Assange-WikiLeaks Crypto Arms Call Triple Cross
Assange-WikiLeaks Crypto Arms Call Triple Cross Applying cryptography's bag of tricks to Julian Assange's introduction to the new book, Cypherpunks: Freedom and the Future of the Internet, entitled "A Call to Cryptographic Arms," it could be taken as a "A Cryptographic Call to Arms," that is, an encrypted warning contained within the plain text. Assange and WikiLeaks, like cypherpunks, is masterfully wily at practicing the characteristic cryptography feature of duplicity, never revealing what is going on beneath public assurances of trustworthiness. Assange and WikiLeaks, like cypherpunks, invoke open-closed cryptographic duplicity as his personal behavior and as the policy of the WikiLeaks initiative. Concealing, obscuring and diverting his personal affairs while seeking publicity, and concealing, obscuring and diverting the inner affairs of the operation for disclosing documents openly. This is cryptography in action. In the same fashion Assange-WikiLeaks has periodically published encrypted packages as "insurance" against takedown, it has also released the unredacted State Department cables by way of a complicated, presumably, orchestrated, leak. The leak of the password to the cable collection by giving it to journalists to publish is a classic instance of cryptographic dupery. Cryptography formulates threats, ruses, disclosures, ploys, diversions, deceptions, double-crosses, triple-crosses to hide strengths and weaknesses, attacks and defenses, lies and dissimulations, assurances of innocence and candor. Crypto AG is a classic instance of NSA deception, among many, to install a backdoor in a widely adopted encrypted system, then leaked decades later as a warning to those who think they can obtain fully secure communication systems. A recent example if that of open source cryptography promoted as means to verify encryption systems by public disclosure and examination. Its shortcoming, and virtue to the wily, is that far from all cryptographers subscribe to the sharing venture -- notably those associated with governments, corporations and mendacious individual efforts, instead take open source and not reveal what is found of its weaknesses (to be exploited in secret) nor what is done with the gift. US spies have admitted they take open source but do not give back. The same could be said of leak sites, anonymizers, IRC, news and mail groups, social media, Skype, varieties of comsec offerings, and the Internet itself among its many levels of access. Offer services, free, paid, purloined or onioned, for which the take is much greater than the offerings -- the standard asymmetric-warfare model, derived from governance, education, non-profits and history's all-time leader, religion, the latter exceeded only by wily hyenas patrolling the herd to mount novel attacks to take down over-confident herdmasters. Cryptographers do not trust one another. Cypherpunks triple cross as ruse. Consider that the Assange-WikiLeaks book Cypherpunks is a cryptographic ruse which conveys an encrypted body of secrets, additional insurance against the takedown of Assange and WikiLeaks to be declared after the volume is widely distributed in print and e-book form. A modern Lutherian proclamation of open and encrypted dissent against the corruption of closed and secret authority. Further, imagine that Assange-WikiLeaks is planting encrypted bits in all its releases which can be decrypted at a future time, to re-assemble into a larger disclosure. In the world of cryptography this would be expected. Cypherpunks advocate this encrypted concealment, dispersion, distribution and future coalescence. Pre-positioning attacks and defenses well before they are needed is conventional warfare -- as well as political, economic and philosophical enterprise. Cypherpunks, before, during and after WikiLeaks, has pre-positioned encrypted packs of arms demurely clothed in dissent from and opposition to governance, finance and faith. This cryptographic call to arms is a triple-cross under a double-cross planted in roots of trust, openness masquerading for multi-level deception, in short, the essence of heavily-armored cryptography.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Everyone respects John for what he does, but it's clear the cheese has slipped further off his cracker in the last couple years. It's saddening. Then again, his messages aren't signed with a key. Maybe the crazy-talk is part of an elaborate psyops quadruple-cross by the Assyrian Illuminati to damage his credibility. On 12/5/2012 3:55 PM, Ted Smith wrote:
On Wed, 2012-12-05 at 13:23 -0500, John Young wrote:
Assange-WikiLeaks Crypto Arms Call Triple Cross <whoa>
Someone's been hitting the silk road a little hard...
