Any Cypherpunk there ?

Karl gmkarl at gmail.com
Mon Jun 29 11:44:52 PDT 2020


On Mon, Jun 29, 2020, 2:43 PM Karl <gmkarl at gmail.com> wrote:

> Just adding on here,
>
> On Fri, Jun 26, 2020, 10:13 PM coderman <coderman at protonmail.com> wrote:
>
>> ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
>> On Friday, June 26, 2020 11:54 PM, таракан <
>> cryptoanalyzers at protonmail.com> wrote:
>> ...
>>
>> My understanding of Cypherpunks is - as per their Manifesto - that they
>> are trying to build privacy in a world where privacy is becoming a crime.
>>
>> I thought recently that the biggest 'weapon' against a fascism regime
>> would be to create the inability for that fascist regime to track, locate,
>> monitor and spy someone.
>>
>>
>> in the words of every hacker ever: "What's your threat model?"
>>
>> nation state attackers are fairly infallible, unless you're personally
>> gifted and/or well resourced...
>>
>
> There are different degrees of being targeted.  If you can stay
> uninteresting, there is still lots of value.  (it's also quite inspiring to
> see targeted people using privacy technology, as not everyone is free to:
> and I imagine this helps talk to others without endangering them)
>
> I walk in the street right now. Nobody knows who I am.
>>
>>
>> check out Clearview AI - and remember this is a commercial,
>> non-classified effort!
>>  E.g.:
>> https://www.nytimes.com/2020/01/18/technology/clearview-privacy-facial-recognition.html
>> , https://www.cbc.ca/news/technology/clearview-app-privacy-1.5447420
>>
>
> Note that many are pausing on facial recognition now due to authority
> abuse.  The OP would be a dot in a database who might be wearing a
> coronavirus mask and is associated only with where he walks.
>
>> My SIM card isn't linked to any ID (true).
>>
>>
>> check out "The Find", and other techniques that are designed to work
>> against burner phones; they attack pattern of life data exhaust across all
>> cell tower radios in addition to targeted attacks against specific baseband
>> chipsets of "selected" targets....
>>
>
> Sounds like you need a lot of additional data to build a profile.
>
> My phone cannot track me because it hasn'\t a GPS and so on ...
>>
>>
>> note that tower based triangulation is nearly as effective as GPS, in
>> terms of geolocation privacy risk.
>>
>
> Effective, but less effective.
>
> I like to keep a phone on hand bought from some physical store that sells
> a lot of them, with its antennas and ideally radio chips removed or
> grounded, before it is first turned on.  I like to add a chain inside and
> keep the device chained to me.  I have seen such devices do freaky things
> one learns to prevent, like update their system time over bluetooth.  I
> have found them to be reliable secure storage for now.
>
>> I know that with the time that sort of life will be harder and harder.
>> Hence I feel it is a noble task to build a system where people can live a
>> normal life and stay anonymous - as they want.
>>
>>
>> indeed! as mentioned before:
>>
>> first deploy encryption to kill passive Eve's ears.
>>  then keying Hardened end-to-end to avoid active Mallory in the Middle.
>>   finally, harden Physical Security against burglary and rubber brutes...
>>
>
> All things people have worked hard on but not quite normalized.  Don't
> forget EMI.
>
>> Interesting enugh soon there will be Quantum crypto, and maybe NSA has
>> already it.
>> How long can we trust these good old programs such as PGP?  RSA wouldn't
>> last a long time against a quantum computer ...
>>
>>
>> side benefit of privacy enhancing technologies like Fully Homomorphic
>> Encryption: they're resistant to quantum attacks (e,g. Post-Quantum ready
>> crypto :)
>>
>> C.f.: https://github.com/homenc/HElib ,
>> https://github.com/IBM/fhe-toolkit-macos , etc.
>>
>
> Thank you for this.  Inspiring.  Missing from pqcrypto.org .
>
> Karl
>
> There is proof inside many peoples' electronics.  Proof that a marketing
> group would contract development of a frightening virus.  A virus that
> responds to peoples' keystrokes and browsing habits, and changes what
> people see on their devices.  A virus that alters political behavior en
> masse, for profit.
> There is proof inside many peoples' electronics.  Proof that a marketing
> group would contract development of a frightening virus.  A virus that
> responds to peoples' keystrokes and browsing habits, and changes what
> people see on their devices.  A virus that alters political behavior en
> masse, for profit.
>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 7736 bytes
Desc: not available
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20200629/b397340a/attachment.txt>


More information about the cypherpunks mailing list