From grarpamp at gmail.com Tue Mar 1 00:15:44 2016 From: grarpamp at gmail.com (grarpamp) Date: Tue, 1 Mar 2016 03:15:44 -0500 Subject: Once again: Tor timing attacks and a Tor confession In-Reply-To: <20160301065454.GA2577@sivokote.iziade.m$> References: <20160229074429.GA2571@sivokote.iziade.m$> <20160229100643.GB2571@sivokote.iziade.m$> <20160229113804.GC2571@sivokote.iziade.m$> <20160301065454.GA2577@sivokote.iziade.m$> Message-ID: On 3/1/16, Georgi Guninski wrote: > Is jitter/fill traffic full solution? Again, to what threat model? I've only mention GPA, fix for which may involve, at possible minimum, all nodes encrypting full fill traffic reclocked with jitter, under some form of negotiated and enforced possibly dynamic traffic contracts with peers. I may also be on crack. > What if they disrupt or slow X times your traffic to Tor? That's an active attack, not a GPA trolling through packets. Then your peers may de-peer you until things look normal. Or it may take a while for you to get signal through. And if they're already close enough to disrupt you specifically, you've probably got other problems. > This will be observable at the other end. Not when every node is doing reclocking and de-peering peers that seem to be misbehaving or dishonoring contracts. > Probably easier is to just own me via some application > sploit (as suggested in this thread). Again, that's active, and application level, not GPA. > RE: cost of ownage/minor offenses. > Don't exclude the possibility single investment to result > in compromise of all of Tor and then deanonimizing will > be just a simple query. You mean like rooting a bunch of Linux nodes, 6+:1 ratio ... 6831 Linux 696 Windows 291 FreeBSD 74 OpenBSD 33 Darwin 8 NetBSD 4 ElectroBSD 4 Bitrig 3 SunOS 2 DragonFly 1 GNU/kFreeBSD 1 CYGWIN_NT-10.0-WOW Or compromising the repo or developers or 3rd party libraries... Or asking your friends AT&T et al to help... What's the threat? > "NSA can deanonimize some Tor users ... Again, talk about whatever, but people need to specify the threat model if they're going to really discuss solutions. Nor is Tor the only active network currently subject to attack. > This is consistent with the fate of Lulzsec. > According to the official story (which I don't believe), > the first of them got caught because "he forgot to use > tor when on irc..." Do they and their court docs officially say that? Or just some blogger reading 4chan? From Rayzer at riseup.net Tue Mar 1 09:16:54 2016 From: Rayzer at riseup.net (Rayzer) Date: Tue, 1 Mar 2016 09:16:54 -0800 Subject: Standard Operating Procedure 303 In-Reply-To: References: <567C7A53.3050207@riseup.net> Message-ID: <56D5CE86.9010607@riseup.net> Zenaan Harkness wrote: > On 12/28/15, coderman wrote: >> On 12/24/15, Rayzer wrote: >>> On January 8 2016 the US Supreme Court will consider a petition for >>> certiorari in the EPIC v. DHS "Standard Operating Procedure 303" FOIA >>> suit. SOP 303 is also known as the 'National Emergency Wireless >>> Kill-Switch' >>> >>> “Standard Operating Procedure 303,” is the protocol that codifies a >>> “shutdown and restoration process for use by commercial and private >>> wireless networks during national crisis.” > Any update on this SCOTUS case? EPIC, January 11... http://epic.org/foia/dhs/internet-kill-switch/ ars technica January 12, filed under "Law & Disorder / Civilization & Discontents": Supreme Court won’t force DHS to reveal secret plan to cut cell service Full text of US cell phone kill-switch policy to remain under lock and key. http://arstechnica.com/tech-policy/2016/01/supreme-court-wont-force-dhs-to-reveal-secret-plan-to-cut-cell-service/ -- RR "I believe democracy has so far disappeared in the United States that no “two evils” exist. There is but one evil party with two names." ~W.E.B. Dubois >> a new FOIA: >> ''' >> Documents regarding the "Chain of Command" necessary to exercise >> "Standard Operating Procedure 303", also known as the "National > ... >> - https://www.muckrock.com/foi/united-states-of-america-10/sop303-23071/ > Any update on this FOIA? > -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From guninski at guninski.com Tue Mar 1 01:43:45 2016 From: guninski at guninski.com (Georgi Guninski) Date: Tue, 1 Mar 2016 11:43:45 +0200 Subject: Once again: Tor timing attacks and a Tor confession In-Reply-To: References: <20160229074429.GA2571@sivokote.iziade.m$> <20160229100643.GB2571@sivokote.iziade.m$> <20160229113804.GC2571@sivokote.iziade.m$> <20160301065454.GA2577@sivokote.iziade.m$> Message-ID: <20160301094345.GC2577@sivokote.iziade.m$> On Tue, Mar 01, 2016 at 03:15:44AM -0500, grarpamp wrote: > On 3/1/16, Georgi Guninski wrote: > > Is jitter/fill traffic full solution? > > Again, to what threat model? > > The threat model is the entire world -- in real life do you care much what accident will "own" your life? If this is too broad for you, the threat model are state sponsored actors including NSA. > You mean like rooting a bunch of Linux nodes, 6+:1 ratio ... > > ... > Or compromising the repo or developers or 3rd party libraries... > > Or asking your friends AT&T et al to help... > > What's the threat? > Combination of many threats -- owning, timing, crypto, etc > > This is consistent with the fate of Lulzsec. > > According to the official story (which I don't believe), > > the first of them got caught because "he forgot to use > > tor when on irc..." > > Do they and their court docs officially say that? > Or just some blogger reading 4chan? Don't know about courts, here is a reference from thereg: http://www.theregister.co.uk/2012/03/07/lulzsec_takedown_analysis/ > Police locked onto Hector Xavier Monsegur, an unemployed 28-year-old > from New York – allegedly LulzSec hacktivist supremo Sabu – after he > apparently made the mistake of logging into an IRC chat server without > using the Tor anonymisation service (^1) From grarpamp at gmail.com Tue Mar 1 10:52:24 2016 From: grarpamp at gmail.com (grarpamp) Date: Tue, 1 Mar 2016 13:52:24 -0500 Subject: Once again: Tor timing attacks and a Tor confession In-Reply-To: <20160301094345.GC2577@sivokote.iziade.m$> References: <20160229074429.GA2571@sivokote.iziade.m$> <20160229100643.GB2571@sivokote.iziade.m$> <20160229113804.GC2571@sivokote.iziade.m$> <20160301065454.GA2577@sivokote.iziade.m$> <20160301094345.GC2577@sivokote.iziade.m$> Message-ID: On 3/1/16, Georgi Guninski wrote: >> > Is jitter/fill traffic full solution? > The threat model is the entire world -- Then the full solution is to unplug, smash, and go outside and play... > in real life do you care much what accident > will "own" your life? ... just be sure to wear your helmet :) > Combination of many threats -- owning, timing, crypto, etc If the thread is a thread just griping on threats that's fine. But lumping them all in versus fill traffic (being a possible solution to the one specific subthreat of GPA)... probably isn't productive towards solving anything... whether the entire threat or any particular subthreat. Especially when fill traffic hasn't yet been speculated here to enhance the efficacy of any other existing threat, or to create new threats. >> Do they and their court docs officially say that? > > Don't know about courts, here is a reference from thereg: > http://www.theregister.co.uk/2012/03/07/lulzsec_takedown_analysis/ That's not a quote from an original source. Neither is what it references... http://blog.erratasec.com/2012/03/notes-on-sabu-arrest.html ... which goes to Fox, which probably goes to... and to... and to... ... including possibly to stretching / ignoring the law, parallel construction... or to some other legit defendant screwup... at least until the quote is validated. Have the actual chain of custodied investigative materials as to exactly how the SilkRoad server was found come out yet? (And other similarly fishy cases where nodes on supposedly strong overlay networks were found...) Or is that still wrapped in grand jury, work product, state secret, in camera, sealed... From grarpamp at gmail.com Tue Mar 1 15:23:07 2016 From: grarpamp at gmail.com (grarpamp) Date: Tue, 1 Mar 2016 18:23:07 -0500 Subject: Chertoff Group's new 28-page report on Encryption In-Reply-To: References: Message-ID: https://www.youtube.com/watch?v=6HNnVcp6NYA ---------- Forwarded message ---------- From: Henry Baker Date: Tue, 01 Mar 2016 12:11:18 -0800 To: cryptography at metzdowd.com FYI -- "The Ground Truth About Encryption, and The Consequences of Extraordinary Access" http://chertoffgroup.com/cms-assets/documents/238024-282765.groundtruth.pdf Abstract: U.S. policy makers are currently engaged in a debate regarding the merits of mandating a means of “extraordinary access” to encrypted data for U.S. law enforcement, what is sometimes referred to as an encryption “backdoor.” This paper examines modern encryption technologies, the feasibility of providing law enforcement with extraordinary access, the impact that encryption technology is currently having on U.S. law enforcement (which some have referred to as “going dark”), and the likely impacts that an extraordinary access requirement would have on U.S. national security, the technology sector, and continued innovation in the security field. We conclude that an extraordinary access requirement is likely to have a negative impact on technological development, the United States’ international standing, and the competitiveness of the U.S. economy and will have adverse long-term effects on the security, privacy, and civil liberties of citizens. From carimachet at gmail.com Tue Mar 1 12:39:17 2016 From: carimachet at gmail.com (Cari Machet) Date: Tue, 1 Mar 2016 21:39:17 +0100 Subject: Once again: Tor timing attacks and a Tor confession In-Reply-To: References: <20160229074429.GA2571@sivokote.iziade.m$> <20160229100643.GB2571@sivokote.iziade.m$> <20160229113804.GC2571@sivokote.iziade.m$> <20160301065454.GA2577@sivokote.iziade.m$> <20160301094345.GC2577@sivokote.iziade.m$> Message-ID: i like the idea of mathmatical echo as solution http://guap.ru/guap/nids/pdf_2010/kuyumchev.pdf On Tue, Mar 1, 2016 at 7:52 PM, grarpamp wrote: > On 3/1/16, Georgi Guninski wrote: > >> > Is jitter/fill traffic full solution? > > The threat model is the entire world -- > > Then the full solution is to unplug, smash, and go outside and play... > > > in real life do you care much what accident > > will "own" your life? > > ... just be sure to wear your helmet :) > > > > Combination of many threats -- owning, timing, crypto, etc > > If the thread is a thread just griping on threats that's fine. > But lumping them all in versus fill traffic (being a possible solution > to the one specific subthreat of GPA)... probably isn't productive > towards solving anything... whether the entire threat > or any particular subthreat. Especially when fill traffic hasn't > yet been speculated here to enhance the efficacy of any other > existing threat, or to create new threats. > > > >> Do they and their court docs officially say that? > > > > Don't know about courts, here is a reference from thereg: > > http://www.theregister.co.uk/2012/03/07/lulzsec_takedown_analysis/ > > That's not a quote from an original source. Neither is what it > references... > http://blog.erratasec.com/2012/03/notes-on-sabu-arrest.html > ... which goes to Fox, which probably goes to... and to... and to... > ... including possibly to stretching / ignoring the law, parallel > construction... > or to some other legit defendant screwup... at least until the quote > is validated. > > Have the actual chain of custodied investigative materials as to exactly > how the SilkRoad server was found come out yet? (And other similarly fishy > cases where nodes on supposedly strong overlay networks were found...) > Or is that still wrapped in grand jury, work product, state secret, > in camera, sealed... > -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4003 bytes Desc: not available URL: From zen at freedbms.net Wed Mar 2 01:18:56 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Wed, 2 Mar 2016 09:18:56 +0000 Subject: Fwd: NSW. New cycling laws: One of the first bike riders hit with $319 fine for not wearing a helmet. In-Reply-To: References: Message-ID: Finally! For those who pine for the cozy safety of a modern democratic socialist nation, yes Australia is here for you. Razer (I think), your concerns about cycling safety have been answered in abundance, and are being enforced :D As folks round here already know, the government's right to legislate is absolute. At least now we'll bring appropriate pressure on all those irresponsible parents who fail to clip a helmet to their poor defenseless child as they hurtle off round the neighbourhood. Please, who will think of the children? The Australian government, that's who. And for those who have yet to experience the smallest of peaceful civil dissent or disobedience or peaceful political protest, and it's consequences, your protest will almost always be couched by the government solicitors as something like "The zero tolerance cycling safety laws are valid. They serve a legitimate object of government power, that is, the safety of its citizens." And so they strive, almost always successfully, to couch your case, not in terms of the rights you believe are unalienable, but in terms of the validity of their pathetic whining little bastard children of legislation making, the god almighty Statute Laws though shalt obey and praise the state! This "validity of the law" position that the govt takes is entirely deceptive: unless you really go into the depths of the invalidity of the government itself, the Australian states have given themselves catch-all power of "the power to pass any law for the good governance of the people." A loud and bombastic, indeed theatrical "OBJECTION!" is advised in such moments as the validity of the law is being raised and or pounded into your posterior... However! Hark, there is hope! The common law right has almost never been removed, and must be explicitly removed by an act for that common law right to be taken to be removed - the mere affirmation of a legislative power (e.g. for a concern of safety), in the guise of an almighty statute, does -not- by itself remove that common law right. Yes you heard me right. At least in Australia although the citation is forgotten just at the moment, this is the position of the High Court of Australia (HCA), comparable to SCOTUS. It's an intellectual deception the govt invariably runs against you and your dirty, dirty human rights, but you need to master this particular deception if you wish to prevail in the Australian courts on a common law civil liberties/ common law right legal ground. Oh, and you might also have to be willing to shoot up to the High Court on appeal. Which, unless you are bold enough to stand in front of the bench and speak your right by yourself, that is without a lawyer, barrister, solicitor or queens counsel (if you have a spare $80K lying around...), might be costly and/ or intimidating. And for those who -do- have the $80k just lying around, TAKE NOTICE: most legal representatives in -this- country will phrase -your- defence of the government's charge(s) against you (in your peaceful political protest), in terms of the validity of the law, thereby selling you out before you even get near enough to the HCA to realise you've been sold out because yes, "your" lawyer/barrister/etc asked the wrong damn question from the start, applying at each level of appeal, all the way to High Court where you case is resoundingly dismissed since "We find that this particular law is valid..." At that point it's too late to say wtf! Good luck, Zenaan ---------- Forwarded message ---------- From: Jim Date: Wed, 2 Mar 2016 19:17:01 +1100 Subject: NSW. New cycling laws: One of the first bike riders hit with $319 fine for not wearing a helmet. NSW's finest dropkick politicians have lost the plot again by imposing ridiculous fines against cyclists for victimless "offences." If stupidity was a criminal offence most Aussie politicians should be doing life in prison for multiple offences. Jim New cycling laws: One of the first bike riders hit with $319 fine for not wearing a helmet news.com.au Jim O’Rourke and Miles Godfrey, The Daily Telegraph March 2, 2016 Cyclist Ben Ackerley was fined for not wearing a helmet while riding his bike on the first day new cycling laws came into effect. Picture: Ross Schultz New cycling laws come into play Opinion: ‘New bike laws are a joke’ DESPITE the threat of the massive new fines for running red lights, not wearing helmets and riding dangerously, The Daily Telegraph witnessed cyclists continuing to flout the road rules. Ben Ackerley, who recently moved to Sydney from the United States, became possibly the first rider to be booked under the new fine regime. The restaurant manager from Darlinghurst was riding on Oxford St just before midday and was not wearing a helmet. Ben Ackerley was upset over being fined $319 for not wearing a helmet while riding his bike. Picture: Ross SchultzSource:News Corp Australia A police Highway Patrol officer on a motorcycle pulled Mr Ackerley over and hit him with the new $319 fine – up from just $71. “I’d just picked the bike up from the bike shop after getting it fixed,” he said. “It got wrecked in an accident with a taxi on Market St about three weeks ago. I knew about the no helmet laws but I was just riding about a mile and a half (1.6km) home. “I’ve just come from living in New York City. The cops there have got better things to do than worry about this sort of stuff.” Mr Ackerley said he may appeal for leniency. As part changes to cycling laws beginning Tuesday, fines for five offences have increased by up to 500 per cent. The $319 fine which Mr Ackerley said he may appeal, asking for leniency. Source: News Corp Australia As well as new fines for no wearing helmets, cyclists risk $425 fines for running a red light; riding dangerously and; not stopping at pedestrian crossings. Motorists who do not leave a 1m buffer between their vehicle and a bike when travelling up to 60km/h can be hit with a $319 fine and lose two demerit points. Those travelling more than 60km/h must leave a 1.5m space. During today’s morning peak, The Daily Telegraph saw riders shooting through on the red light at busy intersections along Oxford St, between Taylor Square at Darlinghurst and College St in the CBD. While the vast majority of cyclists kept to the left lane, some riders weaved among the traffic, coming less than a metre from vehicles moving slowly through the rush hour traffic. At the intersections with Flinders, Crown and Riley streets, a number of cyclists pushed to the front of the traffic queues stopped at red lights, leading to some distance issues between cars and bikes when the lights turned green. In Randwick, a number of cyclists were spotted riding in the middle lane of the three city-bound lanes, on Alison Rd. Ben Ackerley poses with his bike and his $319 fine. Picture: Ross Schultz Source: News Corp Australia Several weaved among the traffic even though a shared cycle/pedestrian path runs along the northern side of the road. On King St at Newtown, a rider, without a helmet, insisted on riding on the footpath. Along busy Bondi Rd at Bondi, several riders darted between vehicles slowing moving towards the city. Police could not confirm any other incidents of vehicle drivers being fined for not giving enough space to cyclists. On Monday, Traffic and Highway Patrol Commander John Hartley said his officers would use their discretion, but would book those who were obviously breaking the new laws. A spokesman for the police Highway Patrol said it had not scheduled a specific enforcement operation targeting cyclists to coincide with the first morning of the new laws. “Police, including our Motorcycle Response Teams, were undertaking their regular duties this morning,” the spokesman said. The government’s Transport Management Centre said it had not recorded any incidents involving cyclists during the morning peak. Bicycle NSW CEO Ray Rice said the majority of cyclists are keen to do the right thing and obey all road rules. While he strongly supports the new minimum passing distance rule, because it offers extra protection to riders, the cycling community is opposed to the increased fines and mandatory photo ID for bicycle riders. In the lead up to the law changes, Bicycle NSW handed a petition containing 10,000 signatures to the state government demanding the government immediately rescind the fine increases and photo ID sections of the legislation. Mr Rice said last month that regulation should be a last resort and described NSW as fast becoming Australia’s nanny state. Mr Rice said no other state has fines this high - and no other state will be introducing mandatory photo identification for bicycle riders. “These two measures do nothing to help the government achieve their aim of doubling the number of riders using bikes for transport,” he said. Mr Rice urged the government to mount a stronger and more sustained public education campaign to inform all road users of how the distance laws work. “We are just not getting the cut through required,” Mr Rice said. “But we know police are not going to be out there with a tape measure trying to work out the distance between cars and bikes.” The NRMA today said it supports the increase in fines. “We support the argument that cyclists should have to carry ID because what we know is that the overwhelming majority of cyclists do the right thing and this is targeting the ones who don’t,” spokesman Peter Khoury said. “They are putting their lives at risk and we don’t want that.” City of Sydney Liberal councillor Christine Forster said cyclists are road users so should be expected to obey the rules. “That should, I imagine, foster mutual respect among cyclists and drivers,” Ms Forster said. Originally published as The first cyclist hit with tough new laws http://www.news.com.au/national/nsw-act/news/new-cycling-laws-one-of-the-first-bike-riders-hit-with-319-fine-for-not-wearing-a-helmet/news-story/ae3b9623f948d15f7d11c89b0d975830 -------------------------------------------------------------------------------- What the bell? New fines for cyclists a bloody joke news.com.au Matthew Dunn March 2, 2016 8:51am OPINION FOR as long as I can remember, I have been using a bicycle as my main source of transport. I love the feeling of doing something good for the environment and vastly improving my health and fitness levels at the same time. However, more than anything I love how much money I save using pedal power. Well, that was until New South Wales premier Mike Baird decided popping me $106 dollars for not having a bell on my bike was a good idea. This is just one of the many ridiculous new fines introduced today by the NSW Government, which appear to be a blatant attempt at revenue raising. Sorry, I shouldn’t be so cynical. Roads Minister Duncan Gay said the new laws were not targeting cyclists; they were targeting “risky behaviour”. Sh*t, I know not having a bell or horn on my bicycle is putting endless lives at risk. Without a bell, how would I ever be able to warn other pedestrians and road users that I am nearby? I should be ashamed at myself for acting with such reckless abandon. Please forgive me, Mr Gay. Oh wait, that’s right. I have this thing called a voice. You know that sound produced in a person’s larynx and uttered through the mouth, as speech or song. Yeah, that thing. NSW Police are making the world a better place catching this ruthless criminal riding with no bike helmet. Anyway, I am just sounding bitter. Surely there is a need to raise the fine for not wearing a helmet from $71 to $319, in order to match the penalty given to motorcyclists breaking the same law. It makes complete sense because we all know I am able to maintain the speed limits, while riding in the middle of heavy traffic. Oh, that’s right. It’s virtually impossible for me to match the power and speeds of a motorbike, even in the safe confines of a bicycle lane. Based on this justification, I am guessing there are some people in the NSW government that must have some powerful legs. Maybe they should sign up for the Commonwealth Games instead of worrying about making these changes to reduce “risky behaviours”. The next increase will see the fine for running a red light jumping from $71 to $425, so that it is equivalent to the penalty given to car drivers for the same offence. Seems fair, given a bicycle causes as much damage to the road infrastructure and emits as much pollution as a two-tonne vehicle. Plus, there is also the small fact that at many intersections bicycles are unable to trigger the traffic signal. It’s fine though, we will just sit there until a car comes up, so we can safely ride on. Don’t want to be partaking in “risky behaviour”. You boys were riding dangerously. Do you know what that means? No? Neither do we. There are also the dubious fines for “riding dangerously” which have increased from $71 to $425. What I want to know is precisely what constitutes “riding dangerously”. If I am facing fines of $425, it would be nice to know exactly what actions I need to avoid. In hoping to clear things up, I headed to the NSW Road Safety website for more information. Unfortunately, there are no specifics listed. I guess I just have to rely on the individual interpretations of police for what they define as riding dangerously. Seems really fair and totally justifiable. Oh, wait. This isn’t even to mention the heavy police presence expected to crack down on these laws. Don’t worry about solving crimes that are a real risk to community, you just put our tax payer money to good use and get dozens of police on the streets solving big issues, like people riding without bells. Why not let people take the risk themselves instead of babying them? And if you do need to fine people, surely there is no need to go to these extents. You should be implementing measures to get people to use alternate modes of transport, not making them scared to even leave the house. Wake up to yourself, NSW Government and get with the times. Continue the discussion on Twitter @mattydunn11 http://www.news.com.au/technology/innovation/motoring/nsw-has-introduced-new-fines-for-cyclists-and-they-are-a-bloody-joke/news-story/358f66ffc225c3c3ec2cda1cfd834453 -------------------------------------------------------------------------------- From grarpamp at gmail.com Wed Mar 2 11:46:21 2016 From: grarpamp at gmail.com (grarpamp) Date: Wed, 2 Mar 2016 14:46:21 -0500 Subject: zeronet.io Message-ID: https://www.reddit.com/r/trackers/comments/48d41h/play_worlds_first_serverless_p2p_distributed/ From carimachet at gmail.com Wed Mar 2 06:54:58 2016 From: carimachet at gmail.com (Cari Machet) Date: Wed, 2 Mar 2016 15:54:58 +0100 Subject: Once again: Tor timing attacks and a Tor confession In-Reply-To: <20160302140144.GC2536@sivokote.iziade.m$> References: <20160229074429.GA2571@sivokote.iziade.m$> <20160229100643.GB2571@sivokote.iziade.m$> <20160229113804.GC2571@sivokote.iziade.m$> <20160301065454.GA2577@sivokote.iziade.m$> <20160301094345.GC2577@sivokote.iziade.m$> <20160302140144.GC2536@sivokote.iziade.m$> Message-ID: "That was enough for a judge to grant the FBI a warrant and permission to secretly install what’s known as a pen/trap device, which allowed for the monitoring of Hammond’s Internet activity at the end of February 2012. That, coupled with the physical surveillance, allowed the agency to see when he was home. What they found correlated with his Tor usage—which allowed him to hide his IP address—and when “yohoho” was online, " http://kernelmag.dailydot.com/issue-sections/headline-story/9895/jeremy-hammond-fbi-surveillance-bust/#sthash.qrw4hBVT.dpuf "Bello Coffee appears to be the cafe from which police say Ulbricht logged into the virtual private network (VPN) that he allegedly used as an extra layer of protection to access Tor and Silk Road. The prosecution says they have records from Google showing Ulbricht logging into his Gmail account from the Internet cafe on a regular basis, including on days when the VPN was used from the same cafe." oh its too funny.... so what jeremy says about his case is that they just did lots of different types of investigations and that is what got him - he also states that he should have been mobile - nomadic ... maybe solutions should be nomadic as well On Wed, Mar 2, 2016 at 3:01 PM, Georgi Guninski wrote: > On Tue, Mar 01, 2016 at 01:52:24PM -0500, grarpamp wrote: > > > Don't know about courts, here is a reference from thereg: > > > http://www.theregister.co.uk/2012/03/07/lulzsec_takedown_analysis/ > > > > That's not a quote from an original source. Neither is what it > references... > > http://blog.erratasec.com/2012/03/notes-on-sabu-arrest.html > > ... which goes to Fox, which probably goes to... and to... and to... > > ... including possibly to stretching / ignoring the law, parallel > > construction... > > or to some other legit defendant screwup... at least until the quote > > is validated. > > > > Have the actual chain of custodied investigative materials as to exactly > > how the SilkRoad server was found come out yet? (And other similarly > fishy > > cases where nodes on supposedly strong overlay networks were found...) > > Or is that still wrapped in grand jury, work product, state secret, > > in camera, sealed... > > If you find out, let us know. > > This is the most "official" version for me for now. > > -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5586 bytes Desc: not available URL: From guninski at guninski.com Wed Mar 2 06:01:44 2016 From: guninski at guninski.com (Georgi Guninski) Date: Wed, 2 Mar 2016 16:01:44 +0200 Subject: Once again: Tor timing attacks and a Tor confession In-Reply-To: References: <20160229074429.GA2571@sivokote.iziade.m$> <20160229100643.GB2571@sivokote.iziade.m$> <20160229113804.GC2571@sivokote.iziade.m$> <20160301065454.GA2577@sivokote.iziade.m$> <20160301094345.GC2577@sivokote.iziade.m$> Message-ID: <20160302140144.GC2536@sivokote.iziade.m$> On Tue, Mar 01, 2016 at 01:52:24PM -0500, grarpamp wrote: > > Don't know about courts, here is a reference from thereg: > > http://www.theregister.co.uk/2012/03/07/lulzsec_takedown_analysis/ > > That's not a quote from an original source. Neither is what it references... > http://blog.erratasec.com/2012/03/notes-on-sabu-arrest.html > ... which goes to Fox, which probably goes to... and to... and to... > ... including possibly to stretching / ignoring the law, parallel > construction... > or to some other legit defendant screwup... at least until the quote > is validated. > > Have the actual chain of custodied investigative materials as to exactly > how the SilkRoad server was found come out yet? (And other similarly fishy > cases where nodes on supposedly strong overlay networks were found...) > Or is that still wrapped in grand jury, work product, state secret, > in camera, sealed... If you find out, let us know. This is the most "official" version for me for now. From mirimir at riseup.net Wed Mar 2 15:07:25 2016 From: mirimir at riseup.net (Mirimir) Date: Wed, 2 Mar 2016 16:07:25 -0700 Subject: fun with Tor Message-ID: <56D7722D.1070404@riseup.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Just for fun, but maybe useful: Onion SSH Hosts for Login Chaining https://www.ivpn.net/privacy-guides/onion-ssh-hosts-for-login-chaining You too can chain multiple onion SSH logins, isolated by intervening multihop VPN links. Lots of latency and jitter, to annoy watchers. It hogs relays, I admit. But at least, there are no exit nodes involved. OpenVPN Onion VPS for Evading Discrimination Against Tor https://dbshmc5frbchaum2.onion/OpenVPN-Onion-VPS.html You look like typical VPN users. They get banned too. But you can easily change VPS. They're inexpensive. And again, there are no Tor exit nodes involved. Maybe there's a commercial opportunity here. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQEcBAEBAgAGBQJW13IqAAoJEGINZVEXwuQ+aIoH/2eSqk9cDKqpkpdAgB0nx5Jt rptP3tkKxBjG9cZY8Pidy01vgtRGPx87/6nB7e8SABUugIrfct0uB6xaqfwjbfq6 bon3UsqImmd/jKZmOseGT4Z7nPweo7gk+cBrzCN/Wh8SCHv+bTe3EHU/au6hKs34 Xhm/ZWkERVl6+xWVny4OuIHn9qIpInilD09Sxm/KHCXa+cX5YfuLTN2l3WqJy4VP 03X3CeT7QVQEZZD85n5gjrmOOHY7DJ98NMikVygYvOqUeCxMhI0T9elrA3/akZ59 N/xMYXdhxJcgBx8zy7IQksYJpTIdB2QdvTnhuEpeMOrIcYh4vv1+h6X8DK+o/c4= =ezP3 -----END PGP SIGNATURE----- From grarpamp at gmail.com Wed Mar 2 19:27:44 2016 From: grarpamp at gmail.com (grarpamp) Date: Wed, 2 Mar 2016 22:27:44 -0500 Subject: [Cryptography] LibreSSL unaffected by DROWN In-Reply-To: <20160302202224.GS10917@mournblade.imrryr.org> References: <20160302202224.GS10917@mournblade.imrryr.org> Message-ID: On 3/2/16, Viktor Dukhovni wrote: > OpenSSL 1.1.0 (days away from beta), which does break compatibility > with 1.0.x, also removes SSLv2, and has many improvements that > LibreSSL does not. Neither is strictly better, there are surely > things that are better in LibreSSL than in OpenSSL 1.1.0. > > Theo is an avid marketer, the reality is a bit more complex. So then where is the link to an independant website which stays current and puts say Libre 2.2.[x] and Open 1.0.2[x] side by side in a feature / protocol / api review table? From grarpamp at gmail.com Wed Mar 2 19:59:16 2016 From: grarpamp at gmail.com (grarpamp) Date: Wed, 2 Mar 2016 22:59:16 -0500 Subject: [Cryptography] iPhone hardware attacks In-Reply-To: <20160302151557.0cc4eda9@jabberwock.cb.piermont.com> References: <20160302151557.0cc4eda9@jabberwock.cb.piermont.com> Message-ID: On 3/2/16, Perry E. Metzger wrote: > I keep wondering what the odds are that the NSA has no method > available to decap the chips within an iPhone and extract secret > keying material. I suspect they must be able to do that, even from one > of the more modern iPhones with hardware based security modules. If IBM can image and arrange single atoms, you can bet the NSA can do something as simple as ablate them. Got the shakes and cook a few extra along the way... no problem, chips still have much larger features. https://en.wikipedia.org/wiki/IBM_(atoms) > The techniques for doing this sort of thing are both well known and in > the open literature. Even skilled amateurs manage such feats on older > hardware quite routinely -- I've personally witnessed chips being > decapped and put into university grade equipment for analysis. Given > the NSA's budget and mission, it seems highly, highly unlikely that > such methods are unavailable to them. > > This brings up another question. FBI officials have testified under > oath that there is no government agency that can extract such > information on their behalf. Is that very careful spin, willful > ignorance, or simple perjury? Doesn't matter, they just contract out to their good ole boys at IBM or their favorite university. From juan.g71 at gmail.com Wed Mar 2 21:42:11 2016 From: juan.g71 at gmail.com (juan) Date: Thu, 3 Mar 2016 02:42:11 -0300 Subject: [Cryptography] iPhone hardware attacks In-Reply-To: References: <20160302151557.0cc4eda9@jabberwock.cb.piermont.com> Message-ID: <56d7cef6.44208c0a.61327.ffffaf88@mx.google.com> On Wed, 2 Mar 2016 22:59:16 -0500 grarpamp wrote: > On 3/2/16, Perry E. Metzger wrote: > > I keep wondering what the odds are that the NSA has no method > > available to decap the chips within an iPhone and extract secret > > keying material. why would they bother extracting something they already know From cmagistrado at gmail.com Thu Mar 3 04:29:10 2016 From: cmagistrado at gmail.com (Chris Magistrado) Date: Thu, 3 Mar 2016 04:29:10 -0800 Subject: Research Paper on The Eternal Life of Cryptocurrencies. Message-ID: I've been reading this mailing list for quite some time now, and usually don't message or write here much. Maybe one other time. I'm writing a paper on the vitality of Cryptocurrencies. My argument is that they are here to stay, and will only continue to rise as our technology becomes better. Some of the statistics I plan to use are the growth in market value, not only in BTC, but in Altcoins as well, the pros of BTC and how altcoins can do what BTC cannot, and lastly the versatility of exchanging coins via places like Shapeshift.io. Any suggestions on data or stats that might be useful? Shamir just said at RSA, "Yet to see a use case for blockchain that can't be solved with an existing simpler technology" I simply disagree. I believe the use of Cryptocurrencies are not only a statement against government control, but also a currency used by people whom want to remain private. (obviously, again, better coins than btc). -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1015 bytes Desc: not available URL: From admin at pilobilus.net Thu Mar 3 01:57:15 2016 From: admin at pilobilus.net (Steve Kinney) Date: Thu, 3 Mar 2016 04:57:15 -0500 Subject: According to www.virustotal.com, lists.debian.org are hosting attachment .DOC virus In-Reply-To: <20160303084422.GD2384@sivokote.iziade.m$> References: <20160303084422.GD2384@sivokote.iziade.m$> Message-ID: <56D80A7B.2020902@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 03/03/2016 03:44 AM, Georgi Guninski wrote: > According to www.virustotal.com, lists.debian.org are hosting > attachment .DOC virus. > > Would someone confirm or deny this? > > Warning: DO NOT OPEN THE .DOC! Discalimer: Nothing personal > against Debian > > https://lists.debian.org/debian-consultants/2016/01/msg00000.html > > links to: > > https://lists.debian.org/debian-consultants/2016/01/docyrW4BlUhzH. doc Well > phooey. I wanted to see what ClamAV said about it and what the textual content was, but... ~/Desktop $ wget https://lists.debian.org/debian-consultants/2016/01/docyrW4BlUhzH.do c [...] (lists.debian.org)|82.195.75.100|:443... connected. HTTP request sent, awaiting response... 404 Not Found 2016-03-03 04:49:28 ERROR 404: Not Found. So, Bog only knows. I imagine it was uploaded by a user, probably one of them "Windoze apologists" would would rather fight than switch and probably don't know anything is wrong with their workstation. :) -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQIcBAEBAgAGBQJW2Ap5AAoJEDZ0Gg87KR0LbDcQALq8j5NbrWFCyKJP6CGAKAEc HClqhchO83dwiJBir+h2v6nJOHV53vgARYQa8wE/9u3fvRXnaYoOuPt5+GK6dp1w Q6Uex2zp9z9CNzA28wRWMMCL5M+ZbTVi9bmU2IxU+ej4Lic0Ziz69R+X+UotvFHV N5qOWFr/CLuAuJvAsBYLAdh1wpZvzuw8Aa1fLOqRDVdBZuA6vIIJOlmg/VowEW79 VqilEosQ+SUc6eqn8Ky1cTE3sCY8JFh3rqwkLf3OAS4t1549c7zMqu0ApxOSsIXZ U9yAI0THIRVBXzzKp2MMRZj5XCcICq6FJ4a0Y5vT3iLKJLk963RFugv6BPscDdmX 3UduCfbc8HACJbUB6+k0HWmHqn1Uu+saf8jNiC1WFMhB4gI2qv2O0jQIMduG5XtD wYGT9z+mF538VAh2aCh0Ayhqu+qIqlv93ZWFNY4Vw4ruuWigYgtuy05u3YxiTJLT 0YYdVjkAKZkqE/HAQ58U4qdoskTFfqXTvte3GWGHDiRBR098S4VjyCUVTK888bH4 7dtzCt7qmuUlZa1kem/tg5JCi+Qzywp6v+Jh4PQsjumUvrVujkSr3hBWwRFTWqW7 KCSdkMM4bwolcYjcSqW9GyahbFouVI7IlQcmI4bDPfnXA4sWkxeUzEiqCjxzj35j X7FsmIsAHcoYM2IXDha/ =53tl -----END PGP SIGNATURE----- From guninski at guninski.com Wed Mar 2 22:10:44 2016 From: guninski at guninski.com (Georgi Guninski) Date: Thu, 3 Mar 2016 08:10:44 +0200 Subject: [Cryptography] LibreSSL unaffected by DROWN In-Reply-To: References: <20160302202224.GS10917@mournblade.imrryr.org> Message-ID: <20160303061043.GA2384@sivokote.iziade.m$> On Wed, Mar 02, 2016 at 10:27:44PM -0500, grarpamp wrote: > > Theo is an avid marketer, the reality is a bit more complex. > > So then where is the link to an independant website which > stays current and puts say Libre 2.2.