cypherpunks
Threads by month
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
September 2013
- 75 participants
- 292 discussions
22 Sep '13
----- Forwarded message from ianG <iang(a)iang.org> -----
Date: Sun, 22 Sep 2013 15:32:42 +0300
From: ianG <iang(a)iang.org>
To: cryptography(a)randombit.net
Subject: Re: [cryptography] [Cryptography] RSA equivalent key length/strength
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:17.0) Gecko/20130801 Thunderbird/17.0.8
On 19/09/13 00:23 AM, Lucky Green wrote:
> According to published reports that I saw, NSA/DoD pays $250M (per
> year?) to backdoor cryptographic implementations. I have knowledge of
> only one such effort. That effort involved DoD/NSA paying $10M to a
> leading cryptographic library provider to both implement and set as
> the default the obviously backdoored Dual_EC_DRBG as the default RNG.
So, boom. Once the finger is pointed so directly, this came tumbling
down within a day or two.
http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-ou…
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrb…
One mystery is left for me. Why so much? It clearly doesn't cost
that much money to implement the DRBG, or if it did, I would have done
it for $5m, honest injun! Nor would it cost that to test it nor to
deploy it on mass. Documentation, etc.
What are we to conclude was the reason for such a high cost?
Conscience sedative? Internal payoffs?
> This was $10M wasted. While this vendor may have had a dominating
> position in the market place before certain patents expired, by the
> time DoD/NSA paid the $10M, few customers used that vendor's
> cryptographic libraries.
Another theory - take a fool's money?
And, what happens to RSA now? If this is business-as-usual, does this
mean that when the Feds show up to my door with 'a proposal' that I
should see the mutual interest in sharing my customer's data with them
by means ecliptic & exotic? Take the 30 pieces of silver (adj. for
2000 years of inflation), and be happy they're also keeping my
struggling business in the black? Or grey?
Or, is it the new Crypto AG? Is RSA the new byword for sellout? Does
RSA go out of business? An Arthur Anderson event?
In which case I have no choice. I have a reason to preserve the
privacy of my customers, and tell the NSA I'm not interested in their
cyanide pill patriotism.
iang
_______________________________________________
cryptography mailing list
cryptography(a)randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography
----- End forwarded message -----
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
1
0
Nothing more useful for spies than widely trusted cryptosystems.
Nor do they ever reveal cracking the highly reputable. Neither
confirm nor deny. They do leak vulns, participate in standards
settings earnestly and lackadasiacly, fund good and bad research,
buy good and bad systems, hire good and bad staff and contractors,
engage in open and secret enterprises, issue truthful and false
statements, advise and mislead political leaders in public and
in secret briefings, claim to obey civilian leaders and disobey
them. As Hallam-Baker reported, NSA when confronted with A
and B choices, select both. This obligatory duplicity is avowed
necessary to conceal what is good and what is bad, both
classified for deception.
Presumably there is stash of comsec revelations pre-positioned
for implementation as needs arise and also when needs do not
arise.
Duality, duplicity, duping, is the lifeblood and poison of security
as well as insecurity, neither ying nor yang can exist without the
other. Paranoia sustains information assurance.
AES will succumb when the time is ripe for a newborn. Perhaps
the time was ripe for Snowden to midwife the inevitable failure
of NSA and ilk.
Recall NSA's 1997 paper on the inevitable failure of computer
security. Imagine a similar one on encryption awaiting disclosure.
Imagine what would replace encryption as the duplicitor of choice.
Then scale up.
Imagine what will replace over-centralized, over-grown, unmanageable
NSA and its mushrooming gaga'd critics. Not DIRNSAs retiring to
shyster duties, cryptographers gone fat feeding marketable
personnas, not Alice, Bob and Chelsea, not NRL-dudes rigging
the Tor 3-card monte, not end to end rotted MITM and at both ends,
not anything once daring and taunting like cryptoanarchy,
not prize winning WikiLeaks and granting EFF, not fleecing
fat cats and fans for FOI liberation and forever elusive privacy,
not spooning bits of spy feces into yawning mouths of readers.
Then scale down to non-secret means and methods accessible
to everyone. Even the end of official spying and its inevitable
corruption of government by out of control secrecy and dependency
upon the toolmakers of secret comsec.
But can cryptographers imagine the end of cryptography or
are they as bone-headedly duplicitous as those who pay them
to promote paranoia, secrecy, distrust and protection.
At 09:39 AM 9/22/2013, you wrote:
>On 22/09/13 16:05 PM, Ed Stone wrote:
>>Why has AES escaped general suspicion? Are we to believe that NIST
>>tested, selected, endorsed and promulgated an algorithm that was
>>immune to NSA's toolset, without NSA participation and approval?
>>NSA involvement in DES is known, but we await cryptanalysis or
>>Snowdenesque revelations before having skepticism about AES?
>
>
>NIST didn't really "test, select, endorse and promulgate" the AES
>algorithm, and neither did the NSA.
>
>The process was a competition for open cryptographers, not
>agencies. It was done this way because we strongly suspected DES interference.
>
>Some 30 algorithms were accepted in the first round, and subject to
>a year or so worth of scrutiny by the same submitting teams. This
>then led to a second round of 5 competitors and another long-ish
>period of aggressive scrutiny. The scrutiny was quite fierce
>because the reputations of the winners would be made, so the 5 teams
>did their darndest to undermine the competition. Many famous names
>were hoping for the prize.
>
>It is the case that NIST (and probably the NSA) selected Rijndael
>from the 5 finalists. But they did so on the basis of a lot of
>commentary, and all the critics was agreed that all 5 were secure [0].
>
>So, claiming that the NSA perverted the AES competition faces a much
>higher burden. They would have had to have done these things:
>
> * pervert some of the early teams,
> * pervert the selection process to enable their stooges through,
> * and designed something that escaped the aggressive scrutiny
> of the losers.
>
>It's possible, but much harder to get away with.
>
>In contrast, with the DRBG adventure, NSA designed the process, and
>tacked it onto a more internal NIST standards process. Little or
>minimal scrutiny from outside, and little or minimal perversion of
>outsiders necessary in the standardisation phase (but that did come later).
>
>
>
>iang
>
>
>
>[0] At the time, myself and my team followed it, and we predicted
>that Rijndael would be the winner ... just by reading all the
>comments. Note we weren't serious cryptographers, but we provided
>the Java framework for the competition, so it was a
>_______________________________________________
>cryptography mailing list
>cryptography(a)randombit.net
>http://lists.randombit.net/mailman/listinfo/cryptography
1
0
Sorry that this question is only tangentially related to cryptography.
Then again, a lot of the stuff here is only tangentially related.
Could anybody here link me to some good resources on chaos theory? I'm
not looking for anything specifically about certain chaotic systems
(like the Lorentz Attractor or Chua's circuit), but instead about
general methods to identify and evaluate chaotic systems. Maybe
something related to calculating fractional dimensions, &c.
This would be a great help.
Thanks,
// Collin
--
VAQIiCiFqqG09YDAYW3rTAUtZqnwNoZkb/ZPm/so4t/CBKQbkMfYL5nujXRI
6+v5Doa2f+X1c9kAUXxElM+B0vrFUCu54tkYyDoi9fzDJB7oLag6Gj+sqoyM
kgbVGy3Ej1YnbY/11Rys/WIarJN6CsQCyI3lZPm6a7SgAvAzroSXwH1GkQuS
MinnS7/RybV3mKp7fMM0NwWqi6FLkLbjZUKAQC1m7nJHmaApGbu2/YOdFXHJ
3DXmVa2HTtANZEER5tD9W0pYn1gxor98wKY/lkFAy+kCohuZi0bgVgOgRDgg
xhRYHAMkmlSyjuK1TRj7e6nuAcvSAVVrAH+n+nSOxA==
1
0
Re: [coreboot] [liberationtech] Fwd: Firefox OS with built in support for OpenPGP encryption
by Eugen Leitl 22 Sep '13
by Eugen Leitl 22 Sep '13
22 Sep '13
----- Forwarded message from David Hendricks <dhendrix(a)google.com> -----
Date: Fri, 20 Sep 2013 12:07:00 -0700
From: David Hendricks <dhendrix(a)google.com>
To: Patrick Georgi <patrick(a)georgi-clan.de>
Cc: Coreboot <coreboot(a)coreboot.org>
Subject: Re: [coreboot] [liberationtech] Fwd: Firefox OS with built in support for OpenPGP encryption
>
> Both of these boxes let you reflash your system firmware with your
>
>> custom build of BSD-licensed TianoCore UEFI.
>>
> BSD-licensed TianoCore + heaps of binary modules that are currently only
> available under NDA.
> They'd also require some additional code (probably binary only?) to make
> Tiano resembling something like a complete and secure implementation.
And as far as FOSS firmware development goes, Gizmo Board (
http://www.gizmosphere.org/why-gizmo/gizmoboard/) is far superior and
actually ships with fully functioning open source firmware derived from
coreboot. No blobs, no restrictive licensing.
> <soapbox>
>> There is a large OEM/ODM/IBV/IHV/ISV ecosystem that currently runs the
>> hardware, and it is UEFI-centric. IMO, focusing only on fringe
>> Lemote/Coreboot technology is not a good bet.
>>
> coreboot is your only bet on x86 if you aim for open source firmware. It
> can be combined with TianoCore to provide the UEFI APIs to the user (read:
> Operating System), but TianoCore alone won't do since it lacks hardware
> initialization drivers (that coreboot provides).
