From clark at metal.psu.edu Thu Jul 1 01:29:14 1993 From: clark at metal.psu.edu (Clark Reynard) Date: Thu, 1 Jul 93 01:29:14 PDT Subject: LEB corruption in Clipper phones--the backdoor? Message-ID: <9307010903.AA03572@metal.psu.edu> ""L. Detweiler"" quotes: >farber at central.cis.upenn.edu (David Farber) writes: >>2. Re chip health. I heard the same story plus yield was very low. >>I also understand that there is substantial redesign going on because >>the story about defaulting to an all-0 key if the LEB were corrupted >>was apparently true. I had heard this story, but discounted it as a 'cyberspace legend.' If this is true, there's the damn backdoor, obvious as the ass on a baboon. As others have noted, simply using the old crummy alligator clip method of wiretapping, sending a spike down the line at the moment of connection, and perhaps even a simple non-IC device like a cable descrambler could tap it, as easily as a normal phone. At the very least, you could record for later decryption, and it would require no more field work than currently necessary. Even with the corruption of analog media such as audio tapes, wouldn't an all-0 key make error-correction for line noise trivial? Corrupt the LEB, and any idiot could decrypt. Even _I_ could do that, with patience and at most a few thousand plaintext/ciphertext pairs (available to any fool with a Clipper chip). Am I wrong here, or is this, in fact, an idiotically simple flaw, so elementary that even the NSA could not have committed such a whopping, cretinous blunder in "good faith"? ---- Robert W. F. Clark rclark at nyx.cs.du.edu clark at metal.psu.edu From karn at qualcomm.com Thu Jul 1 01:45:05 1993 From: karn at qualcomm.com (Phil Karn) Date: Thu, 1 Jul 93 01:45:05 PDT Subject: LEB corruption in Clipper phones--the backdoor? Message-ID: <9307010844.AA24024@servo> Why are we pointing out these flaws publicly? You should let them pass, so that the flawed Clipper chips get widely deployed. THEN you go in front of Malarkey's subcommittee and demonstrate to the whole world how to intercept any Clipper-encrypted conversation without the escrowed keys. Then just stand back and watch the fun begin. 1/2 :-) Phil From nowhere at bsu-cs.bsu.edu Thu Jul 1 06:20:18 1993 From: nowhere at bsu-cs.bsu.edu (Anonymous) Date: Thu, 1 Jul 93 06:20:18 PDT Subject: No Subject Message-ID: <9307011323.AA25759@bsu-cs.bsu.edu> -----BEGIN PGP SIGNED MESSAGE----- Just a few updates: Eric Hollander told me he is working on updating the uclink remailer to only remail encrypted messages (like extropia) so that explains why it seems to be down... for now I moved it to the other remailers which don't support encrypted requests, and alphabetized the list by host. -----BEGIN PGP SIGNATURE----- Version: 2.3 iQCVAgUBLDLkCIOA7OpLWtYzAQFU+gQApPtko5koIevDJmBNo7YPkD3h6ZOybFW8 d7pzJaY6aYAN3DQUS9EHxzMiMrqNllwERvxV1+Ztr9Fgig1Ur7t/OL76WxJryV35 m+F6fOYdq5VP9j37AUr6LUXV4rg4SKcIVCip85eY6UBCLuwcio38wUSAbMbm8fP7 glUzWuSlmtI= =G7/a -----END PGP SIGNATURE----- From elee9sf at Menudo.UH.EDU Thu Jul 1 06:55:19 1993 From: elee9sf at Menudo.UH.EDU (Karl Barrus) Date: Thu, 1 Jul 93 06:55:19 PDT Subject: ANON: free speech Message-ID: <199307011355.AA09915@Menudo.UH.EDU> Wow, Here's an unfortunate case of somebody who could have used anonymous methods to protect his speech and speak without fear: Gregory Steshenko was fired from Microsoft because users on a elist he was on complained. Check out the USENET post (I saw it in alt.comp.acad-freedom.talk) but it was crossposted to zillions of groups. /-----------------------------------\ | Karl L. Barrus | | elee9sf at menudo.uh.edu | <- preferred address | barrus at tree.egr.uh.edu (NeXTMail) | \-----------------------------------/ From nobody at mead.u.washington.edu Thu Jul 1 07:49:06 1993 From: nobody at mead.u.washington.edu (nobody at mead.u.washington.edu) Date: Thu, 1 Jul 93 07:49:06 PDT Subject: REMAIL: list 7/1/93 Message-ID: <9307011448.AA57122@mead.u.washington.edu> -----BEGIN PGP SIGNED MESSAGE----- Q1: What cypherpunk remailers exist? A1: 1: nowhere at bsu-cs.bsu.edu 2: hh at cicada.berkeley.edu 3: hh at pmantis.berkeley.edu 4: hh at soda.berkeley.edu 5: 00x at uclink.berkeley.edu 6: hal at alumni.caltech.edu 7: ebrandt at jarthur.claremont.edu 8: phantom at mead.u.washington.edu 9: remailer at rebma.mn.org 10: elee7h5 at rosebud.ee.uh.edu 11: hfinney at shell.portal.com 12: remail at tamsun.tamu.edu 13: remail at tamaix.tamu.edu 14: remailer at utter.dis.org 15: remail at extropia.wimsey.com NOTES: #1-#5 no encryption of remailing requests #6-#14 support encrypted remailing requests #15 special - header and message must be encrypted together #9,#14,#15 introduce larger than average delay (not direct connect) #9,#14,#15 running on privately owned machines ====================================================================== Q2: What help is available? A2: Check out the pub/cypherpunks directory at soda.berkeley.edu (128.32.149.19). Instructions on how to use the remailers are in the remailer directory, along with some unix scripts and dos batch files. The public keys for the remailers which support encrypted remailing requests is also available in the same directory. Mail to me (elee9sf at menudo.uh.edu) for further help and/or questions. -----BEGIN PGP SIGNATURE----- Version: 2.3 iQCVAgUBLDLfl4OA7OpLWtYzAQHb8wQApHOt2pmOHoRJn7VZqUtZh3b+DLcSDI3i ReClJ//VYO2p30e5ZGlP6zhdfB0N6lbR3nK1d1u6a8hfIKM67Y9KorAgYRrIZr/n 7z/yj8mhX4FG606naDVIy0eXbwX/R5+XiYA00WQNRfhfzYdSxBibmpbdX7mFH/V+ xlkiNkCs+0E= =urKR -----END PGP SIGNATURE----- From nobody at eli-remailer Thu Jul 1 07:57:26 1993 From: nobody at eli-remailer (nobody at eli-remailer) Date: Thu, 1 Jul 93 07:57:26 PDT Subject: REMAIL: list of remailers 7/1/93 Message-ID: <9307011457.AA15378@toad.com> -----BEGIN PGP SIGNED MESSAGE----- Q1: What cypherpunk remailers exist? A1: 1: nowhere at bsu-cs.bsu.edu 2: hh at cicada.berkeley.edu 3: hh at pmantis.berkeley.edu 4: hh at soda.berkeley.edu 5: 00x at uclink.berkeley.edu 6: hal at alumni.caltech.edu 7: ebrandt at jarthur.claremont.edu 8: phantom at mead.u.washington.edu 9: remailer at rebma.mn.org 10: elee7h5 at rosebud.ee.uh.edu 11: hfinney at shell.portal.com 12: remail at tamsun.tamu.edu 13: remail at tamaix.tamu.edu 14: remailer at utter.dis.org 15: remail at extropia.wimsey.com NOTES: #1-#5 no encryption of remailing requests #6-#14 support encrypted remailing requests #15 special - header and message must be encrypted together #9,#14,#15 introduce larger than average delay (not direct connect) #9,#14,#15 running on privately owned machines ====================================================================== Q2: What help is available? A2: Check out the pub/cypherpunks directory at soda.berkeley.edu (128.32.149.19). Instructions on how to use the remailers are in the remailer directory, along with some unix scripts and dos batch files. The public keys for the remailers which support encrypted remailing requests is also available in the same directory. Mail to me (elee9sf at menudo.uh.edu) for further help and/or questions. -----BEGIN PGP SIGNATURE----- Version: 2.3 iQCVAgUBLDLfl4OA7OpLWtYzAQHb8wQApHOt2pmOHoRJn7VZqUtZh3b+DLcSDI3i ReClJ//VYO2p30e5ZGlP6zhdfB0N6lbR3nK1d1u6a8hfIKM67Y9KorAgYRrIZr/n 7z/yj8mhX4FG606naDVIy0eXbwX/R5+XiYA00WQNRfhfzYdSxBibmpbdX7mFH/V+ xlkiNkCs+0E= =urKR -----END PGP SIGNATURE----- From miron at extropia.wimsey.com Thu Jul 1 10:51:18 1993 From: miron at extropia.wimsey.com (Miron Cuperman) Date: Thu, 1 Jul 93 10:51:18 PDT Subject: REMAIL: Error reporting implemented Message-ID: <1993Jul1.172952.10775@extropia.wimsey.com> -----BEGIN PGP SIGNED MESSAGE----- I've implemented error reporting on remail at extropia. The errors are forwarded to errors at extropia.wimsey.com. This is an anon pool (=mailing list). Errors are concise, explaining what went wrong. The incoming Subject: line is used as the (sole) identifier. To subscribe to the error list, send 'subscribe' on the subject line to errors-request at extropia.wimsey.com. For help, send 'help'. - -- Miron Cuperman | NeXTmail/Mime ok Unix/C++/DSP, consulting/contracting | Public key avail AMIX: MCuperman | Laissez faire, laissez passer. Le monde va de lui meme. -----BEGIN PGP SIGNATURE----- Version: 2.2x iQCVAgUBLDMe6pNxvvA36ONDAQHgzwP+J3ra5Z/c8WpNgMlnlfnyAbvLbi8SHgsD HkWHzWr1et+3CP8mt+F/esDIQLmJZuHp+ulZsMowunVdNvfQQy/UU1jeMsepijkJ 2fqIJTjddAgdxs6cIPeZbEHjwFUbfGers5swH7aVe/NM2/W+38zGn3XzdOKHJMly 9llSzJ9K+CA= =V+9b -----END PGP SIGNATURE----- From jet at nas.nasa.gov Thu Jul 1 11:41:53 1993 From: jet at nas.nasa.gov (J. Eric Townsend) Date: Thu, 1 Jul 93 11:41:53 PDT Subject: ANON: free speech In-Reply-To: <199307011355.AA09915@Menudo.UH.EDU> Message-ID: <9307011841.AA01966@boxer.nas.nasa.gov> This is not an official NASA document, nor does it in any way reflect any of NASA's opinions, actions or views. Karl Barrus writes: > Gregory Steshenko was fired from Microsoft because users on a elist > he was on complained. Check out the USENET post (I saw it in > alt.comp.acad-freedom.talk) but it was crossposted to zillions of > groups. This sort of thing happens all the time, actually. A close friend of mine was put on an 'employee improvement plan' (the first step to being fired, actually) because she read/posted to rec.pets.cats. Upon closer examination by her grandboss and subsequent review of her actions before, during and after the plan, it was determined that the action was taken for political reasons. (ie: her boss was looking for a reason to get rid of her because they had a personal conflict). In other words, if they want to fire you, they'll look for a reason. I could be fired for sending this message, if someone wanted to push the issue and my bosses didn't like me. As it is, they do like me, and I do a very good job, so the worst that would happen (first iteration) is an official direction to stop contributing to the cypherpunks list from my work machine. (non-work related use of my government machine.) From fnerd at smds.com Thu Jul 1 13:29:19 1993 From: fnerd at smds.com (FutureNerd Steve Witham) Date: Thu, 1 Jul 93 13:29:19 PDT Subject: Boston cpunx mtg Jul 10? Message-ID: <9307012015.AA22920@smds.com> A good time for the Next Boston area Cypherpunks meeting would be the second saturday of July--july 10, at 6 PM EDT. At least that would be good for me, and easy to remember since it's the canonical time... -fnerd quote me From ftgcorp!dan at uunet.UU.NET Thu Jul 1 13:47:17 1993 From: ftgcorp!dan at uunet.UU.NET (Dan Veeneman) Date: Thu, 1 Jul 93 13:47:17 PDT Subject: Clipper article (and an OCR check) Message-ID: Cypherpunks, This may be old news to most of you, but I just got my HP ScanJet IIc working with Caere's OmniPage Pro 2.1, and thought I'd scan this in to give it a try. Note to D.C. Cypherpunks (or anyone else, for that matter): I'll be happy to scan any documents or newsclippings you send my way. I'm located in Columbia, Maryland. I'm reachable by UUCP e-mail at uunet!anagld!ftgcorp!dan. >From Network World, issue date May 31, 1993. OPINIONS SECURITY PERSPECTIVES BY MICHEL KABAY Vigilance is needed to keep Clipper Chip in check Last month, the federal government endorsed a new encryption technology based on the Clipper Chip. The Clipper Chip will give federal agencies a key to unlock users' encrypted voice and data communications. Network users can live with this situation, but only if they're vigilant about preventing any attempt to make the Clipper Chip the only legal encryption mechanism available in the U.S. The Clipper Chip will serve some legitimate needs. As the U.S. builds its National Information Infrastructure, increasing amounts of data will flow electronically throughout the nation. Users will need encryption to protect their sensitive data. In a multivendor world, having a common encryption standard, such as the Clipper Chip, will simplify protection so users won't even notice their communications being encrypted. However, users have many questions and concerns about the Clipper Chip, as well. Internet users are curious about how the chip was developed: specifically, what companies and individuals were consulted and how the initial manufacturer, Mykotronx, Inc. of Torrance, Calif., was selected. This information might cast light on the quality of the chip and the price to be charged. Internet users also wonder why the algorithm is being kept secret. Without free access to the algorithm, many argue, the scientific community will not be sure that the algorithm actually functions as claimed. Defenders of the plan point to a proposed examination by selected experts, but any closed process leaves open the question of whether there is a back door to decryption. A major user concern involves key escrow, which is at the heart of the administration's proposal. Government agencies would hold pairs of incomplete decryption keys for every Clipper Chip installed in the U.S. To decrypt private communications, a government agency would need to get a warrant to obtain the two parts of the decryption key. INSET: Clipper Chip will give federal agencies a key to users' encrypted communications Anyone who discovers the key pairs for a specific Clipper Chip could decode all encrypted communications initiated by that device, even after the warrant expires. Therefore, the trustworthiness of the key escrow agencies is crucial to avoid abuses of the decryption keys. The partial keys might be stored in databases or generated by black-box decryption devices. Any party involved in creating these databases or devices would be a vulnerable point in the control over decryption. It would be valuable to know whether the federal government has studied the risks and estimated the costs of providing adequate protection. If so, many users would want to evaluate such studies independently. Key escrow for foreign purchasers of the Clipper Chip and for foreign manufacturers will also cause problems. If other countries use the technology and have all the keys in escrow, U.S. users may find their own security compromised by legal systems beyond their control. But the biggest concern regarding this technology is that it could lead to a ban on all unauthorized encryption technology in the U.S. A few years from now, anyone using a non-Clipper Chip encryption method could be assumed to be engaging in crime. Political pressure to ban all non-Clipper Chip encryption could become intense. Making non-Clipper Chip encryption illegal would lead to enforcement problems. Applying the technology only to voice transmissions would raise the popularity of data transmission -- that is, digitally encoded voice file transfers. So it would have to be applied to data, too. But failure to produce clear text using the Clipper Chip decryption could be construed as evidence of illegal encryption, even if the original data stream was not, in fact, interpretable. The prospect of astronomers being arrested because law enforcement officials couldn't make sense of their data on elemental composition of supernovas is pretty funny--if you like that kind of joke. I urge all users to fight any attempt to make the Clipper Chip the only legal encryption mechanism in the U.S. For further developments in the ongoing debate, users should follow the dialogues on the Internet in the Risks forum, the Privacy forum and the new alt.privacy.clipper news group. END Kabay is director of education with the National Computer Security Association in Carlisle, Pa. He can be reached at (717) 258-1816 or on the Internet at 75300.3232 at compuserve.com. -- dan at ftgcorp.UUCP (Dan Veeneman) Fountainhead Title Group From warlord at MIT.EDU Thu Jul 1 13:52:48 1993 From: warlord at MIT.EDU (Derek Atkins) Date: Thu, 1 Jul 93 13:52:48 PDT Subject: Boston cpunx mtg Jul 10? In-Reply-To: <9307012015.AA22920@smds.com> Message-ID: <9307012052.AA09872@toxicwaste.MEDIA.MIT.EDU> I'm probably going to be out of town that weekend, so I can't organize things.. If someone else wants to organize, feel free. Otherwise, I can probably work on organizing the weekend after for this month, assuming people have things they want to talk about and can generate a meeting agenda. I havent had an agenda, which is why I havent called a meeting since the last one in April. Also, I've been busy on my Thesis. ;-) -derek From pbreton at cs.umb.edu Thu Jul 1 14:19:28 1993 From: pbreton at cs.umb.edu (Peter Breton) Date: Thu, 1 Jul 93 14:19:28 PDT Subject: Boston cpunx mtg Jul 10? In-Reply-To: <9307012052.AA09872@toxicwaste.MEDIA.MIT.EDU> Message-ID: The weekend after the 10th (the 17th) would also be better for me. Has Derek or anybody else still got the email addresses of the people who attended last time? ------------------------------------------------------------------------- Peter Breton pbreton at cs.umb.edu PGP key by finger ====================== ================================================== From marc at GZA.COM Thu Jul 1 14:32:44 1993 From: marc at GZA.COM (Marc Horowitz) Date: Thu, 1 Jul 93 14:32:44 PDT Subject: Boston cpunx mtg Jul 10? In-Reply-To: <9307012015.AA22920@smds.com> Message-ID: <9307012132.AA09157@dun-dun-noodles.aktis.com> >> A good time for the Next Boston area Cypherpunks meeting would be >> the second saturday of July--july 10, at 6 PM EDT. >> >> At least that would be good for me, and easy to remember since it's >> the canonical time... I'll be out of town for IETF. Since I'll be attending a DigiCash technical presentation (by David Chaum) and a new "Internet Mercantile Protocols" BOF session, I think I'll have something to offer the group :-) I return on the 18th. But my mother's birthday is the next weekend. Damn. I hate scheduling. Maybe we should just have an August meeting, too :-) Is anybody else here going to IETF? I'd like to meet up with anyone who is. Marc From ejf at world.std.com Thu Jul 1 14:39:35 1993 From: ejf at world.std.com (Eric J Fogleman) Date: Thu, 1 Jul 93 14:39:35 PDT Subject: Boston cpunx mtg Jul 10? In-Reply-To: <9307012015.AA22920@smds.com> Message-ID: On Thu, 1 Jul 1993, FutureNerd Steve Witham wrote: > > A good time for the Next Boston area Cypherpunks meeting would be > the second saturday of July--july 10, at 6 PM EDT. > > At least that would be good for me, and easy to remember since it's > the canonical time... > > -fnerd > quote me Not a good time for me -- I'll be out of town... Any Saturday from 7/24 on is ok w/ me. Eric ===================================================================== ejf at world.std.com 1 Concord Sq #4, Boston, MA 02118 From 72114.1712 at CompuServe.COM Thu Jul 1 18:06:47 1993 From: 72114.1712 at CompuServe.COM (Sandy) Date: Thu, 1 Jul 93 18:06:47 PDT Subject: CLIPPER IN SCIENCE NEWS Message-ID: <930702010048_72114.1712_FHF46-1@CompuServe.COM> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ SANDY SANDFORT Reply to: ssandfort at attmail.com . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Punksters, I have missed some messages because of a computer problem. Perhaps someone has already mentioned or reprinted an article by Ivars Peterson ("Encryption Controversy -- A Fierce Debate Erupts over Cryptography and privacy") about the Clipper, Capstone, et al. in June 19 issue of SCIENCE NEWS. If not, I would be willing to transcribe the article into ASCII and upload it to the list if enough folks are interested. S a n d y >>>>>> Please send e-mail to: ssandfort at attmail.com <<<<<< ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From mdiehl at triton.unm.edu Thu Jul 1 21:53:25 1993 From: mdiehl at triton.unm.edu (J. Michael Diehl) Date: Thu, 1 Jul 93 21:53:25 PDT Subject: PGP and offline-readers In-Reply-To: <2C31A670@kailua.colorado.edu> Message-ID: <9307020453.AA23579@triton.unm.edu> According to James Still: > > >> I am getting involved in networking some local BBS' and > >> message bases. > > The unique feature about CryptoBBS is it's "Post Office." The > P.O. allows callers to set up a p.o. box from which they can > up/download any file (pgp encrypted files for instance) to any > other user on the board without the sysop's approval/knowledge. > It encourages and nurtures an anonymous "mail drop" community > while protecting the caller's privacy. Be carefull! Remember that you may be held accountable for ANYTHING found on your BBS. If someone uses your board to trade credit card numbers..... See ya! > The question is, should I throw away the virtues of a lean 'n mean > app at 80K by adding a dolphin or pgp to it that automatically > encrypts the message base, uploaded messages, etc? Should > we give the BBS caller a little credit and assume he knows to > encrypt at his own machine before uploading the text? Or is > the temptation to make everyone *lick and seal their message > envelopes* too invasive? Typically, you want to assume that user knows NOTHING! You design your user- interface accordingly..... I know it sounds insulting but if this attitude makes your stuff easier to use....what do you care? +-----------------------+-----------------------------+---------+ | J. Michael Diehl ;-) | I thought I was wrong once. | PGP KEY | | mdiehl at triton.unm.edu | But, I was mistaken. |available| | mike.diehl at fido.org | | Ask Me! | | (505) 299-2282 +-----------------------------+---------+ | | +------"I'm just looking for the opportunity to be -------------+ | Politically Incorrect!" | +-----If codes are outlawed, only criminals wil have codes.-----+ +----Is Big Brother in your phone? If you don't know, ask me---+ From zane at genesis.mcs.com Thu Jul 1 22:36:40 1993 From: zane at genesis.mcs.com (Sameer) Date: Thu, 1 Jul 93 22:36:40 PDT Subject: Junk email/encrypted return-path-blocks Message-ID: I've been recently working at the direct-mail place putting rubber bands around mass mailings of junk mail (ah, the wonders of being a poor soon-to-be college student), which got me thinking about electronic junk mail and how such a thing can be avoided. In rl, you can go to the store, buy a product with cash, and you're not put on their mailing list. Buying via mail order, using check/credit-card, etc., requires that they get your address so they can put you on their mailing list, compile statistics about who you are, etc., as we all know. Now, over the net, suppose I wanted to buy an email product. I'd pay for it with digital cash, communicating with the vendor through the anonymous remailers. Now I see a problem in how the vendor will deliver the product. Obviously I can give the vendor my email address encrypted with the remailer's public keys, so the vendor still doesn't know who I am. But the vendor can still keep a database of address-blocks and which address blocks go with which purchases. Then the vendor can compile her mailing list of address blocks, and even *sell* this list to others, with product purchase history. Even though the junk-mailers don't know who I am, they can still flood my box with email. I thought of two possible solutions. The first solution I thought of requires a great deal of bandwidth. The vendor could simply post publicly (to usenet or something) the product I wanted, encrypted with my public key. (Rather, a public key I created just for this venture with a psuedonym so that none could see that it was I who was buying from the vendor.) The bandwidth for this thing would be incredible. The second solution I thought of seems like it would work. When I create the return-address block, it can be given some sort of ID-code (again, like with my other idea posted, similar to the ID-code on peices of Digicash in Chaum's scheme) so when the vendor delivers the product, she sends to encrypted block to the remailer, and the remailer forwards the product to me, and stores the ID-code in its database (doing the proper one-way transformation for untraceability) so that further attempts to use the exact same address-block will be noticed and not delivered. I also thought of creating a digicash like entity, a currency to pay for remailer transactions, so that sending junk mail through a remailer would be prohibitively expensive. It will probably happen anyway once we near the goal of full crypto-anarchy that most remailers will not operate without a fee, while the scheme I present above seems like it would work with both free remailers and those which charge for usage. (And a charge on a remailer which agrees with the market probably won't be high enough to stop a really rich junk mailer from spending the cash on junk mailings.) -- | Sameer Parekh-zane at genesis.MCS.COM-PFA related mail to pfa at genesis.MCS.COM | | Apprentice Philosopher, Writer, Physicist, Healer, Programmer, Lover, more | | "Symbiosis is Good" - Me_"Specialization is for Insects" - R. A. Heinlein_/ \_______________________/ \______________________________________________/ From fergp at sytex.com Fri Jul 2 00:13:18 1993 From: fergp at sytex.com (Paul Ferguson) Date: Fri, 2 Jul 93 00:13:18 PDT Subject: The last word? (forwarded article) Message-ID: <6XL26B1w165w@sytex.com> I took a few minutes (quite a few) and commited this to bidgets. I hope you folks take this as seriously as I do. Cheers. BoardWatch Magazine July 1993 pages 43 - 46 Steve Jackson Games v. US Secret Service by Peter D. Kennedy On March 12, 1993, a federal judge in Austin, Texas decided that the US Secret Service broke the law when it searched Steve Jackson Games Inc., and seized its bulletin board system and other computer equipment. The decision in this case has been long-awaited in the computer world, and most observers have hailed it as a significant victory for computer user's freedom and privacy. I had the fortune to be one of the lawyers representing Steve Jackson and his co-plaintiffs. During the course of the lawsuit, I met many people passionately interested in the issues the case raised. I watched and listened to the discussions and arguments about the case. I've been impressed by the intelligence of the on-line world, and the interest that computer enthusiasts show -- especially computer communications enthusiasts -- in the law. I've also been impressed and distressed at how the Net can spontaneously generate misinformation. Steve Jackson has spent untold hours correcting errors about him, his company, and the case on both the Net and more traditional news media. The decision in the Steve Jackson Games case is clearly a significant victory for computer users, especially BBS operators and subscribers. I hope to give a simple and clear explanation for the intelligent non-lawyer of the legal issues raised by the case, and the significance and limitations of the court's decision. The facts. By now, most people interested in the case are familiar with the basic facts: On March 1, 1990, the Secret Service, in an early-morning raid, searched the offices of Steve Jackson Games. The agents kept the employees out of the offices until the afternoon, and took the company's BBS -- called "Illuminati" -- along with an employee's work computer, other computer equipment, and hundreds and hundreds of floppy disks. They took all the recent versions of a soon-to-be-published game book, "GURPS Cyberpunk," including big parts of the draft which were publicly available on Illuminati. On March 2, Steve Jackson tried to get copies of the seized files back from the Secret Service. He was treated badly, and given only a handful of files from one office computer. He was not allowed to touch the Illuminati computer, or copy any of its files. Steve Jackson Games took a nosedive, and barely avoided going out of business. According to Jackson, eight employees lost their jobs on account of the Secret Service raid, and the company lost many thousands of dollars in sales. It is again a busy enterprise, no thanks to the Secret Service (although they tried to take credit, pointing