[x] and Open 1.0.2[x] > side by side in a feature / protocol / api review table? Both share usage of a lot of if(0) {label:}, what C experts say about this? in libressl 2.3.2 (latest as of now) and openssl 1.0.1p (and probably later) in ssl/s3_clnt.c 984: if (CBS_len(&cert_list) < 3) goto truncated; 1657: if (0) { truncated: SSLerr(SSL_F_SSL3_GET_CERTIFICATE_REQUEST, SSL_R_BAD_PACKET_LENGTH); } Some more info on my blog: https://j.ludost.net/blog/archives/2016/03/02/literate_programming_in_c_if0/index.html From dan at geer.org Thu Mar 3 05:34:14 2016 From: dan at geer.org (dan at geer.org) Date: Thu, 03 Mar 2016 08:34:14 -0500 Subject: participation in sensor networks Message-ID: <20160303133414.74CCDA06DBB@palinka.tinho.net> Most everyone I know is participating in sensor networks beginning with carrying smartphones. Let us assume, for the moment, this is with their eyes wide open as to the possible extent of such networks' implications. Here's another one, http://www.nauto.com, which I mention as the recording of license plates and everything else in the surround, not just the driver's performance envelope, now comes to consumer gear which, undoubtedly, insurance rates will soon reflect and, in the fullness of time, subpoenas will seek. There are a bejillion other technologies of like import coming and coming soon. Those (of us) who opt-out will face price discrimination and, quite likely, participation discrimination on an accelerating pace; look to Sweden's stance on cash money for an example (banks no longer accept cash deposits, as I understand it). The question here is perhaps obvious: Will you opt out and suffer the consequences thereof? --dan From jm at porup.com Thu Mar 3 06:40:36 2016 From: jm at porup.com (J.M. Porup) Date: Thu, 3 Mar 2016 09:40:36 -0500 Subject: participation in sensor networks In-Reply-To: <20160303133414.74CCDA06DBB@palinka.tinho.net> References: <20160303133414.74CCDA06DBB@palinka.tinho.net> Message-ID: <20160303144035.GC1729@fedora-21-dvm> On Thu, Mar 03, 2016 at 08:34:14AM -0500, dan at geer.org wrote: > The question here is perhaps obvious: Will you opt out and suffer > the consequences thereof? yippee kay yay, motherfucker. jmp From guninski at guninski.com Thu Mar 3 00:44:22 2016 From: guninski at guninski.com (Georgi Guninski) Date: Thu, 3 Mar 2016 10:44:22 +0200 Subject: According to www.virustotal.com, lists.debian.org are hosting attachment .DOC virus Message-ID: <20160303084422.GD2384@sivokote.iziade.m$> According to www.virustotal.com, lists.debian.org are hosting attachment .DOC virus. Would someone confirm or deny this? Warning: DO NOT OPEN THE .DOC! Discalimer: Nothing personal against Debian https://lists.debian.org/debian-consultants/2016/01/msg00000.html links to: https://lists.debian.org/debian-consultants/2016/01/docyrW4BlUhzH.doc Submitting the last .doc URL at: https://www.virustotal.com and then going to: Go to downloaded file analysis gives: https://www.virustotal.com/en/file/c7210dc26e00a0d9f9bf8fb3b4850d52b62bb5836a7fa34bb669fc1b1553005e/analysis/1456991242/ SHA256: c7210dc26e00a0d9f9bf8fb3b4850d52b62bb5836a7fa34bb669fc1b1553005e File name: docyrW4BlUhzH.doc Detection ratio: 17 / 54 the first few results are: AVG W97M/Downloader 20160303 AVware Trojan-Downloader.O97M.Adnel.n (v) 20160303 AegisLab W97M.Gen!c 20160303 Arcabit HEUR.VBA.Trojan.e 20160303 Avast VBA:Downloader-ABC [Trj] 20160303 ESET-NOD32 VBA/TrojanDownloader.Agent.AOM 20160303 and some report it as clean. The .doc is downloadable with the same checksum. From Rayzer at riseup.net Thu Mar 3 11:16:30 2016 From: Rayzer at riseup.net (Rayzer) Date: Thu, 3 Mar 2016 11:16:30 -0800 Subject: Bitcoin: A Miner Problem In-Reply-To: References: Message-ID: <56D88D8E.4060808@riseup.net> grarpamp wrote: > http://qntra.net/2016/03/a-miner-problem/ > > That the notion of "a majority of Bitcoin nodes" is void of content, > That a cartel of Bitcoin miners is deliberately and systematically > withholding blocks for an interval of about 20 minutes to a half hour, > so as to ensure themselves a (significant) advantage over any would-be > competitors. > That neither above item makes sense or could long survive without the other > Makes sense to anyone not addicted to bitcoin gambling. -- RR "What the world needs now is a new mythical 'currency' like I need a hole in my head." ~Anonymous Cracker ... This is what he learnt from those euro-trash girlz at Uncle Charlie's Summer Camp -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From grarpamp at gmail.com Thu Mar 3 08:45:47 2016 From: grarpamp at gmail.com (grarpamp) Date: Thu, 3 Mar 2016 11:45:47 -0500 Subject: Bitcoin: A Miner Problem Message-ID: http://qntra.net/2016/03/a-miner-problem/ That the notion of "a majority of Bitcoin nodes" is void of content, That a cartel of Bitcoin miners is deliberately and systematically withholding blocks for an interval of about 20 minutes to a half hour, so as to ensure themselves a (significant) advantage over any would-be competitors. That neither above item makes sense or could long survive without the other From guninski at guninski.com Thu Mar 3 03:07:39 2016 From: guninski at guninski.com (Georgi Guninski) Date: Thu, 3 Mar 2016 13:07:39 +0200 Subject: According to www.virustotal.com, lists.debian.org are hosting attachment .DOC virus In-Reply-To: <56D80A7B.2020902@pilobilus.net> References: <20160303084422.GD2384@sivokote.iziade.m$> <56D80A7B.2020902@pilobilus.net> Message-ID: <20160303110739.GE2384@sivokote.iziade.m$> On Thu, Mar 03, 2016 at 04:57:15AM -0500, Steve Kinney wrote: > phooey. I wanted to see what ClamAV said about it and what > the textual content was, but... > > ~/Desktop $ wget > https://lists.debian.org/debian-consultants/2016/01/docyrW4BlUhzH.do > c > > [...] > > (lists.debian.org)|82.195.75.100|:443... connected. > HTTP request sent, awaiting response... 404 Not Found > 2016-03-03 04:49:28 ERROR 404: Not Found. > Try scanning the .doc urls in virustotal from archive.org: https://web.archive.org/web/20160303105351/https://lists.debian.org/debian-s390/2015/10/msg00002.html https://web.archive.org/web/20160303105748/https://lists.debian.org/debian-hurd/2015/10/msg00029.html Make sure then to follow "Go to downloaded file analysis". From oss-security-admin at lists.openwall.com Thu Mar 3 05:49:09 2016 From: oss-security-admin at lists.openwall.com (oss-security-admin at lists.openwall.com) Date: 3 Mar 2016 13:49:09 -0000 Subject: Returned post for oss-security@lists.openwall.com Message-ID: us-ascii Hi! This is the ezmlm program. I'm managing the oss-security at lists.openwall.com mailing list. I'm working for my owner, who can be reached at oss-security-owner at lists.openwall.com. I'm sorry, your message (enclosed) was not accepted by the moderator. If the moderator has made any comments, they are shown below. >>>>> -------------------- >>>>> If you ever have anything valuable to share, like software bugs you used to find 10+ years ago, please feel free. Other than that, please consider the kind of content you've been posting lately unwelcome on oss-security. We also have a policy to discourage CC'ing other lists on oss-security postings (because this attracts less-relevant postings from other lists), but of course you didn't know nor care. (And the CC's were not particularly bad in this case, I admit. It's worse when someone CC's LKML.) /sd <<<<< ----------------- On Thu, Mar 03, 2016 at 10:28:09AM +0000, Cord Beermann wrote: > Hallo! Du (Adam D. Barratt) hast geschrieben: > > > If you want an answer from those who deal with lists, you have to ask them. > > debian-legal@ is just another mailing list. > > The file has been removed. > > Yours, > Cord, Debian Listmaster of the day Many thanks. You fixed the _entire_ messy issue with a single `rm`. btw, didn't your marketoid debian overlords taught you to hypocritically say `thanks' in issues like this? Goodbye oss-security-unsubscribe@ and debia ----- End forwarded message ----- From guninski at guninski.com Thu Mar 3 05:14:44 2016 From: guninski at guninski.com (Georgi Guninski) Date: Thu, 3 Mar 2016 15:14:44 +0200 Subject: [oss-security] According to www.virustotal.com, lists.debian.org are hosting attachment .DOC virus In-Reply-To: <20160303102809.GH20296@bendel.debian.org> References: <20160303084422.GD2384@sivokote.iziade.m$> <20160303102809.GH20296@bendel.debian.org> Message-ID: <20160303131444.GF2384@sivokote.iziade.m$> On Thu, Mar 03, 2016 at 10:28:09AM +0000, Cord Beermann wrote: > Hallo! Du (Adam D. Barratt) hast geschrieben: > > > If you want an answer from those who deal with lists, you have to ask them. > > debian-legal@ is just another mailing list. > > The file has been removed. > > Yours, > Cord, Debian Listmaster of the day Many thanks. You fixed the _entire_ messy issue with a single `rm`. btw, didn't your marketoid debian overlords taught you to hypocritically say `thanks' in issues like this? Goodbye oss-security-unsubscribe@ and debian-legal@ From juan.g71 at gmail.com Thu Mar 3 10:20:46 2016 From: juan.g71 at gmail.com (juan) Date: Thu, 3 Mar 2016 15:20:46 -0300 Subject: participation in sensor networks In-Reply-To: <20160303133414.74CCDA06DBB@palinka.tinho.net> References: <20160303133414.74CCDA06DBB@palinka.tinho.net> Message-ID: <56d880bd.0551370a.1780c.7f03@mx.google.com> On Thu, 03 Mar 2016 08:34:14 -0500 dan at geer.org wrote: > look to Sweden's stance on cash money for an example (banks > no longer accept cash deposits, as I understand it). that's because of a law that your governmnt and employeer pulled out of their 'legal' ass. and you know what that means? It means that the real problem is government - and you know what government is? - It's a collection of government employees - criminal tax parasites like yourself. > > The question here is perhaps obvious: Will you opt out and suffer > the consequences thereof? > > --dan > From guninski at guninski.com Thu Mar 3 06:16:08 2016 From: guninski at guninski.com (Georgi Guninski) Date: Thu, 3 Mar 2016 16:16:08 +0200 Subject: Fwd: Returned post for oss-security@lists.openwall.com Message-ID: <20160303141608.GJ2384@sivokote.iziade.m$> ----- Forwarded message from oss-security-admin at lists.openwall.com ----- From juan.g71 at gmail.com Thu Mar 3 13:07:44 2016 From: juan.g71 at gmail.com (juan) Date: Thu, 3 Mar 2016 18:07:44 -0300 Subject: Bitcoin: A Miner Problem In-Reply-To: <56D88D8E.4060808@riseup.net> References: <56D88D8E.4060808@riseup.net> Message-ID: <56d8a7e0.d4198c0a.7982d.100f@mx.google.com> On Thu, 3 Mar 2016 11:16:30 -0800 Rayzer wrote: > grarpamp wrote: > > http://qntra.net/2016/03/a-miner-problem/ > > "The only thing that can save Bitcoin, at this point, is completely breaking down the Chinese miner cartel. Which yes, means bricking all their hardware. It's time to do this, not least of all because having this precedent is extremely important for safeguarding Bitcoin in the future. We must show that we ~are~ able to destroy a miner cartel, or else." Damn! The yellow peril. But popescu and his superhero friends will save the world or at least bitcoin, by 'bricking' the yellow hardware... From jdb10987 at yahoo.com Thu Mar 3 12:50:23 2016 From: jdb10987 at yahoo.com (jim bell) Date: Thu, 3 Mar 2016 20:50:23 +0000 (UTC) Subject: participation in sensor networks In-Reply-To: <20160303133414.74CCDA06DBB@palinka.tinho.net> References: <20160303133414.74CCDA06DBB@palinka.tinho.net> Message-ID: <1577405571.3167320.1457038223050.JavaMail.yahoo@mail.yahoo.com> >From: "dan at geer.org" >Here's another one, http://www.nauto.com, which I mention as the >recording of license plates and everything else in the surround, Nearly 20 years ago, I first heard of "3M Louvered film", thin plastic sheets with opaque black plastic molded perpendicularly to the plane of the sheet.  It would be very useful to help block the viewing of license plates from the side of the road, or above on poles or overpasses.  Google-search '3M louvered film".    http://www.apioptics.com/pdf/3M-Display-Film-Summary.pdf     http://www.freepatentsonline.com/3919559.html     http://www.freepatentsonline.com/EP0466460A2.html    Two sheets installed perpendicularly to each other would render a license plate readable only from a limited viewing cone behind, or in front of, the car.            Jim Bell -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2839 bytes Desc: not available URL: From grarpamp at gmail.com Thu Mar 3 18:25:29 2016 From: grarpamp at gmail.com (grarpamp) Date: Thu, 3 Mar 2016 21:25:29 -0500 Subject: Bitcoin: A Miner Problem In-Reply-To: <56d8a7e0.d4198c0a.7982d.100f@mx.google.com> References: <56D88D8E.4060808@riseup.net> <56d8a7e0.d4198c0a.7982d.100f@mx.google.com> Message-ID: On 3/3/16, juan wrote: >> grarpamp wrote: >> > http://qntra.net/2016/03/a-miner-problem/ > > "The only thing that can save Bitcoin, at this point, is > completely breaking down the Chinese miner cartel. Which yes, means > bricking all their hardware. It's time to do this, not least of all > because having this precedent is extremely important for safeguarding > Bitcoin in the future. We must show that we ~are~ able to destroy a > miner cartel, or else." > > > Damn! The yellow peril. But popescu and his superhero friends > will save the world or at least bitcoin, by 'bricking' the > yellow hardware... Flag days are completely rational in bitcoin network exactly the same and entirely rational as the banking network has roughly 8-16 hours in a night to flag change their junk. Especially since bitcoin and any other digital currency offers a new paradigm of expectation to follow. Software updates is one of those things to expects. Bricking through change is a great defensive idea if needed, however unfortunately it applies to all miners, clients, etc that currently exist following the protocol. Therefore the only way to break self interested cartels is for the end user community to get together, realize there is a real problem, and act to solve it. Seemingly in this case, to openly design sell distribute open high performance mining hardware under legally enforced open sales records contract models at scale exclusively to distributed end users at cost. Communities of digital currencies will wake up to this when they see their assets / dreams being pushed to zero by such cartel influences. After all, that action is the supposed model of these decentral digital currencies. Right about now would be a good time to wake up. Amazed there isn't already an AP price on some heads. And that Satoshi may be laughing rather than speaking in all this bullshit. From grarpamp at gmail.com Thu Mar 3 18:50:26 2016 From: grarpamp at gmail.com (grarpamp) Date: Thu, 3 Mar 2016 21:50:26 -0500 Subject: Two more Apple amicus briefs In-Reply-To: References: Message-ID: ---------- Forwarded message ---------- From: Henry Baker Date: Thu, 03 Mar 2016 18:19:23 -0800 Subject: [Cryptography] Two more Apple amicus briefs To: cryptography at metzdowd.com -- a whole bunch of tech companies: https://assets.documentcloud.org/documents/2746620/Apple-Amicus-Brief-by-Airbnb-EBay-Twitter-and.pdf -- ATT: https://assets.documentcloud.org/documents/2746626/Apple-Amicus-Brief-From-AT-amp-T.pdf _______________________________________________ The cryptography mailing list cryptography at metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography From saekung at gmail.com Thu Mar 3 13:08:35 2016 From: saekung at gmail.com (saekung) Date: Thu, 3 Mar 2016 22:08:35 +0100 Subject: participation in sensor networks In-Reply-To: <1577405571.3167320.1457038223050.JavaMail.yahoo@mail.yahoo.com> References: <20160303133414.74CCDA06DBB@palinka.tinho.net> <1577405571.3167320.1457038223050.JavaMail.yahoo@mail.yahoo.com> Message-ID: <56D8A7D3.4080704@gmail.com> On 03/03/2016 21:50, jim bell wrote: > > >From: "dan at geer.org" >Here's another one, http://www.nauto.com, which I mention as the >> recording of license plates and everything else in the surround, > Nearly 20 years ago, I first heard of "3M Louvered film", thin plastic sheets with opaque black plastic molded perpendicularly to the plane of the sheet. It would be very useful to help block the viewing of license plates from the side of the road, or above on poles or overpasses. Google-search '3M louvered film". http://www.apioptics.com/pdf/3M-Display-Film-Summary.pdf http://www.freepatentsonline.com/3919559.html http://www.freepatentsonline.com/EP0466460A2.html Two sheets installed perpendicularly to each other would render a license plate readable only from a limited viewing cone behind, or in front of, the car. Jim Bell > > I would think that is illegal in most countries. From jdb10987 at yahoo.com Thu Mar 3 14:27:28 2016 From: jdb10987 at yahoo.com (jim bell) Date: Thu, 3 Mar 2016 22:27:28 +0000 (UTC) Subject: participation in sensor networks In-Reply-To: <56D8A7D3.4080704@gmail.com> References: <56D8A7D3.4080704@gmail.com> Message-ID: <1275359159.3231766.1457044048534.JavaMail.yahoo@mail.yahoo.com> From: saekung On 03/03/2016 21:50, jim bell wrote:>  >From: "dan at geer.org" >Here's another one, http://www.nauto.com, which I mention as the >> recording of license plates and everything else in the surround, > Nearly 20 years ago, I first heard of "3M Louvered film", thin plastic sheets with opaque black plastic molded perpendicularly to the plane of the sheet.  It would be very useful to help block the viewing of license plates from the side of the road, or above on poles or overpasses.  Google-search '3M louvered film".    http://www.apioptics.com/pdf/3M-Display-Film-Summary.pdf     http://www.freepatentsonline.com/3919559.html     http://www.freepatentsonline.com/EP0466460A2.html   Two sheets installed perpendicularly to each other would render a license plate readable only from a limited viewing cone behind, or in front of, the car.            Jim Bell >I would think that is illegal in most countries. A policeman might, and presumably has, argued that.  But go to your typical car-parts store (in America), and you will see plenty of license-plate covers which shield the plate from dirt and dust.  That doesn't mean that it is definitely 'legal', merely that most of the time, cops tend to look the other way if they can easily see the plate itself. One actually claims that it prevents photographing the plate:    http://www.ontrackcorp.com/original-protector.cfm?id=03 25 years ago, I did some research into making a car 'infrared stealthy'.  The technology of (cheap)  laser radar was just coming into play.  I learned that such laser speedgun units used 905 nanometers IR, pulsed at about 25 nanoseconds.  I concluded that covering a car's corner-cube plastic retroreflectors with an IR-absorptive glass (PPG's Azurlite absorbed all but 6% of 905 nm IR).   Azurlite could also be used to cover a license plate, although it had a distinctive bluish color.  Etching the inside surface of the glass with ammonium bifluoride etchant (art stores) greatly decreased the retroreflectance from the plate itself.I found an LED, Stanley DN305,  (since discontinued)which had a rise/fall time of about 10 nanoseconds.  It would have made an excellent jammer.  Presumably, better ones exist today.            Jim Bell -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5268 bytes Desc: not available URL: From grarpamp at gmail.com Thu Mar 3 19:44:15 2016 From: grarpamp at gmail.com (grarpamp) Date: Thu, 3 Mar 2016 22:44:15 -0500 Subject: Two more Apple amicus briefs In-Reply-To: References: Message-ID: > https://assets.documentcloud.org/documents/2746620/Apple-Amicus-Brief-by-Airbnb-EBay-Twitter-and.pdf > https://assets.documentcloud.org/documents/2746626/Apple-Amicus-Brief-From-AT-amp-T.pdf It may interest reader interpretation that the former companies may speak around being somewhat interested in customer privacy (even if perhaps motivated / bound by their own datamining TOS / profit interests rather than genuine), where old buddy AT&T may just want to be told what to do (given telecoms freewheeling events in history) while not mentioning any particular ethos themselves. Discuss... https://en.wikipedia.org/wiki/Project_SHAMROCK http://www.vice.com/en_ca/read/a-brief-history-of-the-united-states-governments-warrentless-spying https://en.wikipedia.org/wiki/Qwest#Refusal_of_NSA_surveillance_requests https://en.wikipedia.org/wiki/Joseph_Nacchio https://en.wikipedia.org/wiki/MAINWAY She also noted that no U.S. telecommunications company had legally refused to turning over customer metadata, "despite the mechanism for doing so". https://en.wikipedia.org/wiki/Claire_Eagan From grarpamp at gmail.com Thu Mar 3 20:22:55 2016 From: grarpamp at gmail.com (grarpamp) Date: Thu, 3 Mar 2016 23:22:55 -0500 Subject: [Cryptography] Two more Apple amicus briefs In-Reply-To: References: Message-ID: On 3/3/16, Allen wrote: > On Thu, Mar 3, 2016 at 9:19 PM, Henry Baker wrote: >> https://assets.documentcloud.org/documents/2746620/Apple-Amicus-Brief-by-Airbnb-EBay-Twitter-and.pdf >> https://assets.documentcloud.org/documents/2746626/Apple-Amicus-Brief-From-AT-amp-T.pdf >> >> > Someone should file an amicus brief that basically says the FBI violated > federal contracting rules by not putting the hacking work out to > competitive bid through the RFP process, and therefore it's request to > force Apple to do this work violates federal law and should be struck down > as against public policy. I'm not actually familiar enough with the > federal contracting process to know if that is true or not, but it seems > plausible, and it also seems there are many companies that would like to > have a crack at doing this work instead of being forced to do it. At > minimum, the FBI would find out through the RFP process if what it seeks > might be available through another channel and therefore Apple's assistance > is not required. And in the meantime RFP and results are out in the open giving makers more time to roll out and get embedded in society per and for customer interest, impenetrable crypto schemes. Embedding crypto to, for, and in conscience of society as a private and personal tool... is a race condition. And one you want to win. So do it... nao !!! From grarpamp at gmail.com Thu Mar 3 20:34:10 2016 From: grarpamp at gmail.com (grarpamp) Date: Thu, 3 Mar 2016 23:34:10 -0500 Subject: Crypto Individualism Required For Civilization To Reach The Stars? Message-ID: > Embedding crypto to, for, and in conscience of society as > a private and personal tool... is a race condition. > And one you want to win. > So do it... nao !!! Will humanity be able to advance and even reach the stars unless they are able to cryptographically securely extend and embed some portion of both the private and computational function of their brains... in the same private way brains function today... into devices and systems both large and small? bitcoin:16xRaqrjBwckR7HiqVKdKEmRDpb3dnJmSb Because... philosophy. From grarpamp at gmail.com Thu Mar 3 20:55:15 2016 From: grarpamp at gmail.com (grarpamp) Date: Thu, 3 Mar 2016 23:55:15 -0500 Subject: participation in sensor networks In-Reply-To: <20160303133414.74CCDA06DBB@palinka.tinho.net> References: <20160303133414.74CCDA06DBB@palinka.tinho.net> Message-ID: On 3/3/16, dan at geer.org wrote: > The question here is perhaps obvious: Will you opt out and suffer > the consequences thereof? Will you, as principal member[s] of such companies and organizations, recognize that certain things in humanity are distinctly human and necessary to humanity, therefore are of greater purpose than control and profit... and worthy preserving even in the face of risk... and therefore decline to develop, produce, market, and force such supposed solutions, even laws and structures, upon humanity... for what may even boil down to being your own self interest[s]? bitcoin:1CURA2mBjCghNaRujAjTN7Xy34Qai2NS5C Because... philosophy... and hungry. From grarpamp at gmail.com Thu Mar 3 21:11:43 2016 From: grarpamp at gmail.com (grarpamp) Date: Fri, 4 Mar 2016 00:11:43 -0500 Subject: participation in sensor networks In-Reply-To: <1275359159.3231766.1457044048534.JavaMail.yahoo@mail.yahoo.com> References: <56D8A7D3.4080704@gmail.com> <1275359159.3231766.1457044048534.JavaMail.yahoo@mail.yahoo.com> Message-ID: On 3/3/16, jim bell wrote: > It > would have made an excellent jammer. Presumably, better ones exist today. Plates and lights leaves left only how much beams back from micro scratches in windshields? And of course that even consumer flat black spray paint seems to still return some fraction of a real laser beam. Some locales do have laws regarding plate visibility and or modification [via overlays / surrounds]. And some makers do advertise those 3M-like structures in their plate cover products, some even specifying visibility width angles in degrees. But the headlight / retroreflector thing is uncaptured market at the moment. So like with the plate guys, you should go for it if you can solve the problem of production for and application to all the 3d shapes of those lights / retros on vehicle models. From grarpamp at gmail.com Thu Mar 3 21:33:30 2016 From: grarpamp at gmail.com (grarpamp) Date: Fri, 4 Mar 2016 00:33:30 -0500 Subject: [Cryptography] More Apple news In-Reply-To: <6AABF366-6DC7-4299-809A-D34B6A85ED2E@dukhovni.org> References: <6AABF366-6DC7-4299-809A-D34B6A85ED2E@dukhovni.org> Message-ID: On 3/3/16, Viktor Dukhovni wrote: > > http://arstechnica.com/tech-policy/2016/03/san-bernardino-da-says-seized-iphone-may-hold-dormant-cyber-pathogen/ > > "The iPhone is a county owned telephone that may have connected to > the San Bernardino County computer network. The seized iPhone may > contain evidence that can only be found on the seized phone that > it was used as a weapon to introduce a lying dormant cyber pathogen > that endangers San Bernardino's infrastructure," according to a court > filing (PDF) by Michael Ramos, the San Bernardino County District > Attorney. > > This seems so far beyond remotely plausible that one wonders whether > the responsible lawyers can be disbarred for blatant fabrication... If these 31337 criminals wanted to pathogenically jack the county systems they would have jacked in their own USB firmware sploits to fubar the systems starting with any workstations in reach. This lawyers own kids and himself have probably messed with and installed so much shit on his issued iphone to consider it compromised and warranting search. LOL totally made my day. From grarpamp at gmail.com Thu Mar 3 22:09:18 2016 From: grarpamp at gmail.com (grarpamp) Date: Fri, 4 Mar 2016 01:09:18 -0500 Subject: Research Paper on The Eternal Life of Cryptocurrencies. In-Reply-To: References: Message-ID: On 3/3/16, Chris Magistrado wrote: > I'm writing a paper on the vitality of Cryptocurrencies. My argument is > ... > growth in market value, not only in BTC, but in Altcoins as well, the pros > ... > of exchanging coins via places like Shapeshift.io. There is to consider the long tail of dying / dead currencies, who holds and runs them [hobby?] still, who got stuck and why. And I probably posted here once about some situations in which given currency turns rapidly plunging out of control beyond exchange capacity / pricing into other currencies or even goes to zero wiping out billions in vested interests thereby potentially prompting unrest / action / controls in the digital or physical space. Look to past failures and imagine. Post link to paper when finished. From jya at pipeline.com Fri Mar 4 04:09:22 2016 From: jya at pipeline.com (John Young) Date: Fri, 04 Mar 2016 07:09:22 -0500 Subject: USG v. Apple - Amici Applications Through 3 March 2016 Message-ID: https://cryptome.org/2016/03/usg-apple-025-049.pdf (179 pp, 20MB) Few of the applications have been ordered by the court. Thumbnail descriptions provide rationale for each case. Most are lazy, thin and repetitious in argument, not much that's new from previous battles. Faintheatedness suggests riskless PR is the intent, or worse, fear of antagonizing the biggest customer for crypto, govs, reduxing all crypto strutting, mock battles, gov-com-org business conducted in secrecy, public left to believe duplicitous comsec mandated by natsec, or not, usually not. From guninski at guninski.com Thu Mar 3 23:00:51 2016 From: guninski at guninski.com (Georgi Guninski) Date: Fri, 4 Mar 2016 09:00:51 +0200 Subject: Research Paper on The Eternal Life of Cryptocurrencies. In-Reply-To: References: Message-ID: <20160304070051.GB2300@sivokote.iziade.m$> Crypto attack, major math breakthrough almost surely will kill them all in their present form. AFAICT effect of quantum computer is open (might be wrong). Consider checking: On Bitcoin Security in the Presence of Broken Crypto Primitives http://eprint.iacr.org/2016/167.pdf From guninski at guninski.com Fri Mar 4 00:49:23 2016 From: guninski at guninski.com (Georgi Guninski) Date: Fri, 4 Mar 2016 10:49:23 +0200 Subject: Bitcoin: A Miner Problem In-Reply-To: References: Message-ID: <20160304084923.GE2300@sivokote.iziade.m$> On Thu, Mar 03, 2016 at 11:45:47AM -0500, grarpamp wrote: > http://qntra.net/2016/03/a-miner-problem/ > > That the notion of "a majority of Bitcoin nodes" is void of content, > That a cartel of Bitcoin miners is deliberately and systematically > withholding blocks for an interval of about 20 minutes to a half hour, > so as to ensure themselves a (significant) advantage over any would-be > competitors. > That neither above item makes sense or could long survive without the other IIRC sufficiently many dishonest nodes (51%?) might screw bitcoin much worse, it had something to do with consesus/transactions. Is the above true? Isn't this "cartel" the "free market" in juan's anarchist utopia? From guninski at guninski.com Fri Mar 4 04:06:16 2016 From: guninski at guninski.com (Georgi Guninski) Date: Fri, 4 Mar 2016 14:06:16 +0200 Subject: participation in sensor networks In-Reply-To: <20160303133414.74CCDA06DBB@palinka.tinho.net> References: <20160303133414.74CCDA06DBB@palinka.tinho.net> Message-ID: <20160304120616.GF2300@sivokote.iziade.m$> On Thu, Mar 03, 2016 at 08:34:14AM -0500, dan at geer.org wrote: > The question here is perhaps obvious: Will you opt out and suffer > the consequences thereof? > > --dan Let me counter-ask only `dan': Will you exchange a walk on part in a war for a lead role in a cage? This is not exactly quote from Floyd's song. From jdb10987 at yahoo.com Fri Mar 4 09:44:57 2016 From: jdb10987 at yahoo.com (jim bell) Date: Fri, 4 Mar 2016 17:44:57 +0000 (UTC) Subject: participation in sensor networks In-Reply-To: References: Message-ID: <2136427955.3668399.1457113497168.JavaMail.yahoo@mail.yahoo.com> From: grarpamp On 3/3/16, jim bell wrote:>> It would have made an excellent jammer.  Presumably, better ones exist today. >Plates and lights leaves left only how much beams back from >micro scratches in windshields? Probably very little.  The emitted laser power of the unit I had the documentation foremitted 15 watts.  Most of that would have hit the car, but only a tiny fraction wouldhave been reflected back to the laser gun.  Google search "Lambertian".    https://en.wikipedia.org/wiki/Lambertian_reflectance   (The reflectance of a piece ofwhite paper is primarily 'lambertian':  It doesn't act like a mirror;nor does it act like a retroreflector. >And of course that even consumer flat black spray paint >seems to still return some fraction of a real laser beam. I didn't and don't expect that anybody was going to re-paint their car for thispurpose.  Disabling the retro-reflectors is relatively easy.   >Some locales do have laws regarding plate visibility and >or modification [via overlays / surrounds]. >And some makers do advertise those 3M-like structures >in their plate cover products, some even specifying visibility >width angles in degrees. I understood that some of these modifications might arguably be called in violation of the law.  The main one, covering the license plate, seemsto be a minor issue. >But the headlight / retroreflector thing is uncaptured market >at the moment. So like with the plate guys, you should go >for it if you can solve the problem of production for and >application to all the 3d shapes of those lights / retros on >vehicle models. I don't know how big the laser radar market currently is.  When I did the research in 1990-91, it was not clear how big an issue it would eventuallybe.   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4927 bytes Desc: not available URL: From jya at pipeline.com Sat Mar 5 03:17:44 2016 From: jya at pipeline.com (John Young) Date: Sat, 05 Mar 2016 06:17:44 -0500 Subject: Lavabit's and Snowden's Solos Message-ID: Lavabit's brief for Apple has the gutsiest skin in the game, going solo, no joining a pack. None of the fattest of strutting corporate cats rushed to defend Lavabit against absence of FBI corporate-coddling, Congress-stroking, corraling the frightened herd for taking down mavericks like Lavabit and Snowden. https://cryptome.org/2016/03/usg-apple-102-105.pdf From guninski at guninski.com Sat Mar 5 01:21:23 2016 From: guninski at guninski.com (Georgi Guninski) Date: Sat, 5 Mar 2016 11:21:23 +0200 Subject: According to www.virustotal.com, lists.debian.org are hosting attachment .DOC virus In-Reply-To: <20160303110739.GE2384@sivokote.iziade.m$> References: <20160303084422.GD2384@sivokote.iziade.m$> <56D80A7B.2020902@pilobilus.net> <20160303110739.GE2384@sivokote.iziade.m$> Message-ID: <20160305092122.GA2412@sivokote.iziade.m$> On Thu, Mar 03, 2016 at 01:07:39PM +0200, Georgi Guninski wrote: > > Try scanning the .doc urls in virustotal from archive.org: > > https://web.archive.org/web/20160303105351/https://lists.debian.org/debian-s390/2015/10/msg00002.html > https://web.archive.org/web/20160303105748/https://lists.debian.org/debian-hurd/2015/10/msg00029.html > > These are still alive even on debian, though I told this to two debian developers in private mail. One of them suggested to clean their site by clicking "report as spam": https://lists.debian.org/debian-legal/2016/03/msg00005.html From zen at freedbms.net Sat Mar 5 04:43:53 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Sat, 5 Mar 2016 12:43:53 +0000 Subject: Do punks denounce anti-prostitution, anti-pimping and anti-trafficking policies invariably used to repress women? Message-ID: A new and compelling perspective for me... https://www.opendemocracy.net/beyondslavery/sws/gail-pheterson/at-long-last-listen-to-women At long last, listen to the women! Gail Pheterson 2 March 2016 State entrapment, extortion, imprisonment and slander sharpen the consciousness of sex workers who denounce anti-prostitution, anti-pimping and anti-trafficking policies invariably used to repress women and undermine feminist liberation struggles. 'Proud to be whores'. Prostitutes demonstrate in Paris in 2008. philippe leroyer/Flickr. (CC 2.0 by-nc-nd) --- Gail Pheterson began organising with the sex workers of COYOTE in San Francisco in 1984 during a sabbatical year at the Institute for the Study of Social Change, University of California, Berkeley. While in San Francisco she designed an alliance project of whores, wives and dykes that transformed into a network of Bad Girl Rap Groups. Co-facilitated with Margo St. James, Scarlot Harlot/Carol Leigh, Priscilla Alexander, Sharon Kaiser, E. Kitch Childs, Gloria Locket and others, the Bad Girl Rap Groups were open to "any woman who had ever been stigmatised as bad by her work, colour, class, sexuality, history of abuse, or just plain gender". Upon her return to Europe, she co-founded the Red Thread and Pink Thread, two interwoven Dutch organisations of sex workers and allies, with Margot Alvarez, Ans van der Drift, Martine Groen, Violet and others. She also co-organised with Margo St. James the First World Whores’ Congress in Amsterdam and the Second World Whores’ Congress at the European Parliament in Brussels, and co-founded the International Committee for Prostitutes' Rights. Gail Pheterson edited the transcripts of the Whores' Congresses for publication in A Vindication of the Rights of Whores (released in Spanish under the title Nosotras Las Putas) and published a series of essays titled The Prostitution Prism (also in Spanish and French), including her most known and widely translated essay, ‘The Whore Stigma: Female Dishonor and Male Unworthiness’. --- Women mobilised a grassroots liberation movement fifty years ago in defiant resistance against oppression. Those feminists knew their struggle was dangerous but they were unrelenting in claiming rights for women as autonomous persons. Where are we now in this crusade for freedom? The idea of equality between the sexes has moved into the global limelight over the past decades, but women's liberation is still a far cry from home. Government authorities, world organisations, and social reformers continue to undermine radical analysis of pervasive sexism with emotionally-charged rhetoric of individual female misfortune and male misconduct. Exposés of criminal and perverse men capturing helpless women ignite public outrage while leaving intact institutional obstacles to women’s mobility, work, and bodily self-determination. This rhetoric sabotages liberation strategies by taking women-on-the-run into protective custody of the status quo. Anti-violence discourse then serves to reinforce state repression of women. Knowingly or unknowingly, the establishment has succeeded in wrenching the feminist agenda from its subversive fibre. The result is effective camouflage of the political cause for women's flight and disregard for women's material needs, social choices and, most insidiously, agency in thinking and shaping their destinies. All women have reason to seek liberty, but all do not face the same life conditions. The contemporary foot soldiers of our movement are rightless migrant women disallowed from leaving home, crossing borders, earning money, or living independently. Without rights, they are forced to bargain their survival with abusive profiteers inside and outside the law. In legislation, popular media, police records, UN conventions, and even ill-founded feminist tracts, they are branded trafficked women, trapped in the nexus of global power relations, and categorised as this or that kind of victim or tramp. Savvy feminists Sex worker activists are savvy feminist analysts of these machinations, their consciousness undoubtedly sharpened by daily trials of (escaping) state entrapment, extortion, imprisonment, and slander. As intimates of both backroom and front stage men, prostitutes are solicited by government officials to serve as undercover agents and informants. Their advantage over socially reputable women is their exclusion from polite society and direct experience of institutional vice. Mainstream feminists would do well to listen to their word in public as male authorities do in private. Their first demand is decriminalisation of sex work. This implies repealing prohibitions against negotiations and services attached to the sex industry, including the hiring of third parties to facilitate management of businesses and travel to foreign markets. In other words, sex workers demand the abolition of anti-prostitution, anti-pimping and anti-trafficking laws. They know that such laws invariably translate into discriminatory surveillance, fines, arrest, detention, and expulsion of migrant women. Since popular opinion equates pimping and trafficking with the vile use and abuse of women, well-intentioned reformers persist in promoting restrictive legislation that curtails women's sexual negotiations and geographic displacements. Most existing criminal laws against pimping and trafficking are about sex, money, and travel – not about violence. Some countries do require evidence of force to proceed with prosecution, but women are nonetheless subject to discriminatory surveillance rationalised as preventive measures ‘for their own good’. Violence, coercion, and deceit do, of course, occur in prostitution, as elsewhere in the sex class system. Certainly sex workers should have the same recourse to laws against those crimes as any legitimate plaintiff would have in cases of battery, rape, fraud, kidnapping, or other offense against their person. But equal juridical treatment is incompatible with prejudicial classification as prostitute or trafficked woman. Sex workers demand generic, gender-neutral consideration undifferentiated from other workers, citizens, or human beings. Crimes against women are not crimes against incapacitated dependents, property, or morality; they are crimes against individuals. Criminalise marriage? Women have ample cause for class action to claim compensation for a host of injustices, whether unpaid labour, insult, assault, or discrimination. Reparation could be a feminist collective demand. Matrimony and maternity are clearly the key historical sites of subjugation for women in terms of toil and sacrifice. But feminists have never called for prohibition of marriage or pregnancy, regardless of the risks and documented damages. Feminists have fought to give women alternatives or escapes from heterosexual coercions with divorce rights, battered women shelters and lesbians legitimacy. And they have fought to give women escapes from forced pregnancy or forced sterilisation by demanding reproductive choice and by facilitating access to contraception and abortion. But surely they would not deny women the right to decide for themselves whether to marry or bear a child or even whether to remain with an abusive husband. And they would not deny the rewards and satisfactions some women experience as wives or mothers. Why do sex workers not receive the same respect? There could also be a feminist class action to claim compensation for injustices in the sex industry. And clearly, alternatives and escape channels depend upon feminist struggles for migrant rights, labour rights, and residency permits for independent women. But there is no justification for denying the right to negotiate payment for sexual services. Individually we are each in the grip of specific realities, each a unique person, and each entitled to our own thought processes and life choices. Collectively we can shape visions and common liberatory goals without judging any individual woman for her meanderings in the sex class system. This article is published as part of the 'Sex workers speak: who listens?' series on Beyond Trafficking