Indeed. TianoCore is not a full firmware implementation -- It usually sits
atop a layer cake of non-free / binary components that do the actual work
of initializing the hardware.
As Patrick points out, Coreboot running with TianoCore on top as a payload
can accomplish what you seem to be asking for. There has been substantial
work done here already, so if you *really* need UEFI services you can work
on polishing it up:
http://www.phoronix.com/scan.php?page=news_item&px=MTI4ODU
--
David Hendricks (dhendrix)
Systems Software Engineer, Google Inc.
--
coreboot mailing list: coreboot(a)coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot
----- End forwarded message -----
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
2
1
// again, disclaimer: observations of a naive observer...
--- on pattern matching ---
there is a significant difference between evaluations that search for
recognizable patterns and structures based on relativistic pseudo-truth
versus empirical models of truth, removed of falsity.
in the former, a pattern match thus verifies pT=pT in some way that retains
the error rate as part of its structural assumption though likewise could
be considered true by default of the match. in this way the [sign] itself
becomes the truth, as if the pattern itself is true, an accurate model. it
is thus possible for an ungrounded viewpoint to be validated via pattern
recognition and *believe* in the legitimacy of the model because it is able
to locate and recognize and categorize patterns, validating the approach.
that it works confirms that what it is doing is true, as an assumption.
statistics and mathematical modeling often can validate this as forms of
'objective reasoning' that are themselves likewise ungrounded, as if an
approximate algorithm is by default removed of its estimations or need for
ambiguity and via binary 'reason' these inaccuracies can be denied and-or
discarded from questioning the approach itself, the error rate relied upon
and becoming structural to sustain the viewpoint, functioning as belief.
[sign] = [sign] equated with truth
the point is that the sign could be ungrounded, weakly or inaccurately
modeled, and thus a rounding error or observational bias is involved...
[pT.sign] = [T.sign] via pattern match
a quick way of saying it is that there is some unaccounted for subjectivity
involved (a=b) yet also ignored that presumes A=A is the evaluative result.
the issue appears to be that the [sign] itself is arbitrary to an extent,
and does not require investigation beyond its context in language for the
observation to be considered true- seemingly that a concept represented as
a sign effectively is equated with what it is meant to signify, therefore
it may not actually have external truth outside of the language system that
instead functions as if this truth. the pattern match is with the [sign]
that is the word, not what the word references, because the word can be
viewed as its truth. that would be a worst-case confusion, lack of rigor to
the point that this distinction is not being made, allowing the shallow or
weak correlations to exist. at the very least 'computers' could do this,
though likely many a person could likewise who does it think it through
further or allows ideological presumption to take hold of observation by
default of existing structures, without correcting for errors or ambiguity.
an empirical evaluation in contrast would secure the [sign] in relation to
truth firstly, thus when a pattern is match, this match does accurately
correlate with truth, the concept having been removed of known errors.
[T.sign] = [T.sign] via pattern match
although again it must be said this remains contingent and in a realm of
the grey area, within the middle N value (1-N-0) in either a 3-value or
N-value paradoxical evaluation, tending towards absolute truth yet bounded
by worldly limits to only allow a high percentage or reliability (nine
nines) and thus the binary 1/0 instead may function as a sliding scale, in
that it may be effectively '1' yet never absolute, always contingent and
always returning to a state of perpetual questioning, testing of hypotheses
against new evidence and additional structuring. thus a match is still not
'absolute truth' -- instead it is an extreme likelihood and highly weighted
toward truth, yet upon further investigation or data could be overturned as
an observation if the model is somehow flawed and thus error corrected. in
this way a failsafe exists in the observation allowing for correction,
whereas a binary model (either/or) would not be able to make this change
after having decided its state, or if it did it could break the entire
worldview whereas for a paradoxical weighted approach it seems much more
likely that a paradigm shift would rearrange or reconfigure the
perspective and that it would be possible to do this within a malleable
framework that is capable of handling ambiguity, unknowing, multiple
hypotheses at once. and perhaps what this indicates is that a [sign] for
paradoxical pattern matching may exist in superposition, in various
different configurations by this probabilistic weighting, and only over
time resolve the overlapping or contrasting dynamics- which then would
indicate a field of its inquiry, versus a binary approach that would choose
one interpretation over another while discarding its validity within the
model, or so it is assumed.
and perhaps this last aspect of superposition is a new take on synthesis as
it relates to the paradox of theses and antitheses for a given [sign], that
logical reasoning mediates this condition via panoptic observation.
--- on turning ---
this is speculation though i have a strong intuitive sense that forcing a
binary ideological structure into a paradoxical condition would in turn
double everything that exists in that system, via the new codebase. (?!)
another way to say it is that the pT.1 of binary observers would exist in a
context of truth (T) of empirical observation and the removal of error will
destroy the ideological structure needed to maintain pT.1 as if absolute
truth, thus forcing it into recognition as a partial view, pseudo, while
incapacitating the false ideological structures that prop up the viewpoint,
such as invalid or false assumptions. in its minor state, pT.1 can no
longer determine shared truth in the larger empirical context, for others
and must submit to the larger interpretive framework and shared context,
insofar as it is valid and legitimate and removed of errors. In this way
the binary observer _must accept 'other truth' that accounts for the larger
totality of truth (T), that is pT.2, pT.3...pT.N, and thus everything that
is T minus pT.1, which could be this doubling of truth that must in turn be
mediated beyond the binary constraints. If the observer is unwilling or
unable to do this, they would be incapacitated in logical reasoning with
other observers insights as a shared model, to uphold an ideological POV.
yet if they accept it, their minor truth by comparison is limited in
controlling the interpretation and thus forces a compliance with truth that
in effect no longer allows the old presumptions and positions to be
retained. if this was a ploy, internal contradictions would likely be
noticeable or a fakeness in this process. It probably could not be very
well mimicked though if it were, could only last so long before tension
between competing views internal and external caused psychic collapse. it
is to say that without 'grounding' in truth, or its actual observation,
that 'going along with things' in a paradoxical framework without truly
believing in the process, recognizing truth in such a way, could be a self
destructive process if the person remained binarist, and this intolerable
conflicting position between logics could force submission due to madness
of having once all powerful observations instead become minimal at best in
a larger framework, if psychologically unable to see beyond the self's POV.
to try to defeat the larger truth the binarist would have to maintain two
versions of truth, while being able to externally reason in their biased
framework with others, or rely on false frameworks for their evaluations.
it should be readily evident and easy to discern this kind of deception
because binary rationalization would be the governing OS of the person,
even though they may say or indicate otherwise by following, mimicry.
--- questions on random ---
basic electronic circuit with reversed diode for noise. wondering if size
of diode has been correlated to noise patterns-- does a larger diode
generate more randomness. is there any boundary issue for randomness. it
would seem like there would be for linear algorithms versus parallel sets.
for instance, if it were analogous, imagine an aquarium is a smaller diode
and a swimming pool is a much larger diode. and the same effect is going to
be used in both to test for randomness of numbers. how would their output
be compared and evaluated in the same terms, and is it related in any way
to the size or boundary of the diode itself, as to randomness generated.
here is why it seems like it might. if dropping a rock into an aquarium
there would be a splash and waves would immediately start as the rock sinks
to the bottom and thus the boundary condition would influence how much this
outside interaction effects the inside equilibrium. in that higher waves
may form and multiple, if not causing a local splash, and the structure
inside the aquarium could be altered by rock entering its domain.
throwing the same rock into a swimming pool may not have similar effects at
the larger scale, it may sink further to the bottom yet not disrupt
anything else at that scale, and the waves it makes may be minor compared
with the smaller closed environment. whatever influence it may have on the
equilibrium would appear to be much less of a disruption or influence.
then consider throwing the same rock in the middle of the ocean which may
have large waves already and it may not sink for a long time compared to
the other two environments, and it may have negligible effect on wave
creation and may never effect the outer boundary, essentially 'infinity' in
comparison to the aquarium or swimming pool. and thus it may no discernible
effect on the structure that may exist or be considered random, even though
it may have some influence, because it is so infinitesimal.
in this way it is to ask if the 'bounds' or region of randomness may be
related to what is accessed or output as randomness, also in relation to
accessing this state externally or interacting with it, as an influence.
now perhaps this is not an accurate correlation, though i thought i read or
heard mention of various approaches to gleaning information from closed if
not blackbox systems via external diagnostic evaluations seemingly similar
in nature, where a signal may be injected into a realm and read back to
learn of its internal functioning, structure or timing that could be used
to gain access or subvert its operation.
and in my naive mind i relate that to throwing the rock into the bounded
environment and monitoring its trajectory, what is known about it, and
using this perhaps in a way like a random number generator.
if structure of randomness is discernible whatever that mystery is in the
box (aquarium, etc) is assumed to be bad for generating numbers because it
could be used to compromise the security of cryptographic algorithms.
and so if someone were to evaluate the water (numbers generated) and they
could somehow discern a bounded condition that forced patterns somehow,
that would compromise the number generation. or, what if a diode could have
an electromagnet placed next to it and align force fields somehow that
would change the structure of what is generated, yet this may not be
detectable on a circuit board or in an unseen encased or protected device.