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (MingW32) Comment: Using GnuPG with undefined - http://www.enigmail.net/ iQQcBAEBAgAGBQJQwBS0AAoJEEx0OAr3LYCzGXof/31xLKlKWc+26qwepCkVNdKH svvjAlZvgpAeDFfnXON237/+ppXLyYWH9CdE5Qa7z2trMto5nNcBmxpghRreolO1 LcrT7lPX4LIaoKn+ISKc1xNcUZdljezdN7tQC/WBJWGYT+7tY80Bc5mUOL+YoruV Hr8bzTv1P7TAIsUJ+YeAU9O6d/o55jbjQDNCAun+o+0LrwqH2AXC/u/6ccrQr4Dn RfUgSRAqxI71dF/LI6TUVhD0mQWC1/s9EjzqCYF6dpP1dJAOwmXIViychNeGQV+x Dh/VXbTdoG+C1aFxhTva7EoK/huIIddYhmq4eq/FyqR9dKKCKQdYeGVwTw2AXRSc IrkmwlgGIVAez11BjQIy0NolW/OiszWZ3fkn5FASTASbtFQ3hBxjTS8hPQIWdDd8 0/nVKicsht9qCId4XqHXImwBCDSwqFlubjHj9lL4wJjCLpAQphZ2WM3eDnRGw9rc D9CA82EPALbqU/kDycpZR8iKWPSFX5sW/Lj+KQazjQUepyyCKvJuHJMIJsmm4D9a OHS56ZFFHWutmxfhUPaNsovq8mah5o3I6CJxvhngmyesMBvm/jZyGDuXZWaUcVyj lE38WBbXXNIfHTkxrX0kJ1Glw5Aa0vVlLllYMQvKYcK7/DxoGYfsNlVHyg/9R/0O nHIKs3mGlX9T/29kilfFOOUiKelCrmWLATQfwNdWQF+ktYMv02lP0FfpAn/WPEja hhENGxxzfWXe+CqdbhgbIEYjXgnlS+Rdhbu2Ji4naPt3WJ9pVyOro+0VgIDUurzh ZxIxxa6s3wAlMCg6zIaAO8i5mhAf8qbBb7Th1xINCW3ZNr7p+CnksDysOiZsBZ5k EaI4KAuQjfYtUcJOhWx+QxrqtmLVsRpaI9bDPbFCUVbHaqYQCHx4yq2hoqbXeR4H pc/ef5PFM1z7jea21Rkz/w77kTnC7RaBSuignrykP4Xov5ESspdHgPx4h1RTx11B GyXruo+tdcTVr/+WdBIcJH9/0tmETRCizKh0xP3WmGA5V2AR0rW8XR93L7uk+V0e RsIRFeKPJOfYKp5SJzfIiAZmH8QkhPg7fXFqzZXtUd+XZ6HUr3BNiY5ds8Q7HoBz WsyAmvlKCI73az+lBW6UcycADE+5BkyVsJAu90xClH9gxQJ1NQqmsRjh4ZeBp1ck mVjXt4Sn3rgYQP15Q8qEV1HSSa405s6pAH/t9yum9GAH+mE2qSuusgeH2N/BGxIC rxqtvTxgihqd3NRZ27mi++wsz5atBZOeYmAIM6qDfJX2EK6W0XafK30FAWFHCW4I XQ2w4uBp1mUcFpWs8sU+l2NYHkc/JkFk7q03KqVIaFO83tH/QE4WgkBkyU0BhGk= =lekg -----END PGP SIGNATURE-----
Maybe he's like me, and the list strips off his PGP/MIME attachment. On Wed, 2012-12-05 at 17:44 -1000, Cincinnatus wrote:
Everyone respects John for what he does, but it's clear the cheese has slipped further off his cracker in the last couple years. It's saddening.
Then again, his messages aren't signed with a key. Maybe the crazy-talk is part of an elaborate psyops quadruple-cross by the Assyrian Illuminati to damage his credibility.
On 12/5/2012 3:55 PM, Ted Smith wrote:
On Wed, 2012-12-05 at 13:23 -0500, John Young wrote:
Assange-WikiLeaks Crypto Arms Call Triple Cross <whoa>
Someone's been hitting the silk road a little hard...