and Slavery, generously sponsored by COST Action IS1209 ‘Comparing European Prostitution Policies: Understanding Scales and Cultures of Governance' (ProsPol). ProsPol is funded by COST. The University of Essex is its Grant Holder Institution. About the author Gail Pheterson is currently Associate Professor [Maître de conférences] of social psychology, Université de Picardie Jules Verne, Amiens, France, and Researcher at the Centre de recherches sociologiques et politiques de Paris, CNRS/University Paris 8. In alliance with sex workers, she organised the International Committee for Prostitutes' Rights and the World Whores' Congresses in 1985-86. She is editor of A Vindication of the Rights of Whores, and author of The Prostitution Prism and Femmes en flagrant délit d'indépendance. Related Articles We speak but you don’t listen: migrant sex worker organising at the border x:talk project Ava Caradonna What gives them the right to judge us? Roses d'Acier Sex workers speak: who listens? P.G. Macioti Giulia Garofalo Geymonat Read On bracelet-280.jpg Sexual surveillance and moral quarantines: a history of anti-trafficking JESSICA R. PLILEY Convenient conflations: modern slavery, trafficking, and prostitution JULIA O’CONNELL DAVIDSON Speaking of “dead prostitutes”: how CATW promotes survivors to silence sex workers JASON CONGDON Anti-trafficking campaigns, sex workers and the roots of damage CAROL LEIGH Decriminalising sex work in New Zealand: its history and impact FRASER CRICHTON Amnesty’s proposal to decriminalise sex work: contents and discontents SIMANTI DASGUPTA Why decriminalise sex work? GLOBAL NETWORK OF SEX WORK PROJECTS Amnesty International: adopt the proposed policy on sex work INTERNATIONAL COMMITTEE ON THE RIGHTS OF SEX WORKERS IN EUROPE Subjects Sex workers speak: who listens? Related Articles We speak but you don’t listen: migrant sex worker organising at the border https://www.opendemocracy.net/beyondslavery/sws/ava-caradonna-x-talk-project/we-speak-but-you-don-t-listen-migrant-sex-worker-organisi From admin at pilobilus.net Sat Mar 5 10:08:56 2016 From: admin at pilobilus.net (Steve Kinney) Date: Sat, 5 Mar 2016 13:08:56 -0500 Subject: participation in sensor networks In-Reply-To: <20160304120616.GF2300@sivokote.iziade.m$> References: <20160303133414.74CCDA06DBB@palinka.tinho.net> <20160304120616.GF2300@sivokote.iziade.m$> Message-ID: <56DB20B8.2010909@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 03/04/2016 07:06 AM, Georgi Guninski wrote: > On Thu, Mar 03, 2016 at 08:34:14AM -0500, dan at geer.org wrote: >> The question here is perhaps obvious: Will you opt out and >> suffer the consequences thereof? >> >> --dan > > Let me counter-ask only `dan': > > Will you exchange a walk on part in a war for a lead role in a > cage? > > This is not exactly quote from Floyd's song. I for one welcome universal surveillance, an unavoidable consequence of universal data network access. Corporate and intelligence service surveillance databases will always be valuable enough to keep, and will eventually become the communal property of the human species and its descendants. Osiris Ani is not half so immortal as you and I; what we do goes in mankind's permanent record. All the world is now a stage, so get your act together and make it count. https://www.youtube.com/watch?v=Zo6UnKr6Bwg :o) -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQIcBAEBAgAGBQJW2yCwAAoJEDZ0Gg87KR0L4GcP/3UZoLt3omhbVQ+4MppUfFJC dun731+03yVKJkwVTRGhdrKD0li7d6rt3cSt+pfkEjcbq3dP4KHs4rRVz+uO4mWS 0c9eAhdqrkglqCkMZLtpEVRm1f24I+rYV3qFpcbc2rvqic1dvgCF6V0NEAptXgZk 6BPT6Xc26tZ9p1s+fMT0+rbRzTvm9K9F2IGydbmXrzem3xj9ptyUHG6kn6cY1/x9 IDem7/aGaSyoN97idIAepMBI5plkvQ9TYQgsmhp/f0EFLS2dYmA7jAB+BxnU5/vs MyD7KY76IPwfk9deX9Fil9p8aafpCq4gENUSn62Ld6YVzKvf+OsO/RatcqySNqeC ZVKqorEQYAiqRO6pecbxnoicfHJ++NdCkLJLAViu+aY1VgkEvjx4r86XkvD4TYZH IdKtOao2OWWIFYGfVYt2PqYWpHlWEHE4LvJQNHxKwXpqWPp/S1u2nWAjEbTdrXoj ni3jkiLD1/yVVIpF6pe7uUxyL3j8U5waqo2m5ddQMLwBjIXu1+U5CGYeq3IqXR6b CiIp85ODLZpbP14qYZea3oa2GvgwHhaeko0sa8VF0g/pQ0Ojhe9rMuI5T5kTblOG oljbCIdsF/an5WbyaMZa0EkJMIXGgun7sXSeM9j+GMsxibdc9I6XQ4CI2SvqNAmP LnJ8s9ErOmI9RpK8RTVP =T01l -----END PGP SIGNATURE----- From grarpamp at gmail.com Sat Mar 5 11:45:27 2016 From: grarpamp at gmail.com (grarpamp) Date: Sat, 5 Mar 2016 14:45:27 -0500 Subject: Bitcoin: A Miner Problem In-Reply-To: <20160304084923.GE2300@sivokote.iziade.m$> References: <20160304084923.GE2300@sivokote.iziade.m$> Message-ID: On 3/4/16, Georgi Guninski wrote: >> http://qntra.net/2016/03/a-miner-problem/ > > IIRC sufficiently many dishonest nodes (51%?) might screw bitcoin much > worse, it had something to do with consesus/transactions. > > Is the above true? Theres some random link http://bitcoin.stackexchange.com/questions/658/what-can-an-attacker-with-51-of-hash-power-do > Isn't this "cartel" the "free market" in juan's anarchist utopia? Yes. That's supposed to happen. t's also supposed to happen that there will be many independant brains out there that introduce opposing forces. But traditional sheeple don't exactly spin up as independant actors quickly when anarchism is suddenly dropped on them, thus they get raped for a while till they do. The one or two past situations over 50% were voluntarily rebalanced by pools and miners. However since pools are still too uneven few and large multi percent chunks the possible combinations and motives aren't ideal. People will eventually realize that they, as millions of users, are the ones who should be doing the mining, all independantly under a known and necessary code of poolsize limiting, a vested stake in preserving value of their own assets and economy, thus distributed impossible to be abused by large pools / entity cabal miners. Most users don't get that yet. Though the 21 of things is a step towards that. They also don't seem to get that ineffective bitcoin leadership (for those that don't believe in the anarchist blockchain as a possibility itself) is repressing and destroying their value and utility. From juan.g71 at gmail.com Sat Mar 5 10:19:03 2016 From: juan.g71 at gmail.com (juan) Date: Sat, 5 Mar 2016 15:19:03 -0300 Subject: participation in sensor networks In-Reply-To: <56DB20B8.2010909@pilobilus.net> References: <20160303133414.74CCDA06DBB@palinka.tinho.net> <20160304120616.GF2300@sivokote.iziade.m$> <56DB20B8.2010909@pilobilus.net> Message-ID: <56db2355.8e4a370a.21598.3c01@mx.google.com> On Sat, 5 Mar 2016 13:08:56 -0500 Steve Kinney wrote: > I for one welcome universal surveillance, Crazy. Perhaps you didn't notice that what you welcome is even more absolute state power? > an unavoidable > consequence of universal data network access. Corporate and > intelligence service surveillance databases will always be > valuable enough to keep, and will eventually become the communal > property of the human species and its descendants. > > Osiris Ani is not half so immortal as you and I; what we do goes > in mankind's permanent record. All the world is now a stage, so > get your act together and make it count. > > https://www.youtube.com/watch?v=Zo6UnKr6Bwg > > :o) > > > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v2.0.22 (GNU/Linux) > > iQIcBAEBAgAGBQJW2yCwAAoJEDZ0Gg87KR0L4GcP/3UZoLt3omhbVQ+4MppUfFJC > dun731+03yVKJkwVTRGhdrKD0li7d6rt3cSt+pfkEjcbq3dP4KHs4rRVz+uO4mWS > 0c9eAhdqrkglqCkMZLtpEVRm1f24I+rYV3qFpcbc2rvqic1dvgCF6V0NEAptXgZk > 6BPT6Xc26tZ9p1s+fMT0+rbRzTvm9K9F2IGydbmXrzem3xj9ptyUHG6kn6cY1/x9 > IDem7/aGaSyoN97idIAepMBI5plkvQ9TYQgsmhp/f0EFLS2dYmA7jAB+BxnU5/vs > MyD7KY76IPwfk9deX9Fil9p8aafpCq4gENUSn62Ld6YVzKvf+OsO/RatcqySNqeC > ZVKqorEQYAiqRO6pecbxnoicfHJ++NdCkLJLAViu+aY1VgkEvjx4r86XkvD4TYZH > IdKtOao2OWWIFYGfVYt2PqYWpHlWEHE4LvJQNHxKwXpqWPp/S1u2nWAjEbTdrXoj > ni3jkiLD1/yVVIpF6pe7uUxyL3j8U5waqo2m5ddQMLwBjIXu1+U5CGYeq3IqXR6b > CiIp85ODLZpbP14qYZea3oa2GvgwHhaeko0sa8VF0g/pQ0Ojhe9rMuI5T5kTblOG > oljbCIdsF/an5WbyaMZa0EkJMIXGgun7sXSeM9j+GMsxibdc9I6XQ4CI2SvqNAmP > LnJ8s9ErOmI9RpK8RTVP > =T01l > -----END PGP SIGNATURE----- From grarpamp at gmail.com Sat Mar 5 12:23:18 2016 From: grarpamp at gmail.com (grarpamp) Date: Sat, 5 Mar 2016 15:23:18 -0500 Subject: [Cryptography] EFF amicus brief in support of Apple In-Reply-To: References: <20160304220134.81297.qmail@ary.lan> Message-ID: > Bottom line: if FBI/DoJ can strongarm Apple into electronically > signing malware, then we have entered into a truly new imperial > era, where trillion-dollar companies can be rubber-hosed into > misusing their private crypto keys. > > No amount of technology, per se, can prevent this particular > MITM attack. We're now going to have to have multiple keys > from multiple "trusted" sources prior to accepting a firmware > update. Forget visiting Switzerland or the Cayman Islands > for access to $$$; you may now have to physically go there to > get your iPhone securely updated. See this is a problem. All this trust in single entities, singular and closed systems you keep needing to place. Why in the fuck do you keep doing this? You compute hardware should be completely open. You compute software should be completely open. You should fuse your own keys into your own hardware for software builds you reproducibly build sign and install yourself from distributed opensource software. Open designs, open fabs, open products, open source. You are NOT going to solve these problems without it. And quit crying profit... the work of your plumber is all in the open and profitable. Or quality... all quality is currently shit, but at least you stand a chance of seeing the flies on it if it's open. > I'm sure that Microsoft/HP/Dell are looking upon these > proceedings with mixed feelings, as I suspect that they've > *already* provided their code-signing keys to the govt Like all those call and other data... just for the asking, thus retroactive immunity for them, thus rolled up for absorption and enacted by an unaccountable government. > -- perhaps under FISA NSL > -- or perhaps out of a misplaced sense of patriotism. These two are one and the same. > Apple's digital signature is tied to their credible responsibility that software > they sign is theirs Yes it's theirs, which they can fuck you with at any time... because you trusted them, oops. > and in the best interest of their customers and Apple's business. These are in tenacious conflict. > As a minimum the existence of compelled software lays waste to the EULA. Shrinkwrap hardware / software EULAs offer you nothing concrete, trustworthy, or compensatable. All to them, none to you. Negotiated contracts are different but just as tricky. From admin at pilobilus.net Sat Mar 5 12:41:04 2016 From: admin at pilobilus.net (Steve Kinney) Date: Sat, 5 Mar 2016 15:41:04 -0500 Subject: participation in sensor networks In-Reply-To: <56db2355.8e4a370a.21598.3c01@mx.google.com> References: <20160303133414.74CCDA06DBB@palinka.tinho.net> <20160304120616.GF2300@sivokote.iziade.m$> <56DB20B8.2010909@pilobilus.net> <56db2355.8e4a370a.21598.3c01@mx.google.com> Message-ID: <56DB4460.8090007@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 03/05/2016 01:19 PM, juan wrote: > On Sat, 5 Mar 2016 13:08:56 -0500 Steve Kinney > wrote: > > >> I for one welcome universal surveillance, > > Crazy. Perhaps you didn't notice that what you welcome is even > more absolute state power? Crazy? More like far out. Universal surveillance enables abuses of State power only when access to collected data is restricted to State sanctioned actors. When everything becomes searchable by anybody, the inability of State sanctioned actors to conceal their activities or effectively lie about their history and motives will inhibit their potential for destructive action. "Power over others" depends in large part on secrecy, while "powers of self determination" depend largely on free and open access to information. In the long run, the secrecy problem will take care of itself, because the abuses of power it enables have already killed the State: At least, in the sense that a trans-national State hard wired for self destruction, defending that program by any means necessary, is "already dead." :o) >> an unavoidable consequence of universal data network access. >> Corporate and intelligence service surveillance databases >> will always be valuable enough to keep, and will eventually >> become the communal property of the human species and its >> descendants. >> >> Osiris Ani is not half so immortal as you and I; what we do >> goes in mankind's permanent record. All the world is now a >> stage, so get your act together and make it count. >> >> https://www.youtube.com/watch?v=Zo6UnKr6Bwg >> >> :o) >> >> >> >> -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 >> (GNU/Linux) >> >> iQIcBAEBAgAGBQJW2yCwAAoJEDZ0Gg87KR0L4GcP/3UZoLt3omhbVQ+4MppUfFJC >> >> dun731+03yVKJkwVTRGhdrKD0li7d6rt3cSt+pfkEjcbq3dP4KHs4rRVz+uO4mWS >> 0c9eAhdqrkglqCkMZLtpEVRm1f24I+rYV3qFpcbc2rvqic1dvgCF6V0NEAptXgZk >> >> 6BPT6Xc26tZ9p1s+fMT0+rbRzTvm9K9F2IGydbmXrzem3xj9ptyUHG6kn6cY1/x9 >> IDem7/aGaSyoN97idIAepMBI5plkvQ9TYQgsmhp/f0EFLS2dYmA7jAB+BxnU5/vs >> >> MyD7KY76IPwfk9deX9Fil9p8aafpCq4gENUSn62Ld6YVzKvf+OsO/RatcqySNqeC >> ZVKqorEQYAiqRO6pecbxnoicfHJ++NdCkLJLAViu+aY1VgkEvjx4r86XkvD4TYZH >> >> IdKtOao2OWWIFYGfVYt2PqYWpHlWEHE4LvJQNHxKwXpqWPp/S1u2nWAjEbTdrXoj >> ni3jkiLD1/yVVIpF6pe7uUxyL3j8U5waqo2m5ddQMLwBjIXu1+U5CGYeq3IqXR6b >> >> CiIp85ODLZpbP14qYZea3oa2GvgwHhaeko0sa8VF0g/pQ0Ojhe9rMuI5T5kTblOG >> oljbCIdsF/an5WbyaMZa0EkJMIXGgun7sXSeM9j+GMsxibdc9I6XQ4CI2SvqNAmP >> >> LnJ8s9ErOmI9RpK8RTVP >> =T01l -----END PGP SIGNATURE----- > > -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQIcBAEBAgAGBQJW20RdAAoJEDZ0Gg87KR0LvfEQAJ6RHhumNVAqlEyYpKkyi8Cp i376vY+SDoo6Idvtvd21fDc1xi/YWJYMG1vhlzkgsK7UYL0Z+slLNWjSLTqo4ReD b8+o6KHFDDHLeTWRB12rxVa48ZzuOq0WFxdDsyhLRcs0Th6WQdndoSFCUvqYiUOu 9q2tTUVyriKBal76fN8xb3dFGnC5Pwvt9mXl7fBSig4aLzp507kB5d8y+sccP6oe fqlmHR0D4hrQ9uHmMj7TqpBMXB0yT0YcVd3kM2fjgvqQqDsXM8126fgiiCPovDJi uz4ZP1Nc+9ObLw1aetxazy1AWXu35nv/PXsMkdp6wJsXZL54jRluFrsXJJ+pypKf IO6skr3mQAVDWuKzBX8C82VaeXvudx7t9goyjMTTtj7uNe8sI+B0TKNudQIJro/m UJpcfqyYNEjQJZA/qtwqtwLs7kSEAxeWUi4D6xYPCsXVUYNC1/tvNfgIjZKCa1UX BDuGTFwaT4Lzc5W391rNtfXuOX8coLYCTQDbdYEKrtwwSpcbNnX5Z+8zK0BzQEkU qNy/P9DUPsPV7pc4YKhnuEV9MPnU2WRDyzo/ScglJ7BayMj81nMdqD7riLApj0Fd TkFglMBjd+fxnu0XIeeD0AWcfarnuwDdI53/6hshRLqT3IhwVnOrliNOmZpSbwVA E+qukltW+n/7IJHF9x2Q =i8lz -----END PGP SIGNATURE----- From hozer at hozed.org Sat Mar 5 15:39:21 2016 From: hozer at hozed.org (Troy Benjegerdes) Date: Sat, 5 Mar 2016 17:39:21 -0600 Subject: [Cryptography] EFF amicus brief in support of Apple In-Reply-To: References: <20160304220134.81297.qmail@ary.lan> Message-ID: <20160305233921.GZ3544@nl.grid.coop> On Sat, Mar 05, 2016 at 03:23:18PM -0500, grarpamp wrote: > > Bottom line: if FBI/DoJ can strongarm Apple into electronically > > signing malware, then we have entered into a truly new imperial > > era, where trillion-dollar companies can be rubber-hosed into > > misusing their private crypto keys. > > > > No amount of technology, per se, can prevent this particular > > MITM attack. We're now going to have to have multiple keys > > from multiple "trusted" sources prior to accepting a firmware > > update. Forget visiting Switzerland or the Cayman Islands > > for access to $$$; you may now have to physically go there to > > get your iPhone securely updated. > > See this is a problem. All this trust in single entities, > singular and closed systems you keep needing to place. > Why in the fuck do you keep doing this? > > You compute hardware should be completely open. > You compute software should be completely open. > You should fuse your own keys into your own hardware > for software builds you reproducibly build sign and install > yourself from distributed opensource software. > > Open designs, open fabs, open products, open source. > You are NOT going to solve these problems without it. > > And quit crying profit... the work of your plumber is all in the > open and profitable. > > Or quality... all quality is currently shit, but at least > you stand a chance of seeing the flies on it if it's open. > The http://q3ube.be , https://puri.sm/ and http://efabless.com are open for business. If you happen to own a chain of gas stations you might decide an open hardware and multi-signature payment system that lets the customers authenticate the gas pump before payment might be a good long-term investment if you want to keep your customers. http://www.wthr.com/story/31039979/credit-card-skimmers-hit-again-in-central-indiana Place your orders now, or learn how to eat the cost of systems re-compromised with legislative trojans and court-order malware. And if you want to make any money in this space, think like a plumber and get used to dealing with everyone else's shit. -- ---------------------------------------------------------------------------- Troy Benjegerdes 'da hozer' hozer at hozed.org 7 elements earth::water::air::fire::mind::spirit::soul grid.coop Never pick a fight with someone who buys ink by the barrel, nor try buy a hacker who makes money by the megahash From juan.g71 at gmail.com Sat Mar 5 13:01:38 2016 From: juan.g71 at gmail.com (juan) Date: Sat, 5 Mar 2016 18:01:38 -0300 Subject: participation in sensor networks In-Reply-To: <56DB4460.8090007@pilobilus.net> References: <20160303133414.74CCDA06DBB@palinka.tinho.net> <20160304120616.GF2300@sivokote.iziade.m$> <56DB20B8.2010909@pilobilus.net> <56db2355.8e4a370a.21598.3c01@mx.google.com> <56DB4460.8090007@pilobilus.net> Message-ID: <56db4971.c152370a.3c27b.4c42@mx.google.com> On Sat, 5 Mar 2016 15:41:04 -0500 Steve Kinney wrote: > > Universal surveillance enables abuses of State power only when > access to collected data is restricted to State sanctioned actors. Yeah well. The obvious assumption(fact) is that surveillance is carried by the state and its proxies and only they have access to the data. Which is exactly what's happening now. Oh, and not only they have access to the data, they also have access to the guns. So the more data they have, the more damage they can cause. > When everything becomes searchable by anybody, the inability of > State sanctioned actors to conceal their activities or effectively > lie about their history and motives will inhibit their potential > for destructive action. Sorry, I'm not buying that. First, the idea that joe-six-pack is going to have access to the pentagon's satellites is sheer nonsense. And even if he somehow did he wouldn't have access to the the guns. So what good would the information be? > "Power over others" depends in large part > on secrecy, Power over others depends on guns. > while "powers of self determination" depend largely on > free and open access to information. Information is required but information alone will get you nowhere. Or more likely it would get you in jail. > In the long run, the secrecy problem will take care of itself, > because the abuses of power it enables have already killed the > State: > At least, in the sense that a trans-national State hard > wired for self destruction, defending that program by any means > necessary, is "already dead." Well, the only thing missing to prove that claim is...evidence. > > :o) > > From doricuo6 at hartfordbrass.com Sat Mar 5 07:39:50 2016 From: doricuo6 at hartfordbrass.com (Elinor Staton) Date: Sat, 5 Mar 2016 19:09:50 +0330 Subject: Embarrassed of a locker room issue? Then add some inches to him. Message-ID: <000d01d176f5$417ea920$6400a8c0@doricuo6> Since your early childhood you were embarrassed of the size of your little friend? Now you can overcome your fear by enlarging it to the needed extend and get the desired confidence.   Why don't you click -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 695 bytes Desc: not available URL: From admin at pilobilus.net Sat Mar 5 17:22:30 2016 From: admin at pilobilus.net (Steve Kinney) Date: Sat, 5 Mar 2016 20:22:30 -0500 Subject: Unredacted SecureDrop 0.3.4 audit report Message-ID: <56DB8656.4030406@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 An independent audit found a substantial deficiency in one of the dependencies of the SecureDrop document submission / management protocol. SecureDrop gave the devs time to fix it before publishing, but so far the issue remains unresolved: Publishing the unredacted SecureDrop 0.3.4 audit report https://freedom.press/blog/2015/12/publishing-unredacted-securedrop- 034-audit-report vs. https://tinyurl.com/hgeyab8 FTA: SecureDrop uses OSSEC, a popular open source host-based intrusion detection system (HIDS). The OSSEC architecture consists of a single central server, called the Manager, which monitors one or more systems. The monitored systems have programs called Agents, which collect a variety of information and forward it to the Manager for analysis and correlation. The Manager and the Agents may communicate with one of two protocols: "syslog" or "secure". The "secure" protocol is a custom crypto protocol based on shared secret keys that are set up during OSSEC deployment. NCC Group reviewed the custom protocol and found two serious issues in its cryptographic design: Protocol messages are encrypted with the shared secret key using Blowfish in CBC mode. Unfortunately, the protocol uses a static initialization vector (IV) to encrypt and decrypt all messages. This essentially reduces CBC mode to ECB mode and fails to achieve semantic security. Protocol messages are not authenticated. Each message includes an MD5 hash of the plaintext payload with the encrypted content, but this is not a strong authenticator. Among other things, it violates Moxie Marlinspike's "Cryptographic Doom Principle". For more detail, see the finding in the unredacted audit report. NCC Group did not take the time to investigate a proof of concept (PoC) attack based on this vulnerability, but that is not surprising given the limited duration of their engagement and the fact that their focus was on SecureDrop, not OSSEC. Nonetheless, these are serious cryptographic design flaws that could lead to a practical attack in the future. We encourage all OSSEC users to examine their current deployments, consider the level of exposure of any OSSEC "secure" protocol traffic to potential adversaries, and make changes accordingly. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQIcBAEBAgAGBQJW24ZTAAoJEDZ0Gg87KR0LJHAP/ihVjalG8ZNc8kvIQxgSCRro DtwCzakkNSxPzCSjX28UMhDy2nnBkz6IIBBcMP7A7p40lQHKmRRhg34ceGgk1rOw 1SGrPZWeZCZH+s2T30mGHZDGskpe6tmnlZTajbZ5oEe3qSNW1soRqsYTa3K4vNC6 ezPV28SNIwUaqKZ3JWu1Z+QMnHW6lLsbmIpGmCRByAI5tYOYoxpyXEoxRb4sA9Iq //B1vJgfhkAdE7eES2aVGwAidOfPGUHi6M3mWy5TP912yMUok9YW2kyIqDisBpjr BMJRutGCiK9ih0OFiJig/kcHpENGROQVtD0cAa7mEJhBLUB/Mt4brYHT2+XQFSC6 rpjEBbm4iHr+0mn4JBZC+Op4ImJpU8Bhx26EaDU2t5xVZ3m3GFMTQal7PuMieZS+ 05vKIFHMJhkg0tOS6SqC62wKYuxy9XcvlaUlpXcAfnKn9E3tYXP1P2Ez5Ahuqhml WXiIX+JCbE9nLcvuK6IFUvTvWe62JTP3IXv38vP1tFi7j2OWlnYd5PsVsvJecT/U ibiUb/uw8gdsmLHmcAXEJ/YgWsIC7zOul8ORL7MGwa2rcytOf8i3ckUbA6dGM9iA 6nzM//V/H91DsHicngwZ9+zMQRtm3vmp+biXPsSv+fXGdRhxOGiePbrbeeEuVvqq d67XJxo5T/IpitF2L4j0 =gRP3 -----END PGP SIGNATURE----- From grarpamp at gmail.com Sun Mar 6 01:27:54 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 6 Mar 2016 04:27:54 -0500 Subject: Bitcoin: A Miner Problem In-Reply-To: <20160306063159.GA2459@sivokote.iziade.m$> References: <20160304084923.GE2300@sivokote.iziade.m$> <20160306063159.GA2459@sivokote.iziade.m$> Message-ID: On 3/6/16, Georgi Guninski wrote: > social engineered and/or owned again. > Hope this is wrong. Nobody's going to want to pay BTC over 3% CC fee in retail. Dark money can tolerate more fees, but how much? We still see in and out at up to 10% local and washing at 2*3%, plus the 4+*3% real world retail tolerance txfee limit, is 38+% the dark max before they too bail out? So eventually, real soon now... - Every bitcoin user must realize they have to volunteer, develop, sell at cost, and put a $25 open mining chip in their system. This kills mining profit cartels and gives top end network tx capacity (nodecount) beyond visa+mc+banks... after tuning network protocols. (Hypothesis of mining requiring / enabled by profit, instead of just to keep the net up so your unspent value can play, was likely design flaw... lots of networks operate fine on volunteerism without pay.) - Tx scaling must be solved into that new distributed capacity. - Blockchain disk storage must be distributed into distributed protocol archives, possibly with aging by requiring unspents be spent past archive checkpoints. More protocol work for this. In all this, nobody can have their keys invalidated, diminished in value, or be required to push their unspent through a realworld exchange into some other value (black and private market cap, whether entity or personal, are now huge and will refuse to play that). Nor is it known if and for how many hours flag days could be done. All seems sortof deadlocked right now... Popcorn at the halfening for sure :) I'm hodling. From admin at pilobilus.net Sun Mar 6 05:08:10 2016 From: admin at pilobilus.net (Steve Kinney) Date: Sun, 6 Mar 2016 08:08:10 -0500 Subject: participation in sensor networks In-Reply-To: <56db4971.c152370a.3c27b.4c42@mx.google.com> References: <20160303133414.74CCDA06DBB@palinka.tinho.net> <20160304120616.GF2300@sivokote.iziade.m$> <56DB20B8.2010909@pilobilus.net> <56db2355.8e4a370a.21598.3c01@mx.google.com> <56DB4460.8090007@pilobilus.net> <56db4971.c152370a.3c27b.4c42@mx.google.com> Message-ID: <56DC2BBA.9040909@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 03/05/2016 04:01 PM, juan wrote: > On Sat, 5 Mar 2016 15:41:04 -0500 Steve Kinney > wrote: > > >> >> Universal surveillance enables abuses of State power only >> when access to collected data is restricted to State >> sanctioned actors. > > Yeah well. The obvious assumption(fact) is that surveillance > is carried by the state and its proxies and only they have > access to the data. Which is exactly what's happening now. > > Oh, and not only they have access to the data, they also have > access to the guns. So the more data they have, the more > damage they can cause. "The guns" tend to backfire: Common or garden variety capital murders by police officers in the U.S. has re-ignited the Civil Rights movement, for example. Putting that big black genii back in the bottle is a job for covert political warfare via propaganda, deception and PsyOps. The outcome of every revolution I have studied was determined before the first shot was fired. The real damage enabled by mass surveillance in State and Corporate hands includes: Fine tuning and targeting of propaganda in near realtime to achieve maximum influence. Early detection and proactive response to disrupt and co-opt "trending" populist and radical factions. Automated social network mapping and behavior analysis in support of political warfare. >> When everything becomes searchable by anybody, the inability >> of State sanctioned actors to conceal their activities or >> effectively lie about their history and motives will inhibit >> their potential for destructive action. > > > Sorry, I'm not buying that. First, the idea that joe-six-pack > is going to have access to the pentagon's satellites is sheer > nonsense. And even if he somehow did he wouldn't have access > to the the guns. So what good would the information be? Not so much Joe Six Pack as Jane Citizen Journalist. Up to a point of diminishing returns, every time "the guns" are used against her, a dozen more of her appear. As the point of diminishing returns for that function approaches, civil uprisings in response to State violence become likely. >> "Power over others" depends in large part on secrecy, > > Power over others depends on guns. The most important single item of State propaganda against populist and radical politics: Power over others depends on guns. Any challenge to State power that depends primarily on armed conflict has a single, certain outcome: Victory for the State. Again, the outcome of a revolution is determined before the first shot is fired. Building a large base of popular support and a network of ideologically committed cadres is the key to success, and the principal objective of State political warfare is to prevent this from happening. Naive wannabe anarchists who want to "go directly to guns, do not pass the hat, do not collect 200 supporters" only provide the State with a handy means of discrediting its more /effective/ opponents. >> while "powers of self determination" depend largely on free >> and open access to information. > Information is required but information alone will get you > nowhere. Or more likely it would get you in jail. > > >> In the long run, the secrecy problem will take care of >> itself, because the abuses of power it enables have already >> killed the State: At least, in the sense that a >> trans-national State hard wired for self destruction, >> defending that program by any means necessary, is "already >> dead." > > > Well, the only thing missing to prove that claim > is...evidence. Evidence means nothing without context; information that is not actionable is not intelligence. Step one, know your adversary. Who and what IS the State, and why is it so toxic? Some clues from the Harvard National Security Journal here: National Security and Double Government by Michael J. Glennon http://harvardnsj.org/wp-content/uploads/2014/01/Glennon-Final.pdf :o) -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQIcBAEBAgAGBQJW3Cu2AAoJEDZ0Gg87KR0LmSAQAK4nS9NJ3k87dH8ODw3eH0O+ oNxhX6us0RKkq04jo8bn4mi/DzdzPmWYfxsyhJlgx2Gzp8+0/wWL35Qu7Tcj87la gfTMwUYIw6an+y1xztn4DhTYRliRybLj6egs9JWLNLm7y3Rp80Z5GmtPhpeiCjwQ XGq+qZzepKak9LDGSVogrPDlfKMlH8hvJpccf5TWKoNU+R+RaHLOlS0cmz5grNwd JfNv3opRZisueeqme93MlWBS2c4Y9fAT4/U+lZoLt/Ye8R+wTI4RbPxcHVtfFruh I9jUrqoZNZ9BQTv6NZDuWU4laMFFXKmXF+nVW+JXx3Y40DXm8qb65bw2lvyLQ3QF wD6Ht+TFCWuSYPAO9qsC8LN4APtRKUP7/pkmHSRMtroGLjgUx6xo5/gYSVl6XDwE fQG2578tNUsSNRt0skXJysXz/NShc07MAQGR7/+uejvcUPry1CcSsbbpYfSIk7UI Xmk6MVLlx6RPUxH1rJNO7PVEf515ro+67xHx2d/Bv/ABFT9cNXZ/c962nglp+T5D 6ILcvaJRqVhvgUcAy8psVbawmYWN55DMceM9KOM5eAIEWvW3XHFaj7+uwKBycZT8 SxImCUW/MSPhugvTbx/SliIKS7hnUG0BpcjwvsRD+5JHF+Tc7JNSH978qXRJzt+0 z42HWVWYmP/rv4feXy5u =MmU2 -----END PGP SIGNATURE----- From guninski at guninski.com Sat Mar 5 22:31:59 2016 From: guninski at guninski.com (Georgi Guninski) Date: Sun, 6 Mar 2016 08:31:59 +0200 Subject: Bitcoin: A Miner Problem In-Reply-To: References: <20160304084923.GE2300@sivokote.iziade.m$> Message-ID: <20160306063159.GA2459@sivokote.iziade.m$> On Sat, Mar 05, 2016 at 02:45:27PM -0500, grarpamp wrote: > > Isn't this "cartel" the "free market" in juan's anarchist utopia? > .... > People will eventually realize that they, as millions of users, are the ones > who should be doing the mining, all independantly under a known > and necessary code of poolsize limiting, a vested stake in preserving > value of their own assets and economy, thus distributed impossible to > be abused by large pools / entity cabal miners. Most users don't get that > yet. Though the 21 of things is a step towards that. > Don't expect people to change for good in real life and likely even in bitcoin. Probably the best can happen is they get pissed off because of starvation, make a revolution, then soon after get social engineered and/or owned again. Hope this is wrong. From carimachet at gmail.com Sun Mar 6 00:04:03 2016 From: carimachet at gmail.com (Cari Machet) Date: Sun, 6 Mar 2016 09:04:03 +0100 Subject: WIRED: The Future of Wi-Fi Is 10,000 Times More Energy Efficient Message-ID: Engineering students have discovered a way to reflect Wi-Fi packets instead of broadcasting them. http://www.wired.com/2016/03/future-wi-fi-10000-times-energy-efficient/ -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 284 bytes Desc: not available URL: From admin at pilobilus.net Sun Mar 6 06:25:09 2016 From: admin at pilobilus.net (Steve Kinney) Date: Sun, 6 Mar 2016 09:25:09 -0500 Subject: Postscript re popular vs. State power In-Reply-To: <56DC2BBA.9040909@pilobilus.net> References: <20160303133414.74CCDA06DBB@palinka.tinho.net> <20160304120616.GF2300@sivokote.iziade.m$> <56DB20B8.2010909@pilobilus.net> <56db2355.8e4a370a.21598.3c01@mx.google.com> <56DB4460.8090007@pilobilus.net> <56db4971.c152370a.3c27b.4c42@mx.google.com> <56DC2BBA.9040909@pilobilus.net> Message-ID: <56DC3DC5.8010704@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 >> Well, the only thing missing to prove that claim >> is...evidence. > > Evidence means nothing without context; information that is > not actionable is not intelligence. Step one, know your > adversary. Who and what IS the State, and why is it so toxic? > Some clues from the Harvard National Security Journal here: > > National Security and Double Government by Michael J. Glennon > > http://harvardnsj.org/wp-content/uploads/2014/01/Glennon-Final.pdf Postscript: > The State maintains people on payroll whose job is to study popular uprisings and revolutions, the better to direct those whose job is to put them down by force. Manuals written for the State's own cadres incidentally provide instruction for those who are interested in starting an 'insurgency' of their own: https://publicintelligence.net/usarmy-revolution-insurgency-studies/ Notes: Volumes 2 and 3 are of the most interest. Volume 3 incorporates both historical fact and Big Lie propaganda into its narrative, as required for its contemporary U.S. military audience. :o) -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQIcBAEBAgAGBQJW3D3DAAoJEDZ0Gg87KR0LhOIQANgNiF6LnaKDPDPYvynqOLvs b/uAOJBEjlCnWzBRqRBL4Sj7tscoW7hdsnXv8ID4TMaxmwoRlywS9Et31C4iz5Ny KY30QBvtkuHIHeiYcvv01TfiiwkUWJ7tABuNeNxMJjW447Z4Iacv5xZAGCoPt3ne 3YsRpj/Tpk9j+1Yb+i/yD8tFpM0stKcjMFA4m01t7VoePWzZWJ3GDjwV4O5AKxxt uuja6+PtKLAox3e0qJ+rcNC2Q59HbXZpCEbjX1GEQmnLNLrdRzHrCfVi6sDkuA95 a8/tESLBaMkM7A85qpf1FGzSj3gLjRFMDghBMsd8vx3RMQcsnE1skLAfPTy7OWGj 01qHOz4WR5NHTvhMXlC3/p5q4lgaCswdcQOkRlTLaiJxV9DwSr001vrAD86An13j LQ3K3YQSfCKiDqen/++9g3G80MuLmj3NkwsqDPM+UIFKLZh5kCIwwWfm5K2ETWww t8uuH/vhvwi6UEXS7He+T9Pk3cSrKV/YtwbEOlhinkDeHn5hEKcLH/8/VxtJljG+ YToY0nxJLZrJ2jdjwyPqGvBtsdR8R1Il6o602ywPs9ikbLORn72RI3ukOH70KMOu cuOplCNgNrQBeF/U9NJR4B2Tue24dYoj284UNxtZx04KVkEXJfK3o/ieHRCrqrlF uPM5Z6bZ99DKs1dxUQEB =IZ0G -----END PGP SIGNATURE----- From jya at pipeline.com Sun Mar 6 07:28:55 2016 From: jya at pipeline.com (John Young) Date: Sun, 06 Mar 2016 10:28:55 -0500 Subject: The rewards of frenzied comsec-shopping should be a pardon for Snowden Message-ID: NY Times surmises NSA does not want to reveal its crypto cracking capabilities, that the FBI hopes unskilled users will make exploitable mistakes implementing, that DoD hopes to exploit holes, doubt and errors rather than see them corrected, that hackers and corporations expect to continue to sell 0-days for high prices, that Obama staff has mixed views of weak and strong comsec, that the US hacks both friends and foes, engages in cyber defense and offense, all this feeding opportunistic and obliging media fanning flames with anonymous sources, secret briefings, revolving door job offers of op-eds, essays, speeches, testimonies and spy-approved tattle-tales. Essential to crypto fire-storm is fueling a fire-sale Snowden 0-day attribution. The rewards of this frenzied comsec-shopping should be a pardon for Snowden, along with a life-time free travel in search of anywhere crypto is not needed, just his word comms are good to go naked. From agave at openmailbox.org Sun Mar 6 08:20:54 2016 From: agave at openmailbox.org (agave) Date: Sun, 6 Mar 2016 11:20:54 -0500 Subject: Distributed protocols that combat economy of scale In-Reply-To: <3928149.NAsv7Jq6H8@lapuntu> References: <3928149.NAsv7Jq6H8@lapuntu> Message-ID: <20160306112054.3ca17154@bristlecone> On Sun, 06 Mar 2016 16:41:05 +0100 rysiek wrote: > Hi, > > as "A Miner Problem" shows, even a distributed, p2p solution like > BitCoin suffers from a secondary centralisation flaw. Simply put, > economy of scale lets the biggest player or a cartel of thoise > basically undermine the "decentralized" part and take control over > the network. > > A similar thing has happened with e-mail and GMail. GMail basically > dictates the rules in the e-mail world, simply because they're the > largest and have the most users. Again, economy of scale is to blame. > > So let me pose a question here: is it possible to design a protocol > that does not succumb to economy of scale-based secondary > centralisation? Is it possible to design a protocol that does not > lend itself to economy of scale? > There's always things like TorChat for instant messaging and IPFS for content distribution. There's no concept of any centralisation in either - they're completely peer-to-peer. I'm not sure why you drew a comparison to e-mail - it's inherently centralized, just among several servers. From grarpamp at gmail.com Sun Mar 6 10:42:11 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 6 Mar 2016 13:42:11 -0500 Subject: [Cryptography] EFF amicus brief in support of Apple In-Reply-To: <2CF1E7EA-B2F5-4CBA-98BC-63CF511EB96E@lrw.com> References: <20160304220134.81297.qmail@ary.lan> <20160306103307.5fdd9f98@jabberwock.cb.piermont.com> <2CF1E7EA-B2F5-4CBA-98BC-63CF511EB96E@lrw.com> Message-ID: > It's time we stopped believing that there's something magic about open > source software. > There's no way the average person can build their own software from > source [...] forcing your 80 year old grandfather who used to be a chef to audit a > few million lines of source code, compile them, and load them onto > his phone before he can make a phone call isn't going to help No. See, those are the real problems... mindset. You all who say this type of talk are disbelieving apologists still trying to advance control, profit, babysitting, trust us we know better, etc... over others. No one is asserting that opensource is currently better or magic. However, when a billion humans around the world *may* look at and even participate in the hw and sw if they wanted to, versus only 25 people locked in the coderoom of a megacorp whose primary raison d etre is by definition making money... the possible odds that it *could* be better and even a solution to everything as you say... are in fact better. Because it's open, not closed. And even if that doesn't happen, then with opensource there are *still* just 25 talented people involved in and hacking on it... openly, not closed. Nor do I see you offering to personally help those grandfathers around you get their phone / cpu up and running when they understand *why* they want to use the open hw and sw, but come asking some human they know who can help the details. Or setting up some local collectives that do so openly for fun. From grarpamp at gmail.com Sun Mar 6 11:30:19 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 6 Mar 2016 14:30:19 -0500 Subject: [Cryptography] EFF amicus brief in support of Apple In-Reply-To: <56DC5D0E.3070102@sonic.net> References: <20160304220134.81297.qmail@ary.lan> <20160306103307.5fdd9f98@jabberwock.cb.piermont.com> <56DC5D0E.3070102@sonic.net> Message-ID: On 3/6/16, Ray Dillinger wrote: > It is possible that a profit center can be identified outside The profit center, and moreover even change for good in other areas, is the Boards and Officers of Apple, Google, Microsoft and so on... standing up and offering additional value... "Hey world, we are now going fully open hardware and software and integrating security and right to privacy models into all our products. Join us." These are the biggest corporations on Earth, and it's time for the grand experiment of open, secure, and private to begin. It's not insane, it's new. From juan.g71 at gmail.com Sun Mar 6 10:30:24 2016 From: juan.g71 at gmail.com (juan) Date: Sun, 6 Mar 2016 15:30:24 -0300 Subject: Bitcoin: A Miner Problem In-Reply-To: References: <20160304084923.GE2300@sivokote.iziade.m$> Message-ID: <56dc777c.c8908c0a.929a0.ffffaeee@mx.google.com> On Sat, 5 Mar 2016 14:45:27 -0500 grarpamp wrote: > On 3/4/16, Georgi Guninski wrote: > >> http://qntra.net/2016/03/a-miner-problem/ > > Isn't this "cartel" the "free market" in juan's anarchist utopia? > > Yes. That's supposed to happen. No, this isn't the free market. For starters, it should be obvious that bitcoin doesn't operate in a free market. If we had a free market in money we wouldn't need bitcoin... Bitcoin is more like a black market. Similar to the black market for, say, some drugs the gov't doesn't like. And actually, bitcoin is more like a single a company, not a 'market'. Finally, allegedly, some people are 'exploiting' a 'known flaw' in the 'bitcoin protocol'. That's not 'a market'. 