and while this is foolish to consider from this naive perspective, without
any knowledge or likely inaccurate assumptions and faulty framework that
does not correlate with the issues -- it is to wonder still if it might
have something to do with a linear approach to this computation that is
requiring of 'no discernible structure' as an a priori constraint. for
instance, what if multiple bit sets queried the diode state for numbers
simultaneously and their interaction was randomized atop the diode return
values, or that these were mapped to 0-9 and not just 0/1 for numbers. or
what if it were possible to do this fast enough such that various sized
randomized numbers could be input into a running stream, such as 1 to 12
variables stitched on after another with concurrent randomness. or multiple
diodes in an array which could be queried both in serial and parallel and
return 'variable' output that may again randomly stream into a string (or a
bit string, if each output were to become a set in a running bit superset).
if someone could influence the operation of those devices, could they still
access the cryptographic secrets of the algorithms or could defenses exist
in the construction and access of randomness that separates these systems.
in a parallel approach why must structure be assume to be a default exploit
for knowing the computational structure if it is actually arbitrary and to
me in terms of bit sets and calculating multiple infinities, this is an
issue seemingly equivalent with the rock and the ocean. whatever local
structure that rock may encounter or microscopic wave does not indicate it
will be able to discern overall structure of the infinite boundary. you
could throw a million rocks in and it still may not have any compromising
effect on whatever detail or area or structure the computation resides in
in a temporal shifting structure that may or may not be 'on' or accessible
in a given interaction- and thus repeated targeting against randomness may
not reveal any greater insight into particular messaging in the infinity
context, or so it is proposed, if 'vertical' computation is involved.
this fool does not realize how foolish they are to consider such questions
so it is funny for me, to neither know nor care how ridiculous this is.
the ragged presumption then is that infinity calculations could function as
a type of 'mystery box' that computation and encryption occurs within and
that randomness is part of this, yet structure within randomness may not
indicate what is or what is not encrypted in that particular approach. it
would seemingly offer randomness, even if structure exists, because
whatever is accessed would be so minor compared to its interior boundary.
if you have multiple sets as a starting point and each has a potential for
infinite x infinite x infinite possibilities, that involves far greater
randomness than a string of binary digits made arbitrary. and it cannot be
easily accounted for by an algorithm, to decipher its meaning, if that is
indeed its basis for randomness because the algorithm could be random, as
with the output, within certain parameters. anything x anything + anything
/ anything = context. what computer is capable of figuring that out, prior
to accessing the crypto code, and doing it repeatedly in real-time in an
ever changing array of numbers and autogenerated code, variables upon
variables. it would seem even an issue of forensics would be no good, as it
could be arbitrary, non-repeating and repeating structures that may or may
not be active or reappear again, themselves shifting or within structures
that open up or close or phase change. maybe a part of a structure is part
of number, touches upon it, and yet that is it. if it is a random would it
in any way indicate the structure it is related to or would it be arbitrary
and thus like looking for a skull in a sand dune based on a ridge that was
formed on one day and gone the next, yet not knowing where the skull is.
so while the serial approach seems to seek out noise, the parallel bit set
approach appears to exist within the noise as a default condition and may
involve a different realm of questions and new assumptions. processing
noise, ubiquitous noise, contextless needles. localized skews, uncorrected
shotglass scenarios. potentially 1,000s of permutations of encrypting code
-- because it is of an empirical 'many' versus 2 or 3 or 5 layered crypto
approaches.
another analogy might be a cloud chamber, wherein if a serial string or
crypto algorithm may be broken if those fleeting cosmic rays were somehow
to momentarily light up and reveal a hidden structure via this interaction.
and yet the detachment of multiple sets in a bit string may not readily be
recognized as a totality because it could occupy more noise than the cosmic
rays introduce into the system or may not work-back to a solution for the
shared framework if it were generated randomly or disconnected from the
output in its arbitrary range of meaning- the boundary where signal may
exist nested in the structure of noise yet not be readily differentiated as
a single structure or active unless those dots are connected or revealed,
which encryption could seemingly hide and would require a key to decrypt.
as if the entire cloud chamber would need to be decrypted, potentially, by
brute force, and thus throwing every externality into the interior realm
yet it could expand infinitely and still not reveal what is on its inside.
or so that is what a conceptualization of nested sets appears to indicate,
when in a noisy, randomly generated environment, signaling not overt.
a monkey-typewriter situation, any probing potentially to reveal meaning.
maybe the mystery box has produced shakespeare upon a dictionary search or
query, and an elaborate false universe opens up, a portal that instead
could be activated and sustained as a false corridor and then be made
operational with doubling and turning of those trapped inside the mirror,
containing and parallelizing the reality, merging yet bounding its action.
thus, probabilities in context of nested infinities could remain unknowns
and unstable. querying the arbitrary data set as randomizer would generate
its own internal meaning, may or may not be connected to other frameworks,
yet ever changing, irrespective of decrypting interpretation. therefore, a
stone thrown into this realm could create its own data yet may not have any
structural effect on what already exists as it exists, or it may access
some angle or detail of a shared framework yet within another perspective
or meaning and thus bounded in another use of the same signage, via not
knowing what is activated or not in a given moment.
why is the RNG not of cloud code formation, such that:
RNG = [N1][N2][N3]...[N^n] => #
such that: N = 0 -> infinity
(or any calculative function or sign or computation, randomized)
this would create a noise ocean, versus a string of binary bits in terms of
a generating structure (seemingly aquarium, in terms of potentially being
able to manipulate the environment to create effects to subvert it).
--- cloud formations ---
to me the issue of encountering a recognizable pattern or symbol formed of
clouds in in the sky provides a context for the issue of bounded infinity
and its interpretation by an observer.
if the universe (U) was considered the largest boundary, and of all the
clouds that may be referenced, it is only the set in certain encounters
that provide this meaningful connection, only a limit portion of the sky at
a limited time and duration, and involves weather patterns, quality of
light, types of clouds, and also the particular observational framework
that provides meaning or links to the symbolism. thus in the set of all
clouds it is only a specific cloud code that has this function, and if it
is not determined by the observer, it may even appear arbitrary from their
perspective.
thus in cloudspace only some clouds are code like this, and it is very
small portion given all the clouds in the sky, for a particular observer.
cloudspace (clouds {code})
now it may be possible that the generation of cloud code is not arbitrary
and this reverse-engineering of individual perspective could deliver a
meaningful cloud formation on demand as if by a script, so an observer may
see in a given instance a given symbol that may not be noticed by others or
be perceived meaningful, except by the observer in a particular framework.
and thus a forced perspective of a sort could format the sky in such a way
and thus write this symbolism into the environment, via magic seemingly.
how it occurs beyond the boundary, observational limits and threshold of
understanding of the observer, and yet there it is, decrypted as it were
from the other surrounding clouds yet if reliant on a time and unique
perspective (ID) it may not be noticed by others or be recognized as having
meaning that may instead have heightened significance in a given moment.
and thus the cloud could, as a sign, relay a signal and communicate ideas
and information this way.
(the comparison with a realm of interior infinities is that it would be
entirely populated by recognizable fragments and 'clouds of meaning', as if
a particulate gas that is held together by various atmospheric charge and
that can be combined or separated and recombine with others layers, and
that universe upon universe of cloud formations could be mapped out, and
may be ever changing, including if patterns included weather-like flows of
data that transform or shift the interior context or keep it destabilized.)
a man in the middle attack for looking up at the sky and instead of a state
of nature, the clouds could be formed within a simulation of nature and
thus the clouds may be data objects that can be manipulated as [signs] of
nature, representing nature, yet not actually nature themselves, only
images, substitutions. the Wizard of Oz scenario, earth populated by
robotic pigeons. the messages could be transmitted in a false POV and false
framework, and thus involve a deception that could lead a person to doom.
'the mystery box' contains both scenarios, potentially. allowing for both
the open extension into the hidden uncompressed domain that could be
developed as an interiority, mapping out infinity structures, and it could
also function as a boundary space that is a false perspective of this, in
some ways sharing the same structure yet within a different zoning that
expands otherwise and is controlled otherwise, involving knowing which
clouds are real and which are pseudo-real, a split of logics the difference
as the signs ground into different frameworks yet remain correlated and can
establish and sustain entangled dynamics within protected boundaries. or so
it is imagined possible, given the nature of labyrinths and perspective.
--- what the hell ---
if i knew anything about electronics i would get a cracked artificial
quartz crystal ball, internally fit it with piezo sensor, temperature
sensor, photodiode on the outside, put tinfoil around it, get a feverish
rotating DJ laser and point it on the inside and output readings from the
various sensors into various combined number producing sequences.
if really clever i would ask a nanotechnologist to prototype the lottery
ball randomizer at nanoscale or have micromachines tooled to do something
equivalent that could be put on a circuitboard. and yet, i wonder, why not
just use the internet as the randomizer and multi set search and randomize
the output. or take a photograph in multiple parallel set evaluation and
randomize that. that is, the reading or data interaction is arbitrary yet
bounded, though the calculation itself could be random, nonlinear and thus
add more variability. and maybe this is already the default, though the
photograph would have structure, yet if the computation based on input is
also random, how could it be so readily traced back to crack encryption.
maybe it is the more times it is referenced and an issue of boundaries, or
that computers are not able to compute 'infinity' numbers to allow this to
occur without constraints, such that speed is all important thus binary or
single streams of random digits not pieced together set after concatenated
set ad infinitum. so maybe it is the serial approach that requires it. if
not this, why not have non-binary character sets as the output and use
that, something potentially arbitrary or unmappable even, as a system. why
must it be a number. why not a glyph or fragment or symbol instead.