to the supposedly wonderful publicity their raid produced.) After months of pestering, including pressure by lawyers and Senator Lloyd Bentson (now, as Treasury Secretary, the Secret Service's boss) the Secret Service returned most of the equipment taken, some of it much the worse for wear. By then, Steve Jackson had restarted Illuminati on a different computer. When the old Illuminati computer was finally given back, Jackson turned it one -- and saw that all the electronic mail which had been on the board on March 1 was gone! Wayne Bell, WWIV developer and guru, was called in. He gave us invaluable (and free) help evaluating the condition of the files. He concluded, and testified firmly at trial, that during the week of March 20, 1990, when the Secret Service still had Illuminati, the BBS was run, and every piece of e-mail was individually accessed and deleted. The Illuminati files the Secret Service had returned to Steve Jackson left irrefutable electronic traces of what had been done -- even I could understand how the condition and dates of the e-mail files showed what had happened, and when. The lawsuit. Suing the federal government and its agents is never a simple thing. The United States can only be sued when it consents. Lawsuits against individual agents face big legal hurdles erected to protect government officials from fear off a tidal wave of lawsuits. Amazing as it may sound, you cannot sue the United States (or any federal agency) for money damages for violating your constitutional rights. You can sue individual federal agents, though. If you do, you have to get past a defense called "qualified immunity" which basically means you have to show that the officials violated "clearly established" constitutional law. For reasons I can't explain briefly, "qualified immunity" often creates a vicious circle in civil rights litigation, where the substance of constitutional law is never established because the court never has determine the Constitution's scope, only whether the law was "clearly established" at the time of the violation. The strongest remedies for federal over-stepping are often statutes which allow direct suit against the United States or federal agencies (although these are less dramatic than the Constitution). Fortunately, these statutes were available to Steve Jackson and the three Illuminati users who joined him in his suit against the Secret Service. The legal claims. The Steve Jackson Games case was a lot of things to a lot of people. I saw the case as having two basic goals: (1) to redress the suppression of the public expression embodied in Steve Jackson's publications (including his publication via BBS) and thereby compensate the company for the damage unnecessarily done by the raid, and (2) to redress the violation of the privacy of the BBS users, and the less tangible harm they suffered. The individual government agents involved in the raid were sued for constitutional violations -- the First and Fourth Amendments. The Secret Service was sued under two important laws which embody the same principles as the First and Fourth Amendments -- the Privacy Protection Act of 1980 and provisions of the Electronic Communications Privacy Act of 1986. There were other claims, but these were the core. After the case was pending a year and a half and all discovery completed, the government moved to have thee claims dismissed, claiming qualified immunity. This motion (usually brought early in a case) guaranteed that the trail would be delayed by over a year, because even if the government lost its motion, the individuals could immediately appeal. In December, 1992, the tactical decision was made to drop those claims, rather than suffer the delay, and proceed promptly to trail on the claims against the Secret Service itself. The Privacy Protection Act of 1980. In the late 1970's the Stanford Daily was subjected to a fishing expedition by police officers in the Stanford Daily's newsroom. The police were looking for notes and photos of a demonstration the newspaper had covered for a story, hoping the newspaper's files would identify suspects. The Supreme Court held in 1979 that the newspaper had no separate First Amendment right protecting it from searches and seizures of its reporters notes and photographs if they were "evidence" of a crime the paper had covered -- even when the newspaper was not under any suspicion itself. Congress responded in 1980 with the Privacy Protection Act, which, until Steve jackson came along, was distinguished mostly by its lack of interpretation by courts. The Act's wording is rather obtuse, but basically it enacts a "subpoena only" rule for publishers -- law enforcement officials are not allowed to search for evidence of crimes in publisher's offices, or more accurately, they may not "search for or seize" publishers' "work product" or "documentary materials", essentially draft of publications, writer's notes, and such. To get such material, the police must subpoena them, not with the much more disruptive search warrant. Every BBS sysop should read this act, located at 42 U.S.C. 2000aa in the law books, because I can't fully explain it here. The Act is quite broad, protecting from searches and seizures the work product and commentary materials of anyone who has "a purpose to disseminate to the public a newspaper, book, broadcast, or other similar form of public communication..." It also has a big exception -- if the publisher is the person suspected in the criminal investigation. The Electronic Communications Privacy Act. Two provisions of the Electronic Communications Privacy Act (or ECPA) were paramount in the suit. The plaintiffs claimed the Secret Service violated two provisions -- one prohibiting unjustified "disclosure and use" of e-mail (18 U.S.C. 2703; the other prohibiting "interception" of e-mail (18 U.S.C. 22511(1)). The parties' positions were fairly simple, and laid out well before trail. As for the Privacy Protection Act, Steve Jackson claimed that his company's publication, both in book form and on Illuminati, were obviously "work product" protected by the Act, and the government had no right to seize them, and therefore owed him money for the damages the raid caused his business. The government replied claiming that (1) Steve Jackson Games' products are not the type of publications protected by the PPA; and anyway, (2) the Secret Service didn't know that Steve Jackson Games was a publisher when it raided its offices; and even then, (3) the Secret Service didn't mean to take the books, the books just came along when the computers and disks were taken. As for the e-mail, Steve Jackson and the other BBS users claimed that the seizure, disclosure, and deletion of the e-mail was both an unlawful "disclosure and use," and an "interception" of electronic communications in violation of the ECPA. The Secret Service replied that (1) there was no "interception" because the e-mail was just sitting there on the hard drive, not moving; and (2) the Secret Service didn't read the mail, but if it did, it was acting on good faith, because it had a search warrant authorizing it so seize Steve Jackson Games' "computers" and read their contents. The trial. When the individual defendants were dropped, the case quickly went to trail. The plaintiffs opened their case on January 29, 1993. The trail took the better part of four days; the witnesses included now-familiar names: Timothy Foley and Barbara Golden of the Secret Service, William Cook, formerly of the U.S. Attorney's office in Chicago, Henry Kluepfel of Bellcore, Steve Jackson and the BBS users Elizabeth McCoy, Walter Milliken and Steffan O'Sullivan, and WWIV master Wayne Bell. At trail, Judge Sparks was introduced to the labyrinthine E911 investigation. We also set up and ran Illuminati as it looked on March 1, 1990, and Steve Jackson walked Judge Sparks through his BBS, lingering on discussion areas such as "GURPS Old West" to give the Judge a taste of the scope and breadth of BBS publication and communications which the Secret Service had shut down. The judge had appeared upset by the callous and suspicious manner in which the Secret Service had treated Steve Jackson, and with the Service's apparent disregard for the effects the raid might have on the company. The decision. Judge Sparks decided the case in February, 1993, in a long written opinion. The full text of the opinion is available on the Internet at ftp.eff.org, and on Illuminati itself (512-447-7866). I recommend all sysops and BBS users to read it, as it is one of the very few legal rulings specifically addressing bulletin boards and electronic mail. First, the bad news: Judge Sparks accepted the government's argument that the seizure of the BBS was not an "interception" of the e-mail, even mail that had not yet been read. Essentially, he decided that the definition of "interception" implicitly means "contemporaneously with the transmission"; that is, for there to be an interception, the government must position itself in the data stream. like a conventional wiretap. Since the e-mail was temporarily stored on the BBS hard drive, he held there was no contemporaneous interception. Ruling that there was no interception means two things. First, the plaintiffs did not receive the $10,000 minimum damages a violation of the "interception" law provides, even though the judge found the Secret Service had not acted in good faith. More importantly, it lowers the standard for seizing BBS e-mail -- and threatens to lower the standard for the seizure of all electronic communications which reside long enough in computer memory to be seized (which is most all computer communications, as far as I understand it). To "intercept" wire communications you need a court order, not just a routine search warrant. This ruling (which technically only applies in Western District of Texas) means law enforcement is not limited in its seizure of BBSs by the higher standards required of wire-tapping. Now, the good news: the plaintiffs won the "disclosure and use" argument under the ECPA, getting back most of what was lost in the "interception" decision. First, Judge Sparks found the obvious: that while the Secret Service had Illuminati they or their agents read and deleted all the e-mail on Illuminati, including the plaintiffs' mail -- persons the Secret Service admittedly having no reason at all to suspect of any illegal activity. Next, he rejected the Secret Service's argument that its agents were acting in "good faith." While he didn't list all the reasons, quite a few are supported by the evidence: the Secret Service's investigation was "sloppy", he said, and there was no attempt to find out what Steve Jackson Games did as a business; the Secret Service was told the day of the raid that the company was a "publisher," and refused to make copies or return files for months after they were done reviewing them; and the Secret Service apparently allowed the private mail of dozens of entirely innocent and unsuspecting people to be read and trashed. The judge ruled that Steve Jackson, his company, and the three Illuminati users who joined Jackson in the suit were each entitled to an $1,000 award from the government, as provided by the ECPA. The Privacy Protection Act was pretty much a clean sweep. While the judge and Steve Jackson still differ over how much money the raid cost the company, the court's ruling was squarely in Jackson's favor on the law. Although unconventional, the court found that Steve Jackson Games' publications were clearly covered by the Act, should not have been seized, and should have been promptly returned. At trail, the Secret Service agents had freely admitted they knew nothing about the Act. Former U.S. Attorney William Cook claimed he knew about it before the raid, but decided (without any investigation) that Steve Jackson Games wasn't covered. The Privacy Protection Act (unlike the ECPA) allows no "good faith" excuses, anyway, and since the Secret Service was repeatedly told on March 1 and afterwards that the company was a publishing business there was no defense for the seizure of "GURPS Cyberpunk" or the other book drafts. Most of the over $50,000 awarded in damages was due to the violation of the Privacy Protection Act. Steve Jackson Games publishes traditional books and magazines, with printed paper pages. Is the BBS operator who publishes only on-line articles protected, too? It's a question Judge Sparks did not need to address directly, but his opinion can and should be read to include the on-line publisher. The court's opinion includes the BBS files as material improperly seized, and the Act specifically includes work product in electronic form. Publishing via BBSs has become just like publishing a "newspaper, book, or other form of publication..." -- the only source of news many people get. If the Privacy Protection Act is broadly understood to encompass electronic publishing (as it should) it should provide meaningful protection to innocent sysops whose boards may be used by some for illegal purposes. It should prevent the "preventative detention" of BBSs -- where boards are seized in investigations and held indefinitely -- which seems to be one crude means used to attack suspected criminal activity without bothering to actually prosecute a case. It should also force law enforcement to consider who the actual suspect is -- for instance, in the recent spate of seizures of BBSs for suspected copyright violations. The Privacy Protection Act should prevent law enforcement from seizing a sysop's board who is not suspect in engaging or condoning illegal activity. Those of you who have followed this case will note how little significance I've given to the "Phrack" investigation and the overvaluation of the E911 document. Of course the Secret Service misunderstood or exaggerated the importance of the purloined E911 document, and were chasing imaginary goblins. The real significance of the Steve Jackson Games case, however, was not knocking holes in that one investigation (the Neidorf trail effectively did that), but taking a solid step to set firm, discernible limits for criminal investigations involving computer communication. To focus on the specific foibles of the E911 investigation is to miss the importance of what the Secret Service really did wrong. Out of ignorance or callousness, they ignored the legal rights of people not even suspected of crimes; people who simple shared common electronic space. There are and will continue to be legitimate computer-crime investigations. The closeness that people live in Cyberspace, though, means the government must learn ways to conduct investigations without violating the rights of all the innocent members of the on-line community. In March 1990, the Privacy Protection Act said that Steve Jackson could write and publish his books without having them seized; the Secret Service didn't know that. In 1990, the Illuminati users had the right not to have their e-mail seized and read without at least being suspected of a crime; the Secret Service apparently didn't know that, either. Now they do, and hopefully the word will spread to other government agencies, too. (As of this writing, there is still no decision whether the Secret Service (or Steve Jackson, for that matter) will appeal Judge Spark's decision.) [Peter D. Kennedy is an associate with the Austin, Texas law firm of George, Donaldson & Ford, specializing in civil litigation. George, Donaldson & Ford represents national media, technology and other corporate and individual clients in a variety of civil litigation, including libel and invasion of privacy defense, constitutional law, intellectual property, commercial and employment litigation. George, Donaldson & Ford, 114 W. 7th Street, Suite 100, Austin, Texas 787001; (512) 495-1400 voice; (512) 499-0094 fax; E-mail: gdf.well.sf.ca.us] Paul Ferguson | "Confidence is the feeling you get Network Integrator | just before you fully understand Centreville, Virginia USA | the problem." fergp at sytex.com | - Murphy's 7th Law of Computing Quis Custodiet Ipsos Custodes? From newsham at wiliki.eng.hawaii.edu Fri Jul 2 11:24:10 1993 From: newsham at wiliki.eng.hawaii.edu (Timothy Newsham) Date: Fri, 2 Jul 93 11:24:10 PDT Subject: PGP and offline-readers In-Reply-To: <9307020453.AA23579@triton.unm.edu> Message-ID: <9307021824.AA00266@toad.com> I think a good idea for offline readers would be to build ontop of currently implemented protocols. One protocol worth mentioning is IMAP2. Right now IMAP2 usually runs over TCP but there is no reason why it couldn't run over a serial channel instead (SIMAP :) It allows for remote access to mailboxes from a mail server, and also remote access to builitin-board messages (ie. USENET). There are several packages in development or already in use that use IMAP. PINE for unix's and soon to be available for DOS machines supports IMAP access. PINE also supports MIME and could be extended nicely to handle automatic PGP encryption/decryption of mail (or en/de- cryption with other crypto-systems). Macintosh already has a mailer supporting IMAP, the name eludes me at the moment. The mailers in existence are written for TCP and would have to be modified for use over the serial line, perhaps with a pseudo-packet driver in the dos case. I think this type of solution would be much cheaper and much more feature filled than starting from scratch. Tim N. From 72114.1712 at CompuServe.COM Fri Jul 2 12:15:00 1993 From: 72114.1712 at CompuServe.COM (Sandy) Date: Fri, 2 Jul 93 12:15:00 PDT Subject: CLIPPER IN SCIENCE NEWS Message-ID: <930702190909_72114.1712_FHF95-1@CompuServe.COM> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ SANDY SANDFORT Reply to: ssandfort at attmail.com . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . As requested by some of you, here is the encryption article that appeared in the 19 June issue of SCIENCE NEWS. It's copied without permission, for personal use of list members only, blah, blah, blah. S a n d y * * * * * * * ENCRYPTION CONTROVERSY A fierce debate erupts over cryptography and privacy by Ivers Peterson With a little encryption to hide their words, Prince Charles and Princess Diana might never have suffered the embarrassing spectacle of having transcripts of their private telephone conversations splashed across the front pages of newspapers around the world. The royal couple has not been alone in learning the painful lesson that modern technology has made eavesdropping -- whether officially sanctioned, inadvertent, or illegal -- remarkably easy. Today, cellular and cordless telephones transmit conversations via radio waves that can be readily intercepted. Electronic-mail messages pass openly from one computer to another across a network accessible to innumerable people. "We take for granted that by sealing the envelope or closing the door, we can achieve privacy in our communications," says Whitfield Diffie of Sun Microsystems in Mountain View, Calif. "The challenge of modern security technology is to transplant these familiar mechanisms from the traditional world of face-to-face meetings and pen-and-ink communications to a world in which digital electronic communications are the norm and the luxury of personal encounters or handwritten messages [is] the exception." Modern technology has provided a solution in the form of sophisticated schemes for encrypting digitized sounds and text. Only a recipient with the proper key for unlocking the secret code can hear or read the otherwise unintelligible, encrypted string of digits. Nonetheless, few telephones and computers used by the general public come equipped with either software or micro-electronic circuitry for encrypting speech or text. Indeed, some critics charge that the U.S. government has actively discouraged wide dissemination of cryptographic technology. "Conflicting signals from a succession of administrations have led many to be very confused as to what U.S. citizens have a right to expect from cryptographic technologies and what capabilities the U.S. government would prefer its citizens have available," says Stephen T. Walker, president of Trusted Information Systems, Inc., in Glenwood, Md. . . . In April, the Clinton administration added a new ingredient that set the cryptographic-policy pot boiling. The White House proposal called for the adoption of a novel encryption scheme as a federal standard. It would incorporate a "front door" through which properly authorized government officials could readily decrypt intercepted messages for reasons of law enforcement or national security. the proposal ignited a firestorm of protest from large segments of the computer community. Since then, angry debate over this issue and the more general question of privacy in an electronic age has dominated discourse on many electronic bulletin boards, where individuals can post their queries and opinions on a smorgasbord of concerns. "Not everybody is saying this is terrible, terrible, terrible, but nobody is happy about it," Walker says. The list of dissatisfied parties ranges from major computer manufacturers and telephone companies to privacy activists belonging to organizations such as the Electronic Frontier Foundation and Computer Professionals for Social Responsibility. The administration's scheme has also attracted congressional scrutiny and focused attention on the need to formulate a coherent national cryptographic policy. Many see the resolution of privacy issues as one of the key elements in developing a national information infrastructure, which would allow anyone using a networked computer unprecedented access to libraries, data repositories, and other information sources throughout the United States. "Recent years have seen a succession of technological developments that diminish the privacy available to the individual," Diffie stated last month in testimony before the House science subcommittee. "Cryptography is perhaps alone in its promise to give us more privacy rather than less. But here we are told that we should forgo this technical benefit and accept a solution in which the government will retain the power to intercept our ever more valuable and intimate communications." . . . For many decades, cryptography remained largely a government matter -- an arcane discipline of interest to military organizations and to the secretive National Security Agency (NSA), which routinely monitors foreign communications. But the subject also captured the attention of a few enthusiasts outside government. In the 1970s, the development of electronic communication via the first national computer networks spurred these people to look for ways to protect information in this new, wide-open environment. In 1975, Diffie, working with computer scientist Martin E. Hellman of Stanford University, invented a novel, revolutionary cryptographic technique now know as public-key cryptography. Developed entirely outside of government, it offered a high level of security and privacy to any individual using the system. In conventional cryptographic schemes, the user typically has a "key" that changes all the digits of a message into an unintelligible string. The recipient then uses the same key to unscramble the code and read the message. In a public-key system, the user has one key -- kept secret -- encrypting the message and the recipient has a different but mathematically related key to decrypt the message. There's no need to keep the second key secret because, in principle, there should be no way to figure out the private key from knowledge of the public key. This, everyone has a private key and a public key, which they can then use to encrypt or decrypt messages. Almost simultaneously, the U.S. government offered an alternative, single-key method known as the Data Encryption Standard (DES), for coding information. Although experts outside of government initially harbored suspicions that the NSA had deliberately weakened the scheme to make code-breaking easier, 15 years of concerted effort to find flaws have failed to turn up any serious problems. Many banks and other institutions now routinely use this technique to maintain the confidentiality and integrity of communications involving financial transactions and other matters. . . . One of the first hints of something new in the works came early this year. Last fall, Walker heard about a new AT&T telephone equipped with a lightweight electronic device, basd on DES, for turning a telephone signal into a digital stream of encrypted information. He ordered five of these secure telephones for his business. In January, AT&T representatives told Walker they could only loan him the telephones he wanted; something better would become available in April, they said. Walker noticed they no longer mentioned DES as the encryption scheme. "So I knew there was something coming," Walker says. "But I didn't know what the details were." When the White House announcement finally came, the details caught just about everyone in the computer community by surprise. In essence, the proposed "key-escrow" technology takes the form of two specially fabricated, tamper-resistant integrated-circuit chips -- one, known as Clipper, for encrypting digital telephone signals and another, known as Capstone, for encrypting the output of computers. Information from any telephone or computer would pass through the chip to be encrypted, and a corresponding chip attached to the recipient's telephone or computer would decipher the message. However, the scheme is designed to include another key, divided into two parts, that when reconstituted will also unlock the message. The administration's plan is to deposit these pieces -- unique to each chip -- in two separate, secure databases. The two pieces of a particular key would be released only to officials at such agencies as the Federal Bureau of Investigation who are authorized to tap a particular telephone line. This technology improves "the security and privacy of telephone communications while meeting the legitimate needs of law enforcement," the White House stated in announcing the Clipper chip. "The effect," says Diffie, "is very much like that of the little keyhole in the back of the combination locks used on the lockers of schoolchildren. The children open the locks with the combination, which is supposed to keep the other children out, but the teachers can always look in the lockers by using the key." "Because the key-escrow chip enables lawful interceptions, the government for the first time in history is in a position to promote encryption without putting public safety at risk," says Dorothy E. Denning, a cryptography expert at Georgetown University in Washington, D.C. "As a result of the government's efforts, I expect to see greater use of encryption and, consequently, greater protection of sensitive communications." Administration officials insist the Clipper-Capstone scheme is voluntary. Initially, only certain departments and agencies of the government will be required to use it. But clearly, the administration hopes that various companies will start incorporating this technology into commercial products, at first to supply the government market and then to meet the security needs of businesses and private individuals. This approach puzzles many observers. "If you're not going to force it on people, then it's going to be largely irrelevant for the computer community," says Walker. "DES and RSA [a public-key cryptosystem] are already so widely used in software versions that most users will not even consider converting to Clipper or Capstone, simply because of the additional hardware expense." "Anyone who is seriously seeking to protect sensitive information will use