'Utopian' anarchy assumes that most people behave honestly. And service providers do what they are supposed to do. In this case miners are supposed to 'secure' the network, not attack it. If they attack it then we are not dealing with any kind of 'utopian anarchy', but with ordinary fraud. > it's also supposed to happen > that there will be many independant brains out there that introduce > opposing forces. But traditional sheeple don't exactly spin up as > independant actors quickly when anarchism is suddenly dropped > on them, thus they get raped for a while till they do. > > The one or two past situations over 50% were voluntarily rebalanced > by pools and miners. However since pools are still too uneven few and > large multi percent chunks the possible combinations and motives > aren't ideal. People will eventually realize that they, as millions > of users, are the ones who should be doing the mining, all > independantly under a known and necessary code of poolsize limiting, > a vested stake in preserving value of their own assets and economy, > thus distributed impossible to be abused by large pools / entity > cabal miners. Most users don't get that yet. Though the 21 of things > is a step towards that. > > They also don't seem to get that ineffective bitcoin leadership > (for those that don't believe in the anarchist blockchain as a > possibility itself) is repressing and destroying their value and > utility. From grarpamp at gmail.com Sun Mar 6 12:38:46 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 6 Mar 2016 15:38:46 -0500 Subject: [Cryptography] EFF amicus brief in support of Apple In-Reply-To: <20160306142028.79be0d1f@jabberwock.cb.piermont.com> References: <20160304220134.81297.qmail@ary.lan> <20160306103307.5fdd9f98@jabberwock.cb.piermont.com> <2CF1E7EA-B2F5-4CBA-98BC-63CF511EB96E@lrw.com> <20160306142028.79be0d1f@jabberwock.cb.piermont.com> Message-ID: On 3/6/16, Perry E. Metzger wrote: > I'm a practical person. I want systems that work, not that provide > some sort of philosophical warm fuzzies. > Economies of scale are real things. It is nice for a hundred million > people to be able to download patches to their systems automatically > without even having to think about it or understand what a patch is > It is nice for people to be able to download a > game or a to-do application without having to personally audit Open and secure does not preclude any of these things. > Where's the evidence for your assertion? What is your potential when you're chained to a wall? With open, possibility is a right of others, with closed, you forclose it upon them, and likely to serve yourself. That may be part of the potential. > If you look at Android vs. > iOS, iOS, with its much more restrictive environment, seems (as a > practical matter) to be more secure. iOS/Android haven't even hit 10 years old and neither they nor their underlying platforms truly have openness in their core ethos so they can't really be contrasted against each other in the suggested way. > What you're suggesting is impossible. There is no way any of us The general reply is that the overall model of open and all these related things simply hasn't had enough time to develop, execute, and be evaluated in a world that has only known closed. However one thing is of absolute certainty: believing that getting off the rock is impossible... will never get you off the rock. From rysiek at hackerspace.pl Sun Mar 6 07:19:05 2016 From: rysiek at hackerspace.pl (rysiek) Date: Sun, 06 Mar 2016 16:19:05 +0100 Subject: Once again: Tor timing attacks and a Tor confession In-Reply-To: References: <20160229074429.GA2571@sivokote.iziade.m$> <56D443FA.4010609@pilobilus.net> Message-ID: <1570987.9yU48PruzS@lapuntu> Hi, Dnia poniedziałek, 29 lutego 2016 16:57:02 grarpamp pisze: > > My preferred solution: Defund the the agencies that can and > > almost certainly do defeat all current network anonymity > > protocols. My program for accomplishing this objective: Wait. > > They are hell bend on self destruction and Nature will provide. > > You'll be dead by then. It's more fun to risk dying now ;) My personal solution of choice would also be defunding, but I believe this needs some help to happen. > Tor is looking at some forms of network fill traffic, which may > or may not be integrated to the entire network wide sense, or > useful in your own designs... I was thinking (and I'm sure somebody else also got the idea) that maybe combining ideas from Tor with ideas from BotTorrent might be a way to go. Distribute the stuff people access among people accessing it and it becomes harder to do timing attacks, and the network might work a bit faster too. However, it's basically running full speed into one of the two hard problems in IT -- cache invalidation. So, I don't know. -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From rysiek at hackerspace.pl Sun Mar 6 07:41:05 2016 From: rysiek at hackerspace.pl (rysiek) Date: Sun, 06 Mar 2016 16:41:05 +0100 Subject: Distributed protocols that combat economy of scale Message-ID: <3928149.NAsv7Jq6H8@lapuntu> Hi, as "A Miner Problem" shows, even a distributed, p2p solution like BitCoin suffers from a secondary centralisation flaw. Simply put, economy of scale lets the biggest player or a cartel of thoise basically undermine the "decentralized" part and take control over the network. A similar thing has happened with e-mail and GMail. GMail basically dictates the rules in the e-mail world, simply because they're the largest and have the most users. Again, economy of scale is to blame. So let me pose a question here: is it possible to design a protocol that does not succumb to economy of scale-based secondary centralisation? Is it possible to design a protocol that does not lend itself to economy of scale? -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From agave at openmailbox.org Sun Mar 6 13:52:13 2016 From: agave at openmailbox.org (agave) Date: Sun, 6 Mar 2016 16:52:13 -0500 Subject: Distributed protocols that combat economy of scale In-Reply-To: <10061069.QLp78G3N7N@lapuntu> References: <3928149.NAsv7Jq6H8@lapuntu> <20160306112054.3ca17154@bristlecone> <10061069.QLp78G3N7N@lapuntu> Message-ID: <20160306165213.398e4310@bristlecone> On Sun, 06 Mar 2016 22:13:41 +0100 rysiek wrote: > It's not centralized in a way Facebook is, for example. While e-mail > was obviously never a p2p system, it was not a centralized system. > The idea was decentralized, federated among *many* servers. > Oh, I see what you mean. > Such was also the idea in BitCoin. As we can see, there's a secondary > (not protocol-level) centralisation happening there. Cartels emerge, > because economy of scale makes them viable, and indeed profitable. > Hmm, I'm not sure if there's any particular way to solve that problem for BitCoin. I can't imagine any ways of establishing consensus among a completely decentralized protocol other than by popular consensus of the participants, and popular consensus can be manipulated easily as the post you mentioned shows. Maybe decentralization ought to be left to communications only? From juan.g71 at gmail.com Sun Mar 6 12:02:34 2016 From: juan.g71 at gmail.com (juan) Date: Sun, 6 Mar 2016 17:02:34 -0300 Subject: participation in sensor networks In-Reply-To: <56DC2BBA.9040909@pilobilus.net> References: <20160303133414.74CCDA06DBB@palinka.tinho.net> <20160304120616.GF2300@sivokote.iziade.m$> <56DB20B8.2010909@pilobilus.net> <56db2355.8e4a370a.21598.3c01@mx.google.com> <56DB4460.8090007@pilobilus.net> <56db4971.c152370a.3c27b.4c42@mx.google.com> <56DC2BBA.9040909@pilobilus.net> Message-ID: <56dc8d1c.cfdc8c0a.e2bc8.ffffb60c@mx.google.com> On Sun, 6 Mar 2016 08:08:10 -0500 Steve Kinney wrote: me : > > Oh, and not only they have access to the data, they also have > > access to the guns. So the more data they have, the more > > damage they can cause. > you : > "The guns" tend to backfire: Common or garden variety capital > murders by police officers in the U.S. has re-ignited the Civil > Rights movement, I don't think so. There may have been some backlash caused by 'excessive' police brutality, but overall the state's grip keeps tightening. And surveillance is a key factor. Also, if they kill a bit too many people and that hurts their 'public relations' efforts, all they have to do is kill a bit less people. But it's not like the US state killers are going to surrender their guns any time soon. > > The outcome of every revolution I have studied was determined > before the first shot was fired. The real damage enabled by mass > surveillance in State and Corporate hands includes: > > Fine tuning and targeting of propaganda in near realtime to > achieve maximum influence. > > Early detection and proactive response to disrupt and co-opt > "trending" populist and radical factions. > > Automated social network mapping and behavior analysis in support > of political warfare. Yes, that's part of the damage. Given those problems (and there are more), how can you 'welcome' total surveillance? > > Sorry, I'm not buying that. First, the idea that joe-six-pack > > is going to have access to the pentagon's satellites is sheer > > nonsense. And even if he somehow did he wouldn't have access > > to the the guns. So what good would the information be? > > Not so much Joe Six Pack as Jane Citizen Journalist. Up to a > point of diminishing returns, every time "the guns" are used > against her, a dozen more of her appear. One would think that exactly the opposite happens. It's basic incentives... If doing X gets people jailed, maimed or killed, then people are less likely to do X, not more likely. > As the point of > diminishing returns for that function approaches, civil uprisings > in response to State violence become likely. That's nice wishful thinking but it doesn't address the original point : why should be mass surveillance be welcomed? > > >> "Power over others" depends in large part on secrecy, > > > > Power over others depends on guns. > > The most important single item of State propaganda against > populist and radical politics: Power over others depends on guns. That's a basic fact. It is THE basic fact of 'political theory'. I could in turn retort that trying to obscure that fact is propaganda... Anyway, I should have been more precise. State power comes from guns and organization. People who go against the state are ultimately facing an efficient organization of killers. Victims of the state are outgunned and outnumbered. It should be obvious that total surveillance on the hands of such organization is very problematic. > > Any challenge to State power that depends primarily on armed > conflict has a single, certain outcome: Victory for the State. That depends on particular circumstances. I wasn't primarily advocating armed conflict anyway... > Again, the outcome of a revolution is determined before the first > shot is fired. Building a large base of popular support and a > network of ideologically committed cadres is the key to success, I agree. > and the principal objective of State political warfare is to > prevent this from happening. Well, yes. And intimidation and outright violence are pretty useful tools. It's not just 'propaganda' (although propaganda does play an important role) > > Naive wannabe anarchists who want to "go directly to guns, do not > pass the hat, do not collect 200 supporters" only provide the > State with a handy means of discrediting its more /effective/ > opponents. Like I said I should have mentioned that organization is the other source of state power, even more effective than guns if you wish. So, in order to counter the state organization some sort of coordination is required... > > >> while "powers of self determination" depend largely on free > >> and open access to information. > > Information is required but information alone will get you > > nowhere. Or more likely it would get you in jail. > > > > > >> In the long run, the secrecy problem will take care of > >> itself, because the abuses of power it enables have already > >> killed the State: At least, in the sense that a > >> trans-national State hard wired for self destruction, > >> defending that program by any means necessary, is "already > >> dead." > > > > > > Well, the only thing missing to prove that claim > > is...evidence. > > Evidence means nothing without context; Come on Steve =) You seem to believe that the state is done for because of its 'internal contradictions' or something like that but the evidence shows exactly the opposite. State power keeps growing. And the surveillance mechanisms you said you 'welcome' play an important role in extending state power, not limiting it. > information that is not > actionable is not intelligence. Step one, know your adversary. > Who and what IS the State, and why is it so toxic? Some clues > from the Harvard National Security Journal here: I don't think I need the harvard security' journal to teach what the state is, but I'll take a look anyway. Thanks. Meanwhile you can provide evidence supporting this claims "the abuses of power [surveillance?] enables have already killed the State" The state is alive and kicking. "a trans-national State hard wired for self destruction, defending that program by any means necessary, is "already dead." Fact is, the most powerful nation states, 'led' by the american nation state can morph into a transnational state. Allegedly they already are morphing. And they are not 'self destructing' at all. They are increasing their power. Sorry about not sharing your optimism, but the facts don't lend themselves to any optimistic twisting. > > National Security and Double Government by Michael J. Glennon > > http://harvardnsj.org/wp-content/uploads/2014/01/Glennon-Final.pdf > > :o) > > > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v2.0.22 (GNU/Linux) > > iQIcBAEBAgAGBQJW3Cu2AAoJEDZ0Gg87KR0LmSAQAK4nS9NJ3k87dH8ODw3eH0O+ > oNxhX6us0RKkq04jo8bn4mi/DzdzPmWYfxsyhJlgx2Gzp8+0/wWL35Qu7Tcj87la > gfTMwUYIw6an+y1xztn4DhTYRliRybLj6egs9JWLNLm7y3Rp80Z5GmtPhpeiCjwQ > XGq+qZzepKak9LDGSVogrPDlfKMlH8hvJpccf5TWKoNU+R+RaHLOlS0cmz5grNwd > JfNv3opRZisueeqme93MlWBS2c4Y9fAT4/U+lZoLt/Ye8R+wTI4RbPxcHVtfFruh > I9jUrqoZNZ9BQTv6NZDuWU4laMFFXKmXF+nVW+JXx3Y40DXm8qb65bw2lvyLQ3QF > wD6Ht+TFCWuSYPAO9qsC8LN4APtRKUP7/pkmHSRMtroGLjgUx6xo5/gYSVl6XDwE > fQG2578tNUsSNRt0skXJysXz/NShc07MAQGR7/+uejvcUPry1CcSsbbpYfSIk7UI > Xmk6MVLlx6RPUxH1rJNO7PVEf515ro+67xHx2d/Bv/ABFT9cNXZ/c962nglp+T5D > 6ILcvaJRqVhvgUcAy8psVbawmYWN55DMceM9KOM5eAIEWvW3XHFaj7+uwKBycZT8 > SxImCUW/MSPhugvTbx/SliIKS7hnUG0BpcjwvsRD+5JHF+Tc7JNSH978qXRJzt+0 > z42HWVWYmP/rv4feXy5u > =MmU2 > -----END PGP SIGNATURE----- From juan.g71 at gmail.com Sun Mar 6 13:34:42 2016 From: juan.g71 at gmail.com (juan) Date: Sun, 6 Mar 2016 18:34:42 -0300 Subject: Distributed protocols that combat economy of scale In-Reply-To: <3928149.NAsv7Jq6H8@lapuntu> References: <3928149.NAsv7Jq6H8@lapuntu> Message-ID: <56dca2b0.44e58c0a.38fdd.7961@mx.google.com> On Sun, 06 Mar 2016 16:41:05 +0100 rysiek wrote: > Hi, > > as "A Miner Problem" shows, Sorry is there any other source/analysis for popescu's claims? > even a distributed, p2p solution like > BitCoin suffers from a secondary centralisation flaw. Actually, if the cartel exists, what it shows is a flaw in the bitcoin protocol. A look at the original bitcoin paper suggests that the author(s) didn't bother too much with the network side of things. Didn't forsee the use of specialized hardware. Et cetera. "The network itself requires minimal structure." "The network is robust in its unstructured simplicity." Looks like it isn't... > Simply put, > economy of scale lets the biggest player or a cartel of thoise > basically undermine the "decentralized" part and take control over > the network. > > A similar thing has happened with e-mail and GMail. Good example. Because google isn't the result of 'economy of scale' but it's a great example of what the state can accomplish using a 'private' facade. > GMail basically > dictates the rules in the e-mail world, simply because they're the > largest and have the most users. Again, economy of scale is to blame. > > So let me pose a question here: is it possible to design a protocol > that does not succumb to economy of scale-based secondary > centralisation? Is it possible to design a protocol that does not > lend itself to economy of scale? > From juan.g71 at gmail.com Sun Mar 6 13:53:20 2016 From: juan.g71 at gmail.com (juan) Date: Sun, 6 Mar 2016 18:53:20 -0300 Subject: Postscript re popular vs. State power In-Reply-To: <56DC3DC5.8010704@pilobilus.net> References: <20160303133414.74CCDA06DBB@palinka.tinho.net> <20160304120616.GF2300@sivokote.iziade.m$> <56DB20B8.2010909@pilobilus.net> <56db2355.8e4a370a.21598.3c01@mx.google.com> <56DB4460.8090007@pilobilus.net> <56db4971.c152370a.3c27b.4c42@mx.google.com> <56DC2BBA.9040909@pilobilus.net> <56DC3DC5.8010704@pilobilus.net> Message-ID: <56dca70f.b1178c0a.f7252.ffffc136@mx.google.com> On Sun, 6 Mar 2016 09:25:09 -0500 Steve Kinney wrote: > > National Security and Double Government by Michael J. Glennon > > > > http://harvardnsj.org/wp-content/uploads/2014/01/Glennon-Final.pdf > abstract : "U.S. national security policy is defined by the network of executive officials who manage the departments and agencies responsible for protecting U.S. national security and who, responding to structural incentives embedded in the U.S. political system, operate largely removed from public view and from constitutional constraints. " I think I already knew that. The three branches of american government? Hollywood, corporate, the military. I'm reading the article anyway, although it's far too long. Did you read it? Am I supposed to look for something in particular? From skquinn at rushpost.com Sun Mar 6 17:11:03 2016 From: skquinn at rushpost.com (Shawn K. Quinn) Date: Sun, 06 Mar 2016 19:11:03 -0600 Subject: Distributed protocols that combat economy of scale In-Reply-To: <20160306112054.3ca17154@bristlecone> References: <3928149.NAsv7Jq6H8@lapuntu> <20160306112054.3ca17154@bristlecone> Message-ID: <1457313063.6719.4.camel@moonpatrol> On Sun, 2016-03-06 at 11:20 -0500, agave wrote: > On Sun, 06 Mar 2016 16:41:05 +0100 > rysiek wrote: > > > Hi, > > > > as "A Miner Problem" shows, even a distributed, p2p solution like > > BitCoin suffers from a secondary centralisation flaw. Simply put, > > economy of scale lets the biggest player or a cartel of thoise > > basically undermine the "decentralized" part and take control over > > the network. > > > > A similar thing has happened with e-mail and GMail. GMail basically > > dictates the rules in the e-mail world, simply because they're the > > largest and have the most users. Again, economy of scale is to blame. > > > > So let me pose a question here: is it possible to design a protocol > > that does not succumb to economy of scale-based secondary > > centralisation? Is it possible to design a protocol that does not > > lend itself to economy of scale? > > > > There's always things like TorChat for instant messaging and IPFS for > content distribution. There's no concept of any centralisation in > either - they're completely peer-to-peer. I'm not sure why you drew a > comparison to e-mail - it's inherently centralized, just among > several servers. As used today, with many people using services like GMail, Hotmail, etc it could be considered centralized. However, in the sense that I can set up my own email server, and have someone email me at a given address without having to get approved by a central authority first, it is decentralized. Email doesn't even strictly require DNS to work, as there is an email address syntax (rarely used these days, but still technically valid) for addressing email directly to a given userid at a specific IP address by dotted quad. -- Shawn K. Quinn From juan.g71 at gmail.com Sun Mar 6 14:24:23 2016 From: juan.g71 at gmail.com (juan) Date: Sun, 6 Mar 2016 19:24:23 -0300 Subject: Postscript re popular vs. State power In-Reply-To: <56DC3DC5.8010704@pilobilus.net> References: <20160303133414.74CCDA06DBB@palinka.tinho.net> <20160304120616.GF2300@sivokote.iziade.m$> <56DB20B8.2010909@pilobilus.net> <56db2355.8e4a370a.21598.3c01@mx.google.com> <56DB4460.8090007@pilobilus.net> <56db4971.c152370a.3c27b.4c42@mx.google.com> <56DC2BBA.9040909@pilobilus.net> <56DC3DC5.8010704@pilobilus.net> Message-ID: <56dcae56.8add370a.1b9db.ffffbd3f@mx.google.com> On Sun, 6 Mar 2016 09:25:09 -0500 Steve Kinney wrote: > > National Security and Double Government by Michael J. Glennon > > > > http://harvardnsj.org/wp-content/uploads/2014/01/Glennon-Final.pdf > OK. Finished browsing those more than 100 pages of 'academic' garbage. What's the bottom line according to you? The author is lying about the relationship between bureaucracies like the nsa/cia/fbi etc and bureaucracies like the US 'congress'. Both bureaucracies fully cooperate and are sides of the same coin. The author is of course pretty dishonest about the whole thing. At times it seems at if he's critical of the state while at the same time constantly praises the 'national security' bureaucracy. "The benefits derived by the United States from double government —enhanced technical expertise, institutional memory and experience, quick-footedness, opaqueness in confronting adversaries, policy stability, and insulation from popular political oscillation and decisional idiosyncrasy —need hardly be recounted." Aren't his nsa buddies great. All in all a long piece of statist propaganda from harvard university using the very traditional americunt propaganda technique of posing as 'liberal 'libertarian' 'critics' of the system. From grarpamp at gmail.com Sun Mar 6 18:05:08 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 6 Mar 2016 21:05:08 -0500 Subject: Distributed protocols that combat economy of scale In-Reply-To: <56dca2b0.44e58c0a.38fdd.7961@mx.google.com> References: <3928149.NAsv7Jq6H8@lapuntu> <56dca2b0.44e58c0a.38fdd.7961@mx.google.com> Message-ID: On 3/6/16, juan wrote: > Good example. Because google isn't the result of 'economy of > scale' but it's a great example of what the state can > accomplish using a 'private' facade. http://news.slashdot.org/story/16/03/06/1834211/eric-schmidt-gets-a-job-at-the-pentagon From agave at openmailbox.org Sun Mar 6 18:52:25 2016 From: agave at openmailbox.org (agave) Date: Sun, 6 Mar 2016 21:52:25 -0500 Subject: Distributed protocols that combat economy of scale In-Reply-To: <1666763.tqbl8Ym1JK@lapuntu> References: <3928149.NAsv7Jq6H8@lapuntu> <10061069.QLp78G3N7N@lapuntu> <20160306165213.398e4310@bristlecone> <1666763.tqbl8Ym1JK@lapuntu> Message-ID: <20160306215225.32ac4729@bristlecone> On Mon, 07 Mar 2016 00:21:30 +0100 rysiek wrote: > The BitCoin example is particularily complex, as there's no good way > to tell, on the protocol level, "all those nodes are part of a single > cartel, controlled by a single entity". But maybe there is a way of > basing this on behaviour? If nodes X, Y, Z behave in a very similar > manner, lower their weight in consensual decisions? > That's a good idea. It would need to be fine-tuned, though; I'm reminded of the days when I used Windows with antivirus software that would very often false-flag and delete things that I needed. Although, I suppose the consequences wouldn't nearly be as severe. > I see economies of scale driving a lot of not-so-great outcomes > (centralisation of e-mail providers; centralisation of ISPs and the > general Internet infrastructure, introducing single points of failure > in many places). And that makes me wonder what can be done about it. > > > Maybe decentralization ought to be left to communications only? > > How so? > I was going to say that because the simple sharing of information from one person to another doesn't rely on messy things like consensus that come from managing a distributed database like the BitCoin block chain, it's thus immune to economies of scale and fits snugly and easily into the decentralization model, but I didn't really think of the physical infrastructure of communication. Mesh networks do effectively address the problem of centralized infrastructure, though, but it's unfortunate that they aren't yet popular or saturated with resources enough to serve as a viable alternative in most cases. freifunk.net in Germany is a good example. I guess this goes back to your example of GMail again. Mesh networks aren't viable yet because tons of people don't use them yet, and tons of people don't use them yet because tons of people don't use them yet. The network effect is very unfortunate. From rysiek at hackerspace.pl Sun Mar 6 13:13:41 2016 From: rysiek at hackerspace.pl (rysiek) Date: Sun, 06 Mar 2016 22:13:41 +0100 Subject: Distributed protocols that combat economy of scale In-Reply-To: <20160306112054.3ca17154@bristlecone> References: <3928149.NAsv7Jq6H8@lapuntu> <20160306112054.3ca17154@bristlecone> Message-ID: <10061069.QLp78G3N7N@lapuntu> Dnia niedziela, 6 marca 2016 11:20:54 piszesz: > There's always things like TorChat for instant messaging and IPFS for > content distribution. There's no concept of any centralisation in > either - they're completely peer-to-peer. Such was also the idea in BitCoin. As we can see, there's a secondary (not protocol-level) centralisation happening there. Cartels emerge, because economy of scale makes them viable, and indeed profitable. Yes, TorChat, IPFS, Tox are good examples. I'd be hard-pressed to identify any economy of scale possible there, I guess. > I'm not sure why you drew a comparison to e-mail - it's inherently > centralized, just among several servers. It's not centralized in a way Facebook is, for example. While e-mail was obviously never a p2p system, it was not a centralized system. The idea was decentralized, federated among *many* servers. But economy of scale did its magic and now we have a small number of companies controlling almost all of it. -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From rysiek at hackerspace.pl Sun Mar 6 15:21:30 2016 From: rysiek at hackerspace.pl (rysiek) Date: Mon, 07 Mar 2016 00:21:30 +0100 Subject: Distributed protocols that combat economy of scale In-Reply-To: <20160306165213.398e4310@bristlecone> References: <3928149.NAsv7Jq6H8@lapuntu> <10061069.QLp78G3N7N@lapuntu> <20160306165213.398e4310@bristlecone> Message-ID: <1666763.tqbl8Ym1JK@lapuntu> Dnia niedziela, 6 marca 2016 16:52:13 agave pisze: > > Such was also the idea in BitCoin. As we can see, there's a secondary > > (not protocol-level) centralisation happening there. Cartels emerge, > > because economy of scale makes them viable, and indeed profitable. > > Hmm, I'm not sure if there's any particular way to solve that problem > for BitCoin. I can't imagine any ways of establishing consensus among a > completely decentralized protocol other than by popular consensus of > the participants, and popular consensus can be manipulated easily as the > post you mentioned shows. Indeed, and the whole mining thing was supposed to protect BitCoin from such manipulation. Granted, it made it hard, but at some point, with enough money/value involved, economy of scale made it viable. And that's what bothers me, and that's my question: Is it possible to design a protocol in a way that makes economy of scale not work? The BitCoin example is particularily complex, as there's no good way to tell, on the protocol level, "all those nodes are part of a single cartel, controlled by a single entity". But maybe there is a way of basing this on behaviour? If nodes X, Y, Z behave in a very similar manner, lower their weight in consensual decisions? Apologies for being vague; I just feel there's something to it, but can't really put my finger on it. I see economies of scale driving a lot of not-so-great outcomes (centralisation of e-mail providers; centralisation of ISPs and the general Internet infrastructure, introducing single points of failure in many places). And that makes me wonder what can be done about it. > Maybe decentralization ought to be left to communications only? How so? -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From juan.g71 at gmail.com Sun Mar 6 19:23:20 2016 From: juan.g71 at gmail.com (juan) Date: Mon, 7 Mar 2016 00:23:20 -0300 Subject: Distributed protocols that combat economy of scale In-Reply-To: References: <3928149.NAsv7Jq6H8@lapuntu> <56dca2b0.44e58c0a.38fdd.7961@mx.google.com> Message-ID: <56dcf469.0551370a.d0557.ffffe336@mx.google.com> On Sun, 6 Mar 2016 21:05:08 -0500 grarpamp wrote: > On 3/6/16, juan wrote: > > Good example. Because google isn't the result of 'economy of > > scale' but it's a great example of what the state can > > accomplish using a 'private' facade. > > http://news.slashdot.org/story/16/03/06/1834211/eric-schmidt-gets-a-job-at-the-pentagon But thanks jesus and marx, the good government is there to regulate the evil corporations. Just ask stallman and the rest of lefty geniuses... From zen at freedbms.net Sun Mar 6 23:23:41 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Mon, 7 Mar 2016 07:23:41 +0000 Subject: Distributed protocols that combat economy of scale In-Reply-To: <56dcf469.0551370a.d0557.ffffe336@mx.google.com> References: <3928149.NAsv7Jq6H8@lapuntu> <56dca2b0.44e58c0a.38fdd.7961@mx.google.com> <56dcf469.0551370a.d0557.ffffe336@mx.google.com> Message-ID: On 3/7/16, juan wrote: > On Sun, 6 Mar 2016 21:05:08 -0500 > grarpamp wrote: > >> On 3/6/16, juan wrote: >> > Good example. Because google isn't the result of 'economy of >> > scale' but it's a great example of what the state can >> > accomplish using a 'private' facade. >> >> http://news.slashdot.org/story/16/03/06/1834211/eric-schmidt-gets-a-job-at-the-pentagon > > > But thanks jesus and marx, the good government is there to > regulate the evil corporations. Just ask stallman and the > rest of lefty geniuses... Oh come on! That's so facetious! You should thank Google, Facebook and Citigroup for government, at least they pay for the elections... it's all very above board. From zen at freedbms.net Mon Mar 7 00:26:19 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Mon, 7 Mar 2016 08:26:19 +0000 Subject: Who we are up against In-Reply-To: <566F2BAC.7070703@pilobilus.net> References: <20151213160135.GB3799@sivokote.iziade.m$> <566DF771.3060506@pilobilus.net> <566E697D.1040900@pilobilus.net> <566F2BAC.7070703@pilobilus.net> Message-ID: On 12/14/15, Steve Kinney wrote: > On 12/14/2015 03:11 AM, Zenaan Harkness wrote: >>>> Another shot to prod you along a bit further: >>>> >>>> Those who are compliant with despotic external authority in >>>> the face of their own inner conscience of right and wrong, >>>> ought be regarded as other/ outer/ "them", and treated with >>>> extreme caution! >>>> >>>> "Those" sheep happens to be about 60% to 90% of everyone! >>>> You wanna sweep -that- under the carpet of your politically >>>> correct boat? >>> >>> The presumption that people who are notably compliant with >>> illegitimate authority have a "conscience" and fixed notions >>> of right and wrong is questionable. >> >> We're talking about the Milgram experiment - instructor >> (authority, actor), teacher (the sheep), learner (electro shock >> pain receiver for wrong answers, actor). > > [ ... ] > >> The results speak for themselves! > > Indeed they do. In a context where the test subjects are > self-selected (volunteers) from a population and culture deeply > committed to elaborate, labor intensive submission to authority > (college students), with "the boss" hovering over them demanding > compliance (politely of course), most will continue "only > following orders" to the point of endangering the lives of > anonymous strangers. > > I'm not sure this generalizes to describe the behavior of whole > populations in the wild, though. Certainly, every country of any > size has more than enough pathological "followers" to field > military forces, run concentration camps, etc. But I think "60% > to 90%" of any population is a very high estimate. > >> The results speak for themselves. You keep apologising in >> subtle(?) ways - "oh, it's only the most eager sociopaths" and >> "all the others must have had some other disorders". >> >> Seriously? > > Nope: I was expressly talking about "Those who comply most > eagerly", not the much larger number Milgram shows otherwise. Your are expressing nothing more than your personal opinion porn. Back it up with facts, or Milgram's experiment, repeated by other researchers many times, in many countries, with both genders, and even in relatively recent times, is consistent - 60% to 90% of people, in general, -will- push a button that they know/ believe is likely to kill someone, merely under the verbal pressure of an authority above them. > whose compliance is marginal, > grudging, or largely pretended. This is delusion on your part. Did you read the full wikipedia page? Find some facts to support your position, if you want your position to be taken as factual in any way. >> This result doesn't need our qualification nor any apology! >> 'We' need a solution to educating 'ourselves' - our 'fellow >> sheep'! > > You'll get no arguments from me on that point: If I could find a > way to put that on a paying basis, I would probably not be flat > broke today. That's a good start. Let me also put it this way: even if "only" 10 to 15% of the population are sociopathically or "despotically" authority-compliant, rather than the definitive 60% yo 90% as ascertained by Milgram, we are still in an incredibly bad situation, since it appears evident when it's relevant, those exact people (the despotically compliant) end up having to kill or torture the rest - Pol Pot, Nuremberg, Stalin, and more recently the Ukronazis in Ukraine. From what I've read, the concentration camps of the "allies" of WWII were no better, and in some ways quite possibly worse, that the German camps - and many of us are aware of the level the Japanese took to "the fine art of incredible way to torture humans." This problem, and a problem it is, rears its sociopathic head in every historically relevant situation. No "people" are immune, no nation is immune. There is no point burying our heads in the sand - a peaceful transition will always be the better option, if we can ever get enough sheeple to join hands in a government-overturning kumbaya. Short of that, revolution and tyranny must rein for the period of transition. I am not envious of those living in large American cities at this particular point in history. Good luck to those who are, Zenaan From guninski at guninski.com Mon Mar 7 06:18:31 2016 From: guninski at guninski.com (Georgi Guninski) Date: Mon, 7 Mar 2016 16:18:31 +0200 Subject: Distributed protocols that combat economy of scale In-Reply-To: <3928149.NAsv7Jq6H8@lapuntu> References: <3928149.NAsv7Jq6H8@lapuntu> Message-ID: <20160307141831.GA908@sivokote.iziade.m$> On Sun, Mar 06, 2016 at 04:41:05PM +0100, rysiek wrote: > So let me pose a question here: is it possible to design a protocol that does > not succumb to economy of scale-based secondary centralisation? Is it possible > to design a protocol that does not lend itself to economy of scale? > Maybe it is possible to design such, but design is not that important. You _must_ implement it in the real world(tm). Some of your threats include: people technology (backdoors, bugs, sickyouaruty) TLAs governments Won't be surprised if bitcoin is illegal in parts of the real world(tm). From grarpamp at gmail.com Mon Mar 7 23:30:19 2016 From: grarpamp at gmail.com (grarpamp) Date: Tue, 8 Mar 2016 02:30:19 -0500 Subject: Fwd: [Cryptography] News flash: FBI in the "dark" about "numbers" radio stations In-Reply-To: References: Message-ID: ---------- Forwarded message ---------- From: Henry Baker Date: Mon, 07 Mar 2016 14:34:50 -0800 Subject: [Cryptography] News flash: FBI in the "dark" about "numbers" radio stations To: cryptography at metzdowd.com FYI -- http://www.thedailybeast.com/articles/2016/03/06/the-stupidly-simple-spy-messages-no-computer-could-decode.html The Stupidly Simple Spy Messages No Computer Could Decode Shane Harris 03.06.16 5:01 AM ET Every day, hour after hour, the world’s spies send top secret information you can easily listen in on. "But the numbers are just gibberish without that key, known in spycraft as a one-time pad. As its name suggests, it’s used only once. And that’s what makes it so secure." --- These radio communications to/from *terrorists* have been going on since WWII, and yet James Comey hasn't filed suit against the radio receiver manufacturers... From carimachet at gmail.com Mon Mar 7 20:13:38 2016 From: carimachet at gmail.com (Cari Machet) Date: Tue, 8 Mar 2016 05:13:38 +0100 Subject: Searching Places Unknown: Law Enforcement Jurisdiction on the Dark Web Message-ID: Searching Places Unknown: Law Enforcement Jurisdiction on the Dark Web Ahmed Ghappour UC Hastings College of the Law March 5, 2016 http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2742706 -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3684 bytes Desc: not available URL: From jdb10987 at yahoo.com Mon Mar 7 23:36:59 2016 From: jdb10987 at yahoo.com (jim bell) Date: Tue, 8 Mar 2016 07:36:59 +0000 (UTC) Subject: Microsoft is trying to force Windows 10 on just about everyone. In-Reply-To: References: Message-ID: <1297616873.5680378.1457422619469.JavaMail.yahoo@mail.yahoo.com> Microsoft is trying to force Windows 10 on just about everyone. http://www.howtogeek.com/241329/upgrade-now-or-upgrade-tonight-how-microsoft-has-aggressively-pushed-windows-10-to-everyone/ Jim Bell -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1073 bytes Desc: not available URL: From themikebest at gmail.com Tue Mar 8 07:29:26 2016 From: themikebest at gmail.com (Michael Best) Date: Tue, 8 Mar 2016 10:29:26 -0500 Subject: Help wanted: classification czar needed for oversight of national security secrecy system Message-ID: http://fas.org/blogs/secrecy/2016/03/help-wanted-isoo/ The government is looking for a person to oversee, and perhaps sometimes to overrule, classification decisions made throughout the Executive Branch. A job opening for the position of Director of the Information Security Oversight Office (ISOO) was announced in *USA Jobs* last week. The ISOO director is appointed by the Archivist of the United States, since ISOO is housed at the National Archives. But ISOO takes policy direction from the National Security Council, and the director’s authority over classification and declassification policy extends throughout the executive branch. The previous ISOO director , John P. Fitzpatrick, left for the National Security Council in January. Read on at FAS: http://fas.org/blogs/secrecy/2016/03/help-wanted-isoo/ -- Veritas aequitas liberabit vos Veri universum vici That 1 Archive @NatSecGeek -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2835 bytes Desc: not available URL: From grarpamp at gmail.com Tue Mar 8 15:28:34 2016 From: grarpamp at gmail.com (grarpamp) Date: Tue, 8 Mar 2016 18:28:34 -0500 Subject: [onioncat] Onioncat v2 In-Reply-To: <56DE8F93.4050307@abenteuerland.at> References: <56DE8F93.4050307@abenteuerland.at> Message-ID: On 3/8/16, Bernhard R. Fischer wrote: > "Do we want to keep this nice automatic IPv6/Onion-ID translation feature?" > > If NO: > There's no problem. Everybody can setup his own hosts-file for the > translation. > > If YES: > Independent of the final solution there is a need for a > lookup-database/service of any kind. This goes to two things... - the usage models you expect - the usage models you want to enable Let's keep in mind that the fundamental strengths of onioncat and reason that it exists are... - tor and other anonymous overlay networks often do not support full IP semantics, with tor it's TCP only, which cripples or eliminates certain apps. - anonymous overlay networks often do not support interfaces to the traditional IP stack of OS's, with tor it's onion only, which you can't bind(2) to, except via hack within the tor daemon... which only does tcp, which doesn't route, or packet filter, or VM, or... "NO" ... well, that's fine for individual people who meetup elsewhere and personally agree to exchange keys and addresses (or find such listed on the web, etc) in order to communicate. It scales only to the extent one can personally manage it, and it is not oppurtunistic as far as making random new introductions. "YES"... this is where the real potential lies. Lots of apps are p2p, or at least rely on central servers to tell them of their peers in real time. Bitcoin and bittorrent are purely p2p with peers coming in via the network itself at random. VOIP could be thought to be central yet random. This list of non-manual config apps is really long. Then evaluate which are popular in the opensource space whereby they're possibly not run by popular centrals like facebook, but by community (XMPP), or strictly p2p. It seems that NO would still serve a purpose and thus would be a call to making an onioncat v2. And that YES would be a very interesting project that needs to look at many potential solutions some of which people post ideas about on list. > IMO we should use an existing database and we should not try to Yes if it is available, or willing to be developed and integrated by the overlays for such use. > establish a new system because this depends always on people willing to > run these. For example, it may