--- cryptic symbolism ---
the HIOX symbol is a square Union Jack, easy to identify.
as far as i got with research was the Egyptian Sacred Cut for its origins
as well as Plato, Meno i think it was, where the geometry of the square is
first cut diagonally, this making a quadrant of the HIOX symbol.
http://en.wikipedia.org/wiki/Meno
also important in this is dimensionality, nested platonic solids, whereby a
single unit (say toothpick) can be used to generate five different perfect
forms (the elements: fire, air, earth, water, aether or electromagnetism)
and they each nest within the other forms. this is an entire philosophy
that involves geometry and relations between hierarchical structures. a
small amount of polymer clay and toothpicks should allow the forms to be
built and nested via experimentation.
though an inversion of the HIOX form exists, or an opposite structure which
is the same graphic yet half of it is mirrored, so that the diagonals that
radiate outward instead touch the midpoint of each edge. it is as if a
female version of the form.
there is also a combined symbol with both the male and female dynamics
within them, and from this my contention has always been that data could be
written into this structure fractally, as if sentences could be wrapped
around its at decreasing scale as if encrypting to planck scale. in that it
would lose its legibility yet like a QR code could be read by machines as
if a kind of microdot or data signature file. in other word, what would the
result be if you took the letter A within such a master symbol, then
decided where you would next write the letter B within its matrix, at
another level of scale, and onward through the alphabet. What if you took a
sentence or a book. How much data might be tied to structures that could be
written in the empty space, as if a coastline, if in a decipherable order.'
what if data was written into HIOX and decoded by its inverted symbol. or
shifted inbetween the two, etc. questions, possibilities. cryptic code.
Paris - Eiffel Tower
http://www.pinterest.com/pin/178525572702304954/
attachments: 1.5, 2.0
☸
1
0
--- continued... ---
so maybe nothing is this simple, the previous statements and hypothesis
themselves by default ungrounded, unrelated to the complexity involved in
the existing context for social relations.
what if the control of 'sexual code' and its programming via advertisement
and industries is what formats consciousness and social relations and thus
establishes the false 'common value' which is based on pseudo-truth and in
that inaccuracy, the exploits can occur which turn a situation against
itself by these very dynamics, if not via signs that represent them.
for instance, if every female model walking down a global catwalk starts
resembling Mick Jagger, you gotta wonder if the fake god is a narcissist
who cannot get enough of their own image, even in an opposite sex form. and
what that does to male-female dynamic relations likewise, whose ideal mate
is really this, or is it precisely the vulgarity it involves the corruption
itself, the information warfare and psychological ops against humanity.
for instance, how do you know the object of desire is not a man dressed up
or sex-changed into a woman, and what if paired keys does not address this
or there is deception going on, where female appearance is camouflage to
exploit those with natural desires, turning this connection of potential
love into one subverted by hate, using love against a person as their
weakness. and what if this covert, hostile agenda is normalized instead.
and thus even a woman-hating male psyche could be representing if not also
standing in for women, via simulation or substitution, for social relation.
how do you know the difference between the patterns, how to verify and
validate and secure a connection in truth, versus relying on pseudo-truth
and ultimately what could be lies, then allowing the exploit the access it
needs to corrupt and takeover systems. perhaps most especially in terms of
blackmail or setting up a person for a takedown via these methods.
it is proposed that the deceptions in those domain rely upon lies and
structures of falsehood, and 'iconic' expectations such that, like modular
code and programming, can provide predictable behaviors to exploit as if
based on rulesets that can program step by step the interaction according
to a preordained pattern. and that as long as truth is secondary to this,
whether via money or shared ideology or bias, that in that zone these other
activities could be masked or hidden as an agenda, opaque, in waiting.
whereas in grounded truth and intimate connection, truth is the transparent
shared condition of being, honest and error-correcting and forms the basis
for trust between people, not some other framework. perhaps the only way to
know would be a genuine connection in love, removed of illusion, and from
here to proceed- anything else could be an illusion, about images, and in
this way mirages in the desert of unshared reality, tricksters all around.
love as grounding for intimate social relations and beyond, as it relates
with fundamental and foundation truth, as it establishes solid relations
between people and within society via shared empirical agenda. one, many.
versus its subversion, mimicking of love, exploiting it, to serve some
other end or hidden agenda, and thus false confirmations and shared lies
that enable alternate worlds of deception which can occupy houses, entire
neighborhoods and cities and states via networks, and beyond, to which a
person may find themselves someday lost, every direction misinformation,
every sign post a false indication, leading further and further into doom.
thus the assumption of physical connection and the terror of its subversion
may create a gap between the shared mind and awareness, and the physical
relation with another, even though cryptic communication could occur. and
thus asynchronous relations could exist in their place, as if each person
is on the other side of a boundary that cannot be surpassed without losing
the connection, because it cannot be sustained in the given environment.
and yet entanglement could be present in this sharing of truth, especially
in that erotic charge where worlds align, and in this, the same issue of
keys and secure connection though in a realm of shared memory instead, as
the intimate relation, and thus grounding could occur by validating this
and securing it as a shared truth, in the realm of atmosphere it occupies.
archetypes, jungian psychology, transference of S -> S' and S' -> S'. a
woman walks around with her luscious shoes and wet gleaming nail polish
until another turns a corner and becomes transfixed at the beauty, the
circuit completed, switches turned on in the shared erotic connection and
the alter finds its devote worshipper who receives this extreme pleasure.
the economics of lust and love, these forms of hidden exchange, full of
meaning and insight into the prime motivation that moves the world in its
health and through its dysfunction, sickness. a terror to not have these
dynamics liberated while the ugliness and grotesque can do anything while
those so devoted are trapped and confined by rules and regulations as if
natural instinct and affections area illegal, while regressions, sadism and
misogyny are normalized. impossible for healthy balanced sexual dynamics
when they are not allowed for humans, including the full range connections.
instead all of this is middle-managed, bureaucratized and exploited by an
instilled set of beliefs, at least on the outside, in the world of images.
it is as if there are components of a circuitboard that are made to work
with one another, that have collaborative and beneficial dynamics yet are
not allowed in proximity to one another based on the components that are by
comparison rigged, cheating and taking over the space and rewiring it only
for their kinds, leaving areas of isolation and malfunctioning due to the
inability to access the other, beyond the structural frameworks that seek
to subvert and exploit the connection due to a corruption of its truth.
what is unshared or partly true must be adapted to in order to survive. and
then only to find later on what is missing, where it is located, and the
distance between that may only be temporarily bridged in passing, via a
quick glimpse of recognition of what has been lost in the everyday. and
this can be the truth of love itself, intimacy, grounded connections.
as with a simulation that seeks to replicate another situation, the fakery
can be revealed in its errors, where resolution or detail is lacking and
thus whether via inadequate computation or malmodeling, the framework based
on and supporting this falsity may begin to warp and skew, potentially to
cause accidents and crashes as its compass does not align with the larger
circumstance of shared awareness that it seeks to control and to replace.
so too with fake men and women, shallow and without depth of imagination,
of limited and rigid reasoning, and while 'saying all the right things' it
is these 'ideas' that have already and must always have been said before,
as if referencing a memory database for fake-insight, correct perspective.
again the binary viewpoint is ideal for such a simulative social substitute
whereas a paradoxical situation would throw loop after loop into basic
functioning and become a turing test to figure out to what degree the
internal mechanism can actually calculate something beyond its boundary or
threshold of interpretation. thus pregnant pause one thing, silence another
as the system reboots and tries to brute force the situation again and
again, as if something would be different by merely repeating the trials,
trying to look for an error to exploit to retain old existing worldview as
shared reality, albeit ungrounded and based upon deception, cloak dagger.
the alchemy of relations, natural with natural, artificial with artificial,
and virtual with virtual; yet in their recombination the dynamic exchange
of natural with artificial, or natural with virtual, either tending toward
the cyborg and in their composite, perhaps something akin to an advanced
humanity yet removed of the human and grounded truth as the central value,
the antihuman which seeks to destroy and replace the nature at its heart.
typologies and permutations, chemical models and their transformations and
relations within a geometric context -- not only in terms of being, and
thus identity -- ideas themselves: models, hypotheses, awareness.
in this way, understanding such cryptic code and programming can result in
capturing pieces, turning positions and players via seeding truth and
threshold access, putting the labyrinth on autopilot via these dynamics.
it is thus in symbolic communication that observation often occurs and in
awareness of self and others in this context, within existing or potential
dimensions. and yet to also perhaps be ungrounded, illiterate in this same
way as to how the observations are generated, validated, achieving 'truth'
or does it begin as a fiction until removed of all accompanying errors...
again to language and signs, the ecological relation amongst things, the
associational structures inherent in perception whether or not conscious of
them. to see a sign above a store with stalks of wheat, indicating bread.
or grapes, wine. green grapes, white wine, red grapes red wine and so on,
to whatever level of detail. infrastructural signage. bees as they relate
to flowers and pollination, as this relates to honey. ideas, concepts,
dynamics involved in these structural interrelations. massive code as it
were, societies envisioned structured around the bee, for instance, by
analogy. spiritual significance. deep knowledge of nature and industry, as
systems relate and exchange their shared truth.