alternative methods, either instead of or in addition to the Clipper-Capstone chips," he adds. That leaves the possibility that the government may eventually ban the use of certain types of cryptography, though officials presently deny any such intent. "Encryption is a technology that could be constrained legally in the same way that other technologies are constrained," Denning argues. "Congress should consider legislation that would impose such constraints." . . . Debating the technical merits of the administration's proposal has proved tricky. Many of the details of the scheme's implementation remain fuzzy, and the government has insisted on keeping secret the actual mathematical recipe, or algorithm, for generating the required keys. "It's very hard to assess something when you don't know what you're assessing," notes Lance J. Hoffman, a computer scientist at George Washington University in Washington, D.C. In contrast, the government made public the DES algorithm, giving cryptography experts a chance to examine and test the scheme thoroughly t vouch for its security. Developed secretly at the NSA, the new algorithm use for the Clipper and Capstone chips will receive no such scrutiny. The government's reluctance to release the algorithm stems from the possibility that some people might then use the algorithm without its accompanying key-escrow provision to create a formidable encryption scheme. "Tis is a powerful algorithm," says NSA's Clint Brooks. "You need some kind of control mechanism . . . to ensure the law-enforcement capability is preserved." The Clipper and Capstone chips also represent only one possible approach to achieving a reasonable balance between unconstrained privacy and the needs of law enforcement and national security. Silvio Micali of the Massachusetts Institute of Technology has proposed an alternative scheme -- developed well before the Clipper chip announcement -- that eschews complicated chips and special hardware in favor of a considerably more flexible, inexpensive software solution. Like the administration, Micali favors an approach that includes a cryptographic escape hatch in case of dire emergency. "Scientists ought to be socially responsible," he argues. "We have to ask ourselves what would be the social impact of widespread cryptography." Micali has demonstrated that it's possible with his technique to transform any public-key cryptosystem into one that includes a provision for third-party access to encrypted information, if a court deems such access essential for reasons of law enforcement or national security. He calls the transformed version a "fair" public-key cryptosystem. "The transformed systems preserve the security and efficiency of the original ones," Micali says. "Thus, one can still use whatever system [he or she] believes to be more secure and enjoy the additional property of fairness." . . . But to many others, the real debate is not about the technical merits of the Clipper and Capstone proposals. "The fundamental issue that people are talking about is the question of whether people have a right to have privacy in a conversation . . . something that cryptography can provide," says Ronald L. Rivest, a computer scientist at MIT. Denning contends that it would be irresponsible for either government or industry to promote the widespread use of strong encryption. "I do not believe our laws grant an `absolute right' to a private conversation," she says. But Rivest and others reject the notion that the pubic should have access only to cryptography that the U.S. government can decipher. They feel shut out of the government decision-making process that brought forth the Clipper chip. "I don't know anyone inside the government who is fighting for the average citizen's protection here," Walker says. "It's the national security and law enforcement guys that are running the show, and the administration has bought in to their side." "I don't think we have a fair situation at all," he adds. "That's why I keep insisting we've got to have a national review involving . . . private citizens and private organizations." The administration already has an internal review of cryptographic policy under way. This task force is supposed to have its final report ready by the end of the summer. In addition, earlier this month, the Computer System Security and Privacy Advisory Board, which advises the administration on matters of security and privacy, held a three-day meeting to hear public comments on a variety of cryptographic issues. Many people question the sudden rush to implement Clipper-Capstone, given the major ethical and constitutional questions at issue. "There hasn't been a serious public discussion," Hoffman says. "Nobody has been given enough time." Faced with such criticisms, the government now shows signs of slowing implementation of its key-escrow plan until the scheme's ramifications have been studied further. At the same time, computer users already have access to chips and software incorporating DES or the RSA public-key cryptosystem. "For the first time in history, we have a situation in which individuals can use cryptography good enough that even governments can't read [the encrypted messages]," Hoffman says. "That is a big change. The administration is ultimately going to have to address the issue of whether people can use their own cryptography and keep the keys secret themselves." * * * * * * * >>>>>> Please send e-mail to: ssandfort at attmail.com <<<<<< ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From crunch at netcom.com Fri Jul 2 12:29:21 1993 From: crunch at netcom.com (John Draper) Date: Fri, 2 Jul 93 12:29:21 PDT Subject: Cypherpunks brocures needed - Feedback welcome Message-ID: <9307021929.AA27787@netcom4.netcom.com> I am setting up some info tables at various upcoming events and partys. I want to make up a flier for those attending, and would like for someone in cypherpunks to please draft up what the flier should say. It should basically say what the goals of the Cypherpunks are, what they do, and stress the issues at stake, IE: Clipper ship proposal, promoting private data encryption, and the like. The flier will be an 8 1/2 by 11 paper, and I plan on making about 50 of them initially. I would like someone here to help me with the wording. It should be brief, and give just enough information to help our cause. Last call for Laptops. I have someone who has PC-DOS laptop, and we need someone with a Mac laptop, and we then have all bases covered. Thanx From banisar at washofc.cpsr.org Fri Jul 2 14:33:14 1993 From: banisar at washofc.cpsr.org (Dave Banisar) Date: Fri, 2 Jul 93 14:33:14 PDT Subject: CPSR Workplace Privacy Test Message-ID: <00541.2824473766.4122@washofc.cpsr.org> CPSR Workplace Privacy Testimony ===================================================== Prepared Testimony and Statement for the Record of Marc Rotenberg, Director, CPSR Washington office, Adjunct Professor, Georgetown University Law Center on H.R. 1900, The Privacy for Consumers and Workers Act Before The Subcommittee on Labor-Management Relations, Committee on Education and Labor, U.S. House of Representatives June 30, 1993 Mr. Chairman, members of the Subcommittee, thank for the opportunity to testify today on H.R. 1900, the Privacy for Consumers and Workers Act. My name is Marc Rotenberg and I am the director of the CPSR Washington office and an adjunct professor at Georgetown University Law Center where I teach a course on information privacy law. Speaking on behalf of CPSR, we strongly endorse the Privacy for Consumers and Workers Act. The measure will establish important safeguards for workers and consumers in the United States. We believe that H.R. 1900 is particularly important as our country becomes more dependent on computerized information systems and the risk of privacy abuse increases. CPSR has a special interest in workplace privacy. For almost a decade we have advocated for the design of computer systems that better serve the needs of employees in the workplace. We do not view this particular goal as a trade-off between labor and management. It is our belief that computer systems and information policies that are designed so as to value employees will lead to a more productive work environment and ultimately more successful companies and organizations. As Charles Hecksher of the Harvard Business School has said good managers have no use for secret monitoring. Equally important is the need to ensure that certain fundamental rights of employees are safeguarded. The protection of personal privacy in the information age may be as crucial for American workers as the protection of safety was in the age of machines. Organizations that fail to develop appropriate workplace privacy policies leave employees at risk of abuse, embarrassment, and harassment. The concern about workplace privacy is widely felt in the computer profession. This month MacWorld magazine, a leading publication in the computer industry, released a special report on workplace privacy. The report, based on a survey of 301 companies in the United States and authored by noted science writer Charles Piller, made clear the need for a strong federal policy. Among the key findings of the MacWorld survey: > More than 21 percent of those polled said that they had "engaged in searches of employee computer files, voice mail, electronic mail, or other networking communications." > "Monitoring work flow" is the most frequently cited reason for electronic searches. > In two out of three cases, employees are not warned about electronic searches. > Only one third of the companies surveyed have a written policy on privacy What is also interesting about the MacWorld survey is the high level of concern expressed by top corporate managers about electronic monitoring. More than a half of those polled said that electronic monitoring was either "never acceptable" or "usually or always counterproductive." Less than five percent believed that electronic monitoring was a good tool to routinely verify honesty. These numbers suggest that managers would support a sensible privacy law. Indeed, they are consistent with other privacy polls conducted by Professor Alan Westin for the Lou Harris organization which show that managers are well aware of privacy concerns and may, with a little prodding, agree to sensible policies. What would such a policy look like? The MacWorld report also includes a model privacy policy that is based on several U.S. and international privacy codes. Here are the key elements: > Employees should know what electronic surveillance tools are used, and how management will use the data gathered. > Management should minimize electronic monitoring as much as possible. Continuous monitoring should not be permitted. > Data should only be used for clearly defined, work-related purposes. > Management should not engage in secret monitoring unless there is credible evidence of criminal activity or serious wrongdoing. > Data gathered through monitoring should not be the sole factor in employee evaluations. > Personal information gathered by employers should not be disclosed to any third parties, except to comply with legal requirements. > Employees or prospective employees should not be asked to waive privacy rights. > Managers who violate these privacy principles should be subject to discipline or termination. Many of these provisions are contained in H.R. 1900, the Privacy for Consumers and Workers Act. Clearly, the policies and the bill itself are not intended to prohibit monitoring, nor to prevent employers from protecting their business interests. What the bill will do is help establish a clear framework that ensures employees are properly notified of monitoring practices, that personal information is not misused, and that monitoring capability is not abused. It is a straightforward, sensible approach that does not so much balance rights as it clarifies interests and ensures that both employers and employees will respect appropriate limitations on monitoring capability. The need to move quickly to establish a framework for workplace privacy protection is clear. Privacy problems will become more acute in the years ahead as new monitoring schemes are developed and new forms of personal data are collected. As Professor Gary Marx has made clear, there is little that can be imagined in the monitoring realm that can not be achieved. Already, some members of the computer profession are wearing "active badges" that provide full-time geographical monitoring. Properly used, these devices help employees use new tools in the hi-tech workplace. Improperly used, such devices could track the physical movements of an employee throughout the day, almost like a blip on a radar screen. Computers are certainly powerful tools. We believe that they can be used to improve productivity and increase job satisfaction. But this requires that appropriate policies be developed to address employee concerns and that laws be passed, when necessary, to ensure that computer abuse does not occur. This concludes my testimony. I would be pleased to answer your questions. ===================================================== From fergp at sytex.com Fri Jul 2 14:44:23 1993 From: fergp at sytex.com (Paul Ferguson) Date: Fri, 2 Jul 93 14:44:23 PDT Subject: Science News article request Message-ID: <3Fg36B1w165w@sytex.com> On 01 Jul 93 21:00:49 EDT, Sandy Sandfort wrote - > I have missed some messages because of a computer problem. > Perhaps someone has already mentioned or reprinted an article > by Ivars Peterson ("Encryption Controversy -- A Fierce Debate > Erupts over Cryptography and privacy") about the Clipper, > Capstone, et al. in June 19 issue of SCIENCE NEWS. If not, I > would be willing to transcribe the article into ASCII and upload > it to the list if enough folks are interested. Please do. I'm interested in seeing any article relative to the subject at hand... Cheers. Paul Ferguson | "Confidence is the feeling you get Network Integrator | just before you fully understand Centreville, Virginia USA | the problem." fergp at sytex.com | - Murphy's 7th Law of Computing Quis Custodiet Ipsos Custodes? From mdiehl at triton.unm.edu Fri Jul 2 18:16:43 1993 From: mdiehl at triton.unm.edu (J. Michael Diehl) Date: Fri, 2 Jul 93 18:16:43 PDT Subject: PGP and offline-readers In-Reply-To: <9307021824.AA00266@toad.com> Message-ID: <9307030116.AA17473@triton.unm.edu> According to Timothy Newsham: > I think a good idea for offline readers would be to build ontop of > currently implemented protocols. One protocol worth mentioning is This is fine if you are using a *nix machine. But if you are trying to enforce your privacy over CI$ or genie or a bbs, well, you can't rely on one common protocol. This is why I advocate communications program scripts. +-----------------------+-----------------------------+---------+ | J. Michael Diehl ;-) | I thought I was wrong once. | PGP KEY | | mdiehl at triton.unm.edu | But, I was mistaken. |available| | mike.diehl at fido.org | | Ask Me! | | (505) 299-2282 +-----------------------------+---------+ | | +------"I'm just looking for the opportunity to be -------------+ | Politically Incorrect!" | +-----If codes are outlawed, only criminals wil have codes.-----+ +----Is Big Brother in your phone? If you don't know, ask me---+ From newsham at wiliki.eng.hawaii.edu Fri Jul 2 20:06:43 1993 From: newsham at wiliki.eng.hawaii.edu (Timothy Newsham) Date: Fri, 2 Jul 93 20:06:43 PDT Subject: PGP and offline-readers In-Reply-To: <9307030116.AA17473@triton.unm.edu> Message-ID: <9307030306.AA14108@toad.com> > > According to Timothy Newsham: > > I think a good idea for offline readers would be to build ontop of > > currently implemented protocols. One protocol worth mentioning is > > This is fine if you are using a *nix machine. But if you are trying > to enforce > your privacy over CI$ or genie or a bbs, well, you can't rely on one common > protocol. This is why I advocate communications program scripts. We need to get people to use common protocols! CI$ will respond to what its users want. If we got alot of BBS's to use IMAP then the users would want CI$ to use the same. If we made IMAP easy to use and helped BBS authors get IMAP code running in their systems then BBS users would use it PINE is very easy to use. It will be available soon for personal computers to use. That part of the solution is almost there. How do we get BBS's to use IMAP? they could support IMAP in a similar way that they support Zmodem. What needs to be done is to write some code that does IMAPD functions that could easily be incorporated into a BBS program, and figure out a way for end users to run PINE from their favorite bbs program. (and get PINE people to allow for a serial-line connection *or* write a false-packet driver that just strips off TCP/IP headers sends the data over the line and sends back ACK's to the TCP/IP process). Tim From s.summers1 at genie.geis.com Sat Jul 3 00:15:22 1993 From: s.summers1 at genie.geis.com (s.summers1 at genie.geis.com) Date: Sat, 3 Jul 93 00:15:22 PDT Subject: Junk mail/return encrypted-blo Message-ID: <9307030715.AA22317@relay2.geis.com> >From zane at genesis.mcs.com (Sameer) >The second solution I thought of seems like it would work. When I >create the return-address block, it can be given some sort of ID-code >(again, like with my other idea posted, similar to the ID-code on peices >of Digicash in Chaum's scheme) so when the vendor delivers the product, >she sends to encrypted block to the remailer, and the remailer forwards >the product to me, and stores the ID-code in its database (doing the >proper one-way transformation for untraceability) so that further >attempts to use the exact same address-block will be noticed and not >delivered. Why not just include an Expire: header in the encrypted block, after which the remailer would just junk any mail sent with that return address? From mccoy at ccwf.cc.utexas.edu Sat Jul 3 00:23:27 1993 From: mccoy at ccwf.cc.utexas.edu (Jim McCoy) Date: Sat, 3 Jul 93 00:23:27 PDT Subject: PGP and offline-readers In-Reply-To: <9307030306.AA14108@toad.com> Message-ID: <199307030723.AA19543@tramp.cc.utexas.edu> > PINE is very easy to use. It will be available soon for personal > computers to use. That part of the solution is almost there. That part of the solution is already done. There are already several very good POP/IMAP clients for Macs and PCs (Eudora, NuPOP, etc). Why the fixation on a particular mail agent? There is no way that you are going to get people to agree on a single MUA, therefore it seems that the comm channel is the beastie that one should focus on for encryption. > How do we get BBS's to use IMAP? they could support IMAP in > a similar way that they support Zmodem. What needs to be done > is to write some code that does IMAPD functions that could easily > be incorporated into a BBS program, and figure out a way for > end users to run PINE from their favorite bbs program. I hate to break it to you, but there already exists a protocol for off-line reading of mail and news over serial connections: QWK. While a noble effort, I sincerely doubt that the BBSers and CI$ users are going to jump over to a completely new protocol for transport of information for off-line reading unless it offers them something that they do not already have, and IMAP/POP just doesn't do that. If one were to be able to offer encrypted TCP/IP connectivity though, then you would be offering people the additional functionality of this comm channel (telnet, ftp, gopher/www, etc) to entice them to switch over. > (and get PINE people to allow for a serial-line connection *or* > write a false-packet driver that just strips off TCP/IP headers > sends the data over the line and sends back ACK's to the TCP/IP > process). Why not just get them to support IP? Probably easier... All they need is a slip/ppp driver on the host, then you can do the encryption over comm channel and avoid wasting time encrypting something that doesn't need to be encrypted. Many BBS systems are beginning to wade through the shallow water of the Internet, if we had the ability to offer them modifications to provide encryption to thier IP connectivity while they are still new to the game it would be much easier to get them accostomed to the idea that such traffic should offer encryption; not that I think this will happen, but in an ideal world... jim From newsham at wiliki.eng.hawaii.edu Sat Jul 3 01:42:07 1993 From: newsham at wiliki.eng.hawaii.edu (Timothy Newsham) Date: Sat, 3 Jul 93 01:42:07 PDT Subject: PGP and offline-readers In-Reply-To: <199307030723.AA19543@tramp.cc.utexas.edu> Message-ID: <9307030842.AA23089@toad.com> > > > PINE is very easy to use. It will be available soon for personal > > computers to use. That part of the solution is almost there. > > That part of the solution is already done. There are already several very > good POP/IMAP clients for Macs and PCs (Eudora, NuPOP, etc). Why the > fixation on a particular mail agent? There is no way that you are going to > get people to agree on a single MUA, therefore it seems that the comm > channel is the beastie that one should focus on for encryption. No fixation. Just that IMAP is the best protocol for remote mail reading and pine is already available and supporting IMAP. And as a bonus it supports MIME. This *is* something that BBS'ers dont already have.. multi-media mail. > > I hate to break it to you, but there already exists a protocol for off-line > reading of mail and news over serial connections: QWK. While a noble > effort, I sincerely doubt that the BBSers and CI$ users are going to jump > over to a completely new protocol for transport of information for off-line > reading unless it offers them something that they do not already have, and > IMAP/POP just doesn't do that. If one were to be able to offer encrypted > TCP/IP connectivity though, then you would be offering people the additional > functionality of this comm channel (telnet, ftp, gopher/www, etc) to entice > them to switch over. You dont need encrypted TCP/IP! A good mail reader supporting MIME could handle encryption packages automatically! MIME also supports many other things that "they do not already have". > > > (and get PINE people to allow for a serial-line connection *or* > > write a false-packet driver that just strips off TCP/IP headers > > sends the data over the line and sends back ACK's to the TCP/IP > > process). > > Why not just get them to support IP? Probably easier... All they need is > a slip/ppp driver on the host, then you can do the encryption over comm > channel and avoid wasting time encrypting something that doesn't need to be > encrypted. Many BBS systems are beginning to wade through the shallow > water of the Internet, if we had the ability to offer them modifications to > provide encryption to thier IP connectivity while they are still new to the > game it would be much easier to get them accostomed to the idea that such > traffic should offer encryption; not that I think this will happen, but in > an ideal world... I dont think its easier. I think something like SLIMAP (serial line imap) would be the easist thing to implement. IMAP runs over a network stream and there is no reason it couldnt run over a serial line stream. The code written for imapd already runs on stdin/stdout... It wouldnt be hard to port to run on a serial line connection. > jim I dont think offering IP to the masses is the right solution right now. Its not appropriate for the BBS world. Getting people to use remote mail clients is something that the masses could take to alot easier. I think this would be the prefered way to read mail since the user interface could be made more friendly, sorta the 'prodigy thang'. I dont think it matters what protocol is used in the end but I think its something that should happen, and something that we as cypherpunks have an interest in seeing happen. From tcmay at netcom.com Sat Jul 3 02:41:39 1993 From: tcmay at netcom.com (Timothy C. May) Date: Sat, 3 Jul 93 02:41:39 PDT Subject: (fwd) GIFs--Now it can be told Message-ID: <9307030942.AA03729@netcom3.netcom.com> Cypherpatriots, Here's a little experiment I've been conducting. A week ago I posted an ecrypted GIF to a bizarre new newsgroup that showed up on NETCOM, "alt.binaries.pictures.erotica.children." Quite a controversial group, pushing several buttons. My posting generated some real heat, though there was absolutely no evidence it was anything more than just a file. Apparently the mere fact of it existing was a kind of "thoughtcrime" in these politically correct times. Anyway, I let it brew for one week, then wrote this explanation and posted it. Several Cypherpunk list readers were slightly involved, some to criticize me, some to say "Not so fast." You know who you are. :-} All in all, a pleasant little experiment. Here's the posting I sent out: Newsgroups: alt.binaries.pictures.erotica.children,alt.config,netcom.netnews From: tcmay at netcom.com (Timothy C. May) Subject: GIFs--Now it can be told Message-ID: Date: Sat, 3 Jul 1993 09:28:29 GMT One week ago tonight a new group appeared at my site, "alt.binaries.pictures.erotica.children," a group certain to provoke controversy, to bring out the Net Cops, and to induce a certain kind of "Stockholm Syndrome," wherein some folks scramble to initiate censorship prior even to the Feds doing it. (Their battle cry is "Eeek! If we don't nip this in the bud, _right now_, think of what might happen!) My experience has been that these Net.Censors are usually too quick to claim something has clearly gone beyond the bounds of decency and acceptability. Thankfully, they usually fail in their efforts. Anyway, seeing this strange new group appear on my system, I decided to conduct an experiment. I posted an "encrypted GIF," not further identified, and waited for the reaction. The file was as follows (only part of it shown): -----BEGIN PGP MESSAGE----- Version: 2.2 b2cCrVJKUYUZf7UBA/i1tSSz66dOx4+cJKzNkm1JBhGigMdRvxM8Slm3TyC7kgWW L8J3w/On10thisi487rU/Gl7xOMajxCQedHrb6k0+wYDGjxmVcu9xwLWAWpkgq+5 fUiNKBnF/SUA/JisFrWvn63rt44n+DqROwx8CXuSvL1mUdqLRTS0t/timjHnhIwC VmLN1FTnSD8BBACFa38SqiwByarfcVhFg/fuKWc4AgKtYqSt5oWW6sYLckC3nEen ZcHV+DNFo36Exg7r0trapoBXpjoe9ENCsCbFJ7i/M7FwFYvK1QAcxQ6zGt+3HICM 9Hsxg1d5Goqp4+nmpW+9Y/UVY16+WVl9moY3c7Iv04Cp0ipu2B5qfIxPZoSMAlKv ..... Not to my surprise, about 20 people have (so far) requested the key to this file. (The whole encryption rationale is covered later.) I didn't reply to them...some of them asked for the key a second time! What surprised me is that nobody carefully looked at the file. Here it is again, with some places marked: -----BEGIN PGP MESSAGE----- Version: 2.2 b2cCrVJKUYUZf7UBA/i1tSSz66dOx4+cJKzNkm1JBhGigMdRvxM8Slm3TyC7kgWW L8J3w/On10thisi487rU/Gl7xOMajxCQedHrb6k0+wYDGjxmVcu9xwLWAWpkgq+5 ^^^^ fUiNKBnF/SUA/JisFrWvn63rt44n+DqROwx8CXuSvL1mUdqLRTS0t/timjHnhIwC ^^ VmLN1FTnSD8BBACFa38SqiwByarfcVhFg/fuKWc4AgKtYqSt5oWW6sYLckC3nEen ^ ZcHV+DNFo36Exg7r0trapoBXpjoe9ENCsCbFJ7i/M7FwFYvK1QAcxQ6zGt+3HICM ^^^^ 9Hsxg1d5Goqp4+nmpW+9Y/UVY16+WVl9moY3c7Iv04Cp0ipu2B5qfIxPZoSMAlKv ....... I put a couple of other "subliminal messages" in, which I suppose could provoke the Religious Right into squawking that "Satanic messages" are being hidden in computer files *that children could possibly read*. Gasp! Needless to say, such ASCII surgery performed on a PGP file (which, by the way, was just some random message someone had sent me a while back, utterly unreadable by anyone other than the two of us--and not even that after I mutated various characters) makes it completely unreadable. Even if someone had the other half of the PGP key pair--which never existed--the file would not even checksum as a legal PGP file! (Putting plaintext into the file was both a message I hoped astute readers would eventually notice--though it *is* pretty hard to see--and an ironclad proof that the file could not be a real PGP message, let alone a GIF, let alone kiddie porn.) There are some quasi-legitimate issues surrounding the area of child erotica. Was the child coerced? Was consent meaningful? Etc. But the posting of mere bits qua bits causing such anger and flamage indicates a serious overreaction. Are mere thoughts the crime? Orwell covered this, didn't he? * What if such images merely "look like" children (and just what is the age of consent? 