be possible that the [transmission] bittorrent, and cryptocoin, communities might see a reason to run something separate if it gave them p2p access to anonymous transport layers. > I do not know about the userbase of OnionCat but we should > assume that it is small, hence, not (yet) able to keep enough Onioncats > up for running a DB (DHT or whatever). Public usage is all in supply, demand, and advertising. Private usage has seen some successful onion/i2p like what.cd [nee i2p/onion] membership. Evaluating the needs of some VOIP and messaging protocols re IPv6 UDP and tun interface might be useful. We already know bittorrent needs udp and trackerless p2p to be efficient. Another way to think is... can the overall utility of anonymous overlay networks ever grow if they continue to be restricted to, say, TCP and their own proprietary addressing stacks? Are there RFC type proposals to interoperate / expand that among the community of overlay networks? And is onioncat a good place to enable that if either are no? From grarpamp at gmail.com Tue Mar 8 17:12:31 2016 From: grarpamp at gmail.com (grarpamp) Date: Tue, 8 Mar 2016 20:12:31 -0500 Subject: FBI claims to modify its bilateral trolling re NSA data... in secret of course Message-ID: http://news.slashdot.org/story/16/03/08/2316212/fbi-quietly-changes-its-privacy-rules-for-accessing-nsa-data-on-americans https://news.ycombinator.com/item?id=11248320 From grarpamp at gmail.com Tue Mar 8 17:26:48 2016 From: grarpamp at gmail.com (grarpamp) Date: Tue, 8 Mar 2016 20:26:48 -0500 Subject: Unix more / better UTF-8 Message-ID: http://www.dragonflybsd.org/release44/ https://news.ycombinator.com/item?id=11248847 https://wiki.gentoo.org/wiki/UTF-8/it philes... not just high ASCII anymore... From zen at freedbms.net Tue Mar 8 18:20:57 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Wed, 9 Mar 2016 02:20:57 +0000 Subject: Rojava - direct democracy, Kurdistan, gender equality, polyethnic In-Reply-To: References: Message-ID: There's a lot of history between the Kurds and the Russians - over two centuries. This article covers in a number of pages, the bulk of that history, with a bit of analysis of how the relationship is with also USA, Turkey and Iran. A lot of information... After reading this article, I am not so hopeful about "Rojava", although I do still think it would be an excellent experiment, if the power players (Russia, USA) can agree to it, to experiment with a mini state with a political anarchist foundation. If an 'independent' Kurdistan is carved up out of the mid east, perhaps "Rojava the political anarchist micro state" will yet be allowed to exist within that mini state. As a social species, we owe it to ourselves to at least see what might come out of such an experiment... : http://russia-insider.com/en/politics/history-lesson-russia-kurds-oldest-great-power-patron/ri13228 Idea of Vladimir Putin as the 'Godfather' of Kurdistan Isn't Half as Crazy as You Think This article is quite short, pasted below. I suspect "the USA thinks" it will get more influence/ control/ money in the middle east with a separate Kurdistan... at this point in history I can only see America's actions in a highly cynical light. Or as the article suggests, this may also be payment for past support. : http://russia-insider.com/en/turks-arent-going-it-us-building-two-airstrips-syrian-kurdistan/ri13218 " Turks Aren't Going to Like This: US Building Two Airstrips in Syrian Kurdistan Which can mean only one thing: more US hardware for the Kurdish militias Joshua Grimes 2016-03-08 According to Kurdish reports US is building two airstrips in north-eastern Syria under the control of the Kurdish YPG militia. Asked for a comment Americans neither denied nor confirmed the reports saying they were not "in control" of any airfields in Syria but were "consistently looking for ways to increase efficiency for logistics". – Obviously it's possible to have airstrips built or expanded (or ask to have them expanded) to enhance their 'efficiency for logistics' without taking formal control of them. The airstrips are clearly not intended to serve as US airbases (as Kurds also claim), but that's going to do little to comfort Ankara. US is already delivering supplies to the Kurdish YPG, particularly in the Syrian north-east. If airstrips are being expanded that can only mean that such deliveries are to be increased – possibly to be delivered by larger aircraft. Indeed, in recent days the Kurds have been making progress against ISIS, and have been doing so in the southern direction towards Raqqa and along the Syrian-Iraqi border favored by the US. (Rather than in the Kurdish-favored western direction that would see them link up with the Kurdish Afrin corridor and seal off Syria's northern border from Turkey completely.) Are Kurds getting their reward for playing along? " From zen at freedbms.net Tue Mar 8 18:37:42 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Wed, 9 Mar 2016 02:37:42 +0000 Subject: Unix more / better UTF-8 In-Reply-To: References: Message-ID: For those who have -not- yet read the canonical UTF-8 advocacy blog post from many years ago, and for whom doing so is relevant, it really is a must read: http://utf8everywhere.org/ On 3/9/16, grarpamp wrote: > http://www.dragonflybsd.org/release44/ When I read something like: "We introduced "short codes", so now codes like "de_DE", "fr_FR", "en_US", "el_GR", etc. These short-codes are generally mapped to 8-bit character sets such ia ISO-8859-x, but sometimes they are mapped to UTF-8 if the traditional single-byte encoding doesn't adequately cover the locale anymore (e.g. the currency is not supported)." I think "people still haven't cottoned on - UTF-8 should be the default, and only vary if really necessary. Now I must qualify this statement, since I don't know BSD, nor much about locales. Debian is my friend. > https://news.ycombinator.com/item?id=11248847 "Xterm(1) now UTF-8 by default on OpenBSD" - great news! Better late than never... > https://wiki.gentoo.org/wiki/UTF-8/it > > philes... not just high ASCII anymore... Wonders never cease. Now, if only Java could properly handle Unicode characters and had a string class which could properly work with UTF-8: https://zenaan.github.io/zen/javadoc/zen/lang/string.html Note1: Motivated by my extreme frustration with Java's Unicode limitations to the point of not even being able to implement a proper string formatter, by the utf8everywhere.org website, and by having quite some days in a row to figure out why the problem existed in the first place and exactly what -is- Java's problem in this particular regard. Note2: The documentation at the top of this link is the relevant part, the class is just a note pad... Note3: I have a pretty solid CodePointCursor.java class (yet to be uploaded), well tested by a uint and tagged string CodePointParser, if anyone actually wants to finish a proper Java string class such as above... From zen at freedbms.net Tue Mar 8 22:12:30 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Wed, 9 Mar 2016 06:12:30 +0000 Subject: =?UTF-8?Q?Beginning_of_the_USD_end=3F_=2D_Re=3A_Petrodollar_further_?= =?UTF-8?Q?analysis_=2D_Putin_buying_gold_with_=E2=80=9Clittle_fanfare=2C_but_on_?= =?UTF-8?Q?a_large_scale=E2=80=9D?= Message-ID: Beginning of the end of the USD? "The Inflation Genie is Out of the Bottle" http://www.zerohedge.com/news/2016-03-08/inflation-genie-out-bottle (Short article, but a few graphs, so just a key quote, and --beware-- the pyramid(?) futures marketing scheme at the end, so perhaps not such a reputable site, unfortunately - but the inflation figures seem genuine enough:) "Put simply, the inflation genie is out of the bottle. Core inflation is already moving higher at a time when prices of most basic goods are at 19-year lows. Any move higher in Oil and other commodities will only PUSH core inflation higher. The Fed is cornered. Inflation is back." See also: https://en.wikipedia.org/wiki/Inflation In related news: http://www.pravdareport.com/russia/economics/01-03-2016/133690-russia_gold-0/ Russia becomes world's largest buyer of gold 01.03.2016 http://www.zerohedge.com/news/2016-03-02/global-central-banks-continue-longest-gold-buying-spree-vietnam-war Global Central Banks Continue Longest Gold-Buying-Spree Since Vietnam War (with graphs of central bank gold holdings) https://www.rt.com/business/334498-canada-gold-reserves-economy/ Canada’s golden age is over Published time: 4 Mar, 2016 09:29 "Canada has used up all of its gold reserves. For the first time since 1935 the country is out of gold. ..." (Not much foresight in Canada it seems, or perhaps we can say "insider gold sales to my buddies" by some other name.) From seanl at literati.org Wed Mar 9 16:12:27 2016 From: seanl at literati.org (Sean Lynch) Date: Wed, 9 Mar 2016 16:12:27 -0800 Subject: WIRED: The Future of Wi-Fi Is 10,000 Times More Energy Efficient In-Reply-To: References: Message-ID: On Sun, Mar 6, 2016 at 12:04 AM, Cari Machet wrote: > Engineering students have discovered a way to reflect Wi-Fi packets > instead of broadcasting them. > > http://www.wired.com/2016/03/future-wi-fi-10000-times-energy-efficient/ > Neat! It does seem like you're trading "pollution" of the band for power consumption, though. Even ignoring the tone generated by the "plugged in device", which is carrying energy but no information and much of which is wasted, their modulation technique results in significantly more energy outside of the passband of the receiver than inside. So overall power consumption goes way up, even though it's not from the battery-powered device. And then if a bunch of people start using these, the total amount of energy you need to pump out will keep getting higher and higher due to the added interference, which will cause battery powered devices to have to use more power. Possibly surmountable, but still interesting. I suspect (and I think you may have had this in mind as well) that backscatter modulation will end up being more interesting for covert applications, where you use a tiny device with a tiny (or no) battery that transmits by reflecting some signal that is already in the environment, like an FM radio station, and you use a receiver that is designed for receiving the reflected signal including the "mirror image" and a couple of the extra harmonics. You could see that as a kind of "free" spread spectrum. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1936 bytes Desc: not available URL: From guninski at guninski.com Wed Mar 9 07:20:35 2016 From: guninski at guninski.com (Georgi Guninski) Date: Wed, 9 Mar 2016 17:20:35 +0200 Subject: Microsoft is trying to force Windows 10 on just about everyone. In-Reply-To: <1297616873.5680378.1457422619469.JavaMail.yahoo@mail.yahoo.com> References: <1297616873.5680378.1457422619469.JavaMail.yahoo@mail.yahoo.com> Message-ID: <20160309152034.GA662@sivokote.iziade.m$> On Tue, Mar 08, 2016 at 07:36:59AM +0000, jim bell wrote: > Microsoft is trying to force Windows 10 on just about everyone. http://www.howtogeek.com/241329/upgrade-now-or-upgrade-tonight-how-microsoft-has-aggressively-pushed-windows-10-to-everyone/ > > lol. According to the theregister, m$ crashed (not sure if in the cloud) and they couldn't restore from backup (trust 'em). Then they asked their partners to send them CA audits... Hope someone helped them in the crash/backup. From carimachet at gmail.com Wed Mar 9 10:31:41 2016 From: carimachet at gmail.com (Cari Machet) Date: Wed, 9 Mar 2016 19:31:41 +0100 Subject: Warrant for hacks Message-ID: PDF for the FBI warrant used to hack computers in Greece, Chile, and probably the UK: https://t.co/dLvOf1h5cQ Around 1300 devices in all -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 233 bytes Desc: not available URL: From themikebest at gmail.com Thu Mar 10 08:43:01 2016 From: themikebest at gmail.com (Michael Best) Date: Thu, 10 Mar 2016 11:43:01 -0500 Subject: Intelius opt-out Message-ID: Should make it harder to find you by searching, at least in the U.S. https://www.intelius.com/optout If you trust them. FWIW. -- Veritas aequitas liberabit vos Veri universum vici That 1 Archive @NatSecGeek -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 819 bytes Desc: not available URL: From cmagistrado at gmail.com Thu Mar 10 14:18:49 2016 From: cmagistrado at gmail.com (Chris Magistrado) Date: Thu, 10 Mar 2016 14:18:49 -0800 Subject: Snowden sasys FBI can unlock iPhone Message-ID: https://www.aclu.org/blog/free-future/one-fbis-major-claims-iphone-case-fraudulent Is the technical part true? I don't feel like it is... Can anyone confirm this? -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 338 bytes Desc: not available URL: From admin at pilobilus.net Thu Mar 10 12:23:37 2016 From: admin at pilobilus.net (Steve Kinney) Date: Thu, 10 Mar 2016 15:23:37 -0500 Subject: Microsoft is trying to force Windows 10 on just about everyone. In-Reply-To: <605112359.7692457.1457639017902.JavaMail.yahoo@mail.yahoo.com> References: <20160309152034.GA662@sivokote.iziade.m$> <605112359.7692457.1457639017902.JavaMail.yahoo@mail.yahoo.com> Message-ID: <56E1D7C9.2000409@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 03/10/2016 02:43 PM, jim bell wrote: > From: Georgi Guninski > > > Subject: Re: Microsoft is trying to force Windows 10 on just > about everyone. On Tue, Mar 08, 2016 at 07:36:59AM +0000, jim > bell wrote: >>> Microsoft is trying to force Windows 10 on just about >>> everyone. >>> http://www.howtogeek.com/241329/upgrade-now-or-upgrade-tonight-h ow-microsoft-has-aggressively-pushed-windows-10-to-everyone/> >>> >> >> lol. According to the theregister, m$ crashed (not sure if in >> the cloud) and they couldn't restore from backup (trust >> 'em). Then they asked their partners to send them CA >> audits... Hope someone helped them in the crash/backup. > > I'd like to read more about this crash. Are you talking about > something that happened within the last week? Jim bell The Register quotes Microsoft: "As many of you may have just noticed, our system just generated a bunch of emails informing many of you that you are subject to removal because Microsoft does not have evidence of a qualifying audit on file. This is likely an error on our side, but we need your help. "Our CRM system suffered a data loss, and it looks like it rolled back to an old backup. As a result, we lost audit data for about 147 roots. If you received a message, please don't panic. Instead, please just send Microsoft your most-recent audit data, and we will update our records. Sorry for the confusion. The Register says: "As part of Microsoft’s Trusted Root program’s compliance requirements, Certificate Authorities must provide a courtesy copy of their audit data to the company annually. We’re reliably informed that Microsoft stores these internally in a standalone tool. An error occurred with the tool, so Microsoft contacted some CAs and requested they resubmit a copy of their latest audit data, sources confirm. "Microsoft is a player in backup and the cloud, through Microsoft Azure. Asking third parties for data on themselves in the wake of a back-up bungle is not the biggest disaster in the world, but it doesn’t look good either. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQIcBAEBAgAGBQJW4dfHAAoJEDZ0Gg87KR0L/nAP/07sYYKn55vLgB9OTGEZsshn C0Sh3itw9HhmRdGfi52o2LopJzYbVNo9uIVwFoTdiV2+Vpix9B9y7FX+GBT0/heJ uXbwqIqmT7vfc8kjQuE8qeSNHhI47Fugwl1tUbiU+dRiKexU/sEIPSLQ5S3QG58A psPeLJz/G6qqR5IuE+XIg/AIJAsJ48/MXTD1aAIeVsabEUXRfSdtbGBCIZ3MUtBY YNjHbnN9qMm+ve99BocN2UJarwigh8wLUUVQXeqBWRda767ScT0Zdkf8weMXF6yB xI7b+i4VMPD1Z15CKwf99kYPbofvZJjeVuUKVYCM+gBzzwruKZld1O7CXC59VrLZ pK/MIJRJrKdDN4gBMlwi0/8UOjhigOrikP0rBmm+SLgv0jTBFIEAqyVZ1+wVSdbi BQCwwzCnvvB8rgflV2VQRs5vwlKjGc33BGZGjFn0TqcrHlVLtvGqzYS3WMUQ4XlQ uKyuhnTvA2ZQC9fzWIfg7MvMlGjpx/A9dY5YICkMVrv2AD9quTyW0FXiWZ/gOf1C zqhyj3Wls2sVj5O30g67suX4r5ST/nP9Zt8to7D3D86KnO2bom/dTkG9TJwr1xZo 2zDSIihyjR4v3jz6zO14MqnIwkKJR390UmvJXdIN5aEO52G+nTBd2Myv6wjzcUhL cubWo3p3T2ZMXJu8owsf =aSZj -----END PGP SIGNATURE----- From jya at pipeline.com Thu Mar 10 13:22:56 2016 From: jya at pipeline.com (John Young) Date: Thu, 10 Mar 2016 16:22:56 -0500 Subject: USG Support of Motion to Compel Apple Decrypt, iPhone Forensics Message-ID: USG v. Apple - USG Support of Motion to Compel Apple Decrypt https://cryptome.org/2016/03/usg-apple-149.pdf (484 pp, 11MB) FBI agent details Farook's iPhone forensics, Apple discussions https://cryptome.org/2016/03/usg-apple-149-02.pdf From admin at pilobilus.net Thu Mar 10 16:14:56 2016 From: admin at pilobilus.net (Steve Kinney) Date: Thu, 10 Mar 2016 19:14:56 -0500 Subject: Snowden sasys FBI can unlock iPhone In-Reply-To: References: Message-ID: <56E20E00.40209@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 03/10/2016 06:46 PM, Travis Biehn wrote: > This is all true. > > It's a bit easier to attack, actually. Yup, if the erasable "user selected" key can be read out then restored from backup after the OS erases it, no problem: A few days of careful tinkering with hardware, testing proofs of concept against /other/ iPhones, then a few minutes of automated attack against the /interesting/ iPhone. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQIcBAEBAgAGBQJW4g3+AAoJEDZ0Gg87KR0L8LIQAJKA2FplSF7x+wpeQZmJPAi3 mnPGhBsZswrip5xyDv91EQxGwT3PUp0+LERCEM23YO1r9oimsq31PBNQBUn7B/NA jJS5+rTh2phseHLySYpHiTCpfrUMkUCLuNzUEiu6A4gHfGVM6SemtQLkICql1Ggw NEAxThXKcl3Syz5X/cDAJlSBeGR7JOvYRVmVD7XUxss01cVoenpRc9dlRM9Am8TR 5BS+hRkQn359JU+R7dCSm+zVoYqLVI2ui+gpp72+uLX1SbemxyJQz6RXKbEXfEjv zTKsUaBxNHe2EWcVsTXMBXYT55Ut3cwn2zUU4TKmaMbOEbguYF21KRAlWem2zHNj EpihLwjImR71zoW/uXfitbRv9r2c+ibMOUF2Am15j7Cs0iXPF+IASLzZW+74D5qt cHnyHQY52OD473xowgFpyaGs9lPBtDrTYFFuGqiZ+XazgLXIuepNe8iBDJypUDm0 f0gN7a0E4cvKodyPMfKbN213mY7pLW4CclZtTk+kYxocxslasT3palISsOqjs5LI jalMzTGfH57cAzvpDUxVix19dC63iBRbQVRkUJQMf7LQB+l7uSK1XtfpEw0kJB7T ww17VsOVQ7vq3FetoGywE3XugylKmRvPxjMGiLjt7go6tvf7okiu8dxhkbPGAJy4 SbPvrfoxYLWTDCZvdUz3 =rllm -----END PGP SIGNATURE----- From jdb10987 at yahoo.com Thu Mar 10 11:43:37 2016 From: jdb10987 at yahoo.com (jim bell) Date: Thu, 10 Mar 2016 19:43:37 +0000 (UTC) Subject: Microsoft is trying to force Windows 10 on just about everyone. In-Reply-To: <20160309152034.GA662@sivokote.iziade.m$> References: <20160309152034.GA662@sivokote.iziade.m$> Message-ID: <605112359.7692457.1457639017902.JavaMail.yahoo@mail.yahoo.com> From: Georgi Guninski Subject: Re: Microsoft is trying to force Windows 10 on just about everyone. On Tue, Mar 08, 2016 at 07:36:59AM +0000, jim bell wrote: >> Microsoft is trying to force Windows 10 on just about everyone. http://www.howtogeek.com/241329/upgrade-now-or-upgrade-tonight-how-microsoft-has-aggressively-pushed-windows-10-to-everyone/> > >lol. >According to the theregister, m$ crashed (not sure if in the cloud) and >they couldn't restore from backup (trust 'em). >Then they asked their partners to send them CA audits... >Hope someone helped them in the crash/backup. I'd like to read more about this crash. Are you talking about something that happened within the last week? Jim bell From rysiek at hackerspace.pl Thu Mar 10 14:12:05 2016 From: rysiek at hackerspace.pl (rysiek) Date: Thu, 10 Mar 2016 23:12:05 +0100 Subject: Distributed protocols that combat economy of scale In-Reply-To: <20160307141831.GA908@sivokote.iziade.m$> References: <3928149.NAsv7Jq6H8@lapuntu> <20160307141831.GA908@sivokote.iziade.m$> Message-ID: <1543752.gLMoHjkTDD@lapuntu> Dnia poniedziałek, 7 marca 2016 16:18:31 Georgi Guninski pisze: > On Sun, Mar 06, 2016 at 04:41:05PM +0100, rysiek wrote: > > So let me pose a question here: is it possible to design a protocol that > > does not succumb to economy of scale-based secondary centralisation? Is > > it possible to design a protocol that does not lend itself to economy of > > scale? > Maybe it is possible to design such, but design is not that important. > > You _must_ implement it in the real world(tm). Don't I need a protocol first? :) > Some of your threats include: > (...) > Won't be surprised if bitcoin is illegal in parts of the real world(tm). Thank you, Captain Obvious. Would you be interested in this rock? -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From tbiehn at gmail.com Thu Mar 10 15:46:03 2016 From: tbiehn at gmail.com (Travis Biehn) Date: Thu, 10 Mar 2016 23:46:03 +0000 Subject: Snowden sasys FBI can unlock iPhone In-Reply-To: References: Message-ID: This is all true. It's a bit easier to attack, actually. -Travis On Thu, Mar 10, 2016, 5:23 PM Chris Magistrado wrote: > > https://www.aclu.org/blog/free-future/one-fbis-major-claims-iphone-case-fraudulent > > Is the technical part true? > I don't feel like it is... > Can anyone confirm this? > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 776 bytes Desc: not available URL: From ilsa.bartlett at gmail.com Fri Mar 11 01:33:29 2016 From: ilsa.bartlett at gmail.com (ilsa) Date: Fri, 11 Mar 2016 01:33:29 -0800 Subject: Remember, remember the Fukushima nuclear disaster on this day? In-Reply-To: <20160311064333.GA1919@sivokote.iziade.m$> References: <20160311064333.GA1919@sivokote.iziade.m$> Message-ID: Hello, I rather read then post. Today I wish to share the Japan's Nuclear Trauma, as the leaks continue unabated, on it's Fifth Birthday. Georgi, Thank you for posting, your comment is so true... Tomorrow just after 2:00, Five Years Ago was the 9.2 Earth Quake in Japan. 1800 + people died instantly. Our world is still awash with radio active waste still out flowing toward the west coast of the United States in all water around our globe. A Journey In Disaster. This is a Warning To The World! http://www.theguardian.com/…/uk-government-new-plant-fukush… < http://www.theguardian.com/environment/2013/nov/19/uk-government-new-plant-fukushima-nuclear-disaster-warning > I ask you not to forget how the corporation Teco lied. http://fukushimaupdate.com/ < http://l.facebook.com/l.php?u=http%3A%2F%2Ffukushimaupdate.com%2F&h=8AQGlITYaAQHoY9TeQmYrNXgqAlXYeoqc55Kq5zmGj8bgHQ&enc=AZODk0JWlAbkXs3BKkevjuWK68pnyeT8RATOsDhmhvm1pRYV9iOico967DK5OI266QK6bRW2_4t-av_PKDRcqJBCrxAZYSQIqjb4LEOas0WSCH6NK0dbwtttydioRNxemQxZc0gIqg7YqsknoTIIcUxNSO4KMJQ4CfDOjvKI_--KFPFPbaqLeqFV8g11Q-VT_iY&s=1 Japan has enough bomb quality plutonium to make more than 400 hydrogen bombs over the number they already have as test examples for how to build a better killing bomb. http://www.jnfl.co.jp/english/ < http://l.facebook.com/l.php?u=http%3A%2F%2Fwww.jnfl.co.jp%2Fenglish%2F&h=vAQHcZVw6AQH3ZXgmTi0B8q8mKhg-foaClcSTz8fmtg4nnw&enc=AZOgbC5oegQ_Vm3PW7uPSBVJMXQgHQqH-DUiyMuevli2lr6d4kjFvOuGPS_pHpLKOMLTtgXDl2wLqZJ9MUyK4TqTGoVIkZNsbq2WuVcR-a9n_8mMtln_N2dtRk0gIEI6q2Z_6jho3qXX2IIcD3rnDEGMEjEznVZUyseu6OffP9nSargo-GZx3-DMEVHH6S0xR9M&s=1 > > > This is a great example of Money over Human Values > > http://www.nytimes.com/ …/japan-indicts-3-former-executives-… > < http://www.nytimes.com/2016/03/01/world/asia/japan-indicts-3-former-executives-over-fukushima-nuclear-disaster.html?_r%3D0&_r=0 > > > Gratitude and Respect, Smile "Don't ever get so big or important that you can not hear and listen to every other person."-John Col trane​ On Thu, Mar 10, 2016 at 10:43 PM, Georgi Guninski wrote: > Remember the Fukushima nuclear disaster and the causes for it? > > The punky angle is that sufficiently large boom will kill all > punks as a side effect. > > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4699 bytes Desc: not available URL: From guninski at guninski.com Thu Mar 10 21:09:43 2016 From: guninski at guninski.com (Georgi Guninski) Date: Fri, 11 Mar 2016 07:09:43 +0200 Subject: Microsoft is trying to force Windows 10 on just about everyone. In-Reply-To: <605112359.7692457.1457639017902.JavaMail.yahoo@mail.yahoo.com> References: <20160309152034.GA662@sivokote.iziade.m$> <605112359.7692457.1457639017902.JavaMail.yahoo@mail.yahoo.com> Message-ID: <20160311050943.GA740@sivokote.iziade.m$> On Thu, Mar 10, 2016 at 07:43:37PM +0000, jim bell wrote: > From: Georgi Guninski > > > Subject: Re: Microsoft is trying to force Windows 10 on just about everyone. > On Tue, Mar 08, 2016 at 07:36:59AM +0000, jim bell wrote: > >> Microsoft is trying to force Windows 10 on just about everyone. http://www.howtogeek.com/241329/upgrade-now-or-upgrade-tonight-how-microsoft-has-aggressively-pushed-windows-10-to-everyone/> > > > >lol. > >According to the theregister, m$ crashed (not sure if in the cloud) and > >they couldn't restore from backup (trust 'em). > >Then they asked their partners to send them CA audits... > >Hope someone helped them in the crash/backup. > > I'd like to read more about this crash. Are you talking about something that happened within the last week? > Jim bell http://www.theregister.co.uk/2016/03/04/ms_loses_data_after_crm_crash/ Consider searching theregister for "microsoft weird update". From jdb10987 at yahoo.com Thu Mar 10 23:34:20 2016 From: jdb10987 at yahoo.com (jim bell) Date: Fri, 11 Mar 2016 07:34:20 +0000 (UTC) Subject: Remember, remember the Fukushima nuclear disaster on this day? In-Reply-To: <20160311064333.GA1919@sivokote.iziade.m$> References: <20160311064333.GA1919@sivokote.iziade.m$> Message-ID: <632367055.8137868.1457681660487.JavaMail.yahoo@mail.yahoo.com> From: Georgi Guninski To: cypherpunks at cpunks.org >Remember the Fukushima nuclear disaster and the causes for it? Sure, the fools put a nuclear reactor in a location susceptible to both earthquakes and tsunamis...and then they forgot to provide for cooling the core to prevent meltdown in case they had to 'scram' the reaction. (A nuclear reactor ordinarily has a rather large population of 'radioactive daughter elements' that continue to decay and emit heat for hours and days after the neutron-absorbing control rods are put back into place. This continued heat production has the ability, for a few hours, to melt down the core unless cooling water continues to flow. In an emergency like Fukushima, they needed to provide for such continued water flow for hours, lest the core melt down. They didn't. It did.) Jim Bell From guninski at guninski.com Thu Mar 10 22:43:33 2016 From: guninski at guninski.com (Georgi Guninski) Date: Fri, 11 Mar 2016 08:43:33 +0200 Subject: Remember, remember the Fukushima nuclear disaster on this day? Message-ID: <20160311064333.GA1919@sivokote.iziade.m$> Remember the Fukushima nuclear disaster and the causes for it? The punky angle is that sufficiently large boom will kill all punks as a side effect. From guninski at guninski.com Fri Mar 11 00:24:32 2016 From: guninski at guninski.com (Georgi Guninski) Date: Fri, 11 Mar 2016 10:24:32 +0200 Subject: Remember, remember the Fukushima nuclear disaster on this day? In-Reply-To: <632367055.8137868.1457681660487.JavaMail.yahoo@mail.yahoo.com> References: <20160311064333.GA1919@sivokote.iziade.m$> <632367055.8137868.1457681660487.JavaMail.yahoo@mail.yahoo.com> Message-ID: <20160311082432.GB1919@sivokote.iziade.m$> On Fri, Mar 11, 2016 at 07:34:20AM +0000, jim bell wrote: > Sure, the fools put a nuclear reactor in a location susceptible to .. They aren't no fools. In simple words this is business/profit at all costs. I remember the Chernobyl disaster being relatively near and its causes are quite controversial, especially for anti-russians. Is there relatively objective study about the damages Fukushima vs Chernobyl? (What I read was flamewars or propaganda). From Rayzer at riseup.net Fri Mar 11 12:17:27 2016 From: Rayzer at riseup.net (Rayzer) Date: Fri, 11 Mar 2016 12:17:27 -0800 Subject: Microsoft is trying to force Windows 10 on just about everyone. In-Reply-To: <605112359.7692457.1457639017902.JavaMail.yahoo@mail.yahoo.com> References: <20160309152034.GA662@sivokote.iziade.m$> <605112359.7692457.1457639017902.JavaMail.yahoo@mail.yahoo.com> Message-ID: <56E327D7.2070107@riseup.net> jim bell wrote: > From: Georgi Guninski > > > Subject: Re: Microsoft is trying to force Windows 10 on just about everyone. > On Tue, Mar 08, 2016 at 07:36:59AM +0000, jim bell wrote: >>> Microsoft is trying to force Windows 10 on just about everyone. http://www.howtogeek.com/241329/upgrade-now-or-upgrade-tonight-how-microsoft-has-aggressively-pushed-windows-10-to-everyone/> >> lol. >> According to the theregister, m$ crashed (not sure if in the cloud) and >> they couldn't restore from backup (trust 'em). >> Then they asked their partners to send them CA audits... >> Hope someone helped them in the crash/backup. > I'd like to read more about this crash. Are you talking about something that happened within the last week? > Jim bell > The articles I dug up were 2012 vintage. -- RR "Through counter-intelligence it should be possible to pinpoint potential trouble-makers ... And neutralize them, neutralize them, neutralize them" -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From jya at pipeline.com Fri Mar 11 10:26:37 2016 From: jya at pipeline.com (John Young) Date: Fri, 11 Mar 2016 13:26:37 -0500 Subject: Apple Attorneys Move to Join CA and NY Cases Message-ID: USG-Apple EDNY - Apple Attorneys Move to Join CA and NY Cases https://cryptome.org/2016/03/usg-apple-edny-0 31-034.pdf From Rayzer at riseup.net Fri Mar 11 14:05:50 2016 From: Rayzer at riseup.net (Rayzer) Date: Fri, 11 Mar 2016 14:05:50 -0800 Subject: Remember, remember the Fukushima nuclear disaster on this day? In-Reply-To: <56e32bf3.8af68c0a.5611e.6673@mx.google.com> References: <20160311064333.GA1919@sivokote.iziade.m$> <632367055.8137868.1457681660487.JavaMail.yahoo@mail.yahoo.com> <56e32bf3.8af68c0a.5611e.6673@mx.google.com> Message-ID: <56E3413E.6050605@riseup.net> juan wrote: > On Fri, 11 Mar 2016 07:34:20 +0000 (UTC) > jim bell wrote: > >> From: Georgi Guninski >> >> To: cypherpunks at cpunks.org >> >>> Remember the Fukushima nuclear disaster and the causes for it? >> >> Sure, the fools put a nuclear reactor in a location susceptible to >> both earthquakes and tsunamis...and then they forgot to provide for >> cooling the core to prevent meltdown in case they had to 'scram' the >> reaction. > > "The reactors for Units 1, 2, and 6 were supplied by General > Electric, those for Units 3 and 5 by Toshiba, and Unit 4 by Hitachi. > > All six reactors were designed by General Electric." > > > https://en.wikipedia.org/wiki/Fukushima_Daiichi_Nuclear_Power_Plant > > > Nuclear Radiation as a rational energy source for boiling water aside, it's a 'real estate problem' Location Location Location! Not that the design engineering is all that... Recently, within the last week or so in California a skin diver accidentally got into the cooling intake system for a nuclear power plant. I'd guess they can't really put screens on the inlets as trash would quickly clog it but you'd think, with all the millions of dollars spent on designing these things they would have come up with some way of keeping debris, and errant divers, out. It's been discussed, and has been hanging fire since 2010... So I'd guess keeping a tsunami from swamping a reactor after a major earthquake isn't water cooler talk at GE. http://articles.latimes.com/2010/mar/01/local/la-me-cooling1-2010mar01 -- RR "Through counter-intelligence it should be possible to pinpoint potential trouble-makers ... And neutralize them, neutralize them, neutralize them" -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From admin at pilobilus.net Fri Mar 11 11:32:05 2016 From: admin at pilobilus.net (Steve Kinney) Date: Fri, 11 Mar 2016 14:32:05 -0500 Subject: Remember, remember the Fukushima nuclear disaster on this day? In-Reply-To: <20160311082432.GB1919@sivokote.iziade.m$> References: <20160311064333.GA1919@sivokote.iziade.m$> <632367055.8137868.1457681660487.JavaMail.yahoo@mail.yahoo.com> <20160311082432.GB1919@sivokote.iziade.m$> Message-ID: <56E31D35.7010702@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 03/11/2016 03:24 AM, Georgi Guninski wrote: > Is there relatively objective study about the damages Fukushima > vs Chernobyl? > > (What I read was flamewars or propaganda). I haven't seen such a comparison, although from my reading it appears that the Russian government may have done a better job with their evacuation - understandable, because tsunami. And, after first exhausting every wrong answer (Russian military used conventional firefighting methods, greatly exacerbating the situation), they finally listened to the engineers and stabilized the remains of the melted reactor. Not so the Japanese; last I heard they have not even /located/ the fissionable material that's still cooking merrily along. According to a National Geographic article citing Japanese govt. sources, groundwater from under the Fukushima complex was entering the Pacific at a rate of 300 tons daily. Same article said strontium 90 was 100 times more abundant than cesium isotopes in collected waste water stored on-site. http://news.nationalgeographic.com/news/energy/2013/08/130807-fukush ima-radioactive-water-leak/ Reuters article from 2012: "Small amounts of cesium-137 and cesium-134 were detected in 15 tuna caught near San Diego in August 2011, about four months after these chemicals were released into the water off Japan's east coast, scientists reported on Monday ." http://www.reuters.com/article/us-japan-nuclear-tuna-idUSBRE84R0MF20 120528 Strotium was not tested for, as that costs way more than looking for cesium isotopes. Fun fact: Strontium 90 mimics calcium and concentrates in food chains. The Japan Current runs north to the Aleutians and east to North America. But the Pacific based seafood industries can breathe easy: USDA has increases allowable levels of hot isotopes, and if you can't prove in Court that a particular environmental source caused your cancer, nobody is liable. So, how much /worse/ is Fukushima than Chernobyl? As Gully Foyle would say, "guesses for grabs." My guess is, in terms of long term environmental and human health, way worse. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQIcBAEBAgAGBQJW4x00AAoJEDZ0Gg87KR0LrbkQAKYA1+IKdoXvJhbBJipWrWYy pl1plcrbOv9da82jiAtCxBpFyzzA/W5tFEpSBZsTSvzGjmipOWbmE3dMUOT/HGx/ CkiN46qMlsX+p6T6AkgOsB0Yp/HvctHPlURVFAyGuqFkQP2XMYd1fe/hOCjszb0Y nIh419uuZ2D8Ck0vSwEwgTAzhuUqQlBVaN/p7y7XRHNDrE6v6DorfzDuwqMcEnKH k+JMXkQ/ZpX0vL1E3Y4sDYlWzEe2heMOindAQRl4zDRzIGcxR1oeCA5+AC7oyrez 0zp8LRpNQTvGg/XLIRRuTBQgCrbLaHpuFr4mApdPq4NXZglRld2L5rdD/bUHN5TR 1LP85csAhHmxDGHlTAO7omJZC/k1gCqzUawP271A3dwLagZ4ehQnCDm8xJglHe1o GqkI/Rg+obhu1dJWVIJ/4zalfa1gGVUmON0u/PODycWIUREk2wuURTMcOg6FF+V/ lPA4r8s8nY8ycAWCP9iY9x3K7HQWi/AswCC2a4pJF1qk+OMmyobAugNEmwz2yJla yLoB35Djn341bJN0Cnhn17PRZtV6/rj4oGg3rOeX0NwLlXepye82H/vz4mw9Qy7a sjD7g9r542rXfc+kh368oMWCcAS5XooymcgfqLekdL/5ABIdFZVjYy4r+jy5M+dA ZVxU1IMI5uwCxaDrRH+G =/WBq -----END PGP SIGNATURE----- From jason.mcvetta at gmail.com Fri Mar 11 14:51:13 2016 From: jason.mcvetta at gmail.com (Jason McVetta) Date: Fri, 11 Mar 2016 14:51:13 -0800 Subject: On XML - was Fwd: [Yaml-core] Next YAML: drop equality definition In-Reply-To: References: Message-ID: On Fri, Mar 11, 2016 at 2:28 PM, Zenaan Harkness wrote: > Nope. The next choice will be YAML 2. Then the next choice will be > JSON 1. Then the next choice will be JSON 2. Then the next choice will > be native serialization in your language of choice. Then custom binary > serialization. Then a continually permutating algorithmic mixing > stream, just for laughs. There are infinite alternatives to XML and if > worse comes to worst, I suggest hard transcoding your data into COBOL > statements and serializing those in Base63. > XML is a pain to write by hand, for sure. But one shouldn't be doing that. There are perfectly good libraries for working with XML in almost every programming language. It's a bit over-engineered, but one really can represent almost any sort of data as XML. (Whether that's a good idea is a whole different question.) YAML is a lot easier to write a small file by hand, but it's kinda brittle & easy to fuck up. Not nearly as expressive as XML either. Great for small config files; imho not so great for most other things. JSON strikes a nice balance between expressiveness and human readability. That's probably why REST (or if you eschew buzzwords, JSON over HTTP) is so popular these days. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1843 bytes Desc: not available URL: From juan.g71 at gmail.com Fri Mar 11 12:34:04 2016 From: juan.g71 at gmail.com (juan) Date: Fri, 11 Mar 2016 17:34:04 -0300 Subject: Remember, remember the Fukushima nuclear disaster on this day? In-Reply-To: <632367055.8137868.1457681660487.JavaMail.yahoo@mail.yahoo.com> References: <20160311064333.GA1919@sivokote.iziade.m$> <632367055.8137868.1457681660487.JavaMail.yahoo@mail.yahoo.com> Message-ID: <56e32bf3.8af68c0a.5611e.6673@mx.google.com> On Fri, 11 Mar 2016 07:34:20 +0000 (UTC) jim bell wrote: > From: Georgi Guninski > > To: cypherpunks at cpunks.org > > >Remember the Fukushima nuclear disaster and the causes for it? > > > Sure, the fools put a nuclear reactor in a location susceptible to > both earthquakes and tsunamis...and then they forgot to provide for > cooling the core to prevent meltdown in case they had to 'scram' the > reaction. "The reactors for Units 1, 2, and 6 were supplied by General Electric, those for Units 3 and 5 by Toshiba, and Unit 4 by Hitachi. All six reactors were designed by General Electric." https://en.wikipedia.org/wiki/Fukushima_Daiichi_Nuclear_Power_Plant From jya at pipeline.com Fri Mar 11 15:15:03 2016 From: jya at pipeline.com (John Young) Date: Fri, 11 Mar 2016 18:15:03 -0500 Subject: [Cryptography] Apple Attorneys Move to Join CA and NY Cases In-Reply-To: References: Message-ID: At 01:26 PM 3/11/2016, John Young wrote: >USG-Apple EDNY - Apple Attorneys Move to Join CA and NY Cases >https://cryptome.org/2016/03/usg-apple-edny-031-034.pdf > Correction: this is not a joining of cases, only an Apple request for extension of time to respond and filing of pro hac vices by 3 CDCA attorneys in EDNY. No way will the CA and NY attorneys plot together, absolutely not. All the attorneys and eagle eyes who objected to our title unanimously agree, offensively and defensively, a couple irately, guiltily. But some of those have a stake in the furious practice of PHVs. Shortly thereafter USG filed an objection to the extension of time: https://cryptome.org/2016/03/usg-apple-edny-035.pdf From admin at pilobilus.net Fri Mar 11 15:28:30 2016 From: admin at pilobilus.net (Steve Kinney) Date: Fri, 11 Mar 2016 18:28:30 -0500 Subject: Remember, remember the Fukushima nuclear disaster on this day? In-Reply-To: <56E3413E.6050605@riseup.net> References: <20160311064333.GA1919@sivokote.iziade.m$> <632367055.8137868.1457681660487.JavaMail.yahoo@mail.yahoo.com> <56e32bf3.8af68c0a.5611e.6673@mx.google.com> <56E3413E.6050605@riseup.net> Message-ID: <56E3549E.5020108@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 03/11/2016 05:05 PM, Rayzer wrote: > Nuclear Radiation as a rational energy source for boiling water > aside, it's a 'real estate problem' > > Location Location Location! Lemme drag out my soap box... I have a three point plan for safe nuclear power: 1) Repeal the industry's blanket immunity from prosecution for civil liabilities. If it's so safe, why do the owners need to be above the law? 2) Remove the industry's public funding, which presently includes massive subsidies on many fronts. If it's such a freakin' technology miracle, it can pay for itself. 