and so too, in the more profane and superficial realm, viagra and an male
male virility and breast implants and signs of hyper-feminine nurturing and
the ecosystems of advertising, mass media entertainment, and social
relations based on what becomes a structural pseudo-truth, as if mimicry,
by which to 'shared consciousness' which can be a false perspective and
unsustainable except as artifice, which then is further developed and built
upon as if normal and solid when instead it is not of this same nature or
instinct. it has different parameters of interaction, including detached
sign-based relations where error-correction may be ignored and create a
realm of ideological commerce detached from its physical reality, where
womens breasts become detached from the sex itself via imposters or female
substitutes which stand-in as representers or signs of female being yet
seek to subvert the feminine by doing so, that depth of evil hacking, as it
also relates breast cancer or other defacements, cutting and scarring of
the body and its replacement via another plastic aesthetic, barbie doll,
yet potentially Edward in drag, giving come hither looks on the street.
the point is that -belief is not truth-. yet it can function as this if not
aware of what is being perceived, having an understanding of the idea and a
way of evaluating its integrity. can the belief even be questioned- or is
it beyond the boundary of interpretation. and if so, what might it mean if
a world of children is released into a world of masquerade, and the basic
relations between boys and girls are forged in a world of imposters and
exploiters who seek to destroy these very connections via their subversion.
or short-circuit development of individuals and their relations via abuse
that makes it certain they cannot function in these dynamics, healthily.
what if that code is important too, for security in the state, protecting
shared value, yet exists outside of software and hardware systems today, or
rather- is enabling these types of exchanges via an ideological fortress
built of binary religion and schemes that ride alongside the deception,
providing tools and carrying water and making change at the sideshows.
what if this is the same context for mass surveillance and these are also
'the politics' on the inside, mapping to the same corruption that becomes
oppression of ordinary citizens.
(cf. false perspective in relation to false economy via pseudo-truth, false
reality sustained by maintaining status quo; code as facade.)
what if the government spying of the public is being used to secure a
private ideology as a perpetual, unchecked, governing power via corrupt
language with no accounting for truth in its onesided reasoning.
that is, it is deemed "legal" within a warped and skewed constitution and
is essentially BAD FAITH, functioning against citizens, its subtext
political domination and removing of enemies via guiding to cattle chutes.
the programmatic aspect of this- you say certain things and they, like code
words automatically trigger certain dynamics, as if via mechanism. and thus
the [sign] of something, merely referencing 'the constitution' by someone
who is a 'constitutional lawyer' could be viewed legitimate because what
they declare cannot be overpowered by another interpretation in binary
terms, yet similarly *ignores* all contrary and falsifying facts via
ideology, and therefore relies upon, adds and extends errors into the
shared state framework (like bugs and malicious code) that can be further
exploited by subsequent policy actions -- yet which are never held to
account in an empirical framework of shared truth - beyond language (!)
meaning that the [signs], words and letters equate with this grounded truth
instead of the ones and zeros of truth and falsity via logical reasoning,
whereby acts of state become acts of literature, via private interpretation
said to be and validated as 'the reading' though based upon these flaws
that, in this A=B subjectivity, deteriorate the state in its functioning
due to the loss of accurate grounding and accountability in truth, of and
as truth, and instead only and increasingly partial, serving fewer and
fewer. it is not that someone cannot propose ideas, it is that there is no
error-correction mechanism to stop false perspectives from taking over the
interpretation and thus an imbalanced framework, a corrupted code results.
and mass surveillance contrary to privacy and businesses, franchises and
supermarkets and shoe stores surveilling citizens is a vast obscenity to
the laws of the shared state-- and yet a certain empowered population
likewise seems to believe this is their right and proper managerial place,
providing oversight of others, and thus tangibly 'represents their will' to
promote and succeed in such an agenda.
beneath this is the problem of reasoning in binary terms, as if a fencing
competition, points scored and one side is victorious. or jousting match,
someone brutally dismounted from their vehicle if not impaled. thus fear of
losing and losing face, in binary terms.
versus the greatness of ideas, of truth and concepts and modeling, the
activity of considering things and sharing discoveries and knowledge and
how terrible it has become in an age of universalized communication tools,
the limit becoming ourselves, our limits and lack of imagination and the
ability to think beyond flawed approaches while stuck in serial (binary)
language. perhaps most notable is the role of theory, both in negative
consequences yet also the metaphysical and tacit knowledge developed in
tentative frameworks of interpretation that could and should be salvaged
and brought into common empirical error-corrected realms, for what is true
of what is theorized remains true, yet should not be reliant on falsity or
errored-structures to maintain the hypotheses. because the gap between pT
and T, and pT and F is the realm of the exploit, the subversion, which can
change the stated direction of inquiry via its effects, whether knowingly
by subversion or accident, hijacked by other unaccounted hidden forces.
(note: it is this realm of partial truth or pseudo-truth that is the realm
of paradox. essentially up until now it has been referenced as an
inaccuracy, whereby A=B is considered false, due to limits of explanation
in email format- more likely it would be said B=B equals not-A and thus
would be false, though perhaps this should occur beyond a,b notation and
just use t,f, such that T=F is the paradoxical condition, whereby what is
true about it (T) would need to separated from what is false (F) within a
realm of pseudo-truth, such that:
1 <--- T --- (pT) --- F ---> 0
and in doing this via a perpetual looping testing of the hypothesis, remove
falsity and error from pseudo-truth, distilling the truth to only what is
true (1) so that what remains of pseudo-truth is as near absolute as
possible (towards 100% true, or 1 in probabalistic terms). in this way, a
minor truth embedded in falsity that exists as ungrounded pseudo-truth, say
a tiny fragment of truth to recover from an inaccurate error reliant
perspective (1% or .01) could by this process be isolated and purified,
moving towards 100% or 1 (T). thus the issue of paradox exists in an A=B or
T=F scenario though removes the known falsity from the modeling, such that:
(1) A <--- pT ----> B (0) therefore: (~1 <-- .01) T <==
pT
...in terms of addressing and resolving paradox via hypotheses and testing
models and concepts via multiple observers and shared empirical
observations of the common event from as many angles as available.
A = A (tending towards truth)
A ≅ B (tending toward paradox)
A = B (tending towards falsity)
or so it is proposed there is a nuanced delineation required that has been
missing in previous explanation about the ambiguity involved.)
ideas are like molecules, having edges and vertices and yet this is a
nonlinear approach requiring to some degree a computational context for
such 'conceptual language' to exist within, beyond the alphabetic as a
means to communicate, outside the book, into the circuit and diagram and
empirical model. panoptics central, many observers of a given event and
tallying and error correcting the shared view, removing falsity and thus
distortion and arriving at structures and scaffolding within and between
concepts. truth at its core, logic as the basis for reasoned connections,
and then referencing this model from any point and perspective and moving
through it and making various interconnections as a way of conveying ideas,
truth, perception, experience. school children to grandparents referencing
the same modeling, developing and refining it over a lifetime.
the same idea in part as hypertext^1, in this way such point-line-plane
constellations of data could be mapped into its multidimensional structure
and a single common instance of a concept referenced by all documents, such
that [crypto] links to the concept, error-corrected, hypothesis challenged
model of crypto maintained by tens of thousands of people and debated, in
its entirety, as to its integrity and validity in terms of grounded truth,
where every truth must be accounted for, via probabilistic looping of data
and new data that remains contingent, able to be falsified, error-checked
and corrected as part of the process of logical reasoning / programming.
it would then be possible to develop a periodic table of 'ideas', models
and concepts that are /forms/ that are aligned and grounded in the shared
awareness of empirical truth and thus as code, and can be used for debate.
not a negative interaction of win-lose, instead the intellectual challenge
and joy of sharing views and observations and working-through differences
and learning from one another and incorporating what is true within a model
of shared truth and verifying and refining it as part of this 'reasoning'
that has been lost to private relativistic dialogue in binary terms. in
this way, all ideas, my own completely error-ridden and yet like others,
whatever is true in them would survive the edits in shared evaluation as
'truth' and not just a private observation that functions only as fiction.
whereas what is false would be removed, and what is partially true would
need to be separated into what is true and what is unknown and what is
false, and thus the room for potential hypotheses and further evidence, and
also for the richness in previous outdated modeling that may correlate with
an ecosystem of discovery, providing indications of a process involved that
moves from earliest stages to refinement of these conceptual models. again,
literacy is required, the ability to think and be aware and communicate and
relate in a shared framework, as human observers.
(basically modeling ideas as circuits, formed into molecules. individuals
as circuits, tasks and routines for a new model of personal computing based
on an AI data furnace approach)
---
random notes: voting through digital money, taxes for representation,
steering and percentage weighting towards certain policy priorities and-or
approaches, say funding basic and applied research. also: greatest threat
to tax system is subversion of policy which justifies rebellion against
taxes to fund private state oppression of public, financing own holocaust.
work as info/value, correlated to money/currency via data model. accounting
for work in a realm of symbolic processing, versus manual labor standard.
issue of observing and accounting for crypto state viewed as treasonous by
the binary ideologues, revealing deception of traitors, moles, liars and
deceivers. becomes basis for criminalizing citizens as if perpetrators, use
of surveillance blackmail in this context, free speech and expression the
means to justify further police state tactics to protect those on inside
and in administrative and managerial roles. social hierarchy involved and
protected or secured bureaucratic structures these activities occur within.