18? 16? "Children" of 15 can get married in most countries of the world.)...are such "fakes" illegal? * What if they are computer-generated images, of children that never existed outside of a computer? Which children were exploited? We're back to thoughtcrime again. (Don't laugh, a leading interpretation is that even computer-generated child porn would be illegal, not because of crimes committed against children, but because of the "atmosphere" and "climate" it might produce. That is, thoughtcrime.) * What if the images were morphs? Not wholly computer-generated, but the morph of an adult image into that of a child? * What if one 15-year old child took photos of a another 15-year old child? What if one child "exploited" another? What if a child took pictures of herself, self-portraits? * What if the images, if they were ever to be posted, originated someplace where they are legal? Perhaps Amsterdam, someone suggested. If the U.S government tries to stop the Net (which is already a market anarchy, thankfully) from distributing this material, mightn't all the various countries that have different laws than ours do the same thing? There goes alt.fan.salman.rushdie. And there goes soc.motss and all the "normal" alt.binaries.pictures.* groups. Of course it won't likely happen, nor will alt.binaries.pictures.erotica.children go away,either. Get used to it. (Again, I don't care for it, but wailing and moaning won't make it go away.) * What if someone scanned-in images from the widely available books by David Hamilton, or Robert Mapplethorpe? Certainly many of these photos are of nude children...would the imminent death of Usenet finally happen if someone went down to B. Dalton Books, bought a David Hamilton collection, and posted some of the photos in a.b.p.e.c.? So, I would encourage folks to lighten up. In a week on the Net, not a single kiddie porn picture has been posted. And if it does happen, try to just ignore it. The kid whose picture was taken is probably grown up by now (I'm guessing that many such images are from old magazines, etc.). In any case, the occasional picture is hardly going to create a new slave trade in children. The issue of how the media may react is a more serious one. Part of the reason I'm explaining my little experiment now is to make sure my posting, at least, is not used by some nitwit reporter as the basis of a story. (If it's being used, then he'll soon have egg on his face.) That's the story. I hope you enjoyed the ride. P.S. I said I'd say something about why I used encryption. Aside from not being a real PGP-readable file, the idea was to make it look like one. This is the likeliest way for such material to get posted, along with anonymous remailers. The "look for the key in the 'usual places'" bit was to resonate with the "binary nerve gas" idea, where the dangerous pieces are stored separately and only combined at the last minute. I don't know if such techniques are already in use, but I expect them soon. The mutant condors that one reader (who claimed to be a Pope in the Church of the Subgenius, but who humorlessly missed the joke--but I forgive him, for he knew not what he saw) wanted to feed me to, can now stop circling my house. -Tim May -- .......................................................................... Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at netcom.com | anonymous networks, digital pseudonyms, zero 408-688-5409 | knowledge, reputations, information markets, W.A.S.T.E.: Aptos, CA | black markets, collapse of governments. Higher Power: 2^756839 | Public Key: PGP and MailSafe available. Note: I put time and money into writing this posting. I hope you enjoy it. -- From mross at antigone.com Sat Jul 3 06:57:52 1993 From: mross at antigone.com (Michael Ross) Date: Sat, 3 Jul 93 06:57:52 PDT Subject: (fwd) GIFs--Now it can be told Message-ID: <9307031355.AA00356@antigone.com> Tim, That was very manipulative, and did not achieve much. It has also very little to do with the subject of this mailing list. If anything, you discouraged at least one person I know who became genuinely interested in encryption and PGP as a result of your post. If you had posted an actual David Hamilton photo, even encrypted, you would have put yourself forward, perhaps even bravely, as a test case. You then would really have had a point to argue, having taken a stand. As it turns out, you hid behind a pretty lame scheme, the only object of which seems to have been to make a fool out of as many people as possible. This is not how you accomplish constructive change, Tim. People resent being made to feel stupid, and they certainly will _not_ listen to what you have to say if you are belittling them. I happen to agree with those points you deigned to make in a straightforward manner. But you hid them so well behind trickery that they will go unnoticed. Learn to deal with people, and you'll see they are willing to listen to reasonable arguments. If your parents didn't give you enough attention as a child, don't take it out on the world by trying to get some here... Learn to work _with_ people, not _against_ people, lest within ten years you'll be walking into office buildings with automatic weapons strapped to your body and shooting lawyers... ;) Michael From pfarrell at cs.gmu.edu Sat Jul 3 07:04:27 1993 From: pfarrell at cs.gmu.edu (Pat Farrell) Date: Sat, 3 Jul 93 07:04:27 PDT Subject: Ad Hominum attacks (was Re: PC Week Clipper article Message-ID: <36251.pfarrell@cs.gmu.edu> I'm more than a little concerned about the vicious personal attacks that this list makes on folks that have strongly held beliefs that disagree with some (or all) of the beliefs of hot headed posters to cypherpunks. I thought this was a technical mailing list, that dabbled in politics only as necessary. I see no justification for the personal attacks, especially on 3rd parties that do not read this list. These uncalled for attacks will not convince anyone on the list, and do not become the poster. In Message Tue, 29 Jun 1993 , (someone who should know better) writes: >Dorothy Denning is a fucking idiot. I strongly object to this posting. D.E.Denning is neither an idiot nor a "wicked witch of the East." She just happens to support a view that she strongly believes in. The fact that I think her side is dead wrong does not make her an idiot. Name calling accomplishes nothing but does hurt the signal to noise ratio of this list. Even more annoying are the attacks on Jim Bidzos. He is trying to make a buck, which was legal last time I looked. And on many issues, he is far more in our camp than against us. He at least likes strong cryptography, and his disputable patents expire in a relatively short time. He has agreed to allow a PGP-compatible program to use RSA without cost, providing the legal version that many U.S. users would like to see. I thought cypherpunks wrote code. I think that personal attacks on folks that are not on the list is a waste of bandwidth. (If you want to attack me here, fine, at least I get to respond firsthand) Pat Pat Farrell Grad Student pfarrell at cs.gmu.edu Department of Computer Science George Mason University, Fairfax, VA Public key availble via finger #include From tcmay at netcom.com Sat Jul 3 12:48:06 1993 From: tcmay at netcom.com (Timothy C. May) Date: Sat, 3 Jul 93 12:48:06 PDT Subject: "Wired" has more than one cover--why? Message-ID: <9307031948.AA04165@netcom.netcom.com> I noticed that some copies of the latest "Wired" have Peter Gabriel on the cover and others have Mitch Kapor on the cover. What gives? Some sort of experiment? A novel way to gauge reader reaction to the covers? A lawsuit that forced a change in the covers? Esthetics? (My issue, with Peter Gabriel on the cover, is much artier, though harder to figure out, than the relatively mundane image of Kapor.) (Peter Gabriel, being a musician, may be said to be doing "a cover of a piece by Mitch Kapor.") Is Crunch on another set of covers? Did the issue with some of us Cypherpunks on the cover merely represent one of _several_ versions of the cover? (I envision the "Crypto Rebels" covers going to the Bay Area, the "Dish-Wallahs" covers going overseas, and the "Brenda Laurel" covers going directly to "Mondo 2000" headquarters in Berkeley.) -Tim May P.S. The issue of "Wired" is superb, as always. -- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at netcom.com | anonymous networks, digital pseudonyms, zero 408-688-5409 | knowledge, reputations, information markets, W.A.S.T.E.: Aptos, CA | black markets, collapse of governments. Higher Power: 2^756839 | Public Key: by arrangement Note: I put time and money into writing this posting. I hope you enjoy it. From tcmay at netcom.com Sat Jul 3 13:39:04 1993 From: tcmay at netcom.com (Timothy C. May) Date: Sat, 3 Jul 93 13:39:04 PDT Subject: Ad Hominum attacks (was Re: PC Week Clipper article Message-ID: <9307032039.AA07619@netcom.netcom.com> I largely agree with Pat Farrell's comments about the vicious attacks on various crypto folks. I was the one who jokingly used the term "wicked witch of the East" in reference to D.D., though I am almost 100% certain it was only to this mailing list, and not to sci.crypt in general. Perhaps I let my enthusiasm for my wit take precedence over judgment. And in other places, such as sci.crypt, I have in fact defended Denning against ignorant comments along the lines of "Who is this Dorothy Denning person? I can't find her name anywhere in "The Codebreakers." She must not know anything about crypto." Whatever we may think of her position on Clipper, criticizing her personally and imputing motives to her that cannot possibly be known to outsiders, is foolish. What really bothers me is the type of criticism, which I also tend to call "ad hominem" (but which rhetoriticians may have a special name for), in which people impute _motives_ to others. Thus, we see seemingly endless comments about the motives of Denning, of Bidzos, of Sternlight, and of others. (When I posted on the topic of possible cooperation with Bidzos and RSA, I was hit with a barrage of highly critical rebuttals. The substantive ones were fine, and expected, but the ones speculating on my motives and imputing evilness to me were uncalled for. I wrote them off as typical Net zeal, and am still on good terms even with those who foamed at the mouth the most.) "Demonizing" our opponents, or making them look like dunces (as with the many "I've never heard of Dorothy Denning before" posts), does not help our cause. In fact, it probably weakens our cause, for two reasons. First, it cuts off dialog with those we disagree with. Second, we tend to underestimate people we have written off as stooges or dunces. While I think Dorothy Denning is, for various reasons, hopelessly in the camp of the NSA and FBI, I see nothing to be gained by demonizing her. Or imputing evil qua evil motives. Personally, I think being close to the FBI, Justice Dept., NIST, NSA, etc., and socializing with them, having lunch with them, doing contract work for them (nothing evil about that, per se...it's how academic departments fund their research), and generally being in "the Washington scene" has polarized her somewhat, just as we Cypherpunks are polarized by the support we get from our peer group, from the "cognitive dissonance" of seeing mostly the evidence that supports our existing point of view. When you spend your time in a milieu, work with people on their problems, you begin to adopt their world view. Understand, of course, that I am not addressing the underlying issues of who is right and who is wrong...I've already made my beliefs on this clear. I'm just agreeing with Pat Farrell that we all need to be careful not to demonize folks like Denning, Bidzos, or even Sternlight. We don't have to be solicitous (overly polite) toward them, and we can knock down their arguments, but we ought not to use cheap shots and cheap rhetorical tricks (one I hate especially is the "sound effect" jab, the "" sort of comment inserted into postings, sometimes even into the direct quotes of those being attacked!). Pat writes: >Even more annoying are the attacks on Jim Bidzos. He is trying to make a >buck, which was legal last time I looked. And on many issues, he is far more >in our camp than against us. He at least likes strong cryptography, and his >disputable patents expire in a relatively short time. He has agreed to allow >a PGP-compatible program to use RSA without cost, providing the legal >version that many U.S. users would like to see. I agree, though of course he and RSADSI did not fight as hard as they might have, in my opinion, on the subject of the cross-licensing with the DSS and Clipper/Skipjack products. I don't pretend to understand all of the issues involved, though I certainly can imagine he felt a lot more pressure (legal, export, classification) from the Feds than he felt from a loose organization of crypto privacy advocates. We're not where the money is, at least not yet. (In fact, Cypherpunks are generally not even customers of RSADSI, so why should Bidzos really care about our views? The industry security group that has denounced Clipper is undoubtedly much more influential.) Meanwhile, I have no real interest, personally, in the whole RSA v. PGP issue...let those directly involved work it all out. I will applaud loudly if Phil Z. and the other PGP folks do in fact reach an agreement with RSADSI, if only because it will remove one possible avenue of attack on private encryption. -Tim May -- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at netcom.com | anonymous networks, digital pseudonyms, zero 408-688-5409 | knowledge, reputations, information markets, W.A.S.T.E.: Aptos, CA | black markets, collapse of governments. Higher Power: 2^756839 | Public Key: by arrangement Note: I put time and money into writing this posting. I hope you enjoy it. From tcmay at netcom.com Sat Jul 3 14:07:37 1993 From: tcmay at netcom.com (Timothy C. May) Date: Sat, 3 Jul 93 14:07:37 PDT Subject: (fwd) GIFs--Now it can be told Message-ID: <9307032107.AA09849@netcom.netcom.com> (I'll only make a few comments.) Ed Carp writes: >> There are some quasi-legitimate issues surrounding the area of child >> erotica. Was the child coerced? Was consent meaningful? Etc. > >There are no quasi-legitimate issues surrounding child pornography in the >United States. It doesn't matter, legally whether consent was obtained or >not, etc. Child pornography is not legal. To make, sell, possess, distribute, >or conspire to do any of the above is a crime. I meant "quasi-legitimate" in the sense of being at least a real criminal issue. By contrast, merely discussing the issues cannot possibly be a crime, nor can, IMHO, the creation of such a group absent actual evidence of criminality. Sort of like shutting down "alt.drugs" on the grounds that illegal drugs are often discussed. (We can all think of several dozen newsgroups that touch on subjects illegal in many states of the U.S., in many countries of the world, etc.) >In the US, it doesn't matter what their actual ages are - if they are >depicted as being under the age of consent, they are illegal. Ah, but what if no mention is made of the age? If I happen to have a collection of pictures of 19-year-olds-who-look-15, because of my own esthetic standards, is this illegal? It sounds totally legal to me, and I think a court opinion will ultimately be rendered that so long as the models actually are over 18, no matter how young they look, no crime as ocurred. (Actually, the various "cheerleader porn" films cater to this fantasy and are not classed as child porn, so long as the actresses are 18 or older.) On purely computer-generated images: >Not at all. It's not an issue of exploitation in that case, nor is it an >issue of "thoughtcrime", since the thought has produced an actual image >that can be viewed by others. I strongly disagree. A computer image that never involved an actual child, cannot reasonably be viewed as child porn. Can a computer-generated "snuff" film be viewed as murder? (I see acted-out murders every day on t.v.) >Nothing in this email should be construed as a personal attack against you, >Tim. I'm just trying to relate the laws and the facts as they are. I don't take it as a personal attack. Ed's comments were thoughtful, even if I disagreed with some of them. By the way, I agree with some comments I've received that this subject is somewhat far afield from the "Cypherpunks charter," such as it is, but I'm finding the hundreds of highly repetitive and arcane postings about the same old remailer issues, and the internals of obscure mail programs, not all that close to the charter either. (I'm not saying they shouldn't be posted, and some have been well-written summaries, but I am saying they're highly-detailed nuts-and-bolts issues which probably are meaninful to only a few readers.) Part of the Cypherpunks approach is to "monkey wrench" the "Surveillance State" by flooding the comm lines with encrypted junk, with suspicious-looking files that will soak up surveillance time, and with various other subversive things that will push the boundaries. -Tim May -- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at netcom.com | anonymous networks, digital pseudonyms, zero 408-688-5409 | knowledge, reputations, information markets, W.A.S.T.E.: Aptos, CA | black markets, collapse of governments. Higher Power: 2^756839 | Public Key: by arrangement Note: I put time and money into writing this posting. I hope you enjoy it. From anton at hydra.unm.edu Sat Jul 3 17:42:05 1993 From: anton at hydra.unm.edu (Stanton McCandlish) Date: Sat, 3 Jul 93 17:42:05 PDT Subject: test Message-ID: <9307040041.AA13428@hydra.unm.edu> Hmm no mail in weeks from this list...I ass-u-me the problem is on my end, so here be a test message. Blah blah blah. -- Stanton McCandlish * Space Migration * Networking * ChaOrder * NO GOV'T. * anton at hydra.unm.edu * Intelligence Increase * Nano * Crypto * NO RELIGION * FidoNet: 1:301/2 * Life Extension * Ethics * VR * Now! * NO MORE LIES! * Noise in the Void BBS * +1-505-246-8515 (24hr, 1200-14400, v32bis, N-8-1) * From wet!naga Sat Jul 3 17:48:36 1993 From: wet!naga (Peter Davidson) Date: Sat, 3 Jul 93 17:48:36 PDT Subject: Reply to Michael's criticism of Tim Message-ID: I think Michael's reaction to Tim's experiment re alt.binaries.pictures.erotica.children deserves comment. >Date: Sat, 3 Jul 93 06:55:56 -0700 >From: Michael Ross >Subject: Re: (fwd) GIFs--Now it can be told > >Tim, > >That was very manipulative, and did not achieve much. Who was manipulated? Those who reacted did so freely. As Tim said, it was an experiment, not an attempt to achieve anything. The point was to see what would happen. >It has also very little to do with the subject of this mailing list. This mailing list is about encryption and other matters. The use of PGP to distribute erotica is thus a relevant topic. >If anything, you discouraged at least one person I know who became >genuinely interested in encryption and PGP as a result of your post. Tough. >As it turns out, you hid behind a pretty lame scheme, the only object >of which seems to have been to make a fool out of as many people as >possible. I think Michael has missed the point. >This is not how you accomplish constructive change, Tim. >People resent being made to feel stupid, and they certainly will >_not_ listen to what you have to say if you are belittling them. I don't recall Tim's belittling anyone - except perhaps the Net.Censors - who certainy deserve it. I don't think we need be too concerned about hurting their feelings. After all, they plan on doing worse to us. >I happen to agree with those points you deigned to make in a >straightforward manner. But you hid them so well behind trickery that >they will go unnoticed. On the contrary, were it not for the trickery some folks wouldn't bother reading Tim's comments on this subject. >Learn to deal with people, and you'll see >they are willing to listen to reasonable arguments. Ha! Chortle! Where you been all your life, Michael? People listen to reasonable arguments only when it suits them to. >If your parents didn't give you enough attention as a child, don't >take it out on the world by trying to get some here... Learn to work >_with_ people, not _against_ people, lest within ten years ... Garbage. If we are to go into spurious psychoanalysis then I think Michael's post reveals that he is still fixated on pleasing his parents by being a good little boy and not giving anyone any trouble. Fact is, there are people in the world who want to restrict our freedom and make us behave in ways they think best. Fuck 'em all! From khijol!erc at apple.com Sat Jul 3 18:34:58 1993 From: khijol!erc at apple.com (Ed Carp) Date: Sat, 3 Jul 93 18:34:58 PDT Subject: Ad Hominum attacks (was Re: PC Week Clipper article In-Reply-To: <9307032039.AA07619@netcom.netcom.com> Message-ID: > I was the one who jokingly used the term "wicked witch of the East" in > reference to D.D., though I am almost 100% certain it was only to this > mailing list, and not to sci.crypt in general. Perhaps I let my enthusiasm > for my wit take precedence over judgment. And in other places, such as > sci.crypt, I have in fact defended Denning against ignorant comments along > the lines of "Who is this Dorothy Denning person? I can't find her name > anywhere in "The Codebreakers." She must not know anything about crypto." > Whatever we may think of her position on Clipper, criticizing her > personally and imputing motives to her that cannot possibly be known to > outsiders, is foolish. I was the one who called Denning a "fucking idiot". Perhaps I should have said "fucking naive idiot" and been more specific, because while it might make sense for her to be "in bed with" the intelligence community to *her*, it makes no sense to anyone else I've talked to. In my view, she's either being criminally naive in being a mouthpiece for the NSA, being bought off by them, being threatened by them, has a personal/financial interest in the whole Clipper fiasco, or sees a political advantage in aligning herself with them. As has been discussed (to death, probably) in sci.crypt, alt.security*, etc., Clipper has several apparent flaws, none of which I'll go into here. Why would someone who is supposed to be some sort of "expert" be endorsing such a scheme is beyond me, unless she is being motivated by one of the above. In any case, the endorsement of such a scheme is naive in the extreme and almost criminally irresponsible of her, given the nature of Clipper/Capstone and the history of the intelligence community using such technology to spy on its own citizens in illegal operations. *That's* what I meant by my "fucking idiot" remark. > comments about the motives of Denning, of Bidzos, of Sternlight, and of Bidzos is just trying to make a buck. Sternlight seems to be anally retentive in the extreme, and believes his own bullshit. > "Demonizing" our opponents, or making them look like dunces (as with the > many "I've never heard of Dorothy Denning before" posts), does not help our > cause. In fact, it probably weakens our cause, for two reasons. First, it > cuts off dialog with those we disagree with. Second, we tend to > underestimate people we have written off as stooges or dunces. The first rule of most martial arts, as the first rule of combat, is "never underestimate your opponent". However irresponsible I may think Dorothy Denning, Jim Bidzos, or David Sternlight are, I don't underestimate them. If any one of those three (or anyone else, for that matter) has something to say, I will listen and judge it on its own merits. -- Ed Carp erc at apple.com, erc at saturn.upl.com 510/659-9560 For anonymous mailers --> anonymus+5300 at charcoal.com "I've met many thinkers and many cats, but the wisdom of cats is infinitely superior." -- Hippolyte Taine (1828-1893) From mkapor at kei.com Sat Jul 3 18:41:34 1993 From: mkapor at kei.com (Mitchell Kapor) Date: Sat, 3 Jul 93 18:41:34 PDT Subject: "Wired" has more than one cover--why? (fwd) Message-ID: <199307040140.AA26801@kei.com> They decided that West Coast covers should feature Peter Gabriel and the East Coast covers Mitch Kapor. Something about rock and roll playing better on newsstands than policy everywhere but the Northeasteast corridor. All subscribers got the Gabriel cover. As the Wired editor told me this split cover was a last minute decision and a first-time experiment. The Cypherpunks were on the cover all of copies of issue #2. ------------------------------------------------------------------------------ Mitchell Kapor, Electronic Frontier Foundation Note permanent new email address for all correspondence as of 6/1/93 mkapor at kei.com From mdiehl at triton.unm.edu Sat Jul 3 20:46:48 1993 From: mdiehl at triton.unm.edu (J. Michael Diehl) Date: Sat, 3 Jul 93 20:46:48 PDT Subject: Ad Hominum attacks (was Re: PC Week Clipper article In-Reply-To: Message-ID: <9307040345.AA27592@triton.unm.edu> According to Ed Carp: > > I was the one who called Denning a "fucking idiot". Perhaps I should have > said "fucking naive idiot" and been more specific, because while it might Well, I read the post, too, and I thought it was funny! Obviously not meant to be informative. I feel that people such as DD and LEA-mongers are @#$%ing idiots. And in a free forum, I should be able to say so. This is kinda what Cypherpunks stand for, IMHO. > The first rule of most martial arts, as the first rule of combat, is "never > underestimate your opponent". However irresponsible I may think Dorothy > Denning, Jim Bidzos, or David Sternlight are, I don't underestimate them. > If any one of those three (or anyone else, for that matter) has something to > say, I will listen and judge it on its own merits. And the second rule of most martial arts is, "Never get hit." In light of all of the LEA's trying to "hit" us, this is something to think about. Just my $.02. Laters. +-----------------------+-----------------------------+---------+ | J. Michael Diehl ;-) | I thought I was wrong once. | PGP KEY | | mdiehl at triton.unm.edu | But, I was mistaken. |available| | mike.diehl at fido.org | | Ask Me! | | (505) 299-2282 +-----------------------------+---------+ | | +------"I'm just looking for the opportunity to be -------------+ | Politically Incorrect!" | +-----If codes are outlawed, only criminals wil have codes.