3) Open source every detail of design, construction, operation, QA and safety inspection, and decommissioning of nuclear power plants and their inputs/ouputs (fuel, waste), with publication as near to realtime as materially possible. Near-miss and slow-leak containment breaches due to noncompliance with inspection schedules need to just go away. In the United States, compliance with part 1 would end all investment in, and operation of, nuclear power plants: No investor or insurance provider will underwrite a nuclear power plant's exposure under equally applied tort law. Compliance with part 2 would disentangle the nuclear power industry from the nuclear warhead and military reactor industry, its de facto sponsor and sugar daddy - as well as removing tax incentives and "free money" awarded by Utilities Commissions. No free ride on the public's nickel means no nuclear power industry, balance-sheet wise. Part 3, which invokes "many eyeballs" to assure maybe just barely safe enough for optimists safety, would unleash a massive shitstorm/clusterfuck of commercial and military secrecy issues, and require extraordinary budgets for QA compliance and reporting. Oops, that too should be enough by itself to shut the industry down . Me no rikey nuclear electric power plants. The Obama Administration's firmly committed support of the nuclear power industry reflects an ideological and political-economy mandate to reduce global carbon emissions while /preserving/ centralized ownership, control and income from power generation. Decentralized solutions are non-starters because high-density power generation means high-density capitalization and income streams. /soap box -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQIcBAEBAgAGBQJW41ScAAoJEDZ0Gg87KR0LugsQAJ3Vt0LwuedBIM4QS8BMefJt V5Z6xzF2wl8P6QW3Qoh0GE96tqV6ajo7imCq1wkkeI07NKjOfq+TGeKfcIh662nR vuIu9ZyY8Ei9N0MrkRsIWFarwc0E1F3FW+y1P8U6jQYa9I6O9Jr/BOdMWdDi55qE cqT/yBJNPcADy/v9lfBj7Q2uVuvWfQ7hTjn6rp7WIttzQyIiCUABuIzoO8XnPil6 sRfrXQ2G0WwYWgnW2GrfUHTgyGKiIZ82uazxLNTeHkNziH2ebHXya+o0N5rlviM6 c7ysfKulx7vBktfr+kz6cTjghLWp86WRFQgDSzT3r5WjnhBsFskxVZU33ADQdyD0 qe8em8C9DanelP78XkZHh43PJHKJ5X8QnhCbxX4itmKUtfz0sVK0VmJASJu1yXPF N/3pOLbOYvtZ6sG7HbOYnRZP4+GPr1/zmRvwoXMqnB/JY4N5j4g6Oe551svowwd9 Gm27kE2fTG7gMnkh2yvVuHvl8lCzSHv3mAscsLyZJeFLPV5x0Dtln+k+xeWE8Cy8 3M+geK+snNcW+7BAqxv0MzmM17HdmKElXE5JpvDvyHsg/GG1EScbTiOXrVZBthJN cIwQf4Isb6X8kf5/p9DCYvc8QsRdBDS5ieWEklrMWviDwCS3wUUcSMbQPvAwGb5X 4G4+u5JvVuWoxTG7dB5j =VFRs -----END PGP SIGNATURE----- From zen at freedbms.net Fri Mar 11 14:28:39 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Fri, 11 Mar 2016 22:28:39 +0000 Subject: Fwd: On XML - was Fwd: [Yaml-core] Next YAML: drop equality definition In-Reply-To: References: Message-ID: I only forward the last part of this email, since the rest is domain specific (YAML de/serialization minutiae). Z ---------- Forwarded message ---------- From: Zenaan Harkness Subject: Re: [Yaml-core] Next YAML: drop equality definition On 3/10/16, Osamu TAKEUCHI wrote: ... >> One of the reason we explicitly listed the goals, >>_in order_,was to break ties when different goals >>pushed us in different directions. Order the goals >>differently, and you'll get a different spec. I think >>you would end up with JSON if you ordered them in a >>different way. Or even, god help us, XML ;-) ... > If we give up YAML, the next choice will indeed be XML. Nope. The next choice will be YAML 2. Then the next choice will be JSON 1. Then the next choice will be JSON 2. Then the next choice will be native serialization in your language of choice. Then custom binary serialization. Then a continually permutating algorithmic mixing stream, just for laughs. There are infinite alternatives to XML and if worse comes to worst, I suggest hard transcoding your data into COBOL statements and serializing those in Base63. Nowhere would one willingly choose XML. Hell, I'd choose HTML if I was ordered to use XML on a project, just to make sure the next guy who touches that code knows that the serialization format has to be changed. Manager: "Z, did you finish that, what's it called again? Yeah, the XML serialization?" Me: "Sure did! And it's Netscape 3.1 compatible too." HTML Manager: "Oh, cool! That's just great! I knew I'd finish on time, and I'll tell marketing our new name too, 'NewScope compatible' - has a great ring to it. Great ring! Good job Z, you'll go places you know. Go places in this world!" > Actually, my library is build to replace XML serializer > that is provided by C#. Since we want YAML to be able > to serialize both kinds of documents, we have to think > the best balance. Should be easy. Anything's more enjoyable than XML... whoops, there I go again... :) From zen at freedbms.net Fri Mar 11 16:05:24 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Sat, 12 Mar 2016 00:05:24 +0000 Subject: On XML - was Fwd: [Yaml-core] Next YAML: drop equality definition In-Reply-To: References: Message-ID: > YAML is a lot easier to write a small file by hand, but it's kinda brittle > & easy to fuck up. Not nearly as expressive as XML either. Great for > small config files; imho not so great for most other things. > > JSON strikes a nice balance between expressiveness and human readability. > That's probably why REST (or if you eschew buzzwords, JSON over HTTP) is so > popular these days. Unfortunately JSON requires quotes around everything, which on English keyboards requires the same + keypresses as XML. Might look a little better than XML, but not a lot better for editing/ typing files... From grarpamp at gmail.com Fri Mar 11 23:13:39 2016 From: grarpamp at gmail.com (grarpamp) Date: Sat, 12 Mar 2016 02:13:39 -0500 Subject: Obama At SXSW: No On Personal Secure Crypto And Decentral Cryptocurrencies Message-ID: https://news.ycombinator.com/item?id=11270529 http://yro.slashdot.org/story/16/03/11/2336205/obama-government-cant-let-smartphones-be-black-boxes https://www.reddit.com/r/Bitcoin/comments/4a1hcp/obama_indirectly_attacks_bitcoin_users_at_sxsw_if Because terrists and children of course. Typical govt drivel, strategy, and game playing position rollout timeline. Attn Peeps... ur bein 0wn3d. From guninski at guninski.com Fri Mar 11 22:06:11 2016 From: guninski at guninski.com (Georgi Guninski) Date: Sat, 12 Mar 2016 08:06:11 +0200 Subject: Remember, remember the Fukushima nuclear disaster on this day? In-Reply-To: <56E31D35.7010702@pilobilus.net> References: <20160311064333.GA1919@sivokote.iziade.m$> <632367055.8137868.1457681660487.JavaMail.yahoo@mail.yahoo.com> <20160311082432.GB1919@sivokote.iziade.m$> <56E31D35.7010702@pilobilus.net> Message-ID: <20160312060611.GA1464@sivokote.iziade.m$> On Fri, Mar 11, 2016 at 02:32:05PM -0500, Steve Kinney wrote: > Aleutians and east to North America. But the Pacific based > seafood industries can breathe easy: USDA has increases allowable > levels of hot isotopes, and if you can't prove in Court that a > particular environmental source caused your cancer, nobody is > liable. > Radiation therapy kills due to software bugs: http://royal.pingdom.com/2009/03/19/10-historical-software-bugs-with-extreme-consequences/ From guninski at guninski.com Sat Mar 12 01:29:16 2016 From: guninski at guninski.com (Georgi Guninski) Date: Sat, 12 Mar 2016 11:29:16 +0200 Subject: [OT] Would someone please check if links2 and elinks verify certificates on clean install of Debian 8? Message-ID: <20160312092916.GB1464@sivokote.iziade.m$> Apologies for offtopic (this might be mildly ontopic about the current state of crypto in open source). Would someone please check if links2 and elinks verify certificates on fresh install of Debian 8? To verify, try to open site which doesn't properly chain to trusted root, say https://cacert.org (unless you trust their root ) and check if it opens or there is error/warning. For me, on updated system, both don't verify certificates. Looks like at least ubuntu and fedora killed the elinks bug long ago. Searching the web for "$browser self signed certificate" shows some relevant results. From themikebest at gmail.com Sat Mar 12 10:18:50 2016 From: themikebest at gmail.com (Michael Best) Date: Sat, 12 Mar 2016 13:18:50 -0500 Subject: SPICE: Special Purpose Integrated Communications Equipment Message-ID: Does anyone know ANYTHING about Special Purpose Integrated Communications Equipment (SPICE) or a Special Purpose Integrated Communications (SPICECOM) center in Nevada? -- Veritas aequitas liberabit vos Veri universum vici That 1 Archive @NatSecGeek -----BEGIN PGP PUBLIC KEY BLOCK----- Version: SKS 1.1.5 Comment: Hostname: pgp.mit.edu mQINBChG9zoBEADKzALG4UHCjY6L9OFUxWRVGGCW7LY71K2EAK/0jkRh1wPkJ4chPaVJ3vVD nJ0d8HxsyR5R3+y7GH6GCc/tK0IDPJah+xpQnraS1nWUvAlSaaxsBK4hJfuVGyfBg/joQVKU OhpqJLQhRIkUWk30QC94IbOKiCTb6V4pStLYyrLieewjT481vvRIYp/48IS5eiveZW0/IpcA HBON7xJw6P1murC8PNOJSWRCp9FJhcs3wIPG3cFTfsxSZnGcoivMgFLtGAfLbztpZkcHEMOR 4qamVvirzYGHma0UlOzyNr7xpxyLXFsU5kKzQ8Az2nP1GG7vuqXSjPNLIvvHFL+g+gKuCe9W xTa9Ac038RRSiBGdDrvTFpQ/h9h5GWIHP7nsA4TCeZSpL81aqp7Cb0MK3KPQmteTPIujVCnx jXXHrOe9Tj6iYUU8edApISyBEVFZMd+EtfDEDf/ZwDjzSGE85vv1dZ/ck7iJvS8FwM8hsRBG U9huCKiItGs26teUJ2Sum49YaEiDL4QLQhJ+FbsAusxJg+V3GE/4w75K/6/czT0p10Mf66Uo fRFTvYRE7S6CNDxzTI4q7+pnRlxMBduGC33KY4eq4Py/O3LWHBDxZ+LffIa/tWcB/7oZ6yDo bdWleNk5wnJdPGr6lUTHTM4tpDIEcXYpvjzyLcMtg4tFm/Dc0QARAQABtGVNaWNoYWVsIEJl c3QgKFByaXZhdGUsIG5vdCBzZWN1cmUuIEZvciBzZWN1cmUgZW1haWwsIHJlcXVlc3QgYSBv bmUtdGltZSBrZXkuKSA8dGhlbWlrZWJlc3RAZ21haWwuY29tPokCPQQTAQoAJwUCKEb3OgIb AwUJNXc1AAULCQgHAwUVCgkICwUWAgMBAAIeAQIXgAAKCRCiYH9hY4dAS3e+D/sFwyJER4/4 ZnHYC/1EzCpHeDikSmULEgsvNgzo73thOV9/Q2I8mCJTlQjsK4rZ2YiDzi4b0CN8kzjpxtVz BsBsxfyPLrdH4VoqeqeBVzbwHxSk7bYUI3vFt+e3gBgpAxbVfPXCnYUnWPRlr9dc/JZoPJH4 p8yRIqktehbAE3Fa3gkfrXJ5e6+/nKlQhikyvo9VuErrLpPMXBzOq4/2LVfurkcOzlp1RBjs hWr6B98EiOXs44ZGLEkINxJiW8koFhw/WDuON8LKi/DtLiqqtBVTjrkqKCuKzSAVncGGcEVO 3Om3aOIOvG0do/wQKYXnpbeGsHwx2PGrJ7H+lb2bIb5KhbZkbG4rMTjsVnuGN+IF4BxBhmGz MYoooWy4VCLL0o8keomU8JPXt+fZDqJ9sNjY/asTsjOa6aE3bIa6w3mWUeefGwA25oXur3Rr L3wmu1pPzCejumfA1X93dS9UZS3xni+7W34g6YbsREuaZ+YBxFLN227JXAx2pEdjLsuVOaqM 9CO7ARHsxDZoE9U7n0s3txnSw/2YYwjEK1wDhdLnHBL3ZzaAcaHnpzsTYQAVW7uXKKHhzeSK GP3O4ByCisM/7WLFvIIpaNNs85jI1PvKH0GutSTl9xXDfWuYMl9rwwbteBB/oGSxlIFe0pqq IDNfAJdR/HjTLqrTES2wdXJS1bkCDQQoRvc6ARAAmltXrhVfpePdIFrfEHCet4nkQvmRI+AX rUgiNlxQDW8M5FzlUfT2xpMXHMWuKehTYpFq7bNbFi+fwBhMajgvgDsTuLInftKSFp+sisbR n8psv7CpGB4jp0Xd4y1Wm/HejV/kga0kcUVVetaqyzgZedn1UnccQRzDBVWW2j2ed+hi/8g0 /d7mbVG81yzJo8tLidM90xFF7JGlijm0dBAqmhD4UgkxSnJQ3PK5onqdjdbx7HkP68RrkeTQ vhWK1978qzdSl9ljJ0jLnoAaDNPs5Dj/TyYCtqoKHUqMbTwU5nIQnJG7geMeSw/7OVnKlypF Rs/JesZzMBooZTRxZJuIB/q0wOfE/MYTwGSwLs2brUwJFJ6bSYmerZ+81S8W/Y4mehJ3o6Vl SabrrVN+LlBfUuRqd5U909WECzk6HVnwnRfL07zD+1y5cLU+e4MQs2227kLriTIxtDZ/umeG hKQgNgFGTAPHJxA96xGvQ8Ovv+XEivlO0jxBNMIiopNSlMDE+k3nigWHuavt9LUUCOd45aw7 0pgKstQQgpFfVAwV98LPpUKxa61q6wQiQHAcP7YxuQG0dsr4nUq2xids5l1IpOLzZJ3nRThM k7alkljBbqphbocV3FsSXOkpcSWns94k1QGmrPzEPLF0FHFBG6whWoaoEySMkdsN1zVu4GMU o2EAEQEAAYkCJQQYAQoADwUCKEb3OgIbDAUJNXc1AAAKCRCiYH9hY4dASzTaEACKXVgc8KmZ xWyYTUQgIwrj3J/re68uIilq0iBBDocgEZZpxyf6lD1V3IKBjAPpWyYHMrrrLY64rFDR+8DE Xyhm1Wv2S6YJuWJtyAlS4bciXjJE6evirIH5GoFq++vzsufRaudAoQ56hJ0+Z3dNMMWZ6YuP zWNNL2tvpdo3Nvd8bqiADWSffFdIPv5Yj/mZsXmaDN+7iWYlAdCrubGyGzFHlCh26Ghu6SS0 /u8x1/Oi7ma7fUMFnEsFiYjwBkD3pQKK1dm7j2f1OMxi8uky8vgBgx40aeJkoUgEvIHWsCIi CWVTyfiGeWIcKbK7tYP5jsjV5fUv+TaQ1pApt++Pyop1aogfQ8icNBQQkdX6E4gNhnPOPTM8 FTl69Tq5Ori5+TM8VM0iPGiydlcAXIAD3OyR4tZM12Ga1AtppKjx31EyDB4SPzUmDWRy5WgG NRH3+RgiK/iXVcvLdFIKj3/AvctSLdbayyaFD8zrE/wcMzLfie+iE231+rG/7gmcR3H1rcYE vxvmWAPikLQKiMUpPBNSvfLPUTrwNSGiZ5ieAAPgOooc3u5nohwZmEW1pg6HirZgIAgAYuyL aLgnikwH70guiQ4Ufsih3gy0ddsUwliUTtbYQyX0OBQoTUyaiXPy0Wu2FJfsxiW8X9Lu9pIH KOwU9K76VKot+UikGqeFQsS/Ig== =M+du -----END PGP PUBLIC KEY BLOCK----- -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4198 bytes Desc: not available URL: From themikebest at gmail.com Sat Mar 12 11:40:56 2016 From: themikebest at gmail.com (Michael Best) Date: Sat, 12 Mar 2016 14:40:56 -0500 Subject: Foreign Intelligence Relations Management System (FIRMS) Message-ID: Anyone heard of Foreign Intelligence Relations Management System (FIRMS)? All I can dig up ATM is the abbreviation itself. Not sure if it's State, CIA, or etc. jurisdiction -- Veritas aequitas liberabit vos Veri universum vici That 1 Archive @NatSecGeek -----BEGIN PGP PUBLIC KEY BLOCK----- Version: SKS 1.1.5 Comment: Hostname: pgp.mit.edu mQINBChG9zoBEADKzALG4UHCjY6L9OFUxWRVGGCW7LY71K2EAK/0jkRh1wPkJ4chPaVJ3vVD nJ0d8HxsyR5R3+y7GH6GCc/tK0IDPJah+xpQnraS1nWUvAlSaaxsBK4hJfuVGyfBg/joQVKU OhpqJLQhRIkUWk30QC94IbOKiCTb6V4pStLYyrLieewjT481vvRIYp/48IS5eiveZW0/IpcA HBON7xJw6P1murC8PNOJSWRCp9FJhcs3wIPG3cFTfsxSZnGcoivMgFLtGAfLbztpZkcHEMOR 4qamVvirzYGHma0UlOzyNr7xpxyLXFsU5kKzQ8Az2nP1GG7vuqXSjPNLIvvHFL+g+gKuCe9W xTa9Ac038RRSiBGdDrvTFpQ/h9h5GWIHP7nsA4TCeZSpL81aqp7Cb0MK3KPQmteTPIujVCnx jXXHrOe9Tj6iYUU8edApISyBEVFZMd+EtfDEDf/ZwDjzSGE85vv1dZ/ck7iJvS8FwM8hsRBG U9huCKiItGs26teUJ2Sum49YaEiDL4QLQhJ+FbsAusxJg+V3GE/4w75K/6/czT0p10Mf66Uo fRFTvYRE7S6CNDxzTI4q7+pnRlxMBduGC33KY4eq4Py/O3LWHBDxZ+LffIa/tWcB/7oZ6yDo bdWleNk5wnJdPGr6lUTHTM4tpDIEcXYpvjzyLcMtg4tFm/Dc0QARAQABtGVNaWNoYWVsIEJl c3QgKFByaXZhdGUsIG5vdCBzZWN1cmUuIEZvciBzZWN1cmUgZW1haWwsIHJlcXVlc3QgYSBv bmUtdGltZSBrZXkuKSA8dGhlbWlrZWJlc3RAZ21haWwuY29tPokCPQQTAQoAJwUCKEb3OgIb AwUJNXc1AAULCQgHAwUVCgkICwUWAgMBAAIeAQIXgAAKCRCiYH9hY4dAS3e+D/sFwyJER4/4 ZnHYC/1EzCpHeDikSmULEgsvNgzo73thOV9/Q2I8mCJTlQjsK4rZ2YiDzi4b0CN8kzjpxtVz BsBsxfyPLrdH4VoqeqeBVzbwHxSk7bYUI3vFt+e3gBgpAxbVfPXCnYUnWPRlr9dc/JZoPJH4 p8yRIqktehbAE3Fa3gkfrXJ5e6+/nKlQhikyvo9VuErrLpPMXBzOq4/2LVfurkcOzlp1RBjs hWr6B98EiOXs44ZGLEkINxJiW8koFhw/WDuON8LKi/DtLiqqtBVTjrkqKCuKzSAVncGGcEVO 3Om3aOIOvG0do/wQKYXnpbeGsHwx2PGrJ7H+lb2bIb5KhbZkbG4rMTjsVnuGN+IF4BxBhmGz MYoooWy4VCLL0o8keomU8JPXt+fZDqJ9sNjY/asTsjOa6aE3bIa6w3mWUeefGwA25oXur3Rr L3wmu1pPzCejumfA1X93dS9UZS3xni+7W34g6YbsREuaZ+YBxFLN227JXAx2pEdjLsuVOaqM 9CO7ARHsxDZoE9U7n0s3txnSw/2YYwjEK1wDhdLnHBL3ZzaAcaHnpzsTYQAVW7uXKKHhzeSK GP3O4ByCisM/7WLFvIIpaNNs85jI1PvKH0GutSTl9xXDfWuYMl9rwwbteBB/oGSxlIFe0pqq IDNfAJdR/HjTLqrTES2wdXJS1bkCDQQoRvc6ARAAmltXrhVfpePdIFrfEHCet4nkQvmRI+AX rUgiNlxQDW8M5FzlUfT2xpMXHMWuKehTYpFq7bNbFi+fwBhMajgvgDsTuLInftKSFp+sisbR n8psv7CpGB4jp0Xd4y1Wm/HejV/kga0kcUVVetaqyzgZedn1UnccQRzDBVWW2j2ed+hi/8g0 /d7mbVG81yzJo8tLidM90xFF7JGlijm0dBAqmhD4UgkxSnJQ3PK5onqdjdbx7HkP68RrkeTQ vhWK1978qzdSl9ljJ0jLnoAaDNPs5Dj/TyYCtqoKHUqMbTwU5nIQnJG7geMeSw/7OVnKlypF Rs/JesZzMBooZTRxZJuIB/q0wOfE/MYTwGSwLs2brUwJFJ6bSYmerZ+81S8W/Y4mehJ3o6Vl SabrrVN+LlBfUuRqd5U909WECzk6HVnwnRfL07zD+1y5cLU+e4MQs2227kLriTIxtDZ/umeG hKQgNgFGTAPHJxA96xGvQ8Ovv+XEivlO0jxBNMIiopNSlMDE+k3nigWHuavt9LUUCOd45aw7 0pgKstQQgpFfVAwV98LPpUKxa61q6wQiQHAcP7YxuQG0dsr4nUq2xids5l1IpOLzZJ3nRThM k7alkljBbqphbocV3FsSXOkpcSWns94k1QGmrPzEPLF0FHFBG6whWoaoEySMkdsN1zVu4GMU o2EAEQEAAYkCJQQYAQoADwUCKEb3OgIbDAUJNXc1AAAKCRCiYH9hY4dASzTaEACKXVgc8KmZ xWyYTUQgIwrj3J/re68uIilq0iBBDocgEZZpxyf6lD1V3IKBjAPpWyYHMrrrLY64rFDR+8DE Xyhm1Wv2S6YJuWJtyAlS4bciXjJE6evirIH5GoFq++vzsufRaudAoQ56hJ0+Z3dNMMWZ6YuP zWNNL2tvpdo3Nvd8bqiADWSffFdIPv5Yj/mZsXmaDN+7iWYlAdCrubGyGzFHlCh26Ghu6SS0 /u8x1/Oi7ma7fUMFnEsFiYjwBkD3pQKK1dm7j2f1OMxi8uky8vgBgx40aeJkoUgEvIHWsCIi CWVTyfiGeWIcKbK7tYP5jsjV5fUv+TaQ1pApt++Pyop1aogfQ8icNBQQkdX6E4gNhnPOPTM8 FTl69Tq5Ori5+TM8VM0iPGiydlcAXIAD3OyR4tZM12Ga1AtppKjx31EyDB4SPzUmDWRy5WgG NRH3+RgiK/iXVcvLdFIKj3/AvctSLdbayyaFD8zrE/wcMzLfie+iE231+rG/7gmcR3H1rcYE vxvmWAPikLQKiMUpPBNSvfLPUTrwNSGiZ5ieAAPgOooc3u5nohwZmEW1pg6HirZgIAgAYuyL aLgnikwH70guiQ4Ufsih3gy0ddsUwliUTtbYQyX0OBQoTUyaiXPy0Wu2FJfsxiW8X9Lu9pIH KOwU9K76VKot+UikGqeFQsS/Ig== =M+du -----END PGP PUBLIC KEY BLOCK----- -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4205 bytes Desc: not available URL: From juan.g71 at gmail.com Sat Mar 12 11:51:33 2016 From: juan.g71 at gmail.com (juan) Date: Sat, 12 Mar 2016 16:51:33 -0300 Subject: SPICE: Special Purpose Integrated Communications Equipment In-Reply-To: References: Message-ID: <56e4737a.c51c8c0a.27f26.ffffec8d@mx.google.com> On Sat, 12 Mar 2016 13:18:50 -0500 Michael Best wrote: > Does anyone know ANYTHING about Special Purpose Integrated > Communications Equipment (SPICE) or a Special Purpose Integrated > Communications (SPICECOM) center in Nevada? > Yes, it was created by Jesus and the Master American Race to protect American Children from terrorism and to exterminate any evil entity that opposes american supremacy. From juan.g71 at gmail.com Sat Mar 12 11:51:59 2016 From: juan.g71 at gmail.com (juan) Date: Sat, 12 Mar 2016 16:51:59 -0300 Subject: Foreign Intelligence Relations Management System (FIRMS) In-Reply-To: References: Message-ID: <56e47394.0b50370a.c5664.ffffe8df@mx.google.com> On Sat, 12 Mar 2016 14:40:56 -0500 Michael Best wrote: > Anyone heard of Foreign Intelligence Relations Management System > (FIRMS)? All I can dig up ATM is the abbreviation itself. Not sure if > it's State, CIA, or etc. jurisdiction > Yes, it was created by Jesus and the Master American Race to protect American Children from terrorism and to exterminate any evil entity that opposes american supremacy. From Rayzer at riseup.net Sat Mar 12 18:19:26 2016 From: Rayzer at riseup.net (Rayzer) Date: Sat, 12 Mar 2016 18:19:26 -0800 Subject: Foreign Intelligence Relations Management System (FIRMS) In-Reply-To: References: Message-ID: <56E4CE2E.1090804@riseup.net> Michael Best wrote: > Anyone heard of Foreign Intelligence Relations Management System > (FIRMS)? All I can dig up ATM is the abbreviation itself. Not sure if > it's State, CIA, or etc. jurisdiction > > -- https://fas.org/irp/cfr.html maybe. No direct mention but... -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From rysiek at hackerspace.pl Sat Mar 12 14:04:43 2016 From: rysiek at hackerspace.pl (rysiek) Date: Sat, 12 Mar 2016 23:04:43 +0100 Subject: [OT] Would someone please check if links2 and elinks verify certificates on clean install of Debian 8? In-Reply-To: <20160312092916.GB1464@sivokote.iziade.m$> References: <20160312092916.GB1464@sivokote.iziade.m$> Message-ID: <1513592.hl1PrHAnzv@lapuntu> Dnia sobota, 12 marca 2016 11:29:16 Georgi Guninski pisze: > Apologies for offtopic (this might be mildly ontopic about the current > state of crypto in open source). > > Would someone please check if links2 and elinks verify certificates on > fresh install of Debian 8? > > To verify, try to open site which doesn't properly chain to trusted > root, say https://cacert.org (unless you trust their root ) and check > if it opens or there is error/warning. > > For me, on updated system, both don't verify certificates. Verified on a clean Debian 8 install. -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From zen at freedbms.net Sat Mar 12 15:29:26 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Sat, 12 Mar 2016 23:29:26 +0000 Subject: SPICE: Special Purpose Integrated Communications Equipment In-Reply-To: References: Message-ID: I still find that signature of your Mike, just makes me so secure about your 1 sentence email -warm fuzzies in my heart. A toast, to Mike the trusty. :) On 3/12/16, Michael Best wrote: > Does anyone know ANYTHING about Special Purpose Integrated Communications > Equipment (SPICE) or a Special Purpose Integrated Communications (SPICECOM) > center in Nevada? > > -- > Veritas aequitas liberabit vos > Veri universum vici > > That 1 Archive > @NatSecGeek > > -----BEGIN PGP PUBLIC KEY BLOCK----- > > Version: SKS 1.1.5 > Comment: Hostname: pgp.mit.edu > > mQINBChG9zoBEADKzALG4UHCjY6L9OFUxWRVGGCW7LY71K2EAK/0jkRh1wPkJ4chPaVJ3vVD > nJ0d8HxsyR5R3+y7GH6GCc/tK0IDPJah+xpQnraS1nWUvAlSaaxsBK4hJfuVGyfBg/joQVKU > OhpqJLQhRIkUWk30QC94IbOKiCTb6V4pStLYyrLieewjT481vvRIYp/48IS5eiveZW0/IpcA > HBON7xJw6P1murC8PNOJSWRCp9FJhcs3wIPG3cFTfsxSZnGcoivMgFLtGAfLbztpZkcHEMOR > 4qamVvirzYGHma0UlOzyNr7xpxyLXFsU5kKzQ8Az2nP1GG7vuqXSjPNLIvvHFL+g+gKuCe9W > xTa9Ac038RRSiBGdDrvTFpQ/h9h5GWIHP7nsA4TCeZSpL81aqp7Cb0MK3KPQmteTPIujVCnx > jXXHrOe9Tj6iYUU8edApISyBEVFZMd+EtfDEDf/ZwDjzSGE85vv1dZ/ck7iJvS8FwM8hsRBG > U9huCKiItGs26teUJ2Sum49YaEiDL4QLQhJ+FbsAusxJg+V3GE/4w75K/6/czT0p10Mf66Uo > fRFTvYRE7S6CNDxzTI4q7+pnRlxMBduGC33KY4eq4Py/O3LWHBDxZ+LffIa/tWcB/7oZ6yDo > bdWleNk5wnJdPGr6lUTHTM4tpDIEcXYpvjzyLcMtg4tFm/Dc0QARAQABtGVNaWNoYWVsIEJl > c3QgKFByaXZhdGUsIG5vdCBzZWN1cmUuIEZvciBzZWN1cmUgZW1haWwsIHJlcXVlc3QgYSBv > bmUtdGltZSBrZXkuKSA8dGhlbWlrZWJlc3RAZ21haWwuY29tPokCPQQTAQoAJwUCKEb3OgIb > AwUJNXc1AAULCQgHAwUVCgkICwUWAgMBAAIeAQIXgAAKCRCiYH9hY4dAS3e+D/sFwyJER4/4 > ZnHYC/1EzCpHeDikSmULEgsvNgzo73thOV9/Q2I8mCJTlQjsK4rZ2YiDzi4b0CN8kzjpxtVz > BsBsxfyPLrdH4VoqeqeBVzbwHxSk7bYUI3vFt+e3gBgpAxbVfPXCnYUnWPRlr9dc/JZoPJH4 > p8yRIqktehbAE3Fa3gkfrXJ5e6+/nKlQhikyvo9VuErrLpPMXBzOq4/2LVfurkcOzlp1RBjs > hWr6B98EiOXs44ZGLEkINxJiW8koFhw/WDuON8LKi/DtLiqqtBVTjrkqKCuKzSAVncGGcEVO > 3Om3aOIOvG0do/wQKYXnpbeGsHwx2PGrJ7H+lb2bIb5KhbZkbG4rMTjsVnuGN+IF4BxBhmGz > MYoooWy4VCLL0o8keomU8JPXt+fZDqJ9sNjY/asTsjOa6aE3bIa6w3mWUeefGwA25oXur3Rr > L3wmu1pPzCejumfA1X93dS9UZS3xni+7W34g6YbsREuaZ+YBxFLN227JXAx2pEdjLsuVOaqM > 9CO7ARHsxDZoE9U7n0s3txnSw/2YYwjEK1wDhdLnHBL3ZzaAcaHnpzsTYQAVW7uXKKHhzeSK > GP3O4ByCisM/7WLFvIIpaNNs85jI1PvKH0GutSTl9xXDfWuYMl9rwwbteBB/oGSxlIFe0pqq > IDNfAJdR/HjTLqrTES2wdXJS1bkCDQQoRvc6ARAAmltXrhVfpePdIFrfEHCet4nkQvmRI+AX > rUgiNlxQDW8M5FzlUfT2xpMXHMWuKehTYpFq7bNbFi+fwBhMajgvgDsTuLInftKSFp+sisbR > n8psv7CpGB4jp0Xd4y1Wm/HejV/kga0kcUVVetaqyzgZedn1UnccQRzDBVWW2j2ed+hi/8g0 > /d7mbVG81yzJo8tLidM90xFF7JGlijm0dBAqmhD4UgkxSnJQ3PK5onqdjdbx7HkP68RrkeTQ > vhWK1978qzdSl9ljJ0jLnoAaDNPs5Dj/TyYCtqoKHUqMbTwU5nIQnJG7geMeSw/7OVnKlypF > Rs/JesZzMBooZTRxZJuIB/q0wOfE/MYTwGSwLs2brUwJFJ6bSYmerZ+81S8W/Y4mehJ3o6Vl > SabrrVN+LlBfUuRqd5U909WECzk6HVnwnRfL07zD+1y5cLU+e4MQs2227kLriTIxtDZ/umeG > hKQgNgFGTAPHJxA96xGvQ8Ovv+XEivlO0jxBNMIiopNSlMDE+k3nigWHuavt9LUUCOd45aw7 > 0pgKstQQgpFfVAwV98LPpUKxa61q6wQiQHAcP7YxuQG0dsr4nUq2xids5l1IpOLzZJ3nRThM > k7alkljBbqphbocV3FsSXOkpcSWns94k1QGmrPzEPLF0FHFBG6whWoaoEySMkdsN1zVu4GMU > o2EAEQEAAYkCJQQYAQoADwUCKEb3OgIbDAUJNXc1AAAKCRCiYH9hY4dASzTaEACKXVgc8KmZ > xWyYTUQgIwrj3J/re68uIilq0iBBDocgEZZpxyf6lD1V3IKBjAPpWyYHMrrrLY64rFDR+8DE > Xyhm1Wv2S6YJuWJtyAlS4bciXjJE6evirIH5GoFq++vzsufRaudAoQ56hJ0+Z3dNMMWZ6YuP > zWNNL2tvpdo3Nvd8bqiADWSffFdIPv5Yj/mZsXmaDN+7iWYlAdCrubGyGzFHlCh26Ghu6SS0 > /u8x1/Oi7ma7fUMFnEsFiYjwBkD3pQKK1dm7j2f1OMxi8uky8vgBgx40aeJkoUgEvIHWsCIi > CWVTyfiGeWIcKbK7tYP5jsjV5fUv+TaQ1pApt++Pyop1aogfQ8icNBQQkdX6E4gNhnPOPTM8 > FTl69Tq5Ori5+TM8VM0iPGiydlcAXIAD3OyR4tZM12Ga1AtppKjx31EyDB4SPzUmDWRy5WgG > NRH3+RgiK/iXVcvLdFIKj3/AvctSLdbayyaFD8zrE/wcMzLfie+iE231+rG/7gmcR3H1rcYE > vxvmWAPikLQKiMUpPBNSvfLPUTrwNSGiZ5ieAAPgOooc3u5nohwZmEW1pg6HirZgIAgAYuyL > aLgnikwH70guiQ4Ufsih3gy0ddsUwliUTtbYQyX0OBQoTUyaiXPy0Wu2FJfsxiW8X9Lu9pIH > KOwU9K76VKot+UikGqeFQsS/Ig== > =M+du > -----END PGP PUBLIC KEY BLOCK----- > From grarpamp at gmail.com Sun Mar 13 01:35:55 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 13 Mar 2016 05:35:55 -0400 Subject: Intelius opt-out In-Reply-To: References: Message-ID: > https://www.intelius.com/optout > If you trust them. FWIW. Yeah, give them all your correct and private info they want in return for frontend mask of [potentially helpfully inaccurate] data, while their AUP/Privacy policy and secret practices still permit and gang rape you on the backside. Brilliant. Inject more bad data instead. From jya at pipeline.com Sun Mar 13 04:30:40 2016 From: jya at pipeline.com (John Young) Date: Sun, 13 Mar 2016 07:30:40 -0400 Subject: Apple in EDNY added as interested party in another iPhone case in EDNY Message-ID: Apple in EDNY added as interested party in another iPhone case in EDNY https://cryptome.org/2016/03/usg-apple-feng-edny-144.pdf (151 pp, 10MB) Magistrate Judge James Orenstein: The Clerk of Court shall add Apple Inc. as an interested party in United States v. Feng. All documents must be filed on both dockets. (Brodie, Margo) (Entered: 03/12/2016) From guninski at guninski.com Sat Mar 12 22:35:43 2016 From: guninski at guninski.com (Georgi Guninski) Date: Sun, 13 Mar 2016 08:35:43 +0200 Subject: participation in sensor networks In-Reply-To: <20160312221328.F2EB3A06DF9@palinka.tinho.net> References: <20160304120616.GF2300@sivokote.iziade.m$> <20160312221328.F2EB3A06DF9@palinka.tinho.net> Message-ID: <20160313063543.GB730@sivokote.iziade.m$> On Sat, Mar 12, 2016 at 05:13:28PM -0500, dan at geer.org wrote: > Georgi Guninski writes: > | On Thu, Mar 03, 2016 at 08:34:14AM -0500, dan at geer.org wrote: > | > The question here is perhaps obvious: Will you opt out and suffer > | > the consequences thereof? > | > > | > --dan > | > | Let me counter-ask only `dan': > | > | Will you exchange a walk on part in a war for > | a lead role in a cage? > | > | This is not exactly quote from Floyd's song. > > > After looking up the lyrics and reading a few pages about them, > I confess to still being confused as to what they mean and, hence, > what their question is. That is an honest answer -- I am not good > (at all) with anything that is "high art" or whatever the right > terminology here would be. > > Now, as a guess, I'll counter by asking if the lyric is simply a > light modernization of: > > I must study politics and war, that my sons may have the liberty > to study mathematics and philosophy, natural history and naval > architecture, in order to give their children a right to study > painting, poetry, music, architecture, tapestry, and porcelain. > -- John Adams, 2nd US President > > If the "Floyd" lyric asks whether yours is a purpose-driven life, > then my answer to "freedom, security, comfort, choose two" is freedom > and security, abjuring comfort, per se. > > Never mind the lyrics, assume it doesn't exist. Assuming you are the same dan geer who is some boss at in-q-tel, which appears closely related to the cia, what is your definition of "freedom" -- what the usgov decides to give to the enslaved peasants? From seanl at literati.org Sun Mar 13 09:23:56 2016 From: seanl at literati.org (Sean Lynch) Date: Sun, 13 Mar 2016 09:23:56 -0700 Subject: Remember, remember the Fukushima nuclear disaster on this day? In-Reply-To: <20160312060611.GA1464@sivokote.iziade.m$> References: <20160311064333.GA1919@sivokote.iziade.m$> <632367055.8137868.1457681660487.JavaMail.yahoo@mail.yahoo.com> <20160311082432.GB1919@sivokote.iziade.m$> <56E31D35.7010702@pilobilus.net> <20160312060611.GA1464@sivokote.iziade.m$> Message-ID: On Fri, Mar 11, 2016 at 10:06 PM, Georgi Guninski wrote: > On Fri, Mar 11, 2016 at 02:32:05PM -0500, Steve Kinney wrote: > > Aleutians and east to North America. But the Pacific based > > seafood industries can breathe easy: USDA has increases allowable > > levels of hot isotopes, and if you can't prove in Court that a > > particular environmental source caused your cancer, nobody is > > liable. > > > > I can't find any evidence USDA did this, but I do recall reading that the Japanese health authorities had. But the old levels, much like FCC RF exposure limits, weren't based on any science showing harm, just on the levels they'd typically see. That doesn't mean the new levels aren't dangerous, but it also doesn't mean the old levels were safe. It's all about cost of compliance. We just need more research to know what levels are genuinely safe or dangerous. Though to some extent the Japanese are providing this by acting as a living experiment. If there isn't an increase of cancers from eating food at the higher levels, then hopefully the higher levels are fine. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1515 bytes Desc: not available URL: From Rayzer at riseup.net Sun Mar 13 10:29:02 2016 From: Rayzer at riseup.net (Rayzer) Date: Sun, 13 Mar 2016 10:29:02 -0700 Subject: Remember, remember the Fukushima nuclear disaster on this day? In-Reply-To: References: <20160311064333.GA1919@sivokote.iziade.m$> <632367055.8137868.1457681660487.JavaMail.yahoo@mail.yahoo.com> <20160311082432.GB1919@sivokote.iziade.m$> <56E31D35.7010702@pilobilus.net> <20160312060611.GA1464@sivokote.iziade.m$> Message-ID: <56E5A35E.4060905@riseup.net> Sean Lynch wrote: > > On Fri, Mar 11, 2016 at 10:06 PM, Georgi Guninski > > wrote: > > On Fri, Mar 11, 2016 at 02:32:05PM -0500, Steve Kinney wrote: > > Aleutians and east to North America. But the Pacific based > > seafood industries can breathe easy: USDA has increases allowable > > levels of hot isotopes, and if you can't prove in Court that a > > particular environmental source caused your cancer, nobody is > > liable. > > > > > I can't find any evidence USDA did this, but I do recall reading that > the Japanese health authorities had. But the old levels, much like FCC > RF exposure limits, weren't based on any science showing harm, just on > the levels they'd typically see. That doesn't mean the new levels > aren't dangerous, but it also doesn't mean the old levels were safe. > It's all about cost of compliance. We just need more research to know > what levels are genuinely safe or dangerous. Though to some extent the > Japanese are providing this by acting as a living experiment. If there > isn't an increase of cancers from eating food at the higher levels, > then hopefully the higher levels are fine. Can always get your fish from the Gulf of Mexico "Scientists have found a 10 million gallon 'bath mat' of oil on the floor of the Gulf of Mexico" Despite the article's claim it's NOT just from the BP Deepwater/Horizon disaster. NO ONE is keeping tabs on all those thousands of abandoned capped off wells in the Gulf either. http://www.businessinsider.com/bps-deepwater-horizon-spill-has-left-tons-of-oil-on-the-gulfs-floor-2015-2 -- RR "The earth is not dying, it is being killed, and those who are killing it have /names and addresses/." ~U. Utah Phillipsx -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From guninski at guninski.com Sun Mar 13 01:25:50 2016 From: guninski at guninski.com (Georgi Guninski) Date: Sun, 13 Mar 2016 11:25:50 +0200 Subject: [OT] Would someone please check if links2 and elinks verify certificates on clean install of Debian 8? In-Reply-To: <1513592.hl1PrHAnzv@lapuntu> References: <20160312092916.GB1464@sivokote.iziade.m$> <1513592.hl1PrHAnzv@lapuntu> Message-ID: <20160313092550.GD730@sivokote.iziade.m$> On Sat, Mar 12, 2016 at 11:04:43PM +0100, rysiek wrote: > > For me, on updated system, both don't verify certificates. > > Verified on a clean Debian 8 install. > Thanks for confirming. Let's see when Debian will learn about this. (This reminds me of a real vim bug posted 1 April looong ago). oss-security and Fyodor's full disclosure are moderating me. From juan.g71 at gmail.com Sun Mar 13 12:04:39 2016 From: juan.g71 at gmail.com (juan) Date: Sun, 13 Mar 2016 16:04:39 -0300 Subject: Remember, remember the Fukushima nuclear disaster on this day? In-Reply-To: <56E3549E.5020108@pilobilus.net> References: <20160311064333.GA1919@sivokote.iziade.m$> <632367055.8137868.1457681660487.JavaMail.yahoo@mail.yahoo.com> <56e32bf3.8af68c0a.5611e.6673@mx.google.com> <56E3413E.6050605@riseup.net> <56E3549E.5020108@pilobilus.net> Message-ID: <56e5b9fb.43858c0a.2d78b.582d@mx.google.com> So after s quick search, seems that the containment of the general electric designed reactor(s) failed? Maybe americunts should be paying damages? From juan.g71 at gmail.com Sun Mar 13 13:09:05 2016 From: juan.g71 at gmail.com (juan) Date: Sun, 13 Mar 2016 17:09:05 -0300 Subject: Remember, remember the Fukushima nuclear disaster on this day? In-Reply-To: <1257926295.729037.1457898570042.JavaMail.yahoo@mail.yahoo.com> References: <56e5b9fb.43858c0a.2d78b.582d@mx.google.com> <1257926295.729037.1457898570042.JavaMail.yahoo@mail.yahoo.com> Message-ID: <56e5c917.c54f370a.482b9.61ec@mx.google.com> On Sun, 13 Mar 2016 19:49:30 +0000 (UTC) jim bell wrote: > > > From: juan > To: cypherpunks at cpunks.org \>    So after s quick search, seems that > the containment of the>  general electric designed reactor(s) failed? > Maybe americunts > > should be paying damages? > If a court were to address the issue, I think the Japanese would > lose, It, of course, dewpends on the court. It would be ridiculous to try this case in a state court, especially in a court of 'justice' owned by, say, general electric and the american state. Strictly speaking the guilty parties are the american and japanese government and the 'private' mafias that do 'engineering' for them. > primarily because it had been about 40 years before the > earthquake/tsunami occurred.   And that changes the fact that the general electric's design failed? > The question would be, "Could the > Japanese have prevented or ameliorated the damages by modifying the > equipment between 1970 and 2010?".   I think the answer is obviously > "yes".  They should have anticipated that a tsunami would short out > electrical lines outside the plant's walls, rendering them unuseable. And what has that got to do with the fact that the containment that is supposed to contain material in case of a meltdown, does not contain anything? >  This was a fixable problem; they simply chose to continue to operate > the plant containing a known defect.             Jim Bell > > > > From jdb10987 at yahoo.com Sun Mar 13 12:49:30 2016 From: jdb10987 at yahoo.com (jim bell) Date: Sun, 13 Mar 2016 19:49:30 +0000 (UTC) Subject: Remember, remember the Fukushima nuclear disaster on this day? In-Reply-To: <56e5b9fb.43858c0a.2d78b.582d@mx.google.com> References: <56e5b9fb.43858c0a.2d78b.582d@mx.google.com> Message-ID: <1257926295.729037.1457898570042.JavaMail.yahoo@mail.yahoo.com> From: juan To: cypherpunks at cpunks.org \>    So after s quick search, seems that the containment of the>  general electric designed reactor(s) failed? Maybe americunts > should be paying damages? If a court were to address the issue, I think the Japanese would lose, primarily because it had been about 40 years before the earthquake/tsunami occurred.  The question would be, "Could the Japanese have prevented or ameliorated the damages by modifying the equipment between 1970 and 2010?".   I think the answer is obviously "yes".  They should have anticipated that a tsunami would short out electrical lines outside the plant's walls, rendering them unuseable.  This was a fixable problem; they simply chose to continue to operate the plant containing a known defect.             Jim Bell   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2314 bytes Desc: not available URL: From juan.g71 at gmail.com Mon Mar 14 02:21:11 2016 From: juan.g71 at gmail.com (juan) Date: Mon, 14 Mar 2016 06:21:11 -0300 Subject: Remember, remember the Fukushima nuclear disaster on this day? In-Reply-To: <393316439.986541.1457938170399.JavaMail.yahoo@mail.yahoo.com> References: <56e5b9fb.43858c0a.2d78b.582d@mx.google.com> <393316439.986541.1457938170399.JavaMail.yahoo@mail.yahoo.com> Message-ID: <56e682bb.cfdc8c0a.be83a.ffffa55a@mx.google.com> On Mon, 14 Mar 2016 06:49:30 +0000 (UTC) jim bell wrote: > > > From: juan > To: cypherpunks at cpunks.org  >   So after s quick search, seems that > the containment of the >  general electric designed reactor(s) > failed? Maybe americunts >  should be paying damages? > How so? Did you see my previous message? https://cpunks.org/pipermail/cypherpunks/2016-March/012590.html > It looks like it worked like it was designed to work. The design was supposed to contain the melted suff in case of a 'melt-down' - but it didn't. So, no, I don't think it worked like it was designed to. > The > problem is, a decision had been made about making a seawall only a > certain height, and putting the switching circuitry in the basement > which could be flooded.   Well, yes, more than a few things failed at once. > No doubt both these decisions had been > approved by the Japanese involved. Now, if it had been determined > later that they wanted to protect against much larger earthquakes and > higher tsunamis, they could have increased the seawall height and > sealed the basement of the reactor better.  They chose not to do so. >                Jim Bell > > > > From juan.g71 at gmail.com Mon Mar 14 02:24:14 2016 From: juan.g71 at gmail.com (juan) Date: Mon, 14 Mar 2016 06:24:14 -0300 Subject: Remember, remember the Fukushima nuclear disaster on this day? In-Reply-To: <393316439.986541.1457938170399.JavaMail.yahoo@mail.yahoo.com> References: <56e5b9fb.43858c0a.2d78b.582d@mx.google.com> <393316439.986541.1457938170399.JavaMail.yahoo@mail.yahoo.com> Message-ID: <56e68371.d4198c0a.2de4e.ffffaa1d@mx.google.com> >The design was supposed to contain the melted suff molten stuff From jdb10987 at yahoo.com Sun Mar 13 23:49:30 2016 From: jdb10987 at yahoo.com (jim bell) Date: Mon, 14 Mar 2016 06:49:30 +0000 (UTC) Subject: Remember, remember the Fukushima nuclear disaster on this day? In-Reply-To: <56e5b9fb.43858c0a.2d78b.582d@mx.google.com> References: <56e5b9fb.43858c0a.2d78b.582d@mx.google.com> Message-ID: <393316439.986541.1457938170399.JavaMail.yahoo@mail.yahoo.com> From: juan To: cypherpunks at cpunks.org  >   So after s quick search, seems that the containment of the  >  general electric designed reactor(s) failed? Maybe americunts  >  should be paying damages? How so?  It looks like it worked like it was designed to work.  The problem is, a decision had been made about making a seawall only a certain height, and putting the switching circuitry in the basement which could be flooded.  No doubt both these decisions had been approved by the Japanese involved. Now, if it had been determined later that they wanted to protect against much larger earthquakes and higher tsunamis, they could have increased the seawall height and sealed the basement of the reactor better.  They chose not to do so.                