On Mon, Jun 29, 2020, 2:43 PM Karl <gmkarl@gmail.com> wrote:
Just adding on here,

On Fri, Jun 26, 2020, 10:13 PM coderman <coderman@protonmail.com> wrote:
‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
On Friday, June 26, 2020 11:54 PM, таракан <cryptoanalyzers@protonmail.com> wrote:
...
My understanding of Cypherpunks is - as per their Manifesto - that they are trying to build privacy in a world where privacy is becoming a crime.

I thought recently that the biggest 'weapon' against a fascism regime would be to create the inability for that fascist regime to track, locate, monitor and spy someone. 

in the words of every hacker ever: "What's your threat model?"

nation state attackers are fairly infallible, unless you're personally gifted and/or well resourced...

There are different degrees of being targeted.  If you can stay uninteresting, there is still lots of value.  (it's also quite inspiring to see targeted people using privacy technology, as not everyone is free to: and I imagine this helps talk to others without endangering them)

I walk in the street right now. Nobody knows who I am.

check out Clearview AI - and remember this is a commercial, non-classified effort!

Note that many are pausing on facial recognition now due to authority abuse.  The OP would be a dot in a database who might be wearing a coronavirus mask and is associated only with where he walks.
My SIM card isn't linked to any ID (true).

check out "The Find", and other techniques that are designed to work against burner phones; they attack pattern of life data exhaust across all cell tower radios in addition to targeted attacks against specific baseband chipsets of "selected" targets....

Sounds like you need a lot of additional data to build a profile.

My phone cannot track me because it hasn'\t a GPS and so on ...

note that tower based triangulation is nearly as effective as GPS, in terms of geolocation privacy risk.

Effective, but less effective.

I like to keep a phone on hand bought from some physical store that sells a lot of them, with its antennas and ideally radio chips removed or grounded, before it is first turned on.  I like to add a chain inside and keep the device chained to me.  I have seen such devices do freaky things one learns to prevent, like update their system time over bluetooth.  I have found them to be reliable secure storage for now.
I know that with the time that sort of life will be harder and harder. Hence I feel it is a noble task to build a system where people can live a normal life and stay anonymous - as they want.

indeed! as mentioned before:

first deploy encryption to kill passive Eve's ears.
 then keying Hardened end-to-end to avoid active Mallory in the Middle.
  finally, harden Physical Security against burglary and rubber brutes...

All things people have worked hard on but not quite normalized.  Don't forget EMI.
Interesting enugh soon there will be Quantum crypto, and maybe NSA has already it. 
How long can we trust these good old programs such as PGP?  RSA wouldn't last a long time against a quantum computer ...

side benefit of privacy enhancing technologies like Fully Homomorphic Encryption: they're resistant to quantum attacks (e,g. Post-Quantum ready crypto :)


Thank you for this.  Inspiring.  Missing from pqcrypto.org .

Karl

There is proof inside many peoples' electronics.  Proof that a marketing group would contract development of a frightening virus.  A virus that responds to peoples' keystrokes and browsing habits, and changes what people see on their devices.  A virus that alters political behavior en masse, for profit.
There is proof inside many peoples' electronics.  Proof that a marketing group would contract development of a frightening virus.  A virus that responds to peoples' keystrokes and browsing habits, and changes what people see on their devices.  A virus that alters political behavior en masse, for profit.