---
^1 Project Xanadu by Ted Nelson
http://en.wikipedia.org/wiki/Project_Xanadu
Computers for Cynics 0 - The Myth of Technology
http://www.youtube.com/watch?v=KdnGPQaICjk
Computers for Cynics 1 - The Nightmare of Files and Directories
http://www.youtube.com/watch?v=Qfai5reVrck
Computers for Cynics 2 - It All Went Wrong at Xerox PARC
http://www.youtube.com/watch?v=c6SUOeAqOjU
Computers for Cynics 3 - The Database Mess
http://www.youtube.com/watch?v=bhzD2FKEEds
Computers for Cynics 4 - The Dance of Apple and Microsoft
http://www.youtube.com/watch?v=_xL19f48m9U
Computers for Cynics 5 - Hyperhistory
http://www.youtube.com/watch?v=_9PmIkAYhI0
Computers for Cynics 6 - The Real Story of the World Wide Web
http://www.youtube.com/watch?v=gWDPhEvKuRY
Computers for Cynics N - CLOSURE: Pay Attention to the Man Behind the
Curtain
http://www.youtube.com/watch?v=w950GgRzbJk
⚓
1
0
Hi all,
i would suggest to start tagging the "Subject" for all the messages
going trough the cypherpunks mailing list.
It really help in spooling and organizing emails in everybody inbox.
Mailman does that by default, pre-pending [ListName] in the "Subject" line.
I'd love it.
-naif
4
3
Cypherpunk Eric Hughes: Der Überwachungsalptraum ist wahr geworden - http://t.co/hZAWMTEKWZ (DE only) Die Zeit
Google translation: http://translate.google.com/translate?sl=auto&tl=en&u=http%3A//t.co/hZAWMTE…
--Michael
2
1
--- intro ---
observation based on the assumption that everything is code, to some degree
or other. in this, that everything that can be is mapped into language
systems and mathematical context, and that there is an outer boundary or
edge of description, rationalization, where questions and ideas meet,
beyond pre-existing answers and ideologies- new data or anomalies that
break the worldview, reigning perspective, or shared context.
code is thus not just an invention from punchcard looms for algorithms of
calculation and thus only in its binary format legitimate, nor is crypto so
limited to only be an issue of silicon hardware/software tools for
conveying hidden or secure messaging. metaphor to semaphore as language
itself flips its bits.
quilts an example of stories embedded within a particular structural
system, telling of events and people within an abstracted language
requiring 'increased awareness' or 'new literacy' to decode. patterns-
modular constructions, repeated and unique, style as it relates to
substance and the symbolic- likely a more pure form of communication than
buggy computer code as a basis for the same, seemingly even more secure if
the connection is hidden and inaccessible to the unknowing, except shared
key quilters.
atmosphere created and sustained this way as consciousness, shared
understanding and awareness and value and systems of communication,
association and correlation, and grounding of ideas within the realm of
objects, ideas made tangible via the material and yet not cold and detached
and themselves hidden, and instead upfront, aesthetic creations asking to
be looked at, reviewed, evaluated, inspected, and maybe perhaps you could
also begin to read and understand the stories they are carrying within.
pattern recognition, in this way, though into deeper interpretation than
soup can label equals soup can label, the realm of nuance and
juxtaposition, advanced dynamics of association, frameworks, scaffolding,
structures built to convey such messaging.
in this way, so too flower arranging. decentralized and distributed code
networks, perimeters of dynamic interrelations, flowers appearing at events
as symbolic subtext to mediate exchange or secure and enhance a shared zone
via their given aesthetics. these, wide ranging and as deep as nature and
its understanding. the gear-like flower evoking perhaps a mechanization,
the colors their own language mapping the world and its social dynamics,
love, friendship, drama and danger, specific patterns telling stories birth
to death, celebration to impending doom. sunrises and sunsets, the moon and
birth of stars, and of music in their visual and fragrant ethereal delight,
the reminder of what is missing in the technological assemblage, detached
from nature, by comparison a vase of sensors and LED candlelight fail to
warm the heart, imagination.
and thus the floral arrangement as form of secure communication, for
someone to not know of this realm of cultural literacy, to miss the icepick
flower amidst others, while those who see it know what is arriving next.
and thus of limits and bounds to observation, as crayon-like simplicities
exist for awareness by the uninitiated, especially those without
appreciation for natural aesthetics and their language- and the lost
intelligence that results from this, which itself can be a security threat
if not able to read the signs, especially as they may occupy one's
particular world.
in this way the code of flowers can be a highly developed skill and
awareness, a means to establish secure communication and remote connections
at a distance, even if relayed or in the presence of others, given a shared
framework for interpretation. and so some observers may be effectively
blind to the hidden content or code within, and incapable of reading the
details or structures involved,which could be patterns on the flowers
themselves, the different types of leaves or various plant forms, as these
combine into larger relational structures that can mirror the surrounding
world and provide insight via this correlation and alignment, if developed
as a practice. for some it may never go beyond the color for roses as a
mapping of social protocol, a symbolic and perhaps hollow expectation,
turned into a commodity. another thing. whereas for others this depth and
detail could be as large as nature to consider and communicate within, and
thus not only for the florist, the botanist and those who study and relate
and exchange ideas in these domains, this knowledge enabling code
similarly, across structural systems of empirical observation, this as
'reasoning'.
in this way the disciplines, archaeology to zoology, mechanics to small
businesses of a particular domain, hidden communications through the
symbolism involved in shared frameworks and exchange. at some point,
perhaps, additional messages carried along the carrier waves of these
shared structures and assumptions, rightly or wrongly.
the limit to this or conundrum seemingly being insight, or lack thereof and
instead a rote presumption of some bounded meaning that never goes into or
beyond the ordinary and thus in some sense dead ideas or ideological
dispositions to the same domain. this is the danger of rationalization,
deciding upon or fixing a perspective that may become rigid and
unquestioning, a regime of interpretation that may bound further inquiry,
improvement, and development beyond some prevailing condition. and in this
a lack of insight if not due to lack of reflection or self-awareness could
occur that instills and requires this incapacitation as a normality, as a
mode of existence. whereby things are only what they are, nothing else
beyond the given point of view. it could be the difference between ideas
which are alive and those that are dead.
consider birdwatching where some may observe birds to check off a
particular type of bird from their most-wanted observational list and those
who may observe birds in their backyard or in the park and consider their
existence and enjoy their presence. if birdwatching was just a
pattern-matching exercise the larger issues of birds such as their role as
mobile sensors of environment health and a diagnostic for changing
ecosystem patterns could be detached from this, and thus only the checkmark
matters and amounts to a leisure activity without greater insight into what
is actually being observed. whereas if birding data is fed into larger
databases by bird watchers or others who monitor habitats, that can help
build maintain and adjust models to help account for present and future
ecological dynamics, which can relate to policy if it were a value in
civilizational development, versus a footnote without a feedback loop
enough to actually alter the dynamics, due to development patterns having
turned the entire realm of wildlife into compartmentalized zoos, emptied of
larger species of wildlife, the state parks now held within zones of
unending suburbanization. those who can see and understand what it means
when there are no robins singing in spring may then understand the
signaling of nature in regards to its pattern language, or as with clouds
and weather, connect with this natural knowledge and as others likewise,
relate in a shared awareness and domain with regard to its meaning,
substance.
in this way, the pileated woodpecker may signify something and in its
mystery, in sighting or observing it, there can be insight to find it in a
location that it has never been seen or known to exist. and likewise, a
card sent in the mail of a bird or wildlife scene may similarly evoke such
messaging, for the initiated. this is the realm of the symbolic and reliant
on shared awareness and understanding, else to simply evoke something
intangible that may never be understood in its depth for those without such
literacy, and therefore remain in a realm of mystery, missed connection or
a subtext that is inaccessible, though perhaps through another observer
this same event will find its grounding via secure connection. the
importance of boundaries and thresholds, and how bias skew and distortion
could create barriers to interpretation because some event is *unlike* and
thus may remain unobserved in its dimensionality where such meaning may be
encoded, if not encrypted, and this could be of a natural realm, nature
itself, or guided by human involvement and shaping of perception, as with
cards or arrangements or research developing and sharing perspectives.
though as information itself, whatever its substance, it would appear to
exist as knowledge that functions as code, has programmatic qualities and
degrees of comprehension that can lead from genetics and throughout the
chemical and biological sciences outward, to ecosystems and habits and
society and customs and rituals, and thus anthropology and onward, to the
mundane everyday that in itself can be extraordinary, simply in sitting in
a park or on the steps of a dwelling and to have such empirical encounters
that may be developed or accessed or communicate in such a realm, here nor
there in the context of technological civilization and yet primary to the
heart, connection with others, and another way of saying and sharing and
conveying vital information, ideas, shared awareness. and in this, a
weather report or gorgeous looping radar image could itself as language, as
a symbolic code, function as if a type of poetry via its visualization of
this ineffable other realm - such that, in its aesthetics, perhaps it is of
much greater value to have a 'painting' of such imagery looping within a
digital frame as a painting that a copy of a copy of impressionist works
centuries previous, as if most telling about what is beyond the door, lived
context. this then of representation, also. as signs align and correlate
with experiences. and the value of awareness, the meaning involved in these
events, their role as shared and unshared code. what are the domains of
this programmatic language and mathematics that you inhabit, like and
unlike others. what domains does this extra-communicative activity take
place. is it within hobbies or passions that make you unique, and how does
your depth of interest relate or bound you from others- what does it open
up in connection and allow for in terms of secure exchange and what does it
close down by its misalignment or lack of connection due to boundaries of
self and-or others?
again, literacy seems all-critical, and in this the issue of sparking or
developing that vital interest that opens up the fascination these
discoveries and revelations can have within a life. the oft told story of
young boys (and occasionally girls) whose fathers' taught them how to take
things apart or worked on electronics kits, many times engineers and many
with electronics backgrounds. whereas for others, the children may grow up
inept, and with no such skills, perhaps as their parents did not have this
same affordance either, thus impacting generation after generation in turn.
graffiti is another area of code consideration, especially in terms of its
ambiguity and potential difficulty in reading or deciphering for the
uninitiated or outsiders, whether via colors or various styles or the
meaning involved, though at the level of the alphabetic- the prevalence in
the "superposition" of multiple potential letters at the same time, within
the same word, to shift meaning via small details that can create out of
one word fragment, sentence-like constructions. this is a remarkable skill
and insight into the code of communicating and is an advanced approach to
that communication keyboard reliant, bounded in any such ambiguitization at
the scale of the letter itself, the typo occurring only by substitution
digitally, tnis, though perhaps it is a similar idea with an additional
typographic element, custom fonts allowing more to occur in the graphic
detournement.
and it should be said, as part of this hidden communication context and of
code, that the cryptic writing oftentimes found on the back of streetsigns
offers yet another potential application of crypto code in the everyday
environment, no computers needed to observe yet without shared library or
literacy, likely impenetrable for meaning. though rumored -these
instructions- related to black helicopter society and direction for covert
civilization who may key in and out of these infrastructural subtexts,
markers as if waypoints, all signs eventually pointing to armageddon, this
way...