Jim Bell   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2369 bytes Desc: not available URL: From juan.g71 at gmail.com Mon Mar 14 03:08:09 2016 From: juan.g71 at gmail.com (juan) Date: Mon, 14 Mar 2016 07:08:09 -0300 Subject: Remember, remember the Fukushima nuclear disaster on this day? In-Reply-To: <20160314095125.GE679@sivokote.iziade.m$> References: <56e5b9fb.43858c0a.2d78b.582d@mx.google.com> <393316439.986541.1457938170399.JavaMail.yahoo@mail.yahoo.com> <20160314095125.GE679@sivokote.iziade.m$> Message-ID: <56e68dbd.42138c0a.c6845.ffffab1c@mx.google.com> On Mon, 14 Mar 2016 11:51:25 +0200 Georgi Guninski wrote: > I heard the Fukushima reactors were not secure compared to others, > they are "single contour". > > Whether the Japanese would have blown better reactor is not clear to > me. The thing is, even assuming the japanese were fully responsible for blowing the reactors, the reactors are not supposed to leak anything. Well, except for the garbage reactors designed by general electric... > > Do reactors have guarantee? For how long? Were the Fukushima reactors > in guarantee? From guninski at guninski.com Sun Mar 13 22:57:59 2016 From: guninski at guninski.com (Georgi Guninski) Date: Mon, 14 Mar 2016 07:57:59 +0200 Subject: Noam Chomsky on the 2016 Republicans: 'I Have Never Seen Such Lunatics in the Political System' Message-ID: <20160314055759.GA679@sivokote.iziade.m$> Noam Chomsky on the 2016 Republicans: 'I Have Never Seen Such Lunatics in the Political System' http://www.alternet.org/election-2016/noam-chomsky-2016-republicans-i-have-never-seen-such-lunatics-political-system From guninski at guninski.com Sun Mar 13 23:53:36 2016 From: guninski at guninski.com (Georgi Guninski) Date: Mon, 14 Mar 2016 08:53:36 +0200 Subject: Remember, remember the Fukushima nuclear disaster on this day? In-Reply-To: References: <20160311064333.GA1919@sivokote.iziade.m$> <632367055.8137868.1457681660487.JavaMail.yahoo@mail.yahoo.com> <20160311082432.GB1919@sivokote.iziade.m$> <56E31D35.7010702@pilobilus.net> <20160312060611.GA1464@sivokote.iziade.m$> Message-ID: <20160314065336.GB679@sivokote.iziade.m$> On Sun, Mar 13, 2016 at 09:23:56AM -0700, Sean Lynch wrote: > are genuinely safe or dangerous. Though to some extent the Japanese are > providing this by acting as a living experiment. If there isn't an increase > of cancers from eating food at the higher levels, then hopefully the higher > levels are fine. Searching the web for "fukushima anomalies newborn" shows contradicting results, some mention the west coast of the usa. The damage need not be now, it may be in the future. As a living experiment, the Japanese might be more interesting for consequences of being nuked by the usa in WWII. From coderman at gmail.com Mon Mar 14 01:42:37 2016 From: coderman at gmail.com (coderman) Date: Mon, 14 Mar 2016 09:42:37 +0100 Subject: Mathematicians Discover Prime Conspiracy Message-ID: Mathematicians Discover Prime Conspiracy A previously unnoticed property of prime numbers seems to violate a longstanding assumption about how they behave. By: Erica Klarreich March 13, 2016 Two mathematicians have uncovered a simple, previously unnoticed property of prime numbers — those numbers that are divisible only by 1 and themselves. Prime numbers, it seems, have decided preferences about the final digits of the primes that immediately follow them. Among the first billion prime numbers, for instance, a prime ending in 9 is almost 65 percent more likely to be followed by a prime ending in 1 than another prime ending in 9. In a paper posted online today, Kannan Soundararajan and Robert Lemke Oliver of Stanford University present both numerical and theoretical evidence that prime numbers repel other would-be primes that end in the same digit, and have varied predilections for being followed by primes ending in the other possible final digits. “We’ve been studying primes for a long time, and no one spotted this before,” said Andrew Granville, a number theorist at the University of Montreal and University College London. “It’s crazy.” The discovery is the exact opposite of what most mathematicians would have predicted, said Ken Ono, a number theorist at Emory University in Atlanta. When he first heard the news, he said, “I was floored. I thought, ‘For sure, your program’s not working.’” This conspiracy among prime numbers seems, at first glance, to violate a longstanding assumption in number theory: that prime numbers behave much like random numbers. Most mathematicians would have assumed, Granville and Ono agreed, that a prime should have an equal chance of being followed by a prime ending in 1, 3, 7 or 9 (the four possible endings for all prime numbers except 2 and 5). “I can’t believe anyone in the world would have guessed this,” Granville said. Even after having seen Lemke Oliver and Soundararajan’s analysis of their phenomenon, he said, “it still seems like a strange thing.” Yet the pair’s work doesn’t upend the notion that primes behave randomly so much as point to how subtle their particular mix of randomness and order is. “Can we redefine what ‘random’ means in this context so that once again, [this phenomenon] looks like it might be random?” Soundararajan said. “That’s what we think we’ve done.” Prime Preferences Soundararajan was drawn to study consecutive primes after hearing a lecture at Stanford by the mathematician Tadashi Tokieda, of the University of Cambridge, in which he mentioned a counterintuitive property of coin-tossing: If Alice tosses a coin until she sees a head followed by a tail, and Bob tosses a coin until he sees two heads in a row, then on average, Alice will require four tosses while Bob will require six tosses (try this at home!), even though head-tail and head-head have an equal chance of appearing after two coin tosses. Soundararajan wondered if similarly strange phenomena appear in other contexts. Since he has studied the primes for decades, he turned to them — and found something even stranger than he had bargained for. Looking at prime numbers written in base 3 — in which roughly half the primes end in 1 and half end in 2 — he found that among primes smaller than 1,000, a prime ending in 1 is more than twice as likely to be followed by a prime ending in 2 than by another prime ending in 1. Likewise, a prime ending in 2 prefers to be followed a prime ending in 1. Soundararajan showed his findings to postdoctoral researcher Lemke Oliver, who was shocked. He immediately wrote a program that searched much farther out along the number line — through the first 400 billion primes. Lemke Oliver again found that primes seem to avoid being followed by another prime with the same final digit. The primes “really hate to repeat themselves,” Lemke Oliver said. Lemke Oliver and Soundararajan discovered that this sort of bias in the final digits of consecutive primes holds not just in base 3, but also in base 10 and several other bases; they conjecture that it’s true in every base. The biases that they found appear to even out, little by little, as you go farther along the number line — but they do so at a snail’s pace. “It’s the rate at which they even out which is surprising to me,” said James Maynard, a number theorist at the University of Oxford. When Soundararajan first told Maynard what the pair had discovered, “I only half believed him,” Maynard said. “As soon as I went back to my office, I ran a numerical experiment to check this myself.” Lemke Oliver and Soundararajan’s first guess for why this bias occurs was a simple one: Maybe a prime ending in 3, say, is more likely to be followed by a prime ending in 7, 9 or 1 merely because it encounters numbers with those endings before it reaches another number ending in 3. For example, 43 is followed by 47, 49 and 51 before it hits 53, and one of those numbers, 47, is prime. But the pair of mathematicians soon realized that this potential explanation couldn’t account for the magnitude of the biases they found. Nor could it explain why, as the pair found, primes ending in 3 seem to like being followed by primes ending in 9 more than 1 or 7. To explain these and other preferences, Lemke Oliver and Soundararajan had to delve into the deepest model mathematicians have for random behavior in the primes. Random Primes Prime numbers, of course, are not really random at all — they are completely determined. Yet in many respects, they seem to behave like a list of random numbers, governed by just one overarching rule: The approximate density of primes near any number is inversely proportional to how many digits the number has. In 1936, Swedish mathematician Harald Cramér explored this idea using an elementary model for generating random prime-like numbers: At every whole number, flip a weighted coin — weighted by the prime density near that number — to decide whether to include that number in your list of random “primes.” Cramér showed that this coin-tossing model does an excellent job of predicting certain features of the real primes, such as how many to expect between two consecutive perfect squares. Despite its predictive power, Cramér’s model is a vast oversimplification. For instance, even numbers have as good a chance of being chosen as odd numbers, whereas real primes are never even, apart from the number 2. Over the years, mathematicians have developed refinements of Cramér’s model that, for instance, bar even numbers and numbers divisible by 3, 5, and other small primes. These simple coin-tossing models tend to be very useful rules of thumb about how prime numbers behave. They accurately predict, among other things, that prime numbers shouldn’t care what their final digit is — and indeed, primes ending in 1, 3, 7 and 9 occur with roughly equal frequency. Yet similar logic seems to suggest that primes shouldn’t care what digit the prime after them ends in. It was probably mathematicians’ overreliance on the simple coin-tossing heuristics that made them miss the biases in consecutive primes for so long, Granville said. “It’s easy to take too much for granted — to assume that your first guess is true.” The primes’ preferences about the final digits of the primes that follow them can be explained, Soundararajan and Lemke Oliver found, using a much more refined model of randomness in primes, something called the prime k-tuples conjecture. Originally stated by mathematicians G. H. Hardy and J. E. Littlewood in 1923, the conjecture provides precise estimates of how often every possible constellation of primes with a given spacing pattern will appear. A wealth of numerical evidence supports the conjecture, but so far a proof has eluded mathematicians. The prime k-tuples conjecture subsumes many of the most central open problems in prime numbers, such as the twin primes conjecture, which posits that there are infinitely many pairs of primes — such as 17 and 19 — that are only two apart. Most mathematicians believe the twin primes conjecture not so much because they keep finding more twin primes, Maynard said, but because the number of twin primes they’ve found fits so neatly with what the prime k-tuples conjecture predicts. In a similar way, Soundararajan and Lemke Oliver have found that the biases they uncovered in consecutive primes come very close to what the prime k-tuples conjecture predicts. In other words, the most sophisticated conjecture mathematicians have about randomness in primes forces the primes to display strong biases. “I have to rethink how I teach my class in analytic number theory now,” Ono said. At this early stage, mathematicians say, it’s hard to know whether these biases are isolated peculiarities, or whether they have deep connections to other mathematical structures in the primes or elsewhere. Ono predicts, however, that mathematicians will immediately start looking for similar biases in related contexts, such as prime polynomials — fundamental objects in number theory that can’t be factored into simpler polynomials. And the finding will make mathematicians look at the primes themselves with fresh eyes, Granville said. “You could wonder, what else have we missed about the primes?” --- https://www.quantamagazine.org/20160313-mathematicians-discover-prime-conspiracy/ From coderman at gmail.com Mon Mar 14 02:02:13 2016 From: coderman at gmail.com (coderman) Date: Mon, 14 Mar 2016 10:02:13 +0100 Subject: Arithmetic Coding and Blinding for Lattice Cryptography Message-ID: https://eprint.iacr.org/2016/276 Abstract: In this work we apply information theoretically optimal arithmetic coding and a number of novel side-channel blinding countermeasure techniques to create BLZZRD, a practical, compact, and more quantum-resistant variant of the BLISS Ring-LWE Signature Scheme. We show how the hash-based random oracle can be modified to be more secure against quantum preimage attacks while decreasing signature size at any given security level. Most lattice-based cryptographic algorithms require non-uniformly distributed ciphertext, signature, and public/private key data to be stored and transmitted; hence there is a requirement for compression. Arithmetic Coding offers an information theoretically optimal compression for stationary and memoryless sources, such as the discrete Gaussian distributions often used in Lattice-based cryptography. We show that this technique gives better signature sizes than the previously proposed advanced Huffman-based compressors. We further demonstrate that arithmetic decoding from an uniform source to target distribution is also an optimal Gaussian sampling method in the sense that a minimal amount of true random bits is required. Performance of the new Binary Arithmetic Coding (BAC) sampler is comparable to other mainstream samplers. The same code, tables, or circuitry can be utilised for both tasks, eliminating the need for separate sampling and compression components. We also describe a simple blinding technique that can be applied to anti-cyclic polynomial multiplication to mask timing- and power consumption side-channels in ring arithmetic. We further show that Gaussian sampling can also be blinded by a split-and-permute technique while reducing the size of required CDF tables. From guninski at guninski.com Mon Mar 14 02:31:02 2016 From: guninski at guninski.com (Georgi Guninski) Date: Mon, 14 Mar 2016 11:31:02 +0200 Subject: Mathematicians Discover Prime Conspiracy In-Reply-To: References: Message-ID: <20160314092941.GD679@sivokote.iziade.m$> On Mon, Mar 14, 2016 at 09:42:37AM +0100, coderman wrote: > property of prime numbers — those numbers that are divisible only by 1 > and themselves. .... Isn't $1$ counterexample to this definition? Are there links to the papers? And what is the difference with Chebyshev's bias (look it up on wikipedia) which is modulo 4, i.e. base 4? From rysiek at hackerspace.pl Mon Mar 14 03:31:28 2016 From: rysiek at hackerspace.pl (rysiek) Date: Mon, 14 Mar 2016 11:31:28 +0100 Subject: Remember, remember the Fukushima nuclear disaster on this day? In-Reply-To: <20160314065336.GB679@sivokote.iziade.m$> References: <20160311064333.GA1919@sivokote.iziade.m$> <20160314065336.GB679@sivokote.iziade.m$> Message-ID: <2106724.1j4y8XQGkV@lapuntu> Dnia poniedziałek, 14 marca 2016 08:53:36 Georgi Guninski pisze: > On Sun, Mar 13, 2016 at 09:23:56AM -0700, Sean Lynch wrote: > > are genuinely safe or dangerous. Though to some extent the Japanese are > > providing this by acting as a living experiment. If there isn't an > > increase > > of cancers from eating food at the higher levels, then hopefully the > > higher > > levels are fine. > > Searching the web for "fukushima anomalies newborn" shows contradicting > results, some mention the west coast of the usa. I hear the radiation on the US west coast was so miniscule it was considered beneficial by the homeopaths. -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From guninski at guninski.com Mon Mar 14 02:51:25 2016 From: guninski at guninski.com (Georgi Guninski) Date: Mon, 14 Mar 2016 11:51:25 +0200 Subject: Remember, remember the Fukushima nuclear disaster on this day? In-Reply-To: <393316439.986541.1457938170399.JavaMail.yahoo@mail.yahoo.com> References: <56e5b9fb.43858c0a.2d78b.582d@mx.google.com> <393316439.986541.1457938170399.JavaMail.yahoo@mail.yahoo.com> Message-ID: <20160314095125.GE679@sivokote.iziade.m$> On Mon, Mar 14, 2016 at 06:49:30AM +0000, jim bell wrote: > How so?  It looks like it worked like it was designed to work.  The problem is, a decision had been made about making a seawall only a certain height, and putting the switching circuitry in the basement which could be flooded.  No doubt both these decisions had been approved by the Japanese involved. > Now, if it had been determined later that they wanted to protect against much larger earthquakes and higher tsunamis, they could have increased the seawall height and sealed the basement of the reactor better.  They chose not to do so.                Jim Bell > I heard the Fukushima reactors were not secure compared to others, they are "single contour". Whether the Japanese would have blown better reactor is not clear to me. Do reactors have guarantee? For how long? Were the Fukushima reactors in guarantee? From guninski at guninski.com Mon Mar 14 05:25:28 2016 From: guninski at guninski.com (Georgi Guninski) Date: Mon, 14 Mar 2016 14:25:28 +0200 Subject: Arithmetic Coding and Blinding for Lattice Cryptography In-Reply-To: References: Message-ID: <20160314122528.GF679@sivokote.iziade.m$> Happy pi day, 3.14.2016! On Mon, Mar 14, 2016 at 10:02:13AM +0100, coderman wrote: > https://eprint.iacr.org/2016/276 > > Abstract: In this work we apply information theoretically optimal > arithmetic coding and a number of novel side-channel blinding > countermeasure techniques to create BLZZRD, a practical, compact, and > more quantum-resistant variant of the BLISS Ring-LWE Signature Scheme. "more quantum-resistant"??? WTF. Is it known to be provably quantum resistant at all? Or just nobody disclosed the quantum attack _yet_? From seanl at literati.org Mon Mar 14 16:50:18 2016 From: seanl at literati.org (Sean Lynch) Date: Mon, 14 Mar 2016 16:50:18 -0700 Subject: SPICE: Special Purpose Integrated Communications Equipment In-Reply-To: References: Message-ID: On Sat, Mar 12, 2016 at 3:29 PM, Zenaan Harkness wrote: > I still find that signature of your Mike, just makes me so secure > about your 1 sentence email -warm fuzzies in my heart. > > A toast, to Mike the trusty. > > :) > > The message is not actually signed. It just has a public key attached. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 677 bytes Desc: not available URL: From Rayzer at riseup.net Mon Mar 14 20:35:33 2016 From: Rayzer at riseup.net (Rayzer) Date: Mon, 14 Mar 2016 20:35:33 -0700 Subject: They call it "Going Dark" because you wouldn't be scared if they called it "Bad Guy Go Buh Bye" Message-ID: <56E78305.2090604@riseup.net> In light of Apple’s very public battle with the FBI over encryption, John Oliver designed a satirical ad for Apple to help “both their customers and the government” understand just how hard it is to protect data. The host of /Last Week Tonight/ – who last April famously boiled down the argument about NSA surveillance to its core issue, dick picks – said he takes Apple’s side, but acknowledged that the company wasn’t doing a very good job of explaining its position. Watch the two-minute fake ad here . It’s the last two minutes of the segment, embedded below. “We’re barely one step ahead of hackers at all times,” a voiceover actress explains. “So that when you idiots lose your phone, your information doesn’t wind up in the hands of guys like Gary.” Gary is a creepy hacker gratifying himself over family photos on a phone he stole. Apple engineers are pictured panicking and cursing. “So if the FBI comes to us and asks us if we can undermine our encryption without compromising everyone’s emails, texts, and skateboarding videos, this is our response,” the voiceover continues. “Are you fucking kidding me? We’re engineers, not wizards,” says an engineer. https://theintercept.com/2016/03/14/john-oliver-produces-fake-ad-for-apple-about-protecting-data/ RR "Through counter-intelligence it should be possible to pinpoint potential trouble-makers ... And neutralize them, neutralize them, neutralize them" -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2270 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From grarpamp at gmail.com Mon Mar 14 23:00:23 2016 From: grarpamp at gmail.com (grarpamp) Date: Tue, 15 Mar 2016 02:00:23 -0400 Subject: [Cryptography] Govt Can't Let Smartphones Be 'Black Boxes, ' Obama Says In-Reply-To: References: <98e4834a9ef8ad47e039217702aa1735@cannon-ciota.info> Message-ID: On 3/13/16, Henry Baker wrote: > At 05:59 PM 3/13/2016, Michael Froomkin - U.Miami School of Law wrote: >>No, you really can't argue this in good faith in court. The designation of >> crypto as a 'munition' was done by an administrative agency as a >> classificatory convenience to manage the export control regime (it was >> considered a dual use technology). That has no constitutional resonance >> at all. >> >>On Sat, 12 Mar 2016, Henry Baker wrote: >> >>>A case could be made that citizen crypto is protected -- at least in the >>> U.S. -- by the *Second* Amendment. Crypto has been considered "arms" on >>> & off for hundreds of years, so crypto is as much a right under the >>> Second Amendment as a firearm. > > One if by land; two if by sea. > > Code/encryption -- all part of being a militia. > > The real reason no one wants to argue this is that most of the folks who are > for citizen encryption are against citizen guns. So they've tied their own > hands when they go to argue in court. Even if said crypto citizens don't argue... the one group that is for citizen guns, the NRA [1], is also rather against surveillance / spying and databases and for privacy [2][3], so were you to reach out to them you might find a powerful symbiotic ally in the crypto fight. [1] And other similar RKBA groups. [2] See their national rally videos on youtube. [3] Though they may not know how to reach out to crypto to consult and integrate the philosophy into their position for their benefit. https://www.nra.org/ https://www.nraila.org/ From admin at pilobilus.net Tue Mar 15 04:10:39 2016 From: admin at pilobilus.net (Steve Kinney) Date: Tue, 15 Mar 2016 07:10:39 -0400 Subject: SPICE: Special Purpose Integrated Communications Equipment In-Reply-To: References: Message-ID: <56E7EDAF.9010608@pilobilus.net> On 03/14/2016 07:50 PM, Sean Lynch wrote: > On Sat, Mar 12, 2016 at 3:29 PM, Zenaan Harkness > wrote: > > I still find that signature of your Mike, just makes me so secure > about your 1 sentence email -warm fuzzies in my heart. > > A toast, to Mike the trusty. > > :) > > > The message is not actually signed. It just has a public key attached. Or a super sneaky secret message hidden in plain sight? gpg --import yields: gpg: invalid radix64 character 3A skipped gpg: invalid radix64 character 2E skipped gpg: invalid radix64 character 2E skipped gpg: invalid radix64 character 3A skipped gpg: invalid radix64 character 3A skipped gpg: invalid radix64 character 2E skipped gpg: invalid radix64 character 2E skipped gpg: CRC error; 02A730 - 33E76E gpg: [don't know]: invalid packet (ctb=55) gpg: read_block: read error: Invalid packet gpg: import from `[stdin]' failed: Invalid keyring gpg: Total number processed: 0 :o) From dan at geer.org Tue Mar 15 15:22:42 2016 From: dan at geer.org (dan at geer.org) Date: Tue, 15 Mar 2016 18:22:42 -0400 Subject: Remember, remember the Fukushima nuclear disaster on this day? In-Reply-To: Your message of "Fri, 11 Mar 2016 10:24:32 +0200." <20160311082432.GB1919@sivokote.iziade.m$> Message-ID: <20160315222242.1426FA06E75@palinka.tinho.net> See www.transatomicpower.com --dan From dan at geer.org Tue Mar 15 15:34:21 2016 From: dan at geer.org (dan at geer.org) Date: Tue, 15 Mar 2016 18:34:21 -0400 Subject: Intelius opt-out In-Reply-To: Your message of "Sun, 13 Mar 2016 05:35:55 -0400." Message-ID: <20160315223421.A5C25A06DF6@palinka.tinho.net> Two recommendations .............................................. "The Secrets of Surveillance Capitalism", Shoshana Zuboff http://www.faz.net/aktuell/feuilleton/debatten/the-digital-debate/shoshana-zuboff-secrets-of-surveillance-capitalism-14103616-p2.html .............................................. --and-- .............................................. _Obfuscation_, Finn Brunton and Helen Nissenbaum, MIT Press https://mitpress.mit.edu/books/obfuscation .............................................. --dan From jya at pipeline.com Tue Mar 15 17:08:30 2016 From: jya at pipeline.com (John Young) Date: Tue, 15 Mar 2016 20:08:30 -0400 Subject: Apple Reply to USG Opposition to Vacate Decrypt Message-ID: Apple Reply to USG Opposition to Vacate Decrypt, March 15, 2016 https://cryptome.org/2016/03/usg-apple-177.pdf (351 pp, 22MB) From grarpamp at gmail.com Tue Mar 15 23:56:42 2016 From: grarpamp at gmail.com (grarpamp) Date: Wed, 16 Mar 2016 02:56:42 -0400 Subject: [Cryptography] Govt Can't Let Smartphones Be 'Black Boxes, ' Obama Say In-Reply-To: References: <56E4C11C.5070302@sonic.net> Message-ID: On 3/15/16, Phillip Hallam-Baker wrote: > On Sat, Mar 12, 2016 at 8:23 PM, Ray Dillinger wrote: > >> It would be a damned sight easier to take a view that allowed >> exceptional access with warrants, etc, if in the past the USG >> had abided by the notion that such access is in fact exceptional >> rather than routine, and needs to be provided for with warrants, >> etc. > > PRISM and the mass surveillance program violated our norms, no > question. But these were not a surprise to anyone who had been paying > attention. The big surprise for me was the Abu Ghraib photographs. Any > way you consider them, the photographs demonstrate a total collapse of > the moral fabric of the US military. And to this day, nobody has been > punished for committing the torture. The only jail sentences handing > down was for taking the photographs which led to the program being > exposed. Governments always absolve and immunize themselves (and their partners), particularly at the highest levels. Torture, Murder, Surveillance, Drone Kills, Cops Killing, Political Lies, Too Big To Fail, Generally Fucking Shit Up, etc... all typical. The only time they're stopped, indicted, prosecuted, and jailed is when they're failed / overthrown, invaded, or both. In the meantime till people wake up... they've come up with this cool thing called elections to make you forget and think the guard has changed... it hasn't... the same old game. Don't believe it? Ask History. Some history and deja vu... https://en.wikipedia.org/wiki/Church_Committee#Results_of_the_investigation https://en.wikipedia.org/wiki/Clipper_chip https://en.wikipedia.org/wiki/Cabinet_noir http://history.howstuffworks.com/historical-events/10-long-lived-empires.htm/printable From dan at geer.org Wed Mar 16 08:05:09 2016 From: dan at geer.org (dan at geer.org) Date: Wed, 16 Mar 2016 11:05:09 -0400 Subject: blockchain startup Message-ID: <20160316150509.F02F1A06E89@palinka.tinho.net> Good team... Freemit (New York City, NY) http://www.freemit.com Freemit is creating an alternative to current remittance and currency exchange systems. It uses the blockchain and a local currency in/local currency out service, along with a phone app and virtual credit card, to simplify and streamline cross-border money transfers. From guninski at guninski.com Wed Mar 16 06:07:14 2016 From: guninski at guninski.com (Georgi Guninski) Date: Wed, 16 Mar 2016 15:07:14 +0200 Subject: [Cryptography] Govt Can't Let Smartphones Be 'Black Boxes, ' Obama Say In-Reply-To: References: <56E4C11C.5070302@sonic.net> Message-ID: <20160316130714.GA1171@sivokote.iziade.m$> On Wed, Mar 16, 2016 at 02:56:42AM -0400, grarpamp wrote: > till people wake up... Do you think enough people will wake up? Does this list helps waking up people in non-negligible way? I am sceptical to both questions. From jya at pipeline.com Wed Mar 16 14:13:47 2016 From: jya at pipeline.com (John Young) Date: Wed, 16 Mar 2016 17:13:47 -0400 Subject: [Cryptography] Lavabit's and Snowden's Solos In-Reply-To: <56E9BBE7.4050507@sonic.net> References: <56E9BBE7.4050507@sonic.net> Message-ID: Ladar Levison challenges USG misuse of Lavabit case: https://www.facebook.com/KingLadar/posts/10156714933135038 From jya at pipeline.com Wed Mar 16 17:39:14 2016 From: jya at pipeline.com (John Young) Date: Wed, 16 Mar 2016 20:39:14 -0400 Subject: USG v. Lavabit-Snowden Files Unsealed Message-ID: USG v. Lavabit-Snowden Files Unsealed: https://cryptome.org/2016/03/usg-lavabit-unsealed.pdf (560 pp, 140MB) Precursor to USG v. Apple. From Rayzer at riseup.net Wed Mar 16 21:15:15 2016 From: Rayzer at riseup.net (Rayzer) Date: Wed, 16 Mar 2016 21:15:15 -0700 Subject: Google: 'We'll pay $100K if you can hack a Chromebook remotely' Message-ID: <56EA2F53.1000909@riseup.net> > The move doubles last year's top reward of $50,000, available > exclusively for attacks that achieve a persistent compromise on a > Chromebook in 'guest mode' http://www.zdnet.com/article/google-well-pay-100k-if-you-can-hack-a-chromebook-remotely/ -- RR "Through counter-intelligence it should be possible to pinpoint potential trouble-makers ... And neutralize them, neutralize them, neutralize them" -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From zen at freedbms.net Wed Mar 16 15:05:08 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Wed, 16 Mar 2016 22:05:08 +0000 Subject: [Cryptography] Lavabit's and Snowden's Solos In-Reply-To: References: <56E9BBE7.4050507@sonic.net> Message-ID: Fantastic! Ladar rocks! And yes, with all the "anti terror" laws, the USG violates due process, and may "legally" (but not lawfully) do so to a level matched by the Star Chamber and that brief and almost forgettable incident in history known as the Inquisition. Sheeple gotta stand... From zen at freedbms.net Wed Mar 16 16:41:58 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Wed, 16 Mar 2016 23:41:58 +0000 Subject: Philosohpical - Reading between the lines: the Great War of Continents, information wars, and multipolarity In-Reply-To: References: Message-ID: In the context of nations and governments, Putin/ Russia's approach to global order (multipolarity) is healthier than a single global hegemon (be it USA, Russia, China or any other single power). It seems evident to me that Russians, courtesy the collapse of the USSR and surely other historical events, have a far keener awareness of that which constitutes actual national security and a "conservative" global order. Here's one quote from the article linked below: "The confrontation in Syria cannot be solved by ‘international coalitions’ formed other than by the UN Security Council. Russia and the US are the co-chairs of the International Syrian Support Group. And unlike the various coalitions, this group does not aim at overthrowing Assad: its documents specify that the future of the country will be decided by the Syrian people. As it should be. This means that the world has already been redesigned, becoming a much safer place to live in " --- http://russia-insider.com/en/politics/where-did-putin-lead-his-country/ri13070 Where Has Putin Lead his Country? I'll Tell You Where On this, the second anniversary of the Crimean referendum to rejoin Russia, the author answers a Ukrainian questioner From grarpamp at gmail.com Wed Mar 16 21:31:40 2016 From: grarpamp at gmail.com (grarpamp) Date: Thu, 17 Mar 2016 00:31:40 -0400 Subject: [Cryptography] Govt Can't Let Smartphones Be 'Black Boxes, ' Obama Say In-Reply-To: <20160316130714.GA1171@sivokote.iziade.m$> References: <56E4C11C.5070302@sonic.net> <20160316130714.GA1171@sivokote.iziade.m$> Message-ID: On 3/16/16, Georgi Guninski wrote: > Do you think enough people will wake up? Human genome probably not have enough individual self reliance / autonomy and meta observance powers at scale in DNA... too collective / dependant and busy computing social circle for local survival... so will keep taking it up ass by those metas who have it till next reboot. > Does this list helps waking up people in non-negligible way? Fuck no, ain't nobody in general population ever read this shit. Only the usual suspects visit, mine, and call cypherpunks home... The job of a cypherpunk is to push it out to population... Or be so elite that you can just sit back and puppetmaster it all... From jya at pipeline.com Thu Mar 17 03:41:00 2016 From: jya at pipeline.com (John Young) Date: Thu, 17 Mar 2016 06:41:00 -0400 Subject: Ladar Levison Describes USG Abuses in USG v. Lavabit Message-ID: Ladar Levison Describes USG Abuses in USG v. Lavabit http://www.metzdowd.com/pipermail/cryptography/2016-March/028669.html Precursor to USG-Apple abuses. From admin at pilobilus.net Thu Mar 17 10:33:50 2016 From: admin at pilobilus.net (Steve Kinney) Date: Thu, 17 Mar 2016 13:33:50 -0400 Subject: Philosohpical - Reading between the lines: the Great War of Continents, information wars, and multipolarity In-Reply-To: References: Message-ID: <56EAEA7E.5010906@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 11/29/2015 08:53 AM, Zenaan Harkness wrote: > Perhaps you might enjoy it too. > > http://fortruss.blogspot.ru/2015/11/reading-between-lines-great-wa r-of.html It > did provide a few minutes of amusement. Of a sort. :o) A brief review of: Reading between the lines: the Great War of Continents, information wars, and multipolarity This article's title foreshadows its content: Many complex words that say nearly nothing. Orwell's 'duckspeak' condenses language into short bursts of stereotyped, reflexive utterances, meaningless outside the context of simplistic, indoctrinated verities supplied by the State. The bizarre cant the present document was written in looks like an equal and opposite version of Duckspeak: In overblown hyperbolic prose, the author piles high level abstractions one atop the other until any possible meaning disappears, in an apparent attempt to impress and confuse the reader. I had to re-read several paragraphs in the article to unravel their structure and assign possible meanings to them. On the whole it looks to me like a verbal Rorschach inkblot; devoid of content, but the reader might see his or her own latent beliefs peeking out here and there to create an illusion of deeper meaning. The whole semantic content of the article does appear in two sentences buried near the middle of the text: "Fort Russ provides cutting-edge reports and analyses which lay bare realities which mainstream Western media actively distorts, obscures, or flat out conceals. This is absolutely crucial." Here the author lays bare his own apparent intentions and method, attributing them to The Enemy like a good little propagandist should. And that's all I have to say about that. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQIcBAEBAgAGBQJW6up8AAoJEDZ0Gg87KR0LYUQP/iE0bkRJ06dk+8YBlVal/VVo zpWJLeRt+5TIynvzJxbqa8q0mvVzq/qCoEYoHU+/KxgpHW4DP5eGMh2SzHulob3X Vs2Cuj18rZMgNmw0IzxEx09Rxqzy9TRQ/MwikHKBApAYpqA+E0mN/3xLKPzlQHD5 jp9NfQ9VbomjHJAg4GlqJ9ZIOGPsi++DrTEXzXaxLM8wh5fvgumpI+LPDlmAp1ZA gGjY3zE75NN/UvxtmIM/HK52JrDLmPiv8kl8sTieXgYsdKiM6beAYHbtULmPRMXa TJQ3FPWnAaprszuHHWzvNMq/Xnk63juTF7PsAXrnTTeMPWxiPKZ3oK89do5c/E72 E1IVQdvX3QhEPrd3O+AGeltmvmq6nBcvXiWW67sgeHmKQlSt6X669FMU19UeC1fS WMOrfNfHVp4sMLxB6lFzIFeKREh19BX3acrsjrFgP3Chj6zgQ9JjpZF1q0+foPqS 0NCNAYKc2+RsLiTP6j8e72nJgzQBxlufEY1tOPXr4B241fWMA6poKxe/XSI6mi6M 4YBODqb30orM/2GNyFmfrLhckdANRdYBaBfB/KSun964dFkbW10+ZMDxkud87Xit EW0Ngm5SR2ke8UrcvkS3l2MhUaj1UJzacYUx4HB7hkuxwSBzvXtBNGPeyjuvS6Vc etFUPz22Sll5GiChp5Rr =yqwU -----END PGP SIGNATURE----- From admin at pilobilus.net Thu Mar 17 17:51:05 2016 From: admin at pilobilus.net (Steve Kinney) Date: Thu, 17 Mar 2016 20:51:05 -0400 Subject: Safe country for crypto products In-Reply-To: <711da71d48cc47394f401213db6bb068@riseup.net> References: <711da71d48cc47394f401213db6bb068@riseup.net> Message-ID: <56EB50F9.6040107@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 03/17/2016 08:10 PM, strife wrote: > Hi! > > Looks like, rather sooner than later, we will have to move some > products to other countries. AnyDVD, which has slightly > different enemies, moved from Switzerland to Antigua to > Belize. > > Looking at the slightly outdated cryptolaw.org, I wonder which > non-EU/non-US country would actually be suitable to serve as > host organization for open source crypto projects. > > With some thinking, it probably can be arranged to have > parallel entities in multiple countries 'responsible' for an > open source project. I can't think of any examples where this > is the case, most projects do have one primary legal home > (trademark, copyright, etc). Distributed development of software, involving people scattered all over the world, is routine these days. Adapting tools like git and i2p to create hard to find, hard to suppress projects physically hosted at multiple locations in mutually hostile legal jurisdictions is only a question of motivation: When the perceived value of a project exceeds the costs of making it "stateless" and very hard to suppress, people will most likely do just that. I can't think of any technical barriers. People who are competent to make "crypto products" are uniquely qualified to do that particular trick. :o) -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQIcBAEBAgAGBQJW61D0AAoJEDZ0Gg87KR0L6z4QAOX26hm4Mf2ijaPdboH2Tjgp 2xV8mmZglQCtbS1jSHht8iqee81ssVqxK7+91e5sDLHpeAQX2ENfLgz7aiPKgZSs UiIcvd5pXjLKvRLheHt85iK4itlZq22uaBHMpn/KrPp4q0tqC3bjkI6JjzCVZw7g PnD0Csw2CqXN1Jg5m8eapm8c6ZQ5LytwiXYwqjtSm400QcUfCg3+ASSu0AmKSs/E ITzMgIm0Y0FgP2PDjoWp9sBC4kvSO/MMg5wTULXYeMyiA3mBdtyQSFa2tgWFfoFo 1tKvTVitOHFNsS9MDWWjRSsxgAQT4jG/E6cPVdd1p4+/6JLb0VecqEytLa+1cCMU pWvIRvWTnLvk+6OgvYPvCLw7gOYHWlthNwnLrbCOdMP+OQDaA3umPofrxnszKzU7 jg00aakKwVhiG/yO80M9GOBzKQk4HUaXUl/U/qpgQ6iiuhXprZ6+MCv45nOR77fT LSKnYtZfgrbHjOcaJR8Zubs1iCTJW+gjPnIXJL0ooqcGZGt9ham5FYEtV5ihl8ui TaJ2WKRDSH5bTpMWpngb3y5Lzs9Du43IXRs3juRdJFiB+vTArXRPpg9BWS5ojGF7 BDDaJoJ5ZXLS3KH7UlhF/3kw4NdxC43oIyVcCj2ID4coMdTA5NqjmwTbTGpAcr7C kARuXo2dhdXLu6ieykYM =6A6n -----END PGP SIGNATURE----- From grarpamp at gmail.com Thu Mar 17 20:56:16 2016 From: grarpamp at gmail.com (grarpamp) Date: Thu, 17 Mar 2016 23:56:16 -0400 Subject: Safe country for crypto products In-Reply-To: <56EB50F9.6040107@pilobilus.net> References: <711da71d48cc47394f401213db6bb068@riseup.net> <56EB50F9.6040107@pilobilus.net> Message-ID: On 3/17/16, Steve Kinney wrote: > On 03/17/2016 08:10 PM, strife wrote: >> Looks like, rather sooner than later, we will have to move some >> products to other countries. AnyDVD, which has slightly >> different enemies, moved from Switzerland to Antigua to >> Belize. >> >> Looking at the slightly outdated cryptolaw.org, I wonder which >> non-EU/non-US country would actually be suitable to serve as >> host organization for open source crypto projects. >> >> With some thinking, it probably can be arranged to have >> parallel entities in multiple countries 'responsible' for an >> open source project. I can't think of any examples where this >> is the case, most projects do have one primary legal home >> (trademark, copyright, etc). > > Distributed development of software, involving people scattered > all over the world, is routine these days. Adapting tools like > git and i2p to create hard to find, hard to suppress projects > physically hosted at multiple locations in mutually hostile legal > jurisdictions is only a question of motivation: When the > perceived value of a project exceeds the costs of making it > "stateless" and very hard to suppress, people will most likely do > just that. I can't think of any technical barriers. > > People who are competent to make "crypto products" are uniquely > qualified to do that particular trick. There are already number of git repos on anonymous overlay networks from which to choose, or setup your own. Also this repo works quite well over such networks and has additional integrated crypto features... http://monotone.ca/ From grarpamp at gmail.com Thu Mar 17 21:03:17 2016 From: grarpamp at gmail.com (grarpamp) Date: Fri, 18 Mar 2016 00:03:17 -0400 Subject: [tor-talk] Latency Spike In-Reply-To: <1458237928.4872.0.camel@darkdepths.net> References: <1458237928.4872.0.camel@darkdepths.net> Message-ID: On 3/17/16, poly wrote: > Could anyone please explain the reason behind this spike [0] to me? > > [0] https://metrics.torproject.org/torperf.png?start=2015-12-18&end=201 > 6-03-17&source=all&filesize=50kb That's the NSA giving you the finger... From strife at riseup.net Thu Mar 17 17:10:28 2016 From: strife at riseup.net (strife) Date: Fri, 18 Mar 2016 01:10:28 +0100 Subject: Safe country for crypto products Message-ID: <711da71d48cc47394f401213db6bb068@riseup.net> Hi! Looks like, rather sooner than later, we will have to move some products to other countries. AnyDVD, which has slightly different enemies, moved from Switzerland to Antigua to Belize. Looking at the slightly outdated cryptolaw.org, I wonder which non-EU/non-US country would actually be suitable to serve as host organization for open source crypto projects. With some thinking, it probably can be arranged to have parallel entities in multiple countries 'responsible' for an open source project. I can't think of any examples where this is the case, most projects do have one primary legal home (trademark, copyright, etc). Suggestions? From grarpamp at gmail.com Thu Mar 17 22:12:07 2016 From: grarpamp at gmail.com (grarpamp) Date: Fri, 18 Mar 2016 01:12:07 -0400 Subject: blockchain startup In-Reply-To: <20160316150509.F02F1A06E89@palinka.tinho.net> References: <20160316150509.F02F1A06E89@palinka.tinho.net> Message-ID: On 3/16/16, dan at geer.org wrote: > Good team... Really? New / Young blood is fine but never heard of em. So what exactly makes them that? And the two word shill reminisces goldbug style. Can't cpunks make better announcements? > Freemit (New York City, NY) > http://www.freemit.com > > Freemit is creating an alternative to current remittance and currency > exchange systems. It uses the blockchain and a local currency > in/local currency out service, along with a phone app and virtual > credit card, to simplify and streamline cross-border money transfers. They littered Btc symbol over their page though it's probably not solely that, have no whitepapers, no product (except for the iOS spy app), demand KYC, pointlessly lame website, based in the US, cloudflared, lying about 'free', debit card (lol), email collecting, not opensource, not available for Win/Unix PC's, etc. Just another centralized service among hundreds claiming to be something different and affiliating themselves with something they're not. Not to mention you can get all you need and more from BTC, well, except for a nanny (and maybe tx/sec and GiB's... till fixed). Or Ethereum or whatever else decentral and suitably anon. Or is this like the not really p2p different but still thorny Uber "alternative" to the Big Banking + IBM coin announcement? Now imagine a truly p2p ride service... buyers and sellers in direct contact, no middlemen, nice little sidechain of pki based reviews, document validation if you really care, etc. No need for Uber. And as far as anyone can read / tell, not Freemit either. From grarpamp at gmail.com Thu Mar 17 22:20:19 2016 From: grarpamp at gmail.com (grarpamp) Date: Fri, 18 Mar 2016 01:20:19 -0400 Subject: ZDNet: "US government pushed tech firms to hand over source code" In-Reply-To: <20160317142124.0dd9b152@jabberwock.cb.piermont.com> References: <20160317142124.0dd9b152@jabberwock.cb.piermont.com> Message-ID: ---------- Forwarded message ---------- Date: Thu, 17 Mar 2016 14:21:24 -0400 Subject: [Cryptography] ZDNet: "US government pushed tech firms to hand over source code" To: cryptography at metzdowd.com NEW YORK -- The US government has made numerous attempts to obtain source code from tech companies in an effort to find security flaws that could be used for surveillance or investigations. The government has demanded source code in civil cases filed under seal but also by seeking clandestine rulings authorized under the secretive Foreign Intelligence Surveillance Act (FISA), a person with direct knowledge of these demands told ZDNet. We're not naming the person as they relayed information that is likely classified. With these hearings held in secret and away from the public gaze, the person said that the tech companies hit by these demands are losing "most of the time." http://www.zdnet.com/article/us-government-pushed-tech-firms-to-hand-over-source-code/ _____________________________________________ http://www.metzdowd.com/mailman/listinfo/cryptography From grarpamp at gmail.com Thu Mar 17 22:24:05 2016 From: grarpamp at gmail.com (grarpamp) Date: Fri, 18 Mar 2016 01:24:05 -0400 Subject: Apple GovtOS/FBiOS & Proof of Work In-Reply-To: References: Message-ID: ---------- Forwarded message ---------- From: Henry Baker Date: Thu, 17 Mar 2016 17:39:22 -0700 Subject: [Cryptography] Apple GovtOS/FBiOS & Proof of Work To: cryptography at metzdowd.com If Apple is willing to put some serious Proof of Work into constructing *every* firmware update, then it could achieve some level of privacy: When constructing a firmware update, the SHA512 (or better still, some Apple proprietary) hash of the update has to have some preset number of '0' bits. So Apple will have to brute force fiddle with bits in the firmware load to achieve an appropriate hash. The work involved should grow exponentially in the # of '0' bits required. Most companies operate on a fixed update schedule, so Apple would have to plan every release far enough in advance to give Apple enough time to compute such a firmware load. The reason for an Apple proprietary hash is so any attacker would have to build their own custom chips to be able to beat Apple at this Proof of Work game. Note also, that Apple can *change* the hash function on every firmware update, so said custom chip would be useful for only one firmware release. The firmware loader of course refuses to load any firmware whose hash doesn't