-- Sent from Ubuntu
Look how deep the conspiracy goes! On 12/5/2012 5:48 PM, Ted Smith wrote:
Maybe he's like me, and the list strips off his PGP/MIME attachment.
On Wed, 2012-12-05 at 17:44 -1000, Cincinnatus wrote:
Everyone respects John for what he does, but it's clear the cheese has slipped further off his cracker in the last couple years. It's saddening.
Then again, his messages aren't signed with a key. Maybe the crazy-talk is part of an elaborate psyops quadruple-cross by the Assyrian Illuminati to damage his credibility.
On 12/5/2012 3:55 PM, Ted Smith wrote:
On Wed, 2012-12-05 at 13:23 -0500, John Young wrote:
Assange-WikiLeaks Crypto Arms Call Triple Cross <whoa>
Someone's been hitting the silk road a little hard...
On Wed, Dec 5, 2012 at 7:44 PM, Cincinnatus <cincinnatus@lavabit.com> wrote:
Everyone respects John for what he does, but it's clear the cheese has slipped further off his cracker in the last couple years. It's saddening.
While I imagine John appreciates the plausible deniability provided by the possibility of mental illness or declining faculties (cf. Uncle Junior), I think you're failing to appreciate the opportunity here to watch a master at work. It's all part of the show, right? John understands the long game (long con?) better than most. -- Greg Broiles gbroiles@gmail.com
On Wed, 2012-12-05 at 20:04 -0800, Greg Broiles wrote:
On Wed, Dec 5, 2012 at 7:44 PM, Cincinnatus <cincinnatus@lavabit.com> wrote: Everyone respects John for what he does, but it's clear the cheese has slipped further off his cracker in the last couple years. It's saddening.
While I imagine John appreciates the plausible deniability provided by the possibility of mental illness or declining faculties (cf. Uncle Junior), I think you're failing to appreciate the opportunity here to watch a master at work. It's all part of the show, right? John understands the long game (long con?) better than most.
Well, there are the following options: * John plays at level 0: he is insane * John plays at level 1: he is sane, pretending to be insane, and we are deceived by this (in this world, you play at level 2, Greg) But it's also possible for a mask to lie beneath the mask, for him to be insane pretending to be sane pretending to be insane. And so on and so forth all the way down the rabbit hole. I'm sure if we asked him what level he played at, he'd only respond "one level higher than you." It's definitely a great show. -- Sent from Ubuntu
So - imo it's not too hard to understand what's going on. First - John isn't insane. Second - read again the first statement. I think you have to re-read his post and try to understand the underlining context. Try - and try again! All the best --Michael On 06.12.2012 05:09 Ted Smith <tedks@riseup.net>:
On Wed, 2012-12-05 at 20:04 -0800, Greg Broiles wrote:
On Wed, Dec 5, 2012 at 7:44 PM, Cincinnatus <cincinnatus@lavabit.com> wrote: Everyone respects John for what he does, but it's clear the cheese has slipped further off his cracker in the last couple years. It's saddening.
While I imagine John appreciates the plausible deniability provided by the possibility of mental illness or declining faculties (cf. Uncle Junior), I think you're failing to appreciate the opportunity here to watch a master at work. It's all part of the show, right? John understands the long game (long con?) better than most.
Well, there are the following options:
* John plays at level 0: he is insane * John plays at level 1: he is sane, pretending to be insane, and we are deceived by this (in this world, you play at level 2, Greg)
But it's also possible for a mask to lie beneath the mask, for him to be insane pretending to be sane pretending to be insane. And so on and so forth all the way down the rabbit hole.
I'm sure if we asked him what level he played at, he'd only respond "one level higher than you."
It's definitely a great show.
-- Sent from Ubuntu
On Thu, Dec 6, 2012 at 5:10 AM, jd.cypherpunks <jd.cypherpunks@gmail.com>wrote:
So - imo it's not too hard to understand what's going on. First - John isn't insane. Second - read again the first statement.
I think you have to re-read his post and try to understand the underlining context. Try - and try again!
if the screed rings not of truth and substance, your mind may be clouded by bias, or you're asleep at the wheel of life...
participants (6)
-
Cincinnatus
-
coderman
-
Greg Broiles
-
jd.cypherpunks
-
John Young
-
Ted Smith