--- on color coding ---
here, the sociological and cultural. 'whites' and 'blacks' as racial
identities and how much data and bias can be formatted into worldviews and
nuanced into structures relied upon by group identities. this then ranging
perhaps to context of rainbow as cryptic evaluation of the varying hues,
part of a larger shared spectral condition. and how beliefs, ideas,
philosophies can exist according to these frameworks. it could be more
complex or involved than color alone, and thus issues of boundaries,
rationalizations, and limited interpretations, as this relates to issues of
literacy and shared awareness and 'reasoning'. here again the binary is
most dangerous, to over simplify and then roughcut reality to only a
limited if self-biased viewpoint.
the role of depth in this, what is true is true, and getting or accessing
this truth versus trying to control and maintain some limited version of it
which best suits a partial idea, protecting that 'fragment' in place of the
larger whole and in doing so sacrificing the truth to sustain the larger
structural falsity as if this truth. and thus ungrounded observations often
seek to keep truth out to sustain a flawed POV and protect a version of
events, yet this is very shallow and cannot be sustained beyond the finite
limit, and itself bounds awareness to only what is inside that threshold.
whereas in a feedback based, error-correcting observation of a surrounding
context, the involved 'ecological dynamics' must be related to via accurate
modeling of truth and thus ideas models hypotheses must be able to include
truth of these dynamics and not seek to limit it via rationalization based
on some partiality, as if the whole. terrible language this though like
history, to fold into it humanity and women and not account for these
dynamics then establishes structural distortions, lies even, to uphold and
sustain a given false framework and unshared point of view.
and yet likewise, to seek to include the larger ecological dynamics of
female being the counterpoint within the same private limitation of
feminism establishes its own biases and repeats the structuralization
reliant upon the false perspective, in so far as larger truth is edited out
of the shared human relations, whereby again there is no public beyond that
of private wo|man and it becomes an issue of picking sides. nothing like
having a contest between men and women for the place of representing the
whole of humanity. it just does not make any sense, unless in a binary
framework that legitimates it as an ideology, a tradeoff canceling the
other reality, substituting it for a new one that shares and relies upon
the same structural defects, as origin. thus 'bias' is transformed into a
"right" and people can choose their own reality and this becomes a
political process born of inadequate constitutional code that fosters this
kind of programming that functions against humans and our shared awareness.
this, my view, is likely flawed though offered as an interpretation of
events and seeks to provide context for something that is formatting these
relations and the way they are communicated by others means. certainly
women themselves have developed their own ways of hidden communication and
language, though the further it has become ideological the more fragmented
the 'whole' view has been, where consensus is not an issue only of sex or
gender as a class, because there can be low resolution from any view as to
how it relates to a larger life, beyond a finite issue, as they combine
into a life involving others, including in some cases, the antithesis (if
not men).
for sake of madness if not sanity let us just imagine that the entire world
is run by men and even the domain of women is controlled by men, in some
place more readily yet even in unexpected realms like fashion, to the point
that androgyny tends towards the transvestite as the biased model for the
'shared aesthetics' of women, exhibiting a passive-aggressive hatred yet
viable substitute, where female beauty is replaced by an army of manmade
mannequins that have a male-friendly agenda, as an exploit even of the
sexual domain, a conquering and annihilation of female beauty and its
profanation such that her beauty cannot be allowed to exist without being
subverted, spoiled, used against her, just like corrupt crypto- buying into
it destroys the very idea, and this by design. and so what of an ideology
that could promote such a hidden agenda, what kind of cause would be
involved in using the sign and image of women and female beauty against
herself and also against the men who love her, making repugnant the
fascination and devotion by substituting it for something else (A=B),
therefore amplifying perhaps the ambiguity and confusion and turning
towards another approach, which tends towards the male-male dynamic as it
contains both the male (anima) and the female (animus) between males as a
bounded shared relation and awareness. In this way, the actual female is
removed from the male relation and replaced by another male who takes on
the female dimension, and such programming is used to control sexual
dynamics within the subset of males, such that the basis for relations
becomes:
males (female+male)
And likewise, for the other side of this divide, female relations:
females (male+female)
This in terms of set(subset) relations, whereby male-female & male-male
would be the mating context, and female-male & female-female, in terms of a
sex/gender divide. A lot more to it than this, including adding in
dimensions of patriarchy and matriarchy and also God|desses, as these may
map into both realms simultaneously. And also the psychological basis for
these dynamics in their normality (female psyche of males = anima, male
psyche of females = animus) which is a vital part of the human maturation
process, whereby an adult is balanced in both their male and female aspects
and not seeking to retain only one-sidedness, which can lead to great
interrelation problems including abuse and suffering. The ideal relation of
this subtext code of being then being a 'human female' and 'human male' who
each have their own anima/animus issues that balance across the total
shared circuit of being, and this as a traditional basis for relations and
the wealth of developing long-term relation via marriage.
male (anima) & female (animus)
or in other words, the totality of each person...
male (masculine+feminine) & female (masculine+feminine)
And for each person this weighting could be different, some males may be
more feminine in certain dimensions than others, though more masculine in
certain areas, and likewise women may be more feminine or masculine
attributes, and this would need to be complimentary and balance across the
relations, which is psychological yet also social, which leads to belief
that opposites can actually be very complimentary as the circuitry can have
a full range across all the various potential dynamics.
the point of this being that there are issues of awareness involved in
identity, shared and unshared, and this especially so in terms of sexuality
and gender as it relates to a preexisting biased condition of state and
civilizational development that polarizes if not penalizes and makes
impossible grounded relations between males and females in a way that
'benefits both' and instead via binary relations could become an issue of
~one must lose for another to gain, this a structural condition an thus
destruction of family units and marriages because the foundation of
relations is such that "one person's rights take away another person's
equal rights". and thus an implicit form of submission is involved, both
culturally yet also personally in that to span the sexual and gender
dynamics can lead to normalizing this skew, structures thus reliant on
warping and distortion to maintain 'shared reality' that is actually
unshared and occurs by other means via subset dynamics (intra-woman,
intra-men) as this continues to divide and subdivide until there are no
relations anymore, else they become encrypted and only remote connections
are possible, feasible, because the exploitation and total control is so
complete, so annihilating, that there is no room anymore for love or
grounded passion or connection or shared insight, basically outlawed or
made illegal by the standing mediocrity that rules via this corruption.
and then there is a voice that arises, a shared perspective mapped into the
feminine, Code Pink within a mass mediated landscape that seemingly
represents something of this condition, a counterpoint that just makes
sense as a perspective- a viewpoint that is not confined within the
mainstream view if not due to disenfranchisement as part of a reasoning
process beyond that of private viewpoints- which has a public dimension,
and that males and females can relate to or through via its symbology. it
is as if a secret communication is given voice to say what is thought yet
otherwise not heard, or breaks into consciousness what already exists
within daily flows of relations and yet is silenced via these same
environments, specifically via bias and the role of female imagination and
action being removed from most every domain as having value and worth and
importantly- insight, and knowledge of what is going on. this, the conceit
of male perspective as primary and also superior in awareness, not
accounting for limitations or skew and thus choosing errors over their
correction if the feedback loop is broken or unobserved via power
relations, which is normalized. the burka of ideology forced onto the minds
of women as a means of controlling the state and the 'men' who require this
in order to have their stations, virtually.
