Any Cypherpunk there ?

Karl gmkarl at gmail.com
Mon Jun 29 12:43:50 PDT 2020


I can't speak for this list, but since I am on my email right now:

I think the people who are whipping up before breakfast the anonymity
networks that could save enslaved nations, are doing most of their work in
private nowadays, to find more success.

On Mon, Jun 29, 2020, 3:24 PM таракан <cryptoanalyzers at protonmail.com>
wrote:

> My understanding of cypherpunks is that they are/were a group of people
> trying to defeat evil things such as, indeed, Clearview and using their
> deep knowledge of cryptography to counter the use of digital technologies
> by a fascist power (imagine the Third Reich equipped with computers...)
>
> Tracking/Controlling people isn't really knew but let us say there was
> always ... ways to escape... to find another land, another ID, where there
> was no question.
>
> Think about the fictional character of Jean Valjean in "Les
> Misérables"(the book by Victor Hugo) ...
> As a convict he wore a mark on the arm, identifying him and had his
> infamous condition as a former *forcat* noted in his passport. This
> doesn't prevented him to become a notable, a rich entrepreuneur named
> Monsieur Madeleine.
>
> The action is at the beginning of the XIX century in Post-revolutionary
> France.
>
> Now imagine the same man in ... 2020... an escaped forcat... how can he
> live?, how can he change his identity? How can he transfer funds?  Anything
> he will do, any move he will make will be noticed, tracked, recorded. The
> law enforcement will look at him everywhere , in all possible databases and
> if he wants to have a new French passport "the hard way", he shall have to
> tamper protected memory and insert false the records inside a biometric
> passport, which is extremely difficult. Corruption and social enginering
> may not work any more and making fake French passport should involve deep
> knowledge of cryptography...
>
> Who can do this? Only Cypherpunks.
>
> It can be argued that only 'criminals' should care about changing their
> identity but if you are targeted by a fascist regime, getting a new ID is a
> question of life and death.
>
>  yet to my understanding, escaping and defeating the net which is building
> itself, making the world as a gigantic jail, should be the mission of
> cypherpunks, or to whatever organization that would succeed to them.
>
> Imagine a *real* fascist power taking control of the entire planet , how
> much time they need to seek and destroy opponents or individuals listed as
> potential dangers? *maybe just one hour*...
>
>
>
>
> ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
> On Monday, 29 June 2020 г., 21:44, Karl <gmkarl at gmail.com> wrote:
>
>
> On Mon, Jun 29, 2020, 2:43 PM Karl <gmkarl at gmail.com> wrote:
>
>> Just adding on here,
>>
>> On Fri, Jun 26, 2020, 10:13 PM coderman <coderman at protonmail.com> wrote:
>>
>>> ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
>>> On Friday, June 26, 2020 11:54 PM, таракан <
>>> cryptoanalyzers at protonmail.com> wrote:
>>> ...
>>>
>>> My understanding of Cypherpunks is - as per their Manifesto - that they
>>> are trying to build privacy in a world where privacy is becoming a crime.
>>>
>>> I thought recently that the biggest 'weapon' against a fascism regime
>>> would be to create the inability for that fascist regime to track, locate,
>>> monitor and spy someone.
>>>
>>>
>>> in the words of every hacker ever: "What's your threat model?"
>>>
>>> nation state attackers are fairly infallible, unless you're personally
>>> gifted and/or well resourced...
>>>
>>
>> There are different degrees of being targeted.  If you can stay
>> uninteresting, there is still lots of value.  (it's also quite inspiring to
>> see targeted people using privacy technology, as not everyone is free to:
>> and I imagine this helps talk to others without endangering them)
>>
>> I walk in the street right now. Nobody knows who I am.
>>>
>>>
>>> check out Clearview AI - and remember this is a commercial,
>>> non-classified effort!
>>>  E.g.:
>>> https://www.nytimes.com/2020/01/18/technology/clearview-privacy-facial-recognition.html
>>> , https://www.cbc.ca/news/technology/clearview-app-privacy-1.5447420
>>>
>>
>> Note that many are pausing on facial recognition now due to authority
>> abuse.  The OP would be a dot in a database who might be wearing a
>> coronavirus mask and is associated only with where he walks.
>>
>>> My SIM card isn't linked to any ID (true).
>>>
>>>
>>> check out "The Find", and other techniques that are designed to work
>>> against burner phones; they attack pattern of life data exhaust across all
>>> cell tower radios in addition to targeted attacks against specific baseband
>>> chipsets of "selected" targets....
>>>
>>
>> Sounds like you need a lot of additional data to build a profile.
>>
>> My phone cannot track me because it hasn'\t a GPS and so on ...
>>>
>>>
>>> note that tower based triangulation is nearly as effective as GPS, in
>>> terms of geolocation privacy risk.
>>>
>>
>> Effective, but less effective.
>>
>> I like to keep a phone on hand bought from some physical store that sells
>> a lot of them, with its antennas and ideally radio chips removed or
>> grounded, before it is first turned on.  I like to add a chain inside and
>> keep the device chained to me.  I have seen such devices do freaky things
>> one learns to prevent, like update their system time over bluetooth.  I
>> have found them to be reliable secure storage for now.
>>
>>> I know that with the time that sort of life will be harder and harder.
>>> Hence I feel it is a noble task to build a system where people can live a
>>> normal life and stay anonymous - as they want.
>>>
>>>
>>> indeed! as mentioned before:
>>>
>>> first deploy encryption to kill passive Eve's ears.
>>>  then keying Hardened end-to-end to avoid active Mallory in the Middle.
>>>   finally, harden Physical Security against burglary and rubber brutes...
>>>
>>
>> All things people have worked hard on but not quite normalized.  Don't
>> forget EMI.
>>
>>> Interesting enugh soon there will be Quantum crypto, and maybe NSA has
>>> already it.
>>> How long can we trust these good old programs such as PGP?  RSA wouldn't
>>> last a long time against a quantum computer ...
>>>
>>>
>>> side benefit of privacy enhancing technologies like Fully Homomorphic
>>> Encryption: they're resistant to quantum attacks (e,g. Post-Quantum ready
>>> crypto :)
>>>
>>> C.f.: https://github.com/homenc/HElib ,
>>> https://github.com/IBM/fhe-toolkit-macos , etc.
>>>
>>
>> Thank you for this.  Inspiring.  Missing from pqcrypto.org .
>>
>> Karl
>>
>> There is proof inside many peoples' electronics.  Proof that a marketing
>> group would contract development of a frightening virus.  A virus that
>> responds to peoples' keystrokes and browsing habits, and changes what
>> people see on their devices.  A virus that alters political behavior en
>> masse, for profit.
>>
>> There is proof inside many peoples' electronics.  Proof that a marketing
>> group would contract development of a frightening virus.  A virus that
>> responds to peoples' keystrokes and browsing habits, and changes what
>> people see on their devices.  A virus that alters political behavior en
>> masse, for profit.
>>
>
There is proof inside many peoples' electronics.  Proof that a marketing
group would contract development of a frightening virus.  A virus that
responds to peoples' keystrokes and browsing habits, and changes what
people see on their devices.  A virus that alters political behavior en
masse, for profit.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 11777 bytes
Desc: not available
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20200629/172d856d/attachment.txt>


More information about the cypherpunks mailing list