-----+ +----Is Big Brother in your phone? If you don't know, ask me---+ > -- > Ed Carp erc at apple.com, erc at saturn.upl.com 510/659-9560 > For anonymous mailers --> anonymus+5300 at charcoal.com > "I've met many thinkers and many cats, but the wisdom of cats is infinitely > superior." -- Hippolyte Taine (1828-1893) > From mimir at u.washington.edu Sat Jul 3 23:28:33 1993 From: mimir at u.washington.edu (Al Billings) Date: Sat, 3 Jul 93 23:28:33 PDT Subject: "Wired" has more than one cover--why? In-Reply-To: <9307031948.AA04165@netcom.netcom.com> Message-ID: On Sat, 3 Jul 1993, Timothy C. May wrote: > I noticed that some copies of the latest "Wired" have Peter Gabriel on the > cover and others have Mitch Kapor on the cover. What gives? I don't know if this is related to it or not but I work in a magazine store and when we received the latest issue, I noticed that our invoice said something like "West Coast Edition" or something similar. Perhaps the different editions have different covers? From shade at Ice.CC.McGill.CA Sun Jul 4 07:20:42 1993 From: shade at Ice.CC.McGill.CA (Leslie Regan Shade) Date: Sun, 4 Jul 93 07:20:42 PDT Subject: "Wired" has more than one cover--why? In-Reply-To: Message-ID: > > On Sat, 3 Jul 1993, Timothy C. May wrote: > > > I noticed that some copies of the latest "Wired" have Peter Gabriel on the > > cover and others have Mitch Kapor on the cover. What gives? > Well, here in Montreal we got Peter Gabriel and we're certainly not on the west coast! Leslie Shade From parrinel at ux1.cso.uiuc.edu Mon Jul 5 11:35:57 1993 From: parrinel at ux1.cso.uiuc.edu (Chris Parrinello) Date: Mon, 5 Jul 93 11:35:57 PDT Subject: Non-cypherpunk question. Message-ID: <199307051835.AA21072@ux1.cso.uiuc.edu> Hi, I just started reading this mailing list and I've run into a few problems reading some of the messages because they include MIME information which my copy of MH chokes on for some reason. It doesn't like the x-text and text/x-pgp content-types. Would anybody on this list have a fix for that so I can continue to read this list with MH? Any help would be appreciated. Thanks in advance! Chris From marc at Athena.MIT.EDU Mon Jul 5 13:33:37 1993 From: marc at Athena.MIT.EDU (marc at Athena.MIT.EDU) Date: Mon, 5 Jul 93 13:33:37 PDT Subject: [daemon@ATHENA.MIT.EDU : On-Line Congressional Hearing] Message-ID: <9307052033.AA17212@steve-dallas.MIT.EDU> ------- Forwarded transaction [6484] daemon at ATHENA.MIT.EDU (hearing-info at trystero.malamud.com) Commercialization & Privatization of the Internet 07/05/93 14:27 (70 lines) Subject: On-Line Congressional Hearing Date: Mon, 5 Jul 93 14:28:25 -0400 To: com-priv at psi.com From: hearing-info at trystero.malamud.com Reply-To: hearing-info at trystero.malamud.com Station: Internet Multicasting Service Channel: Internet Town Hall Program: On-Line Congressional Hearing Release: July 5, 1993 Content: First Announcement/On-Line Congressional Hearing On July 26 at 9:30AM EDT, the Subcommittee on Telecommunications and Finance of the U.S. House of Representatives will hold the first Congressional Hearing ever held over a computer network. The oversight hearing on "The Role of Government in Cyberspace" will take place in the Grand Ballroom of the National Press Club at 14th and F Streets, N.W., Washington, D.C. The hearing is open to the public. An open house will be held from 3-5PM on the same day in the same location and is also open to the public. Chairman Markey has asked that this historic occasion demonstrate the potential and diversity of the global Internet. Thirty Sparcstations will be in the hearing room, allowing members of Congress, staff, and their guests to read e-mail, use Gopher menus, read testimony in WAIS databases, browse the World Wide Web, and otherwise use the resources of the global Internet as part of the hearing. Some witnesses for the hearing will testify remotely, sending audio and video over the Internet. Audio and video of the hearing will also be multicast over the Multicast Backbone (MBONE). We are hoping that C-SPAN and other traditional media will also carry the event. *MORE DETAILS ON MBONE AND OTHER WAYS TO WATCH THE HEARINGS REMOTELY WILL BE FORTHCOMING SHORTLY.* One of the primary points that we are hoping to demonstrate is the diversity and size of the Internet. We have therefore established an electronic mail address by which people on the Internet can communicate with the Subcommittee before and during the hearing: congress at town.hall.org We encourage you to send your comments on what the role of government should be in the information age to this address. Your comments to this address will be made part of the public record of the hearing. Feel free to carry on a dialogue with others on a mailing list, cc'ing the e-mail address. Your cards and letters to congress at town.hall.org will help demonstrate that there are people who use the Internet as part of their personal and professional lives. We encourage you to send comments on the role of government in cyberspace, on what role cyberspace should play in government (e.g., whether government data be made available on the Internet), on how the Internet should be built and financed, on how you use the Internet, and on any other topic you feel is appropriate. This is your chance to show the U.S. Congress that there is a constituency that cares about this global infrastructure. If you would like to communicate with a human being about the hearing, you may send your comments and questions to: hearing-info at town.hall.org Support for the Internet Town Hall is provided by Sun Microsystems and O'Reilly & Associates. Additional support for the July 26 on-line congressional hearing is being provided by ARPA, BBN Communications, the National Press Club, Xerox PARC, and many other organizations. Network connectivity for the Internet Town Hall is provided by UUNET Technologies. --[6484]-- ------- End forwarded transaction From mark at coombs.anu.edu.au Mon Jul 5 14:55:59 1993 From: mark at coombs.anu.edu.au (Mark) Date: Mon, 5 Jul 93 14:55:59 PDT Subject: Non-cypherpunk question. Message-ID: <9307052155.AA00294@toad.com> >I just started reading this mailing list and I've run into a few problems >reading some of the messages because they include MIME information >which my copy of MH chokes on for some reason. It doesn't like the x-text >and text/x-pgp content-types. Would anybody on this list have a fix for >that so I can continue to read this list with MH? Any help would be appreciated. I use elm to read the list and it barfs on metamail messages as metamail hasnt been installed. What i did was to get cat.c and remove the arg checks so it didnt try to interpret the metamail switches elm piped to it and to not report missing files. Then it just catted it's arguements so /tmp/mail-aa0127 is catted and piped through less so i am able to read metamail (which are just nomal messages with a different Content-Type: line int he header anyway). Bit of a kludge but it works. Mark mark at coombs.anu.edu.au From miron at extropia.wimsey.com Mon Jul 5 18:05:36 1993 From: miron at extropia.wimsey.com (Miron Cuperman) Date: Mon, 5 Jul 93 18:05:36 PDT Subject: More on remail error reporting Message-ID: <1993Jul5.184526.7226@extropia.wimsey.com> I've created a digest list for error reporting. The digest list is errors-d at extropia.wimsey.com. Send a message to errors-d-request to subscribe. Following this is an example of a digest. Notice that the subjects (which include the ID of the messages in question) are the the top for quick browsing. Currently, the digest is transmitted every 12 hours. I'm also handling bounces now, not only remail errors. --- cut here --- Date: Mon, 5 Jul 1993 09:30:29 -0700 From: errors-d-request at extropia.wimsey.com Reply-To: errors at extropia.wimsey.com Subject: errors-d Digest V1993 #2 X-Loop: errors-d at extropia.wimsey.com Precedence: list To: errors-d at extropia.wimsey.com errors-d Digest Volume 1993 : Issue 2 Today's Topics: Remailing error, ID = (No subject supplied) Remailing bounce, ID = "Horror That Scares" ---------------------------------------------------------------------- Date: Sat, 3 Jul 1993 13:44:36 -0700 From: anonymous at extropia.wimsey.com To: errors at extropia.wimsey.com Subject: Remailing error, ID = (No subject supplied) Message-Id: <199307032044.AA26014 at xtropia> No receipient could be ascertained. Note: No encrypted contents was found (encryption is required). No subject was included. Please supply a subject in the future for reporting. It will be stripped-off before remailing. ------------------------------ Date: Mon, 5 Jul 1993 09:30:04 -0700 From: anonymous at extropia.wimsey.com To: errors at extropia.wimsey.com Subject: Remailing bounce, ID = "Horror That Scares" Message-Id: <199307051630.AA05344 at xtropia> Bounced mail: > From: Mail Delivery Subsystem Subject of 'Returned mail: User unknown'. ------------------------------ End of errors-d Digest V1993 Issue #2 ************************************* From hfinney at shell.portal.com Mon Jul 5 20:17:13 1993 From: hfinney at shell.portal.com (Hal Finney) Date: Mon, 5 Jul 93 20:17:13 PDT Subject: Encrypted cypherpunks list Message-ID: <9307060222.AA18201@jobe.shell.portal.com> As Eric Hughes suggested, I put together a little perl script to remail cypherpunks mail, PGP encrypted, to all names on a list. If you'd like to receive your cypherpunks messages encrypted, send me your address and your PGP key and I'll add you to the list. Then you can unsubscribe from the regular list. I'll upload the script once I test it a little more. Initial subscribers should consider themselves alpha testers and feel free to complain. Hal Finney hfinney at shell.portal.com From ld231782 at longs.lance.colostate.edu Mon Jul 5 21:47:13 1993 From: ld231782 at longs.lance.colostate.edu ( L. Detweiler ) Date: Mon, 5 Jul 93 21:47:13 PDT Subject: (fwd) GIFs--Now it can be told In-Reply-To: <9307030942.AA03729@netcom3.netcom.com> Message-ID: <9307060447.AA08750@longs.lance.colostate.edu> >Their battle cry is "Eeek! If >we don't nip this in the bud, _right now_, think of what might >happen! or `if we don't police ourselves, then somebody else will do it for us, and we don't want that'. >The mutant condors that one reader (who claimed to be a Pope in the >Church of the Subgenius, but who humorlessly missed the joke--but I >forgive him, for he knew not what he saw) wanted to feed me to, can >now stop circling my house. boy, all I can say is that you sure have a lot of chutzpah doing something like this, but it does definitely make a fascinating Gedanken. I especially appreciate your cogent description & analysis of the grey areas without which the whole thing would have been pointless, but with it make superb social commentary. ltr. From pmetzger at lehman.com Tue Jul 6 07:43:03 1993 From: pmetzger at lehman.com (Perry E. Metzger) Date: Tue, 6 Jul 93 07:43:03 PDT Subject: (fwd) GIFs--Now it can be told In-Reply-To: <9307031355.AA00356@antigone.com> Message-ID: <9307061442.AA10023@snark.shearson.com> Michael Ross says: > Tim, > > That was very manipulative, and did not achieve much. I wholely disagree. Tim's post to alt.binaries.pictures.erotica.children was a valuable exercise even given its limitations. Perry From nobody at rosebud.ee.uh.edu Tue Jul 6 07:54:35 1993 From: nobody at rosebud.ee.uh.edu (nobody at rosebud.ee.uh.edu) Date: Tue, 6 Jul 93 07:54:35 PDT Subject: REMAIL: list 7/6/93 Message-ID: <9307061454.AA13165@toad.com> NOTE: new remailer @entropy.linet.org! -----BEGIN PGP SIGNED MESSAGE----- Last update: 07/02/93 Q1: What cypherpunk remailers exist? A1: 1: nowhere at bsu-cs.bsu.edu 2: hh at cicada.berkeley.edu 3: hh at pmantis.berkeley.edu 4: hh at soda.berkeley.edu 5: 00x at uclink.berkeley.edu 6: hal at alumni.caltech.edu 7: ebrandt at jarthur.claremont.edu 8: phantom at mead.u.washington.edu 9: remailer at rebma.mn.org 10: elee7h5 at rosebud.ee.uh.edu 11: hfinney at shell.portal.com 12: remail at tamsun.tamu.edu 13: remail at tamaix.tamu.edu 14: remailer at utter.dis.org 15: remailer at entropy.linet.org 16: remail at extropia.wimsey.com NOTES: #1-#5 no encryption of remailing requests #6-#15 support encrypted remailing requests #16 special - header and message must be encrypted together #9,#14,#15,#16 introduce larger than average delay (not direct connect) #9,#14,#15 running on privately owned machines ====================================================================== Q2: What help is available? A2: Check out the pub/cypherpunks directory at soda.berkeley.edu (128.32.149.19). Instructions on how to use the remailers are in the remailer directory, along with some unix scripts and dos batch files. The public keys for the remailers which support encrypted remailing requests is also available in the same directory. Mail to me (elee9sf at menudo.uh.edu) for further help and/or questions. -----BEGIN PGP SIGNATURE----- Version: 2.3 iQCVAgUBLDRKRYOA7OpLWtYzAQEoQgP+MS4qW2ITP5UCSACcG/ngSid3/o/I1fic guGXQ5Ay6QWu9CVdc6YlbmkxxL6ekbLhtFSmMyXC356yixJ8Nvxcs7MYypHLlo3W oG7C6HDPmAq6JgVUdD4YCUXOS7haBt3HJ3K/utXFe3G6ybbEfG0TSUvwqgIVADql LSKB4yfpsk8= =04Iy -----END PGP SIGNATURE----- From dmandl at lehman.com Tue Jul 6 08:34:07 1993 From: dmandl at lehman.com (David Mandl) Date: Tue, 6 Jul 93 08:34:07 PDT Subject: PC Week hops on the bandwagon Message-ID: <9307061533.AA11664@disvnm2.shearson.com> Sorry if this has been mentioned already, but the new issue of PC Week contains a big special report entitled "Privacy in the Workplace." It's got about five or six separate pieces on electronic eavesdropping in the workplace, encryption, Clipper, etc., etc. I've only had a chance to scan it quickly (I mean with my eyes), but it seems that there's no mention of PGP at all, even in the piece on public-key encryption. Shocking. And the piece on Clipper, while it of course mentions all the opposition to the proposal, seemed just a bit wimpy to me. Anyway, it's the June 28 issue. Worth checking out, I guess. --Dave. From 76630.3577 at CompuServe.COM Tue Jul 6 11:15:43 1993 From: 76630.3577 at CompuServe.COM (Duncan Frissell) Date: Tue, 6 Jul 93 11:15:43 PDT Subject: Thoughtcrime Message-ID: <930706181141_76630.3577_EHK32-2@CompuServe.COM> (Ed Carp?) >There are no quasi-legitimate issues surrounding child pornography in the >United States. It doesn't matter, legally whether consent was obtained or >not, etc. Child pornography is not legal. To make, sell, possess, distribute, >or conspire to do any of the above is a crime. Not quite. The 9th Circuit Court of Appeals recently threw out the sell, possess, and distribute parts of the Child Pornography act on the traditional 1st Amendment grounds that retailers can't be punished for failure to examine (and get the model's age certificates) for every page or every film frame of every item in their inventory. Such blanket coverage is vague and overbroad. Who knows what the Supremes or other Circuits not located in San Francisco will do but the state of the law is still fluid. The question of morphing or animated kiddie porn is an interesting one. I haven't read the law so I don't know if they would be arguably covered. Pure *text* kiddieporn is legal of course. Remember all the battles over text pornography? Isn't it great that the video/graphics revolution has eliminated most censorship issues concerning pure text. ******************************************************************** * DUNCAN FRISSELL Attorney at Law, Writer, and Privacy * * CIS 76630,3577 Consultant since the Nixon * * Internet: Administration * * 76630.3577 at compuserve.com * * or frissell at panix.com * * Easylink 62853962 * * Attmail !dfrissell * * TLX: 402231 FRISSELL NYK * * * * Privacy Checkup still only $29.95. Buy today before price * * controls force me to raise my prices. * * * * Would you like a debit VISA card from your secret offshore * * bank account. Let me show you how. * * * ******************************************************************** From tcmay at netcom.com Tue Jul 6 12:04:22 1993 From: tcmay at netcom.com (Timothy C. May) Date: Tue, 6 Jul 93 12:04:22 PDT Subject: We are Becoming Politically Correct Sheep Message-ID: <9307061904.AA12415@netcom.netcom.com> Perry Metzger writes, about the reaction to the "junk bits" file I posted in a controversial new group, "alt.binaries.pictures.erotica.children": >Michael Ross says: >> Tim, >> >> That was very manipulative, and did not achieve much. > >I wholely disagree. Tim's post to alt.binaries.pictures.erotica.children >was a valuable exercise even given its limitations. > Of course I agree with Perry, though I also respect the others who have posted disagreements (sometimes strong!) here on this List or in the various newsgroups...that's what free speech is all about. Bear in mind that most of the "Cypherpunks agenda," to the extent we can identify it, is likely to provoke ordinary citizens into _outrage_. Talk of anonymous mail, digital money, money laundering, information markets, data havens, undermining authority, transnationalism, and all the rest (insert your favorite idea) is not exactly mainstream. While I don't personally care for the "kiddie porn" I've seen (the David Hamilton photos of young girls and the occasional Mapplethorpe photos in news reports), the issues raised in this area are of great importance. (I don't plan to argue for or against these images in this forum, though.) If we back down every time a censor screams "Illegal!," then very few of our agenda items will ever see the light of day. So long as physical violence or coercion is not involved, I see no reason to restrict the activities of others. I completely reject the concept of "class-based crimes," such as: - conventional erotica and pornography should be banned because it is degrading to women, objectifies them, etc. (ironically, unless of course it is "made by and for wimmin," a loophole added by Andrea Dworkin and her supporters after they discovered their anti-porn crusade in Canada and elsewhere would put an end to Lesbian porn mags like "Yellow Silk"!). - I put "child porn" in this category because only the actual coercion of children--if it is happening--should be stopped. (And even this is confusing, as coercion of children happens all the time--we call it "parenting.") A mere image carries no proof that this coercion has happened, for the many reasons I have cited and others have cited (e.g., the child may have willingly participated, the "child" may be 18 and merely look 15, the images may have come from other countries where the customs and laws are different, the image may have been computer-generated or morphed, and so on). - "racist jokes" are being targeted for elimination in many of the Usenet groups, by halting the carrying of "offensive" newsgroups. Legal purists will of course note that this is not "censorship" in the legal/government sense. IMHO, the English language needs a new term for something between the one extreme of government censorship and the other extreme of personal choice, perhaps something like "institutional censorship." Being a free market sort of person, I have no problems with, say, Apple Computer deciding not to carry "alt.binaries.pictures.erotica.children" or "rec.humor.funny.cripples," but it still a _form_ of "institutional censorship." [especially when they are acting so as to head off legal action, as I describe below] - read the "academic freedom" group (I forget the exact title...search for "acad-free" in your newsreader) and you'll see that more and more universities are using the "sexual harassment" laws/codes to stop certain newsgroups, to halt the distribution of sexually oriented images, and to take disciplinary action against students (mostly male) who have put GIFs on their computers or workstations (apparently female students who walk past an office in which female models are used as startup screens have decided they are being "sexually assaulted" or "harassed"). [An important point to make here is that many of these institutions are taking actions largely because they fear that if they don't, the plaintiffs will take their case to the _government_ legal system, perhaps by suing the university for "condoning an atmosphere hostile to womym and other people of color." If there was no threat of ultimate legal action, much of this "institutional censorship" would vanish, and people could just concentrate on doing their jobs, with or without calendars of "Miss Usenet" gracing their walls.] - discussion of ways to undermine the State, via crypto anarchy and strong crypography, are likely to be targets of future crackdowns. Sedition laws, conspiracy laws, RICO, etc. How long before speaking on these matters earns a warning letter from your university or your company? [Again, I think it's the "big stick" of ultimate government action that spurs these univeristy and company policies. Apple fears being shut down for having "involvement" with a terrorist plot, Emory University fears being sued for millions of dollars for "conspiring" to degrade wimmin of color, etc.) - how long before "rec.guns" is no longer carried at many sites, as they fear having their universities or companies linked to discussions of "assault weapons" and "cop-killer bullets"? [Prediction: Many companies and universities, under pressure from the Feds, will block groups in which encrypted files are posted. After all, if one encrypts, one must have something to hide, and that could expose the university to legal action from some group that feels aggrieved.] So, free speech is under assault across the country. The tort system is being abused to stifle dissentinting views (and lest you think I am only a capitalist, only a free marketeer, the use of "SLAPP suits"--"Strategic Lawsuits Against Public Participation"--by corporations or real estate developers to threaten those who dare to publicly speak against their projects is a travesty, a travesty that the courts have only recently begun to correct). We are becoming a nation of sheep, fearing the midnight raid, the knock on the door. We fear that if we tell a joke, someone will glare at us and threaten to sue us _and_ our company! And so companies are adopting "speech codes" and other such baggage of the Orwell's totalitarian state. Political correctness is extending its tendrils into nearly every aspect of life in America. Time to fight back. -Tim May -- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at netcom.com | anonymous networks, digital pseudonyms, zero 408-688-5409 | knowledge, reputations, information markets, W.A.S.T.E.: Aptos, CA | black markets, collapse of governments. Higher Power: 2^756839 | Public Key: by arrangement Note: I put time and money into writing this posting. I hope you enjoy it. From jet at netcom.com Tue Jul 6 12:46:36 1993 From: jet at netcom.com (J. Eric Townsend) Date: Tue, 6 Jul 93 12:46:36 PDT Subject: Complete ignorance of any sort of reality on May's part (was We are Message-ID: <9307061947.AA17712@netcom.netcom.com> Timothy C. May writes: > degrading to women, objectifies them, etc. (ironically, unless of course it > is "made by and for wimmin," a loophole added by Andrea Dworkin and her > supporters after they discovered their anti-porn crusade in Canada and > elsewhere would put an end to Lesbian porn mags like "Yellow Silk"!). This is complete and utter nonsense. Tim May has no clue as to what he talks about. What's worse, it smells of homophobia. In no particular order: - Dworkin has never called for the banning of porn. I've read most of her books, and she even goes out of her way to say she's not calling for any sort of censorship. She *does* push for 'victim compenstation'-style legislation. (How this sort of legislation interacts with constitutional rights is beyond my keen, save a few decisions I've read about 19th century property rights in Louisiana. :-) - I've heard Dworkin come down just has hard on lesbigay porn, if not harder than, as she does on het porn. Her old housemate John Stoltenberg (sp?) is as noxious as she is on this point. - "Yellow Silk" is not a lesbian porn mag. It's a very lame het softcore mag. If you'd like to see *real* lesbian porn (some of which pisses off a fair portition of the feminist and lesbian communities) find "On Our Backs" (started by Susie Bright), "Venus Infers" (started by Pat Califia, women-only SM), or "Girljock" (sort of a preppie/athelete/lesbian (not dyke :-) porn mag). - Last I heard, there was no need to capitalize 'lesbian'. None of the dykes/lesbians I know capitalize it, unless it starts a sentence. Residents of Lesbos (the true 'Lesbians') might disagree, however. Tired of white het male computer geeks talking nonsense about anyone who threatens their place in the power structure, -- jet at netcom.com -- J. Eric Townsend -- '92 R100R: "CLACKER" "Either what you've said is so vague that it's meaningless or I disagreee with you completely." -- Tom Maddox From pmetzger at lehman.com Tue Jul 6 13:01:37 1993 From: pmetzger at lehman.com (Perry E. Metzger) Date: Tue, 6 Jul 93 13:01:37 PDT Subject: Complete ignorance of any sort of reality on May's part (was We are In-Reply-To: <9307061947.AA17712@netcom.netcom.com> Message-ID: <9307062001.AA10698@snark.shearson.com> J. Eric Townsend says: > - Dworkin has never called for the banning of porn. I've read most of > her books, and she even goes out of her way to say she's not calling > for any sort of censorship. She *does* push for 'victim > compenstation'-style legislation. This is silly. Its like saying "I'm not in favor of banning guns -- but I want victims to be able to sue the gun manufacturers for negligence". Dworkin is a fascist in feminist clothing -- for all intents and purposes she believes that any act of heterosexual sex is on some level rape. She's nuts. > Tired of white het male computer geeks talking nonsense about anyone > who threatens their place in the power structure, This white male het computer geek marches in the Gay Pride Parade every year. (Well, not this year -- I was sick. Mea culpa.) He also thinks that Andrea Dworkin is about as anti-censorship as Rev. Wildmon. I don't give a shit about the power structure -- I just think that anyone telling me what I can and cannot see, what I can and cannot write, and what I can and cannot sell, is my enemy. Perry From gnu Tue Jul 6 13:19:19 1993 From: gnu (John Gilmore) Date: Tue, 6 Jul 93 13:19:19 PDT Subject: Looking for biblio re commercialization of encryption Message-ID: <9307062019.AA15820@toad.com> ------- Start of forwarded message ------- From: Kibbee=Streetman%ACIS.1037%DSRD.K25 at VINES.ORNL.GOV To: eff at eff.org Subject: References for Crypto Study Date: Wed, 23 Jun 93 15:27:26 EDT Dear Sir -- I am working on a project for NIST to develop an annotated bibliography on issues in the commercialization of encryption technology. Can you provide me with any references to EFF publications dealing with export, Clipper/Capstone, privacy, etc. ? I already have copies of the material presented at the CSS&PAB meeting at NIST but would like to have anything else that might be available. Thank you for your help! Kibbee D. Streetman (kds at ornl.gov) 1099 Commerce Park Oak Ridge, TN 37830 (615)574-9952 ------- End of Forwarded Message From ejo at world.std.com Tue Jul 6 13:19:44 1993 From: ejo at world.std.com (Edward J OConnell) Date: Tue, 6 Jul 93 13:19:44 PDT Subject: Complete ignorance of any sort of reality on May's part (was We are In-Reply-To: <9307061947.AA17712@netcom.netcom.com> Message-ID: Yeah, I heard that she had to do some gymnastics to explain how gay male porn degrades women, too. ;-) Is this true, or am I also a homophobe? ;-) I hate Dworkins arguments. There are plenty of pro porn lesbians/feminists. At least, I've read stuff by several, (bright/Annie sprinkle, etc) and I've read some stuff by various porn stars that call themselves feminists... Identifying feminism with censorship annoys me...I wish I had some data on how many women who call themselves feminists are pro censorship... if its the majority, I guess I'd have to allow it... ;-) The problem for intellectuals is how to protect 'erotica' and somehow squash 'pornography.' The difference is amusing to me. One mans erotica is another womans porn... All right thinking people would agree that the only thing that could be wrong in the sex trade is coercion, be it of women or children or horses or hamsters... I