--- crypto currency ---
this may be an impossible point to make. it involves the disconnect between
males and females as a structural necessity of the broken code of state and
its effect on these same relations in terms of how they are formatted and
within what frameworks, most especially the context of money- whereby to
survive people have to make decisions that can correlate with choosing
money versus love, say, as a path to existence. and thus 'those who love'
yet are without money, may be without female companionship and connections
while 'those with money who do not love' may have female companionship.
and it is assumed for those literate, that the males and females in these
situations are cognizant of their own conditions and decision-making and
trade-offs involved. and so it is not ignorance and instead perhaps
necessity, that females of interest are oftentimes with males essentially
most concerned with themselves, firstly. while other males who serve women
in their lives and actions may be living without them, though through their
devotion and service seek to reestablish the lost connection.
and this can be as fundamental as truth itself. truth of female existence
both in its existence context, the legitimacy of feminism in a context of
history, and associated politics and policies as a difficult terrain
required to obtain basic changes to the structures that oppress and limit
by default, though also of accompanying bias and distortions resulting from
any such interactions at the level of society, breakage occurring as the
gears are out of alignment across the totality of state and thus
demystifying and making regular the female role as that of another
constituent in a competing marketplace, as if him or her or me in any
instance of the individual and the public prerogative, who gets to speak in
this instance and in what frameworks.
in this way, in all honesty it becomes quite clear: women can be incredibly
shallow, selfish, and exploit dynamics mainly for their benefit and
self-serving viewpoints, and thus error-reliant perspectives and limited
interpretations can lead to classic dynamics that devolve unshared
relations- and this becomes "discourse" on television as wave after wave of
dysfunctional male and female dramas play out on the stage, cheating,
vanity, sexual subversion, physical violence and psychological abuse. as if
the television wasteland is the inner mind and what inhabits the deep
hidden recesses of the unknown, locally, yet as a sign becomes a reference
for given encounters. and thus the empirical aspect of the totality and its
partial relation and interaction. just like the bad man, the evil woman who
may seek to do harm or exploit others. and perhaps this has some relation
to programming, hidden code, reading signs, literacy. just the fact that it
can be acknowledged, perhaps the 'fall of woman' into a state of disgrace
even, as an archetypal form that cannot be allowed to exist anymore in the
corrupted society and thus she is represented by this deterioration
instead. as if 'the symbol' of woman has become her antithesis, by default
of a corrupt state.
this involving a corrupted state of being, likewise, for humans in this
context. the fracturing of higher self into lower realms of malfunctioning,
merely to survive. and thus as context, the opposite of ideal:
broken male <--> broken female
perhaps disillusionment with reality itself, lack of choices or better
options or an incapacitation due to circumstance or unknowing, and then to
look across into the life of another and yet still bridge the gap via
shared understanding, beyond words. that the life still resides within,
there is a shared key between them, and despite everything in surrounding
structures that holds them apart, if the love is there and recognized - the
shared truth of the encounter and connection between them - then perhaps
there is still hope that their relations survives its destruction.
in the profane context, the same dynamic could occur in some sense in terms
of prostitution, whereby a secure exchange could be brokered between the
two via a structural agreement that establishes their relation, mediated by
money, allowing access and connection. and yet it would seem in most cases
pseudo-truth (pT) would be the basis for exchange and that this connection
is occurring in an unshared context more likely by default, or the
circuitry is misaligned in terms of a whole relation as it relates to the
emotional bond between beings. and so in some sense the male may be limited
and remain in their own interiority, albeit externalized via relation with
another, and the female could retain herself within her own boundary,
versus having these dimensions harmonized across a total circuit as happens
in a grounded relation that develops over time, and thus each person can
improve as part of this relation, involving shared commitment though
importantly: concern for the others well being not just in the framework of
the self though also in their framework, to want what is best for the
person and not seek to limit or control it to support only the self.
what is hypothesized is that for a male that is grounded in relation to
female consciousness and truly loves women, that even without "money" a
currency may exist in this as a shared truth that could be recognized by a
woman, and for this example it is to retain the context of a prostitute as
a dynamic range such a connection could exist within, of male whose work
may seek to support the human connection and her freedom to develop as an
individual, and a woman who may recognize the love this involves yet
without the money to access or share this secret connection with her.
and thus it is proposed that if this shared truth was recognized, and a
particular form of key exchange occurred, that this same situation could be
transformed by the transformation of this context of relation, whereby
human intimacy could develop via this shared currency of truth, the shared
idea, the belief and value, and in turn this could become sacred
prostitution by comparison, a real connection between these people that
involves shared keys, encrypted communication, shared awareness and
grounded relation that verifies the connection. thereby neutralizing
exploitation that could be inherent and allowing a new realm of connection
based on this shared truth and service and connection, devotion and work
and allegiance.
it is to suggest that perhaps it is in the color of clothing in relation to
another sign that this communication will occur, or perception of flowers
of nature as the realities align, and in this way the aesthetic
communication and its basis in life and love have within them this mystery
and secret that carries a connection that otherwise may seem absent or
entirely profane, and yet the yearning undying heart continues its work and
she knows this, and thus it may be an issue of communication and the
ability to relate in these terms, not as expectation, yet realization that
there may be other dimensionality that is possible, given the right
conditions.
again, like equals in some domains, shared connection or understanding or
atmosphere that correlates in special moments, this another realm of
patterns, shared identity, value, principles, purpose, respect of other
views and gaining understanding and knowledge likewise. in this implicit
connection, what is shared is truth, what is secured is truth, what is
grounded is truth between them.
(that she knows you respect her, what you are doing is for her, that you
care for her... that you are not trying to game and exploit her.
peer-relation. human. and then perhaps, the hope of balance, the larger
truth of this relation between you. such that she too may desire to secure
the shared reality and support the males best for her.)
in this way, erotic truth in a context of code and logical reasoning. its
role in key exchange, encrypted relations, programming, hidden
infrastructures. and of pattern recognition and its relation to ideas,
behaviors, and social relations including onesided ideologies, structures
and frameworks based on error-reliant biased code.
this proposal then for the currency of erotic truth as a basis for
crypto.sex relations, if thoughts and feelings similarly aligned, verified,
exchange made accessible via shared agreement, within the defined
parameters of relation.
(in most all cases it would be up to her to initiate the potential for
intimacy, secretly indicating willingness to relate within shared
dimensions via pattern-based communications. are you aware of the codes she
communicates within... the aesthetic domain where her insight is supreme,
and where truth indeed aligns with beauty)
1
0
Re: [liberationtech] Fwd: Firefox OS with built in support for OpenPGP encryption
by Eugen Leitl 21 Sep '13
by Eugen Leitl 21 Sep '13
21 Sep '13
----- Forwarded message from Micah Lee <micah(a)micahflee.com> -----
Date: Fri, 20 Sep 2013 11:15:54 -0700
From: Micah Lee <micah(a)micahflee.com>
To: liberationtech(a)lists.stanford.edu
Subject: Re: [liberationtech] Fwd: Firefox OS with built in support for OpenPGP encryption
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130821 Icedove/17.0.8
Reply-To: liberationtech <liberationtech(a)lists.stanford.edu>
On 09/12/2013 04:14 PM, Erik de Castro Lopo wrote:
> Bernard Tyers - ei8fdb wrote:
>
>> Stefan: Why not?
>
> For verification, OpenPGP on smartphones is *possibly* ok. For
> a device used to sign or encrypt smartphones are totally
> inappropriate regardless of the potential convenience.
>
> No such agency and the like are almost certainly able (with the
> help of carriers and manufacturers) backdoor and exploit all
> the major smartphone brands and models [0].
>
> Smartphones are horrendously complex, rely heavily on untrusted
> binary blobs, have mutiple CPUs some without direct owner/user
> control (eg the CPU doing the baseband processing) [1].
> Currently these devices are impossibly difficult to secure.
>
> Erik
>
> [0] http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-sm…
> [1] http://www.geeky-gadgets.com/baseband-hacking-a-new-way-into-your-smartphon…
I completely disagree. Ubiquitous end-to-end encryption will help
protect against *dragnet* surveillance. The fact that smartphones are
imminently pwnable doesn't change this fact. Even if you're using a
Carrier IQ-infested/baseband backdoored device, adversaries would
still need to *target* you in order to compromise your OpenPGP
conversations.
Saying that we shouldn't encourage OpenPGP on smartphones is like
saying we shouldn't encourage it on Windows computers either. There's
a big difference between encrypted internet traffic and endpoint
security, and just because the endpoint isn't 100% secure doesn't mean
you should give up on encrypting traffic.
Undetectable, sniffing the wire eavesdropping is the preferred way
that NSA and GCHQ conduct surveillance. Every time they try to hack
into a laptop or smartphone they run the risk of detection. They might
be really good, and detection might be very unlikely, but it's still
risky because these are active attacks, and they are much more
expensive than getting handed all the data passively. They can't
afford to do *dragnet* endpoint attacks.
There doesn't seem to be these same complaints against OTR on
smartphones, and in fact Gibberbot and ChatSecure seem to be
celebrated by this community, but they suffer all the same problems
(and likely even more, because they run on Android and iOS) that
OpenPGP built-in to Firefox OS would. For that matter, RedPhone,
CSipSimple and OStel, TextSecure, and Orbot also all from running on
smartphones. Should all these projects get discouraged too?
At this point, nothing is completely secure. The most talented hackers
I know use ThinkPads (with alleged Chinese hardware backdoors [0]) and
run Debian (researchers recently crashed 1.2k Debian packages with
automated fuzzing [1] -- how many of these are overflows, how many
have already been systematically weaponized by the NSA?). Should we
discourage people using OpenPGP on ThinkPads, or when using Debian?
The best we can strive to do is make surveillance more expensive,
force it to be targeted, force it to be detectable, and make the cost
of spying on everyone as expensive as possible. I'm really happy to
hear that Firefox OS is building end-to-end encryption tools into
their phone, something that I hope all smartphone OSes copy.
[0] http://www.afr.com/p/technology/spy_agencies_ban_lenovo_pcs_on_security_HVg…
[1] http://lists.debian.org/debian-devel/2013/06/msg00720.html
--
Micah Lee
@micahflee
--
Liberationtech is public & archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at companys(a)stanford.edu.
----- End forwarded message -----
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
2
1