have some problem with the idea of the coerciveness of the 'free market' though, as does Dworkin, so I guess we do have some things in common... I'd like to know that no one is in the trade to pay for a drug habit...of course, I think that drugs, like food and shelter and air, should be free... But I'm a nut. ;-) Jay From mike at EGFABT.ORG Tue Jul 6 14:03:51 1993 From: mike at EGFABT.ORG (Mike Sherwood) Date: Tue, 6 Jul 93 14:03:51 PDT Subject: (fwd) GIFs--Now it can be told In-Reply-To: <9307061442.AA10023@snark.shearson.com> Message-ID: "Perry E. Metzger" writes: > > That was very manipulative, and did not achieve much. > > I wholely disagree. Tim's post to alt.binaries.pictures.erotica.children > was a valuable exercise even given its limitations. I agree.. what if he posted it as some silly program in one of the sources groups, encrypted and all, with a description as something almost no one would want? then the worst that would happen is people flaming him for encrypting it.. that would be a way to go for a real post to convey information.. we could always create an alt.too.many.secrets (obligatory documentary movie reference =]) to post things to where there is a large audience, but for an audience of people who care about such issues, as opposed to a normal post which joe random user could argue with everyone without knowing the difference between a pgp encrypted and uuencoded file. the other issue is that people will think what they want to think if they're uninformed, such as all of the people who flamed Tim for posting what's basically a worthless message, just that those people who flamed him didn't like the name of the group he posted it in.. for all we know, he could've posted his local /etc/hosts. -- Mike Sherwood internet: mike at EGFABT.ORG uucp: ...!sgiblab!egfabt!mike From eaeu362 at orion.oac.uci.edu Tue Jul 6 14:44:58 1993 From: eaeu362 at orion.oac.uci.edu (stub23) Date: Tue, 6 Jul 93 14:44:58 PDT Subject: Wired cover Message-ID: <199307062144.AA01546@orion.oac.uci.edu> well on mindvox the cover decision was announced a bit before the magazine came out and there was a huge guessing contest over who was going to be on the cover with some damn creative ideas but anyhow... although if i were to guess, i would say taht peter gabriel is on the cover of my issue, but on the inside it says cover: mitch kapor so i got confused dunno what mitch kapor looks like... also to note la and sf have different covers from what i ahve heard From davros at ecst.csuchico.edu Tue Jul 6 15:18:22 1993 From: davros at ecst.csuchico.edu (Tyler Yip - UnixWeenie (tm)) Date: Tue, 6 Jul 93 15:18:22 PDT Subject: wired covers Message-ID: <9307062217.AA09173@hairball.ecst.csuchico.edu> In Chico, California, the two book stores large enough to have Wired have Mitch Kapor (Tower Books) and Peter Gabriel (Readmore Books). I might go pick up the other cover. :) From jet at nas.nasa.gov Tue Jul 6 15:23:55 1993 From: jet at nas.nasa.gov (J. Eric Townsend) Date: Tue, 6 Jul 93 15:23:55 PDT Subject: apologies (was Re: Complete ignorance of any sort of reality on May's part (was We are In-Reply-To: <9307062001.AA10698@snark.shearson.com> Message-ID: <9307062223.AA09861@boxer.nas.nasa.gov> I'm sorry I got sidetracked with the bit about dworkin. I'm not really even a serious supporter of hers. On the other hand, I'm probably one of the few people 'here' who've read most of her work. Before one goes about believing many of the outrageous things attributed to her, one should read her writing and take many of the statements in context. (Who was it a couple of years ago posting summaries of out of context quotes by usenetters in alt.flame?) At any rate, I was dismayed by Tim May's lack of knowledge regarding the people he was attacking. Wildly thrashing about and attacking anyone who isn't completely on one's side tends to get one nowhere. Again, I apologize for sidetracking things. -eric From tcmay at netcom.com Tue Jul 6 16:07:36 1993 From: tcmay at netcom.com (Timothy C. May) Date: Tue, 6 Jul 93 16:07:36 PDT Subject: "Let's kill all the lawyers..." Message-ID: <9307062308.AA22680@netcom.netcom.com> "What do you call the killing of those lawyers in San Francisco last week?" Answer (you knew this was coming): "A good start." The discussion of free speech and political correctness is apparently not welcome by some on this list. I guess the usual religious debates about which mail reader is better are what we're supposed to talk about. Well, I'm a member of this list, too, and issues of censorship and free speech are more interesting to me--and to some others, I suspect--than the intricacies of "MH." To each their own. Learn to use your "delete" key. (I agree that discussions of libertarianism vs. liberalism, etc., are the bane of the Net, and that we have been fortunate in avoiding the usual pitched battles between these camps on this List. My comments about censorship of speech, photos, etc., were not intended to provoke such a political battle.) Ironically, even as I type this, I am watching CNN and a special report on a "trial balloon" to ban anti-lawyer remarks! Seriously! Harvey Saferstein, President of the California State Bar, is explaining how "hate speech" laws can and should be used to limit the bashing of lawyers, the portrayal of them as good targets (he cited the lawyer being the first to be eaten in "Jurassic Park" as an example of the "atmosphere of hate" surrounding lawyers), and "inciting to violence." He specifically cited the killings in San Francisco last week as a reason to classify such speech as a "hate crime." No word on whether Shakespeare's "First, let's kill all the lawyers" would've gotten him 10-20 in the Tower of London. What is happening to free speech? What has happened to "Sir, I disagree with what you say, but I defend to the death your right to say it."? Now of course such a law is not likely to pass, or be upheld. (Saferstein is actually not lobbying for a _new_ law, but for extension through the judicial system of existing "hate crime" laws to included any "class-related" jokes and insults. A move other groups are already trying.) In a way, I am cheering this, as it can only end up trivializing and undermining the whole concept of "hate crimes" and "hate speech." Real crimes, including trespass to burn crosses on people's lawns, and the like, can and _should_ be prosecuted, but not "hate" crimes. (If such laws were applied uniformly, instead of just against so-called "white rights" groups, then most "minority" organizations, which preach hatred of "honkeys" and "hets," would be shut down.) As John Gilmore pointed out a few years back, most of us are breaking laws every day. If the government can attach penalties based on our political views, then dissidents can be targeted selectively and given sentences based on their alleged "hate crimes." (Imagine how the Black Panthers or Malcolm X could have been harassed even more aggressively if their "hate" could have been used to increase punishments for otherwise minor crimes? That they were harassed, 20 and 30 years ago, is beside the point. Folks who advocate "hate crime" laws should reflect carefully on how such laws may someday be used against them.) -Tim May -- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at netcom.com | anonymous networks, digital pseudonyms, zero 408-688-5409 | knowledge, reputations, information markets, W.A.S.T.E.: Aptos, CA | black markets, collapse of governments. Higher Power: 2^756839 | Public Key: by arrangement Note: I put time and money into writing this posting. I hope you enjoy it. From khijol!erc at apple.com Tue Jul 6 16:22:00 1993 From: khijol!erc at apple.com (Ed Carp) Date: Tue, 6 Jul 93 16:22:00 PDT Subject: On the medium being the message Message-ID: I was eating lunch today, staring at the cover of "Wired", when the phrase "The medium..." caught my eye. This set off a whole train of thought on message concealibility, like hiding messages in, say, the order of headers in a posting, or the "Reply-To:" header, or even the words in subsequent postings to a newsgroup. Who would ever think to look at, say, the third word in every posting Tim makes to alt.whatever newsgroup? Or in the "Date:" field, or in the "Message-ID:" field, or ... or ... or ... Hmmm. Food for thought. -- Ed Carp erc at wetware.com 510/659-9560 For anonymous mailers --> anonymus+5300 at charcoal.com "I've met many thinkers and many cats, but the wisdom of cats is infinitely superior." -- Hippolyte Taine (1828-1893) From jota at iguana.inesc.pt Tue Jul 6 17:41:10 1993 From: jota at iguana.inesc.pt (Joao Pedro Martins) Date: Tue, 6 Jul 93 17:41:10 PDT Subject: Subscribe Message-ID: <9307070041.AA21672@iguana.inesc.pt> subscribe -- * "Deitaram-se. Blimunda era virgem. Que idade tens, perguntou Baltasar, e *Blimunda respondeu, Dezanove anos, mas ja' enta~o se tornara muito mais *velha." - Jose' Saramago, "Memorial do Convento" **************************************************** jota at mujave.inesc.pt * * ...jotinha meu amor... INFOFREE * i got pgp, ask me NO MORE ! (U2,SBS-L) * 9431006 <- noy my password dancing and laughing From gnu Tue Jul 6 17:41:12 1993 From: gnu (John Gilmore) Date: Tue, 6 Jul 93 17:41:12 PDT Subject: Matchbook reminders for EFF / Cypherpunk members Message-ID: <9307070041.AA17216@toad.com> At a friend's house I found a matchbook printed up by NORML. It serves to advertise the organization, as well as providing information useful during legal troubles. It got me thinking about matchbooks or wallet cards as a good way to make people aware of us. (Matchbooks work better when your organization is concerned with smokables...) Someone mentioned a few weeks ago that we need to have a wallet-sized card that reminds people of their rights when they get into hassles. Experience has shown that we forget and bungle it, without a reminder. The NORML front cover says: Cypherpunk version (strawman): NORML CYPHERPUNKS National Organization Teaching, Learning, for the Reform of and Deploying Marijuana Laws Cryptographic Protection ------------------ 1636 R. St., N.W. Washington, DC 20009 spectron, cleveland, oh <- whoever makes the matches The spine: 900-97-NORML cypherpunks at toad.com The back: Before you rat, Big Brother's listenin' before you squeal, Big Sister's watchin'. before you snitch, Don't get cold feet, or cut a deal.. Use cryptographic stockin's. Call NORML. 900-97-NORML ...etc... (2.95 per minute You must be 18 or older to call) The inside: * NEVER CONSENT TO A Something very similar SEARCH (even with nothing to hide) * NEVER ANSWER ANY QUESTIONS (without an attorney) * CALL AN ATTORNEY IM- MEDIATELY (or call NORML) 900-97-NORML EFF's phone number? (2.95 per minute You must be 18 or older to call) NOTE: The live option is available only from 9 a.m. to 6 p.m., EST, M-F. A tract I cut out of a gay newspaper some years ago is in my wallet now; its advice is: SILENCE = GOLDEN ACT-UP/New York's clip-and-save guide to police intimidation The following guidelines were formulated by legal advisors to ACT UP/NY, but they apply to all gay men and lesbians and activists. 1. You do not have to talk to the police or FBI or any other investigators. You do not have to talk to them whether they come to your house, on the street, if you've been arrested, or even if you are in jail. Only a court or a grand jury has legal authority to compel testimony. 2. You don't have to let the police or FBI into your home or office unless they show you an arrest or search warrant which authorizes them to enter that SPECIFIC place. 3. If they do present a warrant, you do not have to tell them anything other than your name and address. You have a right to observe what they do. 4. Make written notes, including the agents' names, agency and badge numbers. Try to have other people present as witnesses and have them make written notes, too. 5. Anything you do say to any law enforcement officer may be used against you and other people. 6. If you do give the FBI or police information, it may mean that you will have to testify to the same information at a trial or before a grand jury. 7. Lying to an FBI agent or other federal investigators is a crime. 8. The best advice, if the FBI or police try to question you or to enter your home or office without a warrant, is to JUST SAY NO! Law enforcement agents have a job to do and they are highly skilled at it. Attempting to "outwit" them is very risky. YOU CAN NEVER TELL HOW A SEEMINGLY HARMLESS BIT OF INFORMATION CAN HELP THEM HURT YOU OR ANOTHER ACT UP MEMBER. 9. The investigators may threaten you with a grand jury subpoena if you don't give them information. But you may get one anyway, and anything you've already told them will be the basis for more detailed questioning under oath. 10. They may try to threaten or intimidate you by pretending to have information about you ("We know what you've been doing, but if you cooperate it will be all right.") If you are concerned about this, tell them you will consider talking to them with your lawyer present. 11. If you are nervous about simply refusing to talk, you may find it easier to tell them to contact your lawyer. Once a lawyer is involved, the agents usually pull back since they have lost their power to intimidate. If you are taken into police custory, once you request an attorney, they MUST cease questioning until your lawyer is present. But remember, you don't have to answer their questions, even if they keep asking. From karn at qualcomm.com Tue Jul 6 18:03:18 1993 From: karn at qualcomm.com (Phil Karn) Date: Tue, 6 Jul 93 18:03:18 PDT Subject: "Let's kill all the lawyers..." Message-ID: <9307070103.AA23132@servo> Amen! Well spoken, Tim. Last night I saw the Saferstein remarks you mention. I think they hit the local California TV stations before being picked up by CNN. I fully agree that PC is *really* getting out of hand if lawyers are now to be considered one of the downtrodden minority groups. Saferstein doesn't seem to understand the serious role satire plays in actually *preventing* violence in our society. Lawyers and politicians (lawyers being the larval stage of the latter) hold a tremendous amount of power over the rest of us. Satire (including jokes, political cartoons and the like) might not actually do much to lessen that power, but it does give the rest of us a chance to vent some of the resentment that might otherwise build into violence in more people. And of course there is satire's unique selectivity. It's hard to satirize somebody who doesn't deserve it. But a hypocritical lawyer or a politician with a bloated ego... well, I don't think bullets ever get any more magic than this. *They* may still believe in their own overriding self-importance, but thanks to satire, the rest of us don't have to! The real irony of trying to ban "lawyer bashing" is that some of the best (most critical) lawyer jokes are told by the lawyers themselves! So maybe we *should* pass a law against it. What better way to get more lawyers off the street and where they belong? (Short of cloning some more T. Rexes, of course...was there also applause in your theater during that scene?) Phil From dante at microsoft.com Tue Jul 6 18:08:35 1993 From: dante at microsoft.com (dante at microsoft.com) Date: Tue, 6 Jul 93 18:08:35 PDT Subject: Matchbook reminders for EFF / Cypherpunk members Message-ID: <9307070107.AA00445@netmail.microsoft.com> John Gilmore said: | |At a friend's house I found a matchbook printed up by NORML. It |serves to advertise the organization, as well as providing information |useful during legal troubles. | |It got me thinking about matchbooks or wallet cards as a good way to |make people aware of us. (Matchbooks work better when your |organization is concerned with smokables...) Someone mentioned a few |weeks ago that we need to have a wallet-sized card that reminds people |of their rights when they get into hassles. Experience has shown that |we forget and bungle it, without a reminder. Good idea. FYI, the ACLU also provides these wallet-sized cards to anyone who asks, and they are invaluable. Read them _before_ you get arrested. From mccoy at ccwf.cc.utexas.edu Tue Jul 6 18:20:03 1993 From: mccoy at ccwf.cc.utexas.edu (Jim McCoy) Date: Tue, 6 Jul 93 18:20:03 PDT Subject: On the medium being the message In-Reply-To: Message-ID: <199307070119.AA23872@tigger.cc.utexas.edu> > [...] This set off a whole train of thought on > message concealibility, like hiding messages in, say, the order of headers > in a posting, or the "Reply-To:" header, or even the words in subsequent > postings to a newsgroup. Who would ever think to look at, say, the third > word in every posting Tim makes to alt.whatever newsgroup? Or in the "Date:" > field, or in the "Message-ID:" field, or ... or ... or ... Not much bandwidth in that medium there... Things like gif/jpeg images and sound files have a ton of semi-random bits in them that you can fool around with without anyone noticing much, but plain text in news headers and postings just doesn;t leave one with much room for putting in a message. At least not without being blanently obvious... jim From phred at well.sf.ca.us Tue Jul 6 18:32:40 1993 From: phred at well.sf.ca.us (Fred Heutte) Date: Tue, 6 Jul 93 18:32:40 PDT Subject: "Let's kill all the lawyers..." Message-ID: <93Jul6.183147pdt.14190-3@well.sf.ca.us> Tim May and Phil Karn's comments remind me of my friend Mark the Lawyer who lives in SF. I visit him on occasion when I'm in the Bay Area and notice that he has the proper perspective on things. When I was there a week ago he had a copy of the Nolo Press newspaper (including a hefty selection of their vast catalogue of lawyer jokes). And his refrigerator magnet reads: "Lawyer: person retained to protect client from others of profession." We need lawyers, but do we need *so many*?! I was born and grew up in Washington, DC. The DC Bar has over *50,000* lawyers! Even in our nation's capital that seems excessive. From stjude at well.sf.ca.us Tue Jul 6 18:43:00 1993 From: stjude at well.sf.ca.us (Judith Milhon) Date: Tue, 6 Jul 93 18:43:00 PDT Subject: fwd of Chi.Trib article... Message-ID: <93Jul6.184232pdt.14403-3@well.sf.ca.us> ...for you maths hooligans and crypto thugs... From: SPOETZ Subj: The Chicago Tribune on Fermat's Last Theorem To: DELTORTO, SaintJude ------- Forwarded Message Subject: The Chicago Tribune on Fermat's Last Theorem >From: David Notkin The following column appeared in the Chicago Tribune / DuPage County edition Tuesday June 29 1993 page 2-1. MATH RIOTS PROVE FUN INCALCULABLE /by/ Eric Zorn /begin italics/ News Item (June 23) -- Mathematicians worldwide were excited and pleased today by the announcement that Princeton University professor Andrew Wiles had finally proved Fermat's Last Theorem, a 365-year-old problem said to be the most famous in the field. /end italics/ Yes, admittedly, there was rioting and vandalism last week during the celebration. A few bookstores had windows smashed and shelves stripped, and vacant lots glowed with burning piles of old dissertations. But overall we can feel relief that it was nothing -- nothing -- compared to the outbreak of exuberant thuggery that occurred in 1984 after Louis DeBranges finally proved the Bieberbach Conjecture. "Math hooligans are the worst," said a Chicago Police Department spokesman. "But the city learned from the Bieberbach riots. We were ready for them this time." When word hit Wednesday that Fermat's Last Theorem had fallen, a massive show of force from law enforcement at universities all around the country headed off a repeat of the festive looting sprees that have become the traditional accompaniment to triumphant breakthroughs in higher mathematics. Mounted police throughout Hyde Park kept crowds of delirious wizards at the University of Chicago from tipping over cars on the midway as they first did in 1976 when Wolfgang Haken and Kenneth Appel cracked the long-vexing Four-Color Problem. Incidents of textbook-throwing and citizens being pulled from their cars and humiliated with difficult story problems last week were described by the university's math department chairman Bob Zimmer as "isolated." Zimmer said, "Most of the celebrations were orderly and peaceful. But there will always be a few -- usually graduate students -- who use any excuse to cause trouble and steal. These are not true fans of Andrew Wiles." Wiles himself pleaded for calm even as he offered up the proof that there is no solution to the equation x^n + y^n = z^n when n is a whole number greater than two, as Pierre de Fermat first proposed in the 17th Century. "Party hard but party safe," he said, echoing the phrase he had repeated often in interviews with scholarly journals as he came closer and closer to completing his proof. Some authorities tried to blame the disorder on the provocative taunting of Japanese mathematician Yoichi Miyaoka. Miyaoka thought he had proved Fermat's Last Theorem in 1988, but his claims did not bear up under the scrutiny of professional referees, leading some to suspect that the fix was in. And ever since, as Wiles chipped away steadily at the Fermat problem, Miyaoka scoffed that there would be no reason to board up windows near universities any time soon; that God wanted Miyaoka to prove it. In a peculiar sidelight, Miyaoka recently took the trouble to secure a U.S. trademark on the equation "x^n + y^n = z^n " as well as the now-ubiquitous expression "Take that, Fermat!" Ironically, in defeat, he stands to make a good deal of money on cap and T-shirt sales. This was no walk-in-the-park proof for Wiles. He was dogged, in the early going, by sniping publicity that claimed he was seen puttering late one night doing set theory in a New Jersey library when he either should have been sleeping, critics said, or focusing on arithmetic algebraic geometry for the proving work ahead. "Set theory is my hobby, it helps me relax," was his angry explanation. The next night, he channeled his fury and came up with five critical steps in his proof. Not a record, but close. There was talk that he thought he could do it all by himself, especially when he candidly referred to University of California mathematician Kenneth Ribet as part of his "supporting cast," when most people in the field knew that without Ribet's 1986 proof definitively linking the Taniyama Conjecture to Fermat's Last Theorem, Wiles would be just another frustrated guy in a tweed jacket teaching calculus to freshmen. His travails made the ultimate victory that much more explosive for math buffs. When the news arrived, many were already wired from caffeine consumed at daily colloquial teas, and the took to the streets en masse shouting, "Obvious! Yessss! It was obvious!" The law cannot hope to stop such enthusiasm, only to control it. Still, one has to wonder what the connection is between wanton pillaging and a mathematical proof, no matter how long-awaited and subtle. The Victory Over Fermat rally, held on a cloudless day in front of a crowd of 30,000 (police estimate: 150,000) was pleasantly peaceful. Signs unfurled in the audience proclaimed Wiles the greatest mathematician of all time, though partisans of Euclid, Descartes, Newton, and C.F. Gauss and others argued the point vehemently. A warmup act, The Supertheorists, delighted the crowd with a ragged song, "It Was Never Less Than Probable, My Friend," which included such gloating, barbed verses as --- "I had a proof all ready / But then I did a choke-a / Made liberal assumptions / Hi! I'm Yoichi Miyaoka." In the speeches from the stage, there was talk of a dynasty, specifically that next year Wiles will crack the great unproven Riemann Hypothesis ("Rie-peat! Rie-peat!" the crowd cried), and that after the Prime-Pair Problem, the Goldbach Conjecture ("Minimum Goldbach," said one T-shirt) and so on. They couldn't just let him enjoy his proof. Not even for one day. Math people. Go figure 'em. ---------------------------------------------------------------------- St.Jude the Oblique From tcmay at netcom.com Tue Jul 6 18:55:34 1993 From: tcmay at netcom.com (Timothy C. May) Date: Tue, 6 Jul 93 18:55:34 PDT Subject: "Let's kill all the lawyers..." In-Reply-To: <93Jul6.183147pdt.14190-3@well.sf.ca.us> Message-ID: <9307070156.AA16144@netcom3.netcom.com> Fred Heutte comments: > Tim May and Phil Karn's comments remind me of my friend Mark the Lawyer > who lives in SF. I visit him on occasion when I'm in the Bay Area and > notice that he has the proper perspective on things. When I was there > a week ago he had a copy of the Nolo Press newspaper (including a hefty > selection of their vast catalogue of lawyer jokes). And his refrigerator > magnet reads: "Lawyer: person retained to protect client from others of > profession." > > We need lawyers, but do we need *so many*?! I was born and grew up > in Washington, DC. The DC Bar has over *50,000* lawyers! Even in > our nation's capital that seems excessive. I don't really think of lawyers as the problem, per se, nor do I think there are too many GIVEN WHAT THE LAW HAS BECOME. Seems to me folks have gotten what they asked for. The asked for more regulation, they got it. The asked to be protected from the contracts they signed (that is, to find ways to get out of contracts they no longer liked), they got it. They asked for easier divorce, they got it. They asked to be able to sue for nearly anything bad that happens to them, they got it. All of these things increase the business of lawyers, as business is no longer done on a handshake, property has to be divided up with the easier divorces, and so on. If you think about it, the reason for the surge in lawyers is clear. What, if anything, can be done? Here are several suggestions: 1. Return the sanctity of the contract. If parties sign a contract, then unless there is provable fraud, the contract is valid. No wiggling out claiming "diminished capacity" (if you're diminished, hire someone to handle your affairs), claims of "not understanding," or claims that the contract itself was coercion, racist, unfair, whatever. 2. Eliminate public funding of court proceedings. Eliminate things like the "Legal Aid Society" that subsidize court proceeding against landlords and property owners (as but one example). 3. Loser pays all court costs, and perhaps damages for bringing the suit, if the suit was clearly unfounded. (A murky area, I'll grant you, but other countries have tried it and it cuts down on frivolous "I'll sue!" types of suits.) 4. In divorce cases, adopt a system in advance of the wedding clearly stating the terms and conditions under which property, kids, etc., are to be doled out. Oh, and by Point #1, the sanctity of Pre-Nuptial Agreements is ironclad...no wiggling out by hiring lawyers. 5. Ultimately, privatize the court system. Bruce Benson, in "The Enterprise of Law," describes how this might work. (I won't debate it here in this group.) Obligatory Link to Cypherpunk Ideas: Many of these reforms are likely in cyberspace, where contracts will be contracts....with money placed in escrow with anonymous escrow services and only fairly simple adjudication and arbitration of the "facts," not the "intents." (Read Vinge's "True Names" for one vision of crypto anarchy and then try to imagine how the lawyers will ply their trade in such an environment.) -Tim May -- .......................................................................... Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at netcom.com | anonymous networks, digital pseudonyms, zero 408-688-5409 | knowledge, reputations, information markets, W.A.S.T.E.: Aptos, CA | black markets, collapse of governments. Higher Power: 2^756839 | Public Key: PGP and MailSafe available. Note: I put time and money into writing this posting. I hope you enjoy it. From phred at well.sf.ca.us Tue Jul 6 19:07:08 1993 From: phred at well.sf.ca.us (Fred Heutte) Date: Tue, 6 Jul 93 19:07:08 PDT Subject: fwd of Chi.Trib article... Message-ID: <93Jul6.190635pdt.14421-1@well.sf.ca.us> Thanks, that was priceless! Best thing I've read this year. From khijol!erc at apple.com Tue Jul 6 19:32:17 1993 From: khijol!erc at apple.com (Ed Carp) Date: Tue, 6 Jul 93 19:32:17 PDT Subject: On the medium being the message In-Reply-To: <199307070119.AA23872@tigger.cc.utexas.edu> Message-ID: > > [...] This set off a whole train of thought on > > message concealibility, like hiding messages in, say, the order of headers > > in a posting, or the "Reply-To:" header, or even the words in subsequent > > postings to a newsgroup. Who would ever think to look at, say, the third > > word in every posting Tim makes to alt.whatever newsgroup? Or in the "Date:" > > field, or in the "Message-ID:" field, or ... or ... or ... > > Not much bandwidth in that medium there... > > Things like gif/jpeg images and sound files have a ton of semi-random bits > in them that you can fool around with without anyone noticing much, but > plain text in news headers and postings just doesn;t leave one with much > room for putting in a message. At least not without being blanently > obvious... True, but how much do you need if you have code dictionaries? The Message-ID field, for example, could contain a page.word reference, one that meant "the cops are watching me, be careful", or "Nuclear detonator received". Not much the NSA could do to figure that one out unless they had searched your place, or knew a HELL of a lot about you and your co-conspirator. My point was, there are a lot of covert channels that one can use without making it obvious that there is any sort of covert data being passed. -- Ed Carp erc at wetware.com 510/659-9560 For anonymous mailers --> anonymus+5300 at charcoal.com "I've met many thinkers and many cats, but the wisdom of cats is infinitely superior." -- Hippolyte Taine (1828-1893) From sneal at muskwa.ucs.ualberta.ca Tue Jul 6 20:08:19 1993 From: sneal at muskwa.ucs.ualberta.ca (Sneal) Date: Tue, 6 Jul 93 20:08:19 PDT Subject: We are becoming politically correct sheep Message-ID: <9307070308.AA02565@muskwa.ucs.ualberta.ca> I am slightly dubious of the wisdom of Tim's switch-and-bate on a.b.p.e.c. for a couple of reasons: a) The possibility of some media nitwit hearing about the initial post and missing Tim's "retraction" (or ignoring it in the interests of a great big ol' byline). Nightmarish possibilities abound, particularly given the subtle nature of the "clue" in the PGP block. b) In a more paranoid moment some months ago, I predicted that the NSA would be waiting for a chance to work a PGP angle into some sensational story that creates a lot of public outcry. Linking PGP to terrorism, drug dealing, or kiddie porn would be a great first step towards getting some laws against "unlicensed cryptography" on the books. I'm less worried about Tim giving the TLAs any ideas (I'm sure they have lots of bright "media relations" people already) than I am about him inspiring real pornographers (or agent provocateurs). c) Personally, I think that the fewer excuses one gives busybodies to "make policy", the better. However, what with Clipper, Markey, Gore, Denning, Sternlight, et al, the cat's already out of the bag. We can only sigh and wish that these beknighted ones had viewed with alarm the excess profits and price gouging of the haircutting industry, and the need to balance unbridled free enterprise with the tonsorial rights of the public. However - tickling a few neurons may very well have been worth the risks noted above. In response to Tim's later post about freedom of speech, J. Eric Townsend writes: >[flameage censored] In arguing the fine points of Dworkinism, pornography, capitalization of proper nouns, etc., I think Eric misses Tim's point, which is (I think) that the current movement of society is from Forbidding actions that cause harm to others to Forbidding actions and speech that might offend others, or make them uncomfortable, or hurt their feelings. This is an obviously not a happy thing. While not offending others is an admirable goal, I am going to disagree with Tim May if he claims that he can levitate given the right mix of ginseng, pig knuckles, and spiritual harmony. Tim may be emotionally crushed by this, but that's life. If things keep on the way they are, in a few years, Tim will have the option of taking me to the Spiritual Tribunal and having me busted for emotional assault, where I'll be sentenced to three to five years at hard consciousness-raising. There's an excellent article on this issue by Jonathan Rauch in the April 93 issue of 'Reason'; this is an excerpt from his book "Kindly Inquisitors: The New Attack On Free Thought". Rauch's thesis is that the very humanitarian goal of making sure that nobody's feelings are hurt is incompatible with the free inquiry and lively discourse that are necessary parts of a free society. To those of you who think "it can't happen here", I would refer you to Canada's "hate speech" laws, which make it a criminal offense to "promote hatred against an identifiable group". To date, the only well-known charges under these laws have been against couple of Holocaust revisionists; however, the definitions of "promoting hatred" and "identifiable group" are vague enough to make this country a somewhat dangerous place to have unpopular views, even disregarding the tremendous leverage this law gives governments to step on anyone who gets too far out of line. "It's the First Amendment, stupid." -- Steve From nobody at soda.berkeley.edu Tue Jul 6 21:07:14 1993 From: nobody at soda.berkeley.edu (nobody at soda.berkeley.edu) Date: Tue, 6 Jul 93 21:07:14 PDT Subject: Encrypted list software Message-ID: <9307070403.AA05223@soda.berkeley.edu> -----BEGIN PGP SIGNED MESSAGE----- I've had a couple of people ask to have their names added to the encrypted list forwarder I put together. I'm soliciting feedback on how this service should work. Right now, it only encrypts the "body" of the message. The "headers", which are the "From:" and "Subject:" lines, etc., are passed through basically unchanged (except for "To:", which I change to be the person it is going to. Maybe that's unnecessary, as I notice that the cypherpunks list puts its own address into "To:", for some reason.) It also adds "Encrypted: PGP" to the headers. I wonder if it would be better for it to encrypt the whole message, headers and body together, then to mail that with a fresh new header that would show nothing about the original message. The first approach hides the contents of the message, but not its subject or who it is from; the second hides more. Any suggestions as to which is more useful? Hal Finney hfinney at shell.portal.com -----BEGIN PGP SIGNATURE----- iQCUAgUBLDoazagTA69YIUw3AQEVIQP4yImWVmyipsNbMUu8pX4QkyPx9T/95MVP lTc+LAFwACUSbm2/DNTqLOLbDhb9rnMlHT/926mjoJFC4H3xQn61oXzM50GtRiaY ORJOxJ8CVqmQE7RW51jEAM0wIH4L2CDhveudY6r2ZX7uLjmybkdHJy4G5BSb46cD x5h93fOyXg== -----END PGP SIGNATURE----- From fergp at sytex.com Tue Jul 6 21:13:11 1993 From: fergp at sytex.com (Paul Ferguson) Date: Tue, 6 Jul 93 21:13:11 PDT Subject: Public record Message-ID: <5HPa7B2w165w@sytex.com> I received a letter from "The National Computer System Security and Priivacy Advisory Board" this past week, acknowledging my letter to them (and submission thereof) on the "key-escrow" initiative. Without quoting the entirety of the letter, one particular passage merits repeat: "Copies of written statements/comments received on these issues will be made part of the public record. All statements/comments are available for inspection aand copying in the Central Reference and Records Inspection Facility, Room 600, Herbert C. Hoover (Department of Commerce) Building, 14th Street between Pennsylvania and Constitution Avenues, NW, Washington, DC 20230." The letter is signed by Lynn McNulty, Board Secretariat. (Actually, his secretary called me here in New York to get my mailing address even though I made a point of including it in my original letter of opposition. Go figure.) Anyway, this is now public record and subject to an FOIA request, no? Cheers. Paul Ferguson | "Confidence is the feeling you get Network Integrator | just before you fully understand Centreville, Virginia USA | the problem." fergp at sytex.com | - Murphy's 7th Law of Computing Quis Custodiet Ipsos Custodes? From fergp at sytex.com Tue Jul 6 21:13:49 1993 From: fergp at sytex.com (Paul Ferguson) Date: Tue, 6 Jul 93 21:13:49 PDT Subject: Live for today Message-ID: On Tue, 6 Jul 93 16:08:00 -0700, Timothy C. May wrote - > The discussion of free speech and political correctness is > apparently not welcome by some on this list. I guess the usual > religious debates about which mail reader is better are what > we're supposed to talk about. Well, I'm a member of this list, > too, and issues of censorship and free speech are more > interesting to me--and to some others, I suspect--than the > intricacies of "MH." Hear, hear. Settle down, old chum. I suppose it takes a volitile issue or two to get me off of my keister, but now that I'm up, I'm more than willing to toss my (good?) name into the fracas. Idealisms are much akin to links in a chain; each crafted individually, yet forming a bond that link each idealism together into a society. (Discussions on how healthy this society really should be left for future discusion.) I walk a fine line between an affectionado for free speech and a staunch supporter of individual rights and privacy. Each aspect has its proponents and contentions, yet each aspect needs protection under _human_ law. Now, where does one infringe upon the other? I have always been fond of the adage that "your right to swing your fist ends when it hits my nose," and I hope you understand my sentiment. I have even played the role of the "net police" in at least one instance. (But then again, I did not react to rumor, innuendo or happenstance. This is another topic entirely. Those who subscribe to RISKS may be the wiser.) I applaud your exploit in the bitwise/erotica/net-police experiment. I personally think it was damned clever and proved a valuable point. In fact, I'd like to get your permission to reprint your original message in Legal Net News, por favor. > What is happening to free speech? What has happened to "Sir, I > disagree with what you say, but I defend to the death your right > to say it."? I was a military-man (once upon a time), and took that oath seriously. I tired of the "spinning-your-wheels" metality, so I naturally migrated into the private telecommunications sector. I would still defend it today, to death. Make no mistake, this country may have developed some serious problems over the course of the past 200 years, but some of us hold the intrinsic values embelished in the Constitution dear. What Tim has done is above and beyond petty in-fighting in this group. We are about change, challenge and chaos. We are old, we are new. We change, yet we are the same. What does it take? Ask us. We will tell you -- its about stirring up the pot. Paul Ferguson | "Confidence is the feeling you get Network Integrator | just before you fully understand Centreville, Virginia USA | the problem." fergp at sytex.com | - Murphy's 7th Law of Computing Quis Custodiet Ipsos Custodes? From tcmay at netcom.com Tue Jul 6 21:25:10 1993 From: tcmay at netcom.com (Timothy C. May) Date: Tue, 6 Jul 93 21:25:10 PDT Subject: We are becoming politically correct sheep In-Reply-To: <9307070308.AA02565@muskwa.ucs.ualberta.ca> Message-ID: <9307070425.AA15301@netcom3.netcom.com> Steve Neal makes some very good points: > a) The possibility of some media nitwit hearing about the initial > post and missing Tim's "retraction" (or ignoring it in the interests > of a great big ol' byline). Nightmarish possibilities abound, > particularly given the subtle nature of the "clue" in the PGP block. I agree, which is why I ended the charade. (And I would've ended it sooner had I gotten any strange phone calls, suggesting a reporter sniffing around, or threats to report the posting to the cops. I did get a few strange messages suggesting Netcom should yank my account.) But the interesting thing is how paranoid people are about free speech being exercised (the free speech being posting of non-provably illegal material, not the posting of provably illegal material). I won't repeat my point about a nation of politically correct sheep. > However - tickling a few neurons may very well have been worth the > risks noted above. Yes, perhaps thinking about some issues in advance is a good "drill." (For some reason, I seem to gravitate toward these "early warning" situations...it was me who posted the first message about Dorothy Denning's key escrow system, last October ("A Trial Balloon to Ban Encryption?"), and I also posted the fake "Stealth Secrets" article in cypherpunks, anonymously. The intent was to test the commitment of the list to the much-talked about "whistleblowers" group and to the likey implications. (Sure enough, several people freaked out and called for censorship--as if anonymous whistleblowing can be censored! I 'fessed-up after several days, pointing out the material came from a published book and some Aviation Leak material.) Steve then makes some really excellent points: > In arguing the fine points of Dworkinism, pornography, > capitalization of proper nouns, etc., I think Eric misses Tim's point, > which is (I think) that the current movement of society is from > > Forbidding actions that cause harm to others > > to > > Forbidding actions and speech that might offend others, or make them > uncomfortable, or hurt their feelings. Yes, exactly! This is a profound shift from the principles on which this country (apologies to Brits, etc.) was founded. > To those of you who think "it can't happen here", I would refer you > to Canada's "hate speech" laws, which make it a criminal offense to > "promote hatred against an identifiable group". To date, the only And France and Germany have both used "hate crimes" as "hate groups" as justification to ban certain groups from existing. > well-known charges under these laws have been against couple of > Holocaust revisionists; however, the definitions of "promoting > hatred" and "identifiable group" are vague enough to make this > country a somewhat dangerous place to have unpopular views, even > disregarding the tremendous leverage this law gives governments to > step on anyone who gets too far out of line. Good points, but the so-called "Holocaust" never actually happened, hence there cannot be any such thing as "Holocaust revisionism," just the telling of the truth. While the Nazis were not perfect, this nonsense about extermination camps was just Allied propaganda (confirmed by documents declassified in 1967) designed to embarass the Nazi "Huns" and to hide the mass exodus of Jews, who stole the wealth of Germany and took it to New York to set up brokerage and banking firms like S.G. Warburg and the Rothschild Bank. Every true researcher knows this. (This little joke could be enough in Canada, as Steve points out, to at least threaten me, and perhaps the machine this message originates to the List from. Most likely not (the Canadians concentrated on long-time activists), but the _threat_ is there. And this threat is coming down to the U.S.) Understand that the real threat to the Jews in Germany was not so much hatred of the Jews (of which there was probably less in Germany than in France and other European countried until Hitler began stirring up hatred and staging events to trigger mass hatred) as it was the unbridled power of the Nazi state. Civil rights were suspended, the courts fell under the control of Hitler's people, and "law" became whatever the government wanted. Ironically, with "hate crimes" as a prosecutorial tool in the 1930s, Hitler could have used the laws to prosecute Jews (especially Orthodox Jews, with different fashion styles and a dislike ("hate"?) for many Gentiles. The real threat is the government, whatever its initial intent. They have the guns, they have the courts, they have the power. We've sunk into a strange situation in which various special interest groups jockey for special privilege, special powers granted to them by the State. "Live and let live" doesn't mean one has to _like_ all the various individuals or groups that are out there, it just means you let them do their thing as long as they don't interfere with your own life. You can't pass laws to force others to like you, or your group, or to make their thougths conform to yours. About all you can really do is make sure they can't rob and kill, and even that's iffy. --Tim May -- .......................................................................... Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at netcom.com | anonymous networks, digital pseudonyms, zero 408-688-5409 | knowledge, reputations, information markets, W.A.S.T.E.: Aptos, CA | black markets, collapse of governments. Higher Power: 2^756839 | Public Key: PGP and MailSafe available. Note: I put time and money into writing this posting. I hope you enjoy it. From tcmay at netcom.com Tue Jul 6 21:40:37 1993 From: tcmay at netcom.com (Timothy C. May) Date: Tue, 6 Jul 93 21:40:37 PDT Subject: Live for today In-Reply-To: Message-ID: <9307070441.AA21415@netcom3.netcom.com> Paul Ferguson writes: > I applaud your exploit in the bitwise/erotica/net-police experiment. > I personally think it was damned clever and proved a valuable point. > In fact, I'd like to get your permission to reprint your original > message in Legal Net News, por favor. By all means! Just be sure to provide enough context and to included the "explanation." Also, several other people made some excellent comments, and you might want to somehow include their points. > Ask us. We will tell you -- its about stirring up the pot. Yeah, I think a lot of us got involved in this whole thing (now called Cypherpunks, but it started percolating years ago) precisely to stir things up. And to the credit of you folks, I think some progress has been made. The remailers, the awareness of Cypherpunks-type issues in the media ("Wired," "Whole Earth Review," "New York Times," "Newsweek"), and our role in the Clipper/Capstone/Skipjack/whatever matter, are all positive steps. It is true we haven't deployed digital cash, nor have we set up data havens in cyberspace, nor a bunch of other things, but these things are instrinsically hard to pull off. Someday they'll come. Finally: > Quis Custodiet Ipsos Custodes? (I've been tempted recently to come up with a "crypto" version of this famous "And who shall guard the guardians?" line. Something, in Latin of course (for effect), about "And who shall eavesdrop on the eavesdroppers?" or somesuch. Perhaps the original is best as it is.) -Tim May -- .......................................................................... Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at netcom.com | anonymous networks, digital pseudonyms, zero 408-688-5409 | knowledge, reputations, information markets, W.A.S.T.E.: Aptos, CA | black markets, collapse of governments. Higher Power: 2^756839 | Public Key: PGP and MailSafe available. Note: I put time and money into writing this posting. I hope you enjoy it. From parrinel at ux1.cso.uiuc.edu Tue Jul 6 21:47:34 1993 From: parrinel at ux1.cso.uiuc.edu (Chris Parrinello) Date: Tue, 6 Jul 93 21:47:34 PDT Subject: Encrypted list software In-Reply-To: <9307070403.AA05223@soda.berkeley.edu> Message-ID: <199307070446.AA27421@ux1.cso.uiuc.edu> Your message dated: Tue, 06 Jul 1993 21:03:30 PDT >-----BEGIN PGP SIGNED MESSAGE----- > >I've had a couple of people ask to have their names added to the >encrypted list forwarder I put together. I'm soliciting feedback on >how this service should work. > >I wonder if it would be better for it to encrypt the whole message, headers >and body together, then to mail that with a fresh new header that would >show nothing about the original message. I think encrypting who the message is from and the subject would be best that way I can have a subject of "Plans to Kill Pauly Shore" after I decrypt the message. For how the service should work, I think you should look into MIME. You can include encrypted text that will decrypt when you read it with your mail program. Chris From i6t4 at jupiter.sun.csd.unb.ca Tue Jul 6 22:31:44 1993 From: i6t4 at jupiter.sun.csd.unb.ca (Nickey MacDonald) Date: Tue, 6 Jul 93 22:31:44 PDT Subject: What do you make of this? Message-ID: Here's a list of phone numbers, what do you make of them? (503) 241-9796 ext: 09 (510) 244-8003 ext: 308 (614) 626-6421 ext: 19 (917) 806-0801 ext: 19 (208) 565-6220 ext: 23 (807) 961-6176 (608) 809-5822 (402) 815-5084 (716) 251-3201 ext: 214 (317) 837-9796 ext: 20 (514) 999-7352 ext: 38 (412) 221-7266 ext: 226 (619) 620-9556 ext: 18 (417) 582-2491 ext: 26 (210) 879-1228 ext: 017 (413) 708-9037 ext: 24 (203) 791-3828 ext: 15 (413) 366-5478 ext: 37 (414) 297-3632 ext: 301 (305) 469-5633 (200) 296-4919 ext: 104 (818) 708-4065 ext: 12 (402) 614-0058 (213) 918-2514 ext: 221 (201) 897-4434 ext: 01 (611) 200-0862 ext: 208 (213) 248-9232 ext: 0309 (507) 236-2585 ext: 27 (218) 271-1379 ext: 0329 (201) 267-6176 ext: 114 (504) 214-8612 ext: 22 (803) 823-1367 (207) 562-8716 ext: 27 (215) 239-5596 ext: 0421 (405) 332-6203 (912) 248-6594 ext: 225 (216) 440-2025 ext: 122 (313) 322-2667 ext: 33 -- Nick MacDonald | NMD on IRC i6t4 at jupiter.sun.csd.unb.ca | PGP 2.1 Public key available via finger i6t4 at unb.ca | (506) 457-1931 ^{1024/746EBB 1993/02/23} From rwhelan at mason1.gmu.edu Tue Jul 6 23:00:41 1993 From: rwhelan at mason1.gmu.edu (Ryan A. Whelan) Date: Tue, 6 Jul 93 23:00:41 PDT Subject: Encrypted list software In-Reply-To: <199307070446.AA27421@ux1.cso.uiuc.edu> Message-ID: <9307070600.AA23572@mason1.gmu.edu> -----BEGIN PGP SIGNED MESSAGE----- > I think encrypting who the message is from and the subject would be > best that way I can have a subject of "Plans to Kill Pauly Shore" > after I decrypt the message. > For how the service should work, I think you should look into MIME. You > can include encrypted text that will decrypt when you read it with > your mail program. Well actaully, since we just recently got perl installed on our system, I have been playing around with the elm and nn scripts. They seem to work resonably well, but it looks like they need a little work. The do detect if the message is PGP encrypted or if it has a PGP signature in it and when I mail things it asks if I want to sign it or encrypt it. They need a little polishing but they do work. Anyone else has any experience using this? anyone got any suggestions? Sometime when I am not so tired I am going to play with the emacs and tin scripts. - -- Ryan A. Whelan "Only two good things came out of Berkeley, LSD and BSD, rwhelan at mason1.gmu.edu rwhelan at cosmos.gmu.edu coincidence???" rwhelan at gmuvax.gmu.edu PGP Public Key available via finger "If its not UNIX, its crap" -----BEGIN PGP SIGNATURE----- Version: 2.3 iQCVAgUBLDpmSxGKBstqmlA7AQHHQwQAjSnhBqjU28HAjYN87g7iSSwfZxRYxrdY ArpkU89N72CW1NgEQnLoZGYmyVuXNdmMn7qVJrEPXM5ivT/iGgiLmrUsiFSe1mtF gt20XyQ/VYO74M3DI7wC3tUcn63lRaJO79rYjenQKL6g4HPdIZxYjJMj6TlEzPK3 ULahI5aALys= =zUm7 -----END PGP SIGNATURE----- From khijol!erc at apple.com Wed Jul 7 00:07:56 1993 From: khijol!erc at apple.com (Ed Carp) Date: Wed, 7 Jul 93 00:07:56 PDT Subject: What do you make of this? In-Reply-To: Message-ID: > Here's a list of phone numbers, what do you make of them? > Nick MacDonald | NMD on IRC > i6t4 at jupiter.sun.csd.unb.ca | PGP 2.1 Public key available via finger > i6t4 at unb.ca | (506) 457-1931 ^{1024/746EBB 1993/02/23} I don't know. What are they? Ed (busily building gcc-2.4.5 on a 486) Carp -- Ed Carp erc at wetware.com 510/659-9560 For anonymous mailers --> anonymus+5300 at charcoal.com "I've met many thinkers and many cats, but the wisdom of cats is infinitely superior." -- Hippolyte Taine (1828-1893) From mike at EGFABT.ORG Wed Jul 7 00:36:42 1993 From: mike at EGFABT.ORG (Mike Sherwood) Date: Wed, 7 Jul 93 00:36:42 PDT Subject: What do you make of this? In-Reply-To: Message-ID: Nickey MacDonald writes: > Here's a list of phone numbers, what do you make of them? > > (503) 241-9796 ext: 09 > (510) 244-8003 ext: 308 I dont know about all of them, but the second one is near me and I confirmed that there is no 244 prefix in the 510 area code, so either ther is an error in that data, or should I venture so far as to say that he's trying to make a point about hiding information in a seemingly harmless format. I don't have the desire to actually try to find out what it is, but it wouldnt take much more research to find out if the list is primarily made of nonexistent numbers. However, the only reason I even looked that far is because of the nature of this group and the fact that it was brought up as such, rather than "Local U.S. Department of Agriculture offices" or some other title that would cause people to want to be as far away from it as possible. -- Mike Sherwood internet: mike at EGFABT.ORG uucp: ...!sgiblab!egfabt!mike  From shipley at merde.dis.org Wed Jul 7 01:22:04 1993 From: shipley at merde.dis.org (Peter shipley) Date: Wed, 7 Jul 93 01:22:04 PDT Subject: a forward of a forward of a .... Message-ID: <9307070608.AA06525@merde.dis.org> ------- Forwarded Message Return-Path: shipley at remarque.berkeley.edu Message-Id: From: sinster at scintilla.santa-clara.ca.us (Darren Senn) Subject: Warning from the LPF... To: fyi at xcf.berkeley.edu Date: Tue, 6 Jul 1993 20:53:48 -0800 (PDT) X-Mailer: ELM [version 2.4 PL21] Content-Type: text Content-Length: 11239 Resent-To: shipley at dis.org Resent-Date: Tue, 06 Jul 1993 21:02:51 -0700 Resent-From: Evil Pete [ Indented just so I don't choke anyone's mailer -- DS ] Date: Mon, 28 Jun 1993 07:48:33 GMT From: friedman at gnu.ai.mit.edu (Noah Friedman) Subject: Digital Signature Scandal Organization: Free Software Foundation, 675 Mass Ave. Cambridge, MA 02139 [The following is an official announcement from the League for Programming Freedom. Please redistribute this as widely as possible. [NF]] Digital Signature Scandal Digital signature is a technique whereby one person (call her J. R. Gensym) can produce a specially encrypted number which anyone can verify could only have been produced by her. (Typically a particular signature number encodes additional information such as a date and time or a legal document being signed.) Anyone can decrypt the number because that can be done with information that is published; but producing such a number uses a "key" (a password) that J. R. Gensym does not tell to anyone else. Several years ago, Congress directed the NIST (National Institute of Standards and Technology, formerly the National Bureau of Standards) to choose a single digital signature algorithm as a standard for the US. In 1992, two algorithms were under consideration. One had been developed by NIST with advice from the NSA (National Security Agency), which engages in electronic spying and decoding. There was widespread suspicion that this algorithm had been designed to facilitate some sort of trickery. The fact that NIST had applied for a patent on this algorithm engendered additional suspicion; despite their assurances that this would not be used to interfere with use of the technique, people could imagine no harmless motive for patenting it. The other algorithm was proposed by a company called PKP, Inc., which not coincidentally has patents covering its use. This alternative had a disadvantage that was not just speculation: if this algorithm were adopted as the standard, everyone using the standard would have to pay PKP. (The same patents cover the broader field of public key cryptography, a technique whose use in the US has been mostly inhibited for a decade by PKP's assiduous enforcement of these patents. The patents were licensed exclusively to PKP by the Massachusetts Institute of Technology and Stanford University, and derive from taxpayer-funded research.) PKP, Inc. made much of the suspect nature of the NIST algorithm and portrayed itself as warning the public about this. On June 8, NIST published a new plan which combines the worst of both worlds: to adopt the suspect NIST algorithm, and give PKP, Inc. an *exclusive* license to the patent for it. This plan places digital signature use under the control of PKP through the year 2010. By agreeing to this arrangement, PKP, Inc. shows that its concern to protect the public from possible trickery was a sham. Its real desire was, as one might have guessed, to own an official national standard. Meanwhile, NIST has justified past suspicion about its patent application by proposing to give that patent (in effect) to a private entity. Instead of making a gift to PKP, Inc., of the work all of us have paid for, NIST and Congress ought to protect our access to it--by pursuing all possible means, judicial and legislative, to invalidate or annul the PKP patents. If that fails, even taking them by eminent domain is better (and cheaper in the long run!) than the current plan. You can write to NIST to object to this giveaway. Write to: Michael R. Rubin Active Chief Counsel for Technology Room A-1111, Administration Building, National Institute of Standards and Technology Gaithersburg, Maryland 20899 (301) 975-2803. The deadline for arrival of letters is around August 4. Please send a copy of your letter to: League for Programming Freedom 1 Kendall Square #143 P.O.Box 9171 Cambridge, Massachusetts 02139 (The League for Programming Freedom is an organization which defends the freedom to write software, and opposes monopolies such as patented algorithms and copyrighted languages. It advocates returning to the former legal system under which if you write the program, you are free to use it. Please write to the League if you want more information.) Sending copies to the League will enable us to show them to elected officials if that is useful. This text was transcribed from a fax and may have transcription errors. We believe the text to be correct but some of the numbers may be incorrect or incomplete. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ** The following notice was published in the Federal Register, Vol. 58, No. 108, dated June 8, 1993 under Notices ** National Institute of Standards and Technology Notice of Proposal for Grant of Exclusive Patent License This is to notify the public that the National Institute of Standards and Technology (NIST) intends to grant an exclusive world-wide license to Public Key Partners of Sunnyvale, California to practice the Invention embodied in U.S. Patent Application No. 07/738.431 and entitled "Digital Signature Algorithm." A PCT application has been filed. The rights in the invention have been assigned to the United States of America. The prospective license is a cross-license which would resolve a patent dispute with Public Key Partners and includes the right to sublicense. Notice of availability of this invention for licensing was waived because it was determined that expeditious granting of such license will best serve the interest of the Federal Government and the public. Public Key Partners has provided NIST with the materials contained in Appendix A as part of their proposal to NIST. Inquiries, comments, and other materials relating to the prospective license shall be submitted to Michael R. Rubin, Active Chief Counsel for Technology, Room A-1111, Administration Building, National Institute of Standards and Technology, Gaithersburg, Maryland 20899. His telephone number is (301) 975-2803. Applications for a license filed in response to this notice will be treated as objections to the grant of the prospective license. Only written comments and/or applications for a license which are received by NIST within sixty (60) days for the publication of this notice will be considered. The prospective license will be granted unless, within sixty (60) days of this notice, NIST receives written evidence and argument which established that the grant of the license would not be consistent with the requirements of 35 U.S.C. 209 and 37 CFR 404.7. Dated: June 2, 1993. Raymond G. Kammer Acting Director, National Institute Standards and Technology. Appendix "A" The National Institute for Standards and Technology ("NIST") has announced its intention to grant Public Key Partners ("PKP") sublicensing rights to NIST's pending patent application on the Digital Signature Algorithm ("DSA"). Subject to NIST's grant of this license, PKP is pleased to declare its support for the proposed Federal Information Processing Standard for Digital Signatures (the "DSS") and the pending availability of licenses to practice the DSA. In addition to the DSA, licenses to practice digital signatures will be offered by PKP under the following patents: Cryptographic Apparatus and Method ("Diffie-Hellman") No. 4,200,770 Public Key Cryptographic Apparatus and Method ("Hellman-Merkle") No. 4,315,552 Exponential Cryptographic Apparatus and Method ("Hellman-Pohlig") No. 4,434,414 Method For Identifying Subscribers And For Generating And Verifying Electronic Signatures In A Data Exchange System ("Schnorr") No. 4,995,082 It is PKP's intent to make practice of the DSA royalty free for personal, noncommercial and U.S. Federal, state and local government use. As explained below, only those parties who enjoy commercial benefit from making or selling products, or certifying digital signatures, will be required to pay royalties to practice the DSA. PKP will also grant a license to practice key management, at no additional fee, for the integrated circuits which will implement both the DSA and the anticipated Federal Information Processing Standard for the "key escrow" system announced by President Clinton on April 16, 1993. Having stated these intentions, PKP now takes this opportunity to publish its guidelines for granting uniform licenses to all parties having a commercial interest in practicing this technology: First, no party will be denied a license for any reason other that the following: (i) Failure to meet its payment obligations, (ii) Outstanding claims of infringement, or (iii) Previous termination due to material breach. Second, licenses will be granted for any embodiment sold by the licensee or made for its use, whether for final products software, or components such as integrated circuits and boards, and regardless of the licensee's channel of distribution. Provided the requisite royalties have been paid by the seller on the enabling component(s), no further royalties will be owned by the buyer for making or selling the final product which incorporates such components. Third, the practice of digital signatures in accordance with the DSS may be licensed separately from any other technical art covered by PKP's patents. Fourth, PKP's royalty rates for the right to make or sell products, subject to uniform minimum fees, will be no more than 2 1/2% for hardware products and 5% for software, with the royalty rate further declining to 1% on any portion of the product price exceeding $1,000. These royalty rates apply only to noninfringing parties and will be uniform without regard to whether the licensed product creates digital signatures, verifies digital signatures or performs both. Fifth, for the next three (3) years, all commercial services which certify a signature's authenticity for a fee may be operated royalty free. Thereafter, all providers of such commercial certification services shall pay a royalty to PKP of $1.00 per certificate for each year the certificate is valid. Sixth, provided the foregoing royalties are paid on such products or services, all other practice of the DSA shall be royalty free. Seventh, PKP invites all of its existing licensees, at their option, to exchange their current licenses for the standard license offered for DSA. Finally, PKP will mediate the concerns of any party regarding the availability of PKP's licenses for the DSA with designated representatives of NIST and PKP. For copies of PKP's license terms, contact Michael R. Rubin, Acting Chief Counsel for Technology, NIST, or Public Key Partners. Dated: June 2, 1993. Robert B. Fougner, Esq., Director of Licensing, Public Key Partners, 310 North Mary Avenue, Sunnyvale, CA 94033 [FR Doc. 93-13473 Filed 8-7-93; 8:45 am] ^^^^^^ [Looks like a typo to me... -- DS ] - -- Darren Senn Phone: (408) 988-2640 Snail: 620 Park View Drive #206 sinster at scintilla.santa-clara.ca.us Santa Clara, CA 95054 Just another alpha male wire-head pyromaniac ------- End of Forwarded Message From jonb at insignia.co.uk Wed Jul 7 02:36:21 1993 From: jonb at insignia.co.uk (jon barber) Date: Wed, 7 Jul 93 02:36:21 PDT Subject: Complete ignorance of any sort of reality on May's part (was We are Message-ID: <756.9307070933@panacea.insignia.co.uk> > Tired of white het male computer geeks talking nonsense about anyone > who threatens their place in the power structure, Bollocks. I'm sick of being labelled 'white het male'. I am, but so what ? Your response was the most power-oriented in this exchange, and your steroetypes are just as banal as me calling all lesbians fat & ugly. What power structure ? I don't see any power structure - in fact I'm just as powerless as anyone else is. I'm sick and tired of having to be politically correct for fear of being called a bigot. I'll be damned if I'll be turned into an emasculated new age man, as the ones I've come across repel me almost as much as child pornographers. Jon Barber, donning asbestos suit. P.S. I'm no homophobe. My best friend is HIV+ after having a bisexual history, and his girlfriends twin sister is a lesbian, who I like very much. From claborne at ccgate.sandiegoca.NCR.COM Wed Jul 7 21:58:29 1993 From: claborne at ccgate.sandiegoca.NCR.COM (Chris Claborne) Date: Wed, 7 Jul 93 21:58:29 PDT Subject: PC week Message-ID: <9307071831.af02186@ncrcom.DaytonOH.NCR.COM> >Sorry if this has been mentioned already, but the new issue of PC >Week contains a big special report entitled "Privacy in the >Workplace." It's got about five or six separate pieces on electronic >eavesdropping in the workplace, encryption, Clipper, etc., etc. I've >only had a chance to scan it quickly (I mean with my eyes), but it >seems that there's no mention of PGP at all, even in the piece on >public-key encryption. Shocking. And the piece on Clipper, while it >of course mentions all the opposition to the proposal, seemed just a >bit wimpy to me. Anyway, it's the June 28 issue. Worth checking >out, I guess. Wimpy yes, but a good start. I am seeing more and more on clipper and encryption. I think I even saw on in the LA Times. I would reccomend that we encourage this behavior by writing letters to the editor. Remember... Power of the press. (some day "power of the net") 2 -- C -- From murphy at s1.elec.uq.oz.au Wed Jul 7 21:59:56 1993 From: murphy at s1.elec.uq.oz.au (Peter Murphy) Date: Wed, 7 Jul 93 21:59:56 PDT Subject: We are becoming politically correct sheep In-Reply-To: <9307070425.AA15301@netcom3.netcom.com> Message-ID: <9307080418.AA00492@s2.elec.uq.oz.au> Summarizing the important bits from Timothy's Post ... > > But the interesting thing is how paranoid people are about free speech > being exercised (the free speech being posting of non-provably illegal > material, not the posting of provably illegal material). I won't > repeat my point about a nation of politically correct sheep. > > > However - tickling a few neurons may very well have been worth the > > risks noted above. > > Yes, perhaps thinking about some issues in advance is a good "drill." > .... and .... > > Steve then makes some really excellent points: > > > In arguing the fine points of Dworkinism, pornography, > > capitalization of proper nouns, etc., I think Eric misses Tim's point, > > which is (I think) that the current movement of society is from > > > > Forbidding actions that cause harm to others > > > > to > > > > Forbidding actions and speech that might offend others, or make them > > uncomfortable, or hurt their feelings. > > Yes, exactly! This is a profound shift from the principles on which > this country (apologies to Brits, etc.) was founded. > .... plus more ... > > The real threat is the government, whatever its initial intent. They > have the guns, they have the courts, they have the power. > > We've sunk into a strange situation in which various special interest > groups jockey for special privilege, special powers granted to them > by the State. > > "Live and let live" doesn't mean one has to _like_ all the various > individuals or groups that are out there, it just means you let them > do their thing as long as they don't interfere with your own life. > > You can't pass laws to force others to like you, or your group, or to > make their thougths conform to yours. About all you can really do is make > sure they can't rob and kill, and even that's iffy. > > > --Tim May > > > > -- > .......................................................................... > Timothy C. May | Crypto Anarchy: encryption, digital money, > tcmay at netcom.com | anonymous networks, digital pseudonyms, zero > 408-688-5409 | knowledge, reputations, information markets, > W.A.S.T.E.: Aptos, CA | black markets, collapse of governments. > Higher Power: 2^756839 | Public Key: PGP and MailSafe available. > Note: I put time and money into writing this posting. I hope you enjoy it. > Okay. I agree with most of the post above. I also thought that Tim's "child- porn" exercise was both useful and amusing. These two stories below are some more examples of political correctness gone wrong. The first concerns David Irving, well-known right-wing revisionist "historian". Mr. Irving wanted to do a lecture tour in my country of residence, Australia. The government banned his entry, on grounds of racial hatred and the like. This decision has immediately criticized my a sizeable majority of the newspapers, with the prevalent view being "He's got appaling viewpoint, but he should be permitted to be heard." I am not certain whether the decision has been reversed or not. I'll have to get back on the subject. Personally, I agreed with the newspapers on that subject (but of course not on others....) The second story is more amusing. I don't know how many people on the list have seen the movie "Romper Stomper", or even if it has been released in America (from which most of the list resides). For those who don't know, Romper Stomper concerns a gang of Nazi skinheads who live in Melbourne. Most of them are unedu- cated scum, although their leader, Hando, although twisted, is quite intellegent and charismatic. The film concerns the decline of the group, both through the action of some Vietnamese immigrants (who fight back for a change), and the police. The film, like the skinheads, are quite violent. The film (from what I could gather) portrayed the skinheads in an unflattering light. None of the cast or crew advocated Nazi ideology, and especially not Russell Crowe, who played Hando. This didn't stop the British Anti-Nazi League from picketing the film when it was shown in England. They seemed to have gathered that it was a very naughty film indeed, although how they got their selective myopia I don't understand. Fortunately, the picket was a failure. Most of the Australian expatriates told their friends to see it, and they told their friends, und so weiter. Okay, political correctness is a dangerous thing. Note that I didn't say bad, just dangerous. I do agree that racism, sexism and homophobia are bad things, so I do sympathize with most p.c. objectives. But mostly I have not found any strong evidence for legislative strategies to enforce these objectives (with one exception ... see below). Fortunately their are ways to defuse this dilemma without legal wrangling. Firstly, a lot of terms (although not all) which started out as a symbol of demonizing have turned out to be words of pride. Examples are Nigga (as Niggas with Attitute) and Dyke (as in Dykes on Bikes, which are always prominent in the Sydney Gay Pride Festival, among other places, and whoops, I forgot to mention "Gay"). This is of course imperfect ... I don't think the word "Faggot" is used very positively, and as for such words like "Slag" (slang for women), the less said the better. Of course, as a white male heterosexual (or Breeder, whatever you prefer), I don't encounter much discrimination, so I am not as knowledgeble (sic) as some people. Still, when people can use _some_ of these words in a humerous fashion (as opposed to offensive), things look brighter. The second point is immediately related to the last point - humour. If you are not going to ban the bastards from speaking you can at least make fun of them. After all, it is part of YOUR right to speak. As an example, in Australia some judges have been under fire for making stupid comments at rape trial. Some people have called for their dismissal (which is a bit extreme). However, a lot of comics have been satirizing their judgements, and the jokes have even occured on two comedy shows: "The Late Show" and "Full Frontal". (After all, can you say the phrase "No means Yes" with a straight face anymore ..?) For the third point, I admit that it does fall into the category of legal wrangling. It is this - remove all legislation that limits the powers of a minority. Fortunately, most of this work has already been done in most Western countries. Still, examples do exist. Queensland (my state) decriminalized homosexual behavior among consenting adults only three years ago, and legislation still exists in Tasmania (although it is "not enforced"). Also, until recently, several cantons in Switzerland didn't give women the right to vote in local elections. I leave you to think of local example. (Note - maternity leave for women is NOT an example of limiting the power of a minority.) (Aside, I think the talk of the change of focus to "forbidding speech that hurts others" is exaggerated, or at least in Australia. (Obviously most of you know more about America than I do). My impression was that some of the local focus is on "giving more freedom to consenting adult, as doing otherwise encourages police corruption. Our state is currently going though a review of it's Marijuana legislation, and the stuff is already decriminalized in South Australia. Also, we've got more liberal censorship laws than America.) The final point. Obviously removing stupid discriminatary action (calling people by rude names, etc.,) is a laudible aim. This can (of course) occur in different ways. For example, some poor soul might fall foul of the p.c. brigade, not though nastiness, but through naivete (like using the term "chairman"). I was once called a hypocrite because I believed both in capitalism and small-l liberalism (by a socialist, no less). What's the big weapon for change? Well, it's powerful, but sometimes quite undependable. It's called time. Believe me, you need a lot of it to affect social change; revolutionary change leads almost always to tyranny. Still, a lot has happened in the last 30 years. It was only in 1966 that Australian Aborigines were given full citizenship, and currently we are in the middle of the aftereffects from the Mabo land claim decision. In a lot of ways, the world has got worst as well as better. Still, when the conservative elders die, you can only hope that their children have kept the good things, and rejected the bad things, of their parents. I'll have to end it there. I want to have lunch. Whoops, this is going to a list primarily concerning encryption! What will I say? Got it ... "Stop the Clipper chip!" I hope it will keep em' happy ... Cheers for now. Peter. -- ============================================================================= Peter Murphy - Department of Electrical Engineering,|Phone: 61 - 7 - 300 3452. University of Queensland: murphy at s2.elec.uq.oz.au .|------------------------ "Contrary to popular belief, the wings of demons are|Please do not put any the same as the wings of angels, although they're |Heinlein quotes in your often better groomed." - Terry Pratchett. |.sig - they're old. ============================================================================= From caadams at polaris.unm.edu Wed Jul 7 21:59:59 1993 From: caadams at polaris.unm.edu (Clifford A Adams) Date: Wed, 7 Jul 93 21:59:59 PDT Subject: USENET newsreaders and cryptography: features/suggestions/questions Message-ID: <9307080348.AA10446@polaris.unm.edu> Hello out there! The current version of strn (see below) contains a signature verification command (control-V). It looks for either a RIPEM or PGP signature line and passes the article to the appropriate command for verification. (Strn leaves it up to the user to interpret the output of the command.) I have a few questions/requests that I hope the cypherpunks list can help me with: 1. Does anyone know if including code like system("pgp -m foobar") might cause legal problems? Strn doesn't implement any cryptographic techniques. 2. What's the status on a USA-legal PGP (using RSAREF)? I would like to greatly expand strn's cryptographic features, but I'd rather not implement features that many of strn's users can't use. (That includes me--I won't use PGP until/unless the legal issues are cleared up.) 3. It would be greatly convenient if someone would implement a "verify signature only" switch for PGP. Most of the applications I would like to use don't involve data hiding--just signature verification. I'm also lobbying the RIPEM author to include a similar feature. Also, if anyone has any comments or suggestions about newsreader cryptographic features feel free to send mail. I hope to do some work later with things like remote reconfiguration, trusted ratings, suggested reading lists, and the like. --Cliff P.S. Strn is about 10K lines of C code added to trn. It is (probably) just a few weeks away from a public beta test. If anyone really wants to test strn, let me know and I'll consider it. More information is also available via finger or mail. -- Clifford A. Adams caadams at polaris.unm.edu | USENET Interface Project: 457 Ash St. NE Albuquerque, NM 87106 | Tools for advanced newsreading STRN (Scan TRN) now in testing: trn 3.0 plus flexible newsgroup menus, fast article scoring with score ordered display, and merged/virtual newsgroups. From phantom at u.washington.edu Wed Jul 7 22:01:01 1993 From: phantom at u.washington.edu (The Phantom) Date: Wed, 7 Jul 93 22:01:01 PDT Subject: John Gilmores' matchbook idea Message-ID: I forgot to tell you where to ftp to: ftp.u.washington.edu login: anonymous /pub/user-supported/cypherpunks/cpmatch.eps (CypherPunk MATCH.eps) let me know -- Matt Thomlinson Say no to the Wiretap Chip! University of Washington, Seattle, Washington. Internet: phantom at u.washington.edu phone: (206) 528-5732 PGP 2.2 key available via email or finger phantom at hardy.u.washington.edu From phantom at u.washington.edu Wed Jul 7 22:01:13 1993 From: phantom at u.washington.edu (The Phantom) Date: Wed, 7 Jul 93 22:01:13 PDT Subject: John Gilmores' matchbook cover idea Message-ID: I have made a mockup of what it 'should' (note my quotations) look like. I'd appreciate it if some of you would take the time to ftp the .eps and dump it to the nearest postscript printer. Let me know what you think about the text and the font sizes, also what you think about the layout. Does anyone want to pursue this? Let me know, I think they might be pretty nice looking (and a way to get our name (& cause) known). Matt Matt Thomlinson Say no to the Wiretap Chip! University of Washington, Seattle, Washington. Internet: phantom at u.washington.edu phone: (206) 528-5732 PGP 2.2 key available via email or finger phantom at hardy.u.washington.edu From i6t4 at jupiter.sun.csd.unb.ca Wed Jul 7 22:04:10 1993 From: i6t4 at jupiter.sun.csd.unb.ca (Nickey MacDonald) Date: Wed, 7 Jul 93 22:04:10 PDT Subject: Some source code for phone number coding... Message-ID: Here is a couple of message about my phone encoding format (giving progressively more info to a person trying to guess the format) followed by the complete source... Use it well. (TABsize was 3.) Okay, well without giving you the source... heres the biggest hint I can think of... >From /etc/magic: 0 string \037\235 compressed data Translating that to decimal and in 4 byte unsigned long we get (\037\235\0\0 == 31,157,0,0 == 0,530,382,848 ^^^^^ >From the start of my posted list of phone numbers: (503) 241-9796 ext: 09 ^^^ ^ ?? ? If you know the rules for forming (valid looking) phone numbers... Anyway, to finially give the whole thing away... The file that is hidden starts with these 4 bytes... 1f 9d 90 54 == 0,530,419,796 Well.. I like puzzles... (as long as the answer is eventually revealed) so I'll let you think it over for a bit, before I send you the source... ;-) Okay well... lets assume that all valid phone numbers must be in the form [2-9][0-1][0-9] [2-9][0-9][0-9] [0-9][0-9][0-9][0-9] This is the form of my encoding... now if you take a sample number, like 1,234,567,890 and try encode it into a phone number, you would get (123) 456-7890 ^^ And you notice that the 1 and the two are out of range... Well.. as it happens, for 32 bit unsigned numbers the range is 0 to 4,294,967,294... The first digit will always be 0-4, half of which are illegal in that position, so I decided to swap the first two digits... That doesn't fix all of the range problems, thus whenever there is an invalid digit in position 1,2 or 4 I move it to the extension and put a special indicator value (the higest of the legal range) in its place. Thats the whole secret... Code will follow soon... :-) /* pe.c phone encode Written by: Nickey MacDonald July 7, 1993 Encode a message as a list of phone numbers... There are some tricks used to make the phone numbers appear more realistic, and there is a caveate... If the input file has 4 null bytes aligned of a 4 byte boundry, then the program will think its the EOF and stop... This could be fixed easily... I just didn't. */ #include unsigned long getbytes(FILE *fp); int main(void) { unsigned short i, ei; /* i=work counter, ei=ext. counter */ unsigned char pn[10], ext[4], v=0; /* Digits of phone num, ext and a */ /* pseudo random value */ unsigned long b; /* 4 bytes compress to a unsigned long */ char tpnumbuf[11]; /* a sprinft buffer for b */ /* Read until EOF or 4 properly aligned null bytes */ while((b=getbytes(stdin)) != 0) { ei=0; /* Convert the unsigned long into a string */ sprintf(tpnumbuf, "%010lu", b); /* Pick up the digits of the unsigned long */ /* Because of the distribution, swap the first two digits... */ pn[0]=tpnumbuf[1]-'0'; pn[1]=tpnumbuf[0]-'0'; for(i=2; i<10; i++) { pn[i]=tpnumbuf[i]-'0'; v+=pn[i]; } /* The first digit of the area code must be [2-9] */ if (pn[0]<3) { ext[ei++]=pn[0]; pn[0]=2; } /* Currently the middle digit of area code must be 0 or 1 */ if (pn[1]>0) { ext[ei++]=pn[1]; pn[1]=1; } /* The first digit of prefix must be [2-9] */ if (pn[3]<3) { ext[ei++]=pn[3]; pn[3]=2; } /* Generate the output phone number */ fprintf(stdout, "(%d%d%d) %d%d%d-%d%d%d%d", pn[0], pn[1], pn[2], pn[3], pn[4], pn[5], pn[6], pn[7], pn[8], pn[9]); /* Generate the extension if needed */ if (ei>0) { ext[ei++]=v%10; fprintf(stdout, " ext: "); for (i=0; i