have the appropriate number of '0' bits (along with the standard Apple signing key checks, etc.). The hash also incorporates the previous firmware load a la Merkle, so if your firmware is ever compromised, your iPhone is forever bricked. The hardware loading code refuses to load the first block of the new firmware anywhere but right on top of the user's file encryption key. So the *default* for the firmware flasher is to always *forget* this key, unless very special arrangements are made to save this key in other places. This key is further encrypted and broken into many pieces prior to moving it out of the way of the firmware loader (including into the CPU's volatile register memory, so any power disruption will destroy some of this key). Of course, much like a password hashing function, such Apple hash functions would be designed specifically to be *slow*, so GPU's and gate-arrays would be of no particular value. With a proper PoW system, any attacker would have to spend at least as much time as Apple themselves to create a loadable firmware, and that time might be as long as 6-12 months. A scalable way for Apple to dominate any attacker (including most nation-states) is to utilize the *entire installed base* of Apple products (estimated by Tim Cook to be >1 billion devices) in a distributed calculation. Thus, Apple could use its "herd" itself to provide for "herd immunity" to firmware update attacks. iPhone users would notice if Apple were attempting to compute >1 firmware update PoW at any given time! A 6-12 month lead time (during which the PoW for GovtOS is being computed) would give Apple plenty of time to respond to any legal issues and warn other Apple customers of an impending breach-of-trust in the firmware update chain. If Apple is issued an NSL and can't talk about it, 6-12 months would still be a long enough delay to deter all but the most persistent of govts. Even Napoleon refused to look at any messages until they were at least 3 days old; he found out that 99% of these messages resolved themselves without any action on his part -- e.g., "please pardon my son; he is to be executed in the morning". If Apple speeded up or slowed down its pre-announced firmware update schedule, that change itself would provide an excellent "warrant canary". _______________________________________________ http://www.metzdowd.com/mailman/listinfo/cryptography From grarpamp at gmail.com Thu Mar 17 22:41:55 2016 From: grarpamp at gmail.com (grarpamp) Date: Fri, 18 Mar 2016 01:41:55 -0400 Subject: Google: 'We'll pay $100K if you can hack a Chromebook remotely' In-Reply-To: <56EA2F53.1000909@riseup.net> References: <56EA2F53.1000909@riseup.net> Message-ID: On 3/17/16, Rayzer wrote: >> exclusively for attacks that achieve a persistent compromise on a >> Chromebook in 'guest mode' > > http://www.zdnet.com/article/google-well-pay-100k-if-you-can-hack-a-chromebook-remotely/ Doesn't this thing use Intel's AMT processor and NIC? Intel's probably protected their source code access processes with more than $100k against any researcher, same with Google, but as we've just seen NSA already FISA'd / moled both their source. So what's the difference? Or the point? If Google wants to pull a stunt, it should open it's own code and start paying out along that new bug discovery asymptote. Regardless of whether you sell software / hardware or not... "We're closed, and awesome" really doesn't cut it anymore when the bad guys have the source everyone else thought was closed. . From juan.g71 at gmail.com Thu Mar 17 23:19:22 2016 From: juan.g71 at gmail.com (juan) Date: Fri, 18 Mar 2016 03:19:22 -0300 Subject: blockchain startup In-Reply-To: References: <20160316150509.F02F1A06E89@palinka.tinho.net> Message-ID: <56eb9e20.c4b28c0a.8e210.6df9@mx.google.com> On Fri, 18 Mar 2016 01:12:07 -0400 grarpamp wrote: > On 3/16/16, dan at geer.org wrote: > > Good team... > > Really? New / Young blood is fine but never heard of em. > So what exactly makes them that? > The fact that they're on the CIA's payroll? From juan.g71 at gmail.com Thu Mar 17 23:21:26 2016 From: juan.g71 at gmail.com (juan) Date: Fri, 18 Mar 2016 03:21:26 -0300 Subject: ZDNet: "US government pushed tech firms to hand over source code" In-Reply-To: References: <20160317142124.0dd9b152@jabberwock.cb.piermont.com> Message-ID: <56eb9e9c.0928370a.7d3cf.ffff8f39@mx.google.com> On Fri, 18 Mar 2016 01:20:19 -0400 grarpamp wrote: > ---------- Forwarded message ---------- > Date: Thu, 17 Mar 2016 14:21:24 -0400 > Subject: [Cryptography] ZDNet: "US government pushed tech firms to > hand over source code" > To: cryptography at metzdowd.com > > NEW YORK -- The US government has made numerous attempts to obtain > source code from tech companies in an effort to find security flaws > that could be used for surveillance or investigations. That's why open source is so much more convenient. Sorry, I couldn't resist, haha. From jya at pipeline.com Fri Mar 18 05:52:35 2016 From: jya at pipeline.com (John Young) Date: Fri, 18 Mar 2016 08:52:35 -0400 Subject: USG-Apple - 3/22/16 Hearing Procedures, Add 3 USGs Message-ID: USG-Apple - 3/22/16 Hearing Procedures, Add 3 USGs https://cryptome.org/2016/03/usg-apple-181-184.pdf From Rayzer at riseup.net Fri Mar 18 10:10:20 2016 From: Rayzer at riseup.net (Rayzer) Date: Fri, 18 Mar 2016 10:10:20 -0700 Subject: Apple engineers... Will they (snigger) crack under pressure Message-ID: <56EC367C.8030103@riseup.net> I can't imagine Apple would fire an employee for refusing. AAMOF the best publicity in the WORLD for them would be if they publicly declined to discipline or fire an employee for refusing. "Apple’s engineers may refuse to write software to break into the phone of one of the San Bernardino shooters if the FBI wins its court battle with the tech giant, according to more than half a dozen current and former employees." Apple employees are already discussing what they will do if ordered to help law enforcement authorities. Some say they may balk at the work, while others may even quit their high-paying jobs rather than undermine the security of the software they have already created, according to more than a half-dozen current and former Apple employees. Among those interviewed were Apple engineers who are involved in the development of mobile products and security, as well as former security engineers and executives. The potential resistance adds a wrinkle to a very public fight between Apple, the world’s most valuable company, and the authorities over access to an iPhone used by one of the attackers in the December mass killing in San Bernardino, Calif. It also speaks directly to arguments Apple has made in legal documents that the government’s demand curbs free speech by asking the company to order people to do things that they consider offensive. “Such conscription is fundamentally offensive to Apple’s core principles and would pose a severe threat to the autonomy of Apple and its engineers,” Apple’s lawyers wrote in the company’s final brief to the Federal District Court for the Central District of California. In full: http://www.nytimes.com/2016/03/18/technology/apple-encryption-engineers-if-ordered-to-unlock-iphone-might-resist.html?_r=0 -- RR "Through counter-intelligence it should be possible to pinpoint potential trouble-makers ... And neutralize them, neutralize them, neutralize them" -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From drwho at virtadpt.net Fri Mar 18 11:48:48 2016 From: drwho at virtadpt.net (The Doctor) Date: Fri, 18 Mar 2016 11:48:48 -0700 Subject: Safe country for crypto products In-Reply-To: References: <711da71d48cc47394f401213db6bb068@riseup.net> <56EB50F9.6040107@pilobilus.net> Message-ID: <20160318114848.f816cbc62ab906059c12de09@virtadpt.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On Thu, 17 Mar 2016 23:56:16 -0400 grarpamp wrote: > Also this repo works quite well over such networks and has > additional integrated crypto features... > http://monotone.ca/ I've been using Fossil (https://www.fossil-scm.org/index.html/doc/trunk/www/index.wiki) in this way for a couple of years on some projects, and it's been very useful. - -- The Doctor [412/724/301/703/415] [ZS] PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1 WWW: https://drwho.virtadpt.net/ If your pride's getting in the way, then your dreams aren't big enough. -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJW7E2QAAoJED1np1pUQ8RkvpwP/jHd1JiJZ1dVeMgXES60nJx8 TSwcbqcSW9Xn3u9l4fDQgqNp41BNMPxrOk16mQQo/ZD6cUmdXbTpdVYSExE4F2xe FZ6vNSKAHDblEAo+uFqVDLL0mx/L70FZg5mK29WYDBDeJblDqZaSlvnzfJPM96pb ypf/dLPinRLyYW6+PjkoNGdCWIvgpOcu/5GWQCjqdGbVF6Im3dC9CJzUP4587x2M jYjiCwJPUwYqCyEJUfCo6o8uozDN6aoOAKcQK1qrqQhLbXCypGFpT1/Lie+S+sOi EYG6imoDx5/pfmPhSgzXwGwCMSmfKX7491zqYmtwjjaIp7C+cJD2xA+BNpHkIDhx b2GPxRwRuZH5dlJQSIyfnaw8Eg5uvZ8RRz8ZatT/TZumAASAY4TRtzJBI92wzaGi mq4KlHJ7f2wwud3jcKDmoPo1YFW4dwShOJjzVVKr/o0Ef/buT5bCm8Hwts7/QBNr lMgIPUf3ENyQcJi4HgRsyOc/d4IRnSuoXH/VrQhYuytcB7p06noDsAj/shnLjmRl /Qjx2H07uCJa6RfdigQLSsyDNcpU6+BcCShJq4G6pQJ1Zid3w+0T3cr1dasJnrT0 o4TAX/5bdsNb4Qtd0w4f+pXX07Dwwjfv8btP3JebMUiYwuvVxpldrYVeMIo8ebET ++lWjnfSzwUlv1W4xVpk =X32I -----END PGP SIGNATURE----- From seanl at literati.org Fri Mar 18 13:35:11 2016 From: seanl at literati.org (Sean Lynch) Date: Fri, 18 Mar 2016 13:35:11 -0700 Subject: Apple engineers... Will they (snigger) crack under pressure In-Reply-To: <56EC641D.6010203@cajuntechie.org> References: <20160318180200.4B227A06D95@palinka.tinho.net> <56EC641D.6010203@cajuntechie.org> Message-ID: On Fri, Mar 18, 2016 at 1:25 PM, Anthony Papillion wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > > On 03/18/2016 01:02 PM, dan at geer.org wrote: > > Apple will have its Snowden. > > That's not a given. Everyone believes that Windows has backdoors and > spying components in it but we've not seen a single Snowden from > Microsoft. Why would we from Apple, an even more secretive company > than Microsoft? > Or, just playing devils' advocate, perhaps we haven't seen any Snowdens from Microsoft because there's nothing to be leaked? Perhaps, instead of demanding cooperation from vendors and risking getting caught, the government focuses on building the capability to exploit bugs and opsec failures on the part of their targets. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1188 bytes Desc: not available URL: From seanl at literati.org Fri Mar 18 13:44:15 2016 From: seanl at literati.org (Sean Lynch) Date: Fri, 18 Mar 2016 13:44:15 -0700 Subject: Google: 'We'll pay $100K if you can hack a Chromebook remotely' In-Reply-To: References: <56EA2F53.1000909@riseup.net> Message-ID: On Thu, Mar 17, 2016 at 10:41 PM, grarpamp wrote: > On 3/17/16, Rayzer wrote: > >> exclusively for attacks that achieve a persistent compromise on a > >> Chromebook in 'guest mode' > > > > > http://www.zdnet.com/article/google-well-pay-100k-if-you-can-hack-a-chromebook-remotely/ > > Doesn't this thing use Intel's AMT processor and NIC? > Intel's probably protected their source code access processes > with more than $100k against any researcher, same with Google, > but as we've just seen NSA already FISA'd / moled both their source. > So what's the difference? Or the point? > > If Google wants to pull a stunt, it should open it's own code > and start paying out along that new bug discovery asymptote. > > Regardless of whether you sell software / hardware or not... > "We're closed, and awesome" really doesn't cut it anymore > when the bad guys have the source everyone else thought > was closed. > Most of ChromeOS is open source. The BIOS, AIUI, is Coreboot. Most of what isn't open source can't legally be open sourced because it's other people's IP, like the codecs, Flash, etc. If you care, go compile and run ChromiumOS. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1818 bytes Desc: not available URL: From dan at geer.org Fri Mar 18 11:02:00 2016 From: dan at geer.org (dan at geer.org) Date: Fri, 18 Mar 2016 14:02:00 -0400 Subject: Apple engineers... Will they (snigger) crack under pressure In-Reply-To: Your message of "Fri, 18 Mar 2016 10:10:20 -0700." <56EC367C.8030103@riseup.net> Message-ID: <20160318180200.4B227A06D95@palinka.tinho.net> Apple will have its Snowden. --dan From seanl at literati.org Fri Mar 18 14:18:49 2016 From: seanl at literati.org (Sean Lynch) Date: Fri, 18 Mar 2016 14:18:49 -0700 Subject: Apple engineers... Will they (snigger) crack under pressure In-Reply-To: <56EC6714.4050506@cajuntechie.org> References: <20160318180200.4B227A06D95@palinka.tinho.net> <56EC641D.6010203@cajuntechie.org> <56EC6714.4050506@cajuntechie.org> Message-ID: On Fri, Mar 18, 2016 at 1:37 PM, Anthony Papillion wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > > > > On 03/18/2016 03:35 PM, Sean Lynch wrote: > > > > On Fri, Mar 18, 2016 at 1:25 PM, Anthony Papillion > > > wrote: > > > > -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 > > > > On 03/18/2016 01:02 PM, dan at geer.org wrote: > >> Apple will have its Snowden. > > > > That's not a given. Everyone believes that Windows has backdoors > > and spying components in it but we've not seen a single Snowden > > from Microsoft. Why would we from Apple, an even more secretive > > company than Microsoft? > > > > > > Or, just playing devils' advocate, perhaps we haven't seen any > > Snowdens from Microsoft because there's nothing to be leaked? > > Perhaps, instead of demanding cooperation from vendors and risking > > getting caught, the government focuses on building the capability > > to exploit bugs and opsec failures on the part of their targets. > > That /could/ be true. But why should we believe that they wouldn't > have enlisted the cooperation of Microsoft prior to the dates on the > Snowden leaks? The NSA has been cooperating with companies since the > 1970's (and got in a lot of trouble about it). Why would they ignore a > company that has 90%+ of the desktop market worldwide? Possible but > unlikely IMHO. > > Just Occam's Razor. Why bother getting cooperation when the software is not secure to begin with? There are too many ways to gain access to Windows that aren't vulnerable to leaks. And we know for sure this is true and has been for a long time; just look at the thousands of exploit kits out there, most of which have been made by people without much in the way of resources or experience. If that's what the script kiddies can do, imagine what an agency with a $50B budget can do. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2690 bytes Desc: not available URL: From anthony at cajuntechie.org Fri Mar 18 13:25:01 2016 From: anthony at cajuntechie.org (Anthony Papillion) Date: Fri, 18 Mar 2016 15:25:01 -0500 Subject: Apple engineers... Will they (snigger) crack under pressure In-Reply-To: <20160318180200.4B227A06D95@palinka.tinho.net> References: <20160318180200.4B227A06D95@palinka.tinho.net> Message-ID: <56EC641D.6010203@cajuntechie.org> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 03/18/2016 01:02 PM, dan at geer.org wrote: > Apple will have its Snowden. That's not a given. Everyone believes that Windows has backdoors and spying components in it but we've not seen a single Snowden from Microsoft. Why would we from Apple, an even more secretive company than Microsoft? -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJW7GQdAAoJEAKK33RTsEsV3mQQAJpT3cdXDQZDE9Mla+C4yL71 ZepV3D+7f51AVbGgtZu/1+NkTqbRZvrtq9IjFyZdWH4FTM7xUbJmhaHw4048gSwu VupTP0TvQTADLzsEdabsCJSPk3yfZfMqOXeNxhORtuDI6xOLIbeKIx1iMiFvNjnl ETd5NDImtk99A/P7EddPqFEfwy2FwLv6Y6JydXhTyo/UFzzSIjbbx0TDLNvVLma6 3/QNPPF5d3ITVKmmz5kCtrNcVUmqVc7ZwDGdtyC/W8l1HWnG3swjeB+TNJNUdalp 9KPCpWs3ioV2ExhxjxWXuZFECsIzwSPa4yYaNsIYKwbMzQaJasSn+nz65ltEXiRf uPJ9f91DFhmZbhzA3ofqhp4YKUHUWhXhg7GzvU7NdqFcTi2N3EEToKa4f5bA9I3w gVvEAITNJ3YiCHm3MuwiceXNyxNCfeUNBl3c2WiPStmiUHtYNttvUWF66kLsSqwu U2QRJRMZ6+zhheFNgdIWWbgM78YVRPb79plSI44DDAzqORArz7HysA3UJyNQz3Ux wSldYb8VrXBqplMz0vFWgSAfeXUHWGA5jXHfm4sXuKOs54mqDmxolZl5xNuJHqxa vCb+81oyd3OWYO5WxYu7iQ+5YG6DpWa8YnF1ULHx7md2BGRMqZURyCJ4GkC6tl7q 4XUOORuyLRNRFwWeQaHX =zySL -----END PGP SIGNATURE----- From anthony at cajuntechie.org Fri Mar 18 13:37:40 2016 From: anthony at cajuntechie.org (Anthony Papillion) Date: Fri, 18 Mar 2016 15:37:40 -0500 Subject: Apple engineers... Will they (snigger) crack under pressure In-Reply-To: References: <20160318180200.4B227A06D95@palinka.tinho.net> <56EC641D.6010203@cajuntechie.org> Message-ID: <56EC6714.4050506@cajuntechie.org> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 03/18/2016 03:35 PM, Sean Lynch wrote: > > On Fri, Mar 18, 2016 at 1:25 PM, Anthony Papillion > > wrote: > > -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 > > On 03/18/2016 01:02 PM, dan at geer.org wrote: >> Apple will have its Snowden. > > That's not a given. Everyone believes that Windows has backdoors > and spying components in it but we've not seen a single Snowden > from Microsoft. Why would we from Apple, an even more secretive > company than Microsoft? > > > Or, just playing devils' advocate, perhaps we haven't seen any > Snowdens from Microsoft because there's nothing to be leaked? > Perhaps, instead of demanding cooperation from vendors and risking > getting caught, the government focuses on building the capability > to exploit bugs and opsec failures on the part of their targets. That /could/ be true. But why should we believe that they wouldn't have enlisted the cooperation of Microsoft prior to the dates on the Snowden leaks? The NSA has been cooperating with companies since the 1970's (and got in a lot of trouble about it). Why would they ignore a company that has 90%+ of the desktop market worldwide? Possible but unlikely IMHO. -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJW7GcUAAoJEAKK33RTsEsVVZIQAKly2eCxgmAHgkyhz1/patK9 IapaxW1dMJk9BJ+pxB9x4IQIEIN29tegapgyWT1FKU9hGhBG2ByWWKLS4GlqAy3n Xhsd+zJIdxP+jilDYZ/np6IyzeOXi9iab7uu6UmNw0nCoFrJnu0t8edDPvGNuDc7 SIrSK8ZQjR66yom2tiZj+AaOzfLcJQVPijNajoidov47+GyPqmXtYU2wr+wgLS0H xCCz8eyK/TAPa+vJjiAXSAW2I1FtRVoRZ+hkRdp/U7F/lkgsu+IKG7K5dZjUYNtB 8Ga26au/TXHJT9wowdpGDEkcXxj2MapJKG3hjMfr0fx0te+TjntAfohwJWxmXAzn giGnIV1RyTp3pGdMCJksQmg4p3xDbULKYUjwe3jaHMOtrszMKhMThb0i3hz5+5Q9 tKkLJlyTbP+ivwJ4t/ZyPhDNqyoKjx7y6926YPAN7kAGO5tjDupgEtKiu6X2u6s6 jyBBEfRC+0T2Qo9kBFjqPl/RjQRkcZoupZ4/ja2mVEXPnSTqdPqoY4IngMUIC5ey dIRX52XReaZkT039zpSx7ZR2ZW7ELp3r8I+TqPvpOIrWinnW4eSQ1jO6kfwxaPq2 ch8hhCw6VnNyapSbpgDkb4vCpEHxEsy3XdOg4jf2Y/RSsjFqHH+/F3yshBF/ITBv BFBPXl/5NkqUzh0gMTEr =L+Pi -----END PGP SIGNATURE----- From anthony at cajuntechie.org Fri Mar 18 14:28:40 2016 From: anthony at cajuntechie.org (Anthony Papillion) Date: Fri, 18 Mar 2016 16:28:40 -0500 Subject: Apple engineers... Will they (snigger) crack under pressure In-Reply-To: References: <20160318180200.4B227A06D95@palinka.tinho.net> <56EC641D.6010203@cajuntechie.org> <56EC6714.4050506@cajuntechie.org> Message-ID: <56EC7308.9060602@cajuntechie.org> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 03/18/2016 04:18 PM, Sean Lynch wrote: > > > On Fri, Mar 18, 2016 at 1:37 PM, Anthony Papillion > > wrote: > > -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 > > > > On 03/18/2016 03:35 PM, Sean Lynch wrote: >> >> On Fri, Mar 18, 2016 at 1:25 PM, Anthony Papillion >> > >> > wrote: >> >> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 >> >> On 03/18/2016 01:02 PM, dan at geer.org >> > wrote: >>> Apple will have its Snowden. >> >> That's not a given. Everyone believes that Windows has backdoors >> and spying components in it but we've not seen a single Snowden >> from Microsoft. Why would we from Apple, an even more secretive >> company than Microsoft? >> >> >> Or, just playing devils' advocate, perhaps we haven't seen any >> Snowdens from Microsoft because there's nothing to be leaked? >> Perhaps, instead of demanding cooperation from vendors and >> risking getting caught, the government focuses on building the >> capability to exploit bugs and opsec failures on the part of >> their targets. > > That /could/ be true. But why should we believe that they wouldn't > have enlisted the cooperation of Microsoft prior to the dates on > the Snowden leaks? The NSA has been cooperating with companies > since the 1970's (and got in a lot of trouble about it). Why would > they ignore a company that has 90%+ of the desktop market > worldwide? Possible but unlikely IMHO. > > > Just Occam's Razor. Why bother getting cooperation when the > software is not secure to begin with? There are too many ways to > gain access to Windows that aren't vulnerable to leaks. And we know > for sure this is true and has been for a long time; just look at > the thousands of exploit kits out there, most of which have been > made by people without much in the way of resources or experience. > If that's what the script kiddies can do, imagine what an agency > with a $50B budget can do. You bring up good points. It not only saves money but also allows them to hide their true capabilities. -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJW7HMIAAoJEAKK33RTsEsVD9wQAJzd8z5s7/qrlaR9S9l+e7Yo 8w6drsQvpn4XaR9kzCAz7i1xl+MEzCdqbaIKFNw0Kf5JoAeqRhJ6/pgfMjs6SS9L 1zolofmybjezMmh5d6USvExsDZivvikt6BtsO1o6x33FsMczZrBSfQ1zdA2qsvQY ch/Ms0jZt92iXsefvaxHMZEuGLvZViiB5v1mgU0eBc+GEKiFN469wunPmOXuihWi ngkKZCIJHWd+T/Qtcl8DW9mrNlICs9qmIcTn4mMvl6aJWIj7UenK8Rg33M0/Lv2+ ccyGanXt9kZbsz77PKrZGDcRQ0N0c+37fZaysmY6s9ywwZKKpj1L2BQO40QA4yTC LbUl9hrhu19TE4LZglemlfQXHdZgQYFsz5c6hriyK36oJBi01iEXB1vo30yKIx98 /es0j0xRGCBgbHmQWi+86y4QHhgp+FiRiy9UBv4o5kwV1mPGnZyh7dvX2+i0Eg2a Zr2xPIUBWou+7aL0xv2b+HoiwMzBlNSkyXQ+HxfNqXIKHXq03Liwkel0uiEl7NHg AKhYFm5edtKPlRmzwIBavAQRiVrmilBRT3XBcYfz1Fu4SlLf08SUs5qWAycIOVGN fMDBlXEssQz7xGYK++zw+gi7ejTOdN9/UOzHnYyvP/WO4IMww8pQxxfWH7Qfjl9p bzmWceCXS5QT6UDGujs0 =BmuW -----END PGP SIGNATURE----- From juan.g71 at gmail.com Fri Mar 18 14:07:21 2016 From: juan.g71 at gmail.com (juan) Date: Fri, 18 Mar 2016 18:07:21 -0300 Subject: Apple engineers... Will they (snigger) crack under pressure In-Reply-To: <56EC641D.6010203@cajuntechie.org> References: <20160318180200.4B227A06D95@palinka.tinho.net> <56EC641D.6010203@cajuntechie.org> Message-ID: <56ec6e3b.492c8c0a.325de.0975@mx.google.com> On Fri, 18 Mar 2016 15:25:01 -0500 Anthony Papillion wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > > On 03/18/2016 01:02 PM, dan at geer.org wrote: > > Apple will have its Snowden. > > That's not a given. Everyone believes that Windows has backdoors and > spying components in it but we've not seen a single Snowden from > Microsoft. Is this message for real? Trolling? Or what. From seanl at literati.org Fri Mar 18 11:16:01 2016 From: seanl at literati.org (Sean Lynch) Date: Fri, 18 Mar 2016 18:16:01 +0000 Subject: Apple engineers... Will they (snigger) crack under pressure In-Reply-To: <56EC367C.8030103@riseup.net> References: <56EC367C.8030103@riseup.net> Message-ID: It seems unlikely any engineer who quit Apple rather than write software to help the FBI break into the phone would have any trouble at all finding a job in Silicon Valley that would pay them even more money than they're making at Apple. Apple is nowhere near the top of the list in terms of compensation. On Fri, Mar 18, 2016 at 10:17 AM Rayzer wrote: > I can't imagine Apple would fire an employee for refusing. AAMOF the > best publicity in the WORLD for them would be if they publicly declined > to discipline or fire an employee for refusing. > > "Apple’s engineers may refuse to write software to break into > the phone of one of the San Bernardino shooters if the FBI wins > its court battle with the tech giant, according to more than > half a dozen current and former employees." > > > Apple employees are already discussing what they will do if ordered > to help law enforcement authorities. Some say they may balk at the > work, while others may even quit their high-paying jobs rather than > undermine the security of the software they have already created, > according to more than a half-dozen current and former Apple employees. > > Among those interviewed were Apple engineers who are involved in the > development of mobile products and security, as well as former > security engineers and executives. > > The potential resistance adds a wrinkle to a very public fight > between Apple, the world’s most valuable company, and the > authorities over access to an iPhone used by one of the attackers in > the December mass killing in San Bernardino, Calif. > > It also speaks directly to arguments Apple has made in legal > documents that the government’s demand curbs free speech by asking > the company to order people to do things that they consider offensive. > > “Such conscription is fundamentally offensive to Apple’s core > principles and would pose a severe threat to the autonomy of Apple > and its engineers,” Apple’s lawyers wrote in the company’s final > brief to the Federal District Court for the Central District of > California. > > In full: > > http://www.nytimes.com/2016/03/18/technology/apple-encryption-engineers-if-ordered-to-unlock-iphone-might-resist.html?_r=0 > > -- > RR > "Through counter-intelligence it should be possible to pinpoint potential > trouble-makers ... And neutralize them, neutralize them, neutralize them" > > > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3103 bytes Desc: not available URL: From jdb10987 at yahoo.com Fri Mar 18 13:28:55 2016 From: jdb10987 at yahoo.com (jim bell) Date: Fri, 18 Mar 2016 20:28:55 +0000 (UTC) Subject: New video on Ethereum at Reason.com References: <1218031202.1111177.1458332935154.JavaMail.yahoo.ref@mail.yahoo.com> Message-ID: <1218031202.1111177.1458332935154.JavaMail.yahoo@mail.yahoo.com> http://reason.com/reasontv/2016/03/18/ethereum-blockchain-lubin-consensys A very well-done video on the Ethereum blockchain-based network, by Jim Epstein of Reason Magazine.                Jim Bell -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 806 bytes Desc: not available URL: From coderman at gmail.com Fri Mar 18 15:58:20 2016 From: coderman at gmail.com (coderman) Date: Fri, 18 Mar 2016 23:58:20 +0100 Subject: Apple engineers... Will they (snigger) crack under pressure In-Reply-To: <20160318180200.4B227A06D95@palinka.tinho.net> References: <56EC367C.8030103@riseup.net> <20160318180200.4B227A06D95@palinka.tinho.net> Message-ID: On 3/18/16, dan at geer.org wrote: > Apple will have its Snowden. Snowden disclosed in service of Liberty, Apple Insider kleptography will service only Filthy Lucre... make no mistake, the NSA gets their keys. the FBI is the one out in the cold here! best regards, From guninski at guninski.com Fri Mar 18 23:51:29 2016 From: guninski at guninski.com (Georgi Guninski) Date: Sat, 19 Mar 2016 08:51:29 +0200 Subject: Apple engineers... Will they (snigger) crack under pressure In-Reply-To: References: <20160318180200.4B227A06D95@palinka.tinho.net> <56EC641D.6010203@cajuntechie.org> Message-ID: <20160319065129.GB963@sivokote.iziade.m$> On Fri, Mar 18, 2016 at 01:35:11PM -0700, Sean Lynch wrote: > Or, just playing devils' advocate, perhaps we haven't seen any Snowdens > from Microsoft because there's nothing to be leaked? Perhaps, instead of > demanding cooperation from vendors and risking getting caught, the > government focuses on building the capability to exploit bugs and opsec > failures on the part of their targets. I doubt this. m$ named their signing keys NSAKEY (look it up on wikipedia). Have there been requests m$ to unlock phone/computer? What if m$ gave to the NSA update signing certificate? Heard rumors that the majority of m$ developers, developers!!! see very small fraction of the source, so likely the potential backdoors are kept very well. As an aside, vaguely remember that someone leaked something of little importance (likely screenshots or prerelease). They used _hotmail_ to send the stuff to journos and as expected got caught. From jya at pipeline.com Sat Mar 19 07:48:44 2016 From: jya at pipeline.com (John Young) Date: Sat, 19 Mar 2016 10:48:44 -0400 Subject: Apple engineers... Will they (snigger) crack under pressure In-Reply-To: <20160318180200.4B227A06D95@palinka.tinho.net> References: <20160318180200.4B227A06D95@palinka.tinho.net> Message-ID: At 02:02 PM 3/18/2016, you wrote: >Apple will have its Snowden. > >--dan Marc Zwillinger, top tech lawyer for Apple in several cases, is an ex-DoJ top tech lawyer. Several of the Apple and amici lawyers are ex-USG, a stepping onto the golden stone -- a la Snowden Inc. -- to higher public service of just-us legally empowered spy-technoids rewards. All sharks are dual-hatted officers of the court, government agents and spies, with privileged access to ex parte, sealed, classified, in camera, judge's chambers, bar associations, commissions, panels, perks-comped and liquid-and-teen-sex fueled retreats and sojourns (flyaways from top law perches to hottie climates), ghost-writing, talking-heads, media advisors, why, momma mia, jumping the sharks is the lawful spying profession's motto. Engineers are not only dual-hatted, but verily Methusalaic with cascading, fast-changing head gear to fit the opportunities to engineer the fuck out of the public with godawful PR-slathered technology, science, math, human experiments, climate trashing, harmful environmental remediation, and, ah ha, literally grandmotherfucking encryption and cybersecurity not worth shit. Pardon our don't give a fuck for Job's protege >1% Tim Cook is so cocksure mouthing in chorus with his duplicitously greedy sharks, venal managerial engineers and advertising geniuses are glossing "on behalf of the public's right to privacy" (except from predatory USG, Apple and amici conspiring to keep secrets and sealings from the iYokels). From admin at pilobilus.net Sat Mar 19 08:01:04 2016 From: admin at pilobilus.net (Steve Kinney) Date: Sat, 19 Mar 2016 11:01:04 -0400 Subject: Noam Chomsky on the 2016 Republicans: 'I Have Never Seen Such Lunatics in the Political System' In-Reply-To: <20160314055759.GA679@sivokote.iziade.m$> References: <20160314055759.GA679@sivokote.iziade.m$> Message-ID: <56ED69B0.9040605@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 03/14/2016 01:57 AM, Georgi Guninski wrote: > Noam Chomsky on the 2016 Republicans: 'I Have Never Seen Such > Lunatics in the Political System' > > http://www.alternet.org/election-2016/noam-chomsky-2016-republican s-i-have-never-seen-such-lunatics-political-system When > well funded politicians appear to be "lunatics", keep your back to the wall and your eyes on the nearest exit. Better yet, leave quickly and quietly if you can. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQIcBAEBAgAGBQJW7WmuAAoJEDZ0Gg87KR0LJicP/js7+8MAuIIipV2O8iHKVq7F PoJowfeeLN35mcT09Z130cu5rWUXTlhHYGhlWR3QNWwfNtm05cXF65eqBi3LH4QT hA0aON8Ms7aKxvvIJ1dLqhr2GNJRFkuX6F3jSZiKPOy1uJRaySASDtzEwaOKCQLt 6P2nDCy3Tp803fVoOKusLZ3o3vI363lm8NIp6Tmb4+kj+F6rlUzB04zXhXUrYc5r 8Q4hhdW2HqnUZ3cIf9AltxkGwh3kq9hyVwlKbObW+gYQezcFMEIhFStWHbw3GQkJ s/onUEBT5wylgsMwKpLCUCwHMaH4xhHfAyRezhW6oZ78iq6cDwQ4/AKeYdrr22GE /AIJMQ+62nczwVOxBCyvcq17SrzTTFDSccTlBsym2sEYV0RW4iL027I9un9Tb5Cj A5vvc8Zb6KHf5ZHyazim7lOhnph1X85xx5mZdTlOpw5JhRPl79Nf9LX5VUZ66bvN qu+xHkxvi5xm3DP9snliFzj4rT1DLUgODMcIxm3oBN0C+AprfTsBItrxHyK56QVZ PUYlIVBrMp3Gn3lKzXA+/Lt/EGJh7PW4qRh/mx5ELx9PLTrGADs43CfZTljQ/e/e uPjnleC3K9sHEUm/u65/XiESip7/xWB6FK59pXlR95idWkqiyLeHL3Sx+67Yg7au FIOZs1QwLuwHyNgebX8p =qSeE -----END PGP SIGNATURE----- From guninski at guninski.com Sat Mar 19 03:03:44 2016 From: guninski at guninski.com (Georgi Guninski) Date: Sat, 19 Mar 2016 12:03:44 +0200 Subject: Drivels on OSS security about CVEs Message-ID: <20160319100344.GA2171@sivokote.iziade.m$> There is some drivel on OSS security about CVEs: http://openwall.com/lists/oss-security/2016/03/04/4 I have trolled on numerous occasions that CVE and mitre suck much, e.g. a post from 2006: http://seclists.org/fulldisclosure/2006/Jan/259 From zen at freedbms.net Sat Mar 19 06:04:55 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Sat, 19 Mar 2016 13:04:55 +0000 Subject: solutions for source code take downs due to DMCA? Message-ID: brief github session: --- python-iview.gitm $ git fetch Username for 'https://github.com': zenaan Password for 'https://zenaan at github.com': remote: Repository unavailable due to DMCA takedown. remote: See the takedown notice for more details: remote: https://github.com/github/dmca/blob/master/2015-10-27-Python-iview.md. fatal: unable to access 'https://github.com/vadmium/python-iview.git/': The requested URL returned error: 503 --- My last change is: caf726732 2015-07-02 (HEAD, master) Humax retired; change to Panasonic feed I had plans to use it, but never quite got a round tuit, but I did grab a clone last year, to make sure I had a copy in case and or when I wanted or needed it. A DMCA takedown has happened since then. Finding alternative repos is not hard, but finding one which is updated is not something I have achieved - it looks like the DMCA ogre has wielded his club and squashed this probject, AFAICT. That's not good. It's not healthy for our (global) community. This feels like a problem we should be able to solve. Further info on this DMCA takedown: https://github.com/vadmium/python-iview https://github.com/github/dmca/blob/master/2015-10-27-Python-iview.md https://theconversation.com/python-iview-copyright-crusader-or-vigilante-operative-9763 http://www.mibus.org/2012/09/18/letter-to-the-abc-re-the-takedown-of-python-iview/ http://www.mibus.org/2012/09/23/doctor-who-sans-python-iview/ A foundational thought re freedom of information and freedom of culture and freedom to share comes to mind - are there any papers about any form of shock-test resistant hidden server design, e.g. with some number of trusted entry points into the TOR network to hide behind? It seems "we" have yet to design a functional hidden service? Zenaan From moritz at headstrong.de Sat Mar 19 07:41:12 2016 From: moritz at headstrong.de (mo) Date: Sat, 19 Mar 2016 15:41:12 +0100 Subject: solutions for source code take downs due to DMCA? In-Reply-To: References: Message-ID: <56ED6508.8060309@headstrong.de> On 03/19/2016 02:04 PM, Zenaan Harkness wrote: > It seems "we" have yet to design a functional hidden service? How so? I know of a couple of gits and gitlabs behind hidden services, it works just fine. From jm at porup.com Sat Mar 19 15:31:30 2016 From: jm at porup.com (J.M. Porup) Date: Sat, 19 Mar 2016 18:31:30 -0400 Subject: Apple engineers... Will they (snigger) crack under pressure In-Reply-To: <56edd1c6.055f8c0a.f8c71.ffff8db7@mx.google.com> References: <56EC367C.8030103@riseup.net> <20160318180200.4B227A06D95@palinka.tinho.net> <56edd1c6.055f8c0a.f8c71.ffff8db7@mx.google.com> Message-ID: <20160319223129.GB1779@fedora-21-dvm> At 02:02 PM 3/18/2016, you wrote: >Apple will have its Snowden. > >--dan We are players in this drama, not observers. If you think someone at Apple should leak sensitive documents in the public interest, why don't you drive over to Cupertino and encourage your contacts there to leak? Evil men take power when good men do nothing. Which are you? jmp From juan.g71 at gmail.com Sat Mar 19 15:24:22 2016 From: juan.g71 at gmail.com (juan) Date: Sat, 19 Mar 2016 19:24:22 -0300 Subject: Apple engineers... Will they (snigger) crack under pressure In-Reply-To: References: <20160318180200.4B227A06D95@palinka.tinho.net> Message-ID: <56edd1c6.055f8c0a.f8c71.ffff8db7@mx.google.com> On Sat, 19 Mar 2016 10:48:44 -0400 John Young wrote: > At 02:02 PM 3/18/2016, you wrote: > >Apple will have its Snowden. > > > >--dan > > Marc Zwillinger, top tech lawyer for Apple in several cases, is an > ex-DoJ top tech lawyer. > > Several of the Apple and amici lawyers are ex-USG, a stepping onto > the golden stone -- a la Snowden Inc. -- to higher public service of > just-us legally empowered spy-technoids rewards. The 'amicus curiae brief' from lavabit was pretty unimpressive but of course as self-parody it was great. For instance, the legal geniuses who wrote the 'brief' argued that forcing apple to work for their partners, the government, would be 'involuntary servitude' (poor oppressed corporation). At the same time the master doctors cheerfully 'acknowledged' the supreme authority of the americunt konstitution and noted that 'involutary servitude' was perfectly 'legal', 'just' and 'amazing' in quite a few cases, to wit : "the conscription of americans into military service does not violate the 13th ammendment forced jury service is also not a violation preventing sailors who contracted to work from desserting their ship AND forced roadwork are not a violations of the 13th ammendment" https://cryptome.org/2016/03/usg-apple-102-105.pdf It seems clear that with this kind of 'freedom' 'fighters' freedom needs no enemies. From carimachet at gmail.com Sun Mar 20 03:23:17 2016 From: carimachet at gmail.com (Cari Machet) Date: Sun, 20 Mar 2016 11:23:17 +0100 Subject: life > humans Message-ID: READINGS — From the August 2015 issue *The Transhuman Condition* By John Markoff Download Pdf Read Online https://harpers.org/archive/2015/08/the-transhuman-condition/ Single Page Print Page *By John Markoff, from* Machines of Loving Grace, *out this month from Ecco Books. Markoff has been a technology and business reporter for the* New York Times *since 1988.* B ill Duvall grew up on the peninsula south of San Francisco. The son of a physicist who was involved in classified research at Stanford Research Institute (SRI), a military-oriented think tank, Duvall attended UC Berkeley in the mid-1960s; he took all the university’s computer-programming courses and dropped out after two years. When he joined the think tank where his father worked, a few miles from the Stanford campus, he was assigned to the team of artificial-intelligence researchers who were building Shakey. Although *Life* magazine would later dub Shakey the first “electronic person,” it was basically a six-foot stack of gear, sensors, and motorized wheels that was tethered — and later wirelessly connected — to a nearby mainframe. Shakey wasn’t the world’s first mobile robot, but it was the first that was intended to be truly autonomous. It was designed to reason about the world around it, to plan its own actions, and to perform tasks. It could find and push objects and move in a planned way in its highly structured world. At both SRI and the nearby Stanford Artificial Intelligence Laboratory (SAIL), which was founded by John McCarthy in 1962, a tightly knit group of researchers was attempting to build machines that mimicked human capabilities. To this group, Shakey was a striking portent of the future; they believed that the scientific breakthrough that would enable machines to act like humans was coming in just a few short years. Indeed, among the small community of AI researchers who were working on both coasts during the mid-Sixties, there was virtually boundless optimism. But the reality disappointed Duvall. Shakey lived in a large open room with linoleum floors and a couple of racks of electronics. Box-like objects were scattered around for the robot to “play” with. Shakey’s sensors would capture its environment and then it would “think” — standing motionless for minutes on end — before moving. Even in its closed and controlled world, the robot frequently broke down or drained its batteries after just minutes of operation. Down the hall from the Shakey laboratory, another research group, led by computer scientist Doug Engelbart, was building a computer to run a program called NLS — the oN-Line System. Most people who know of Engelbart today know him as the inventor of the mouse. But the mouse, to Engelbart, was simply a gadget to improve our ability to interact with computers. His more encompassing idea was to use computer technologies to make it possible for small groups of scientists, engineers, and educators to “bootstrap” their projects by employing an array of ever more powerful software tools to organize their activities and create a “collective I.Q.” that outstripped the capabilities of any single individual. During World War II, Engelbart had stumbled across an article by Vannevar Bush that proposed a microfilm-based information-retrieval system called Memex to manage all of the world’s knowledge. He realized that such a system could be assembled with computers. The cultural gulf between McCarthy’s artificial intelligence and Engelbart’s contrarian NLS was already apparent to those on either side. When Engelbart visited MIT to demonstrate his project, prominent AI researcher Marvin Minsky complained that he was wasting research dollars on a glorified word processor. But the idea captivated Bill Duvall. Before long he switched his allegiance and moved down the hall to work in Engelbart’s lab. Late on the evening of October 29, 1969, Duvall connected the NLS system in Menlo Park, via a data line leased from the phone company, to a computer controlled by another young hacker in Los Angeles. It was the first time that two computers connected over the network that would become the Internet. Duvall’s leap from the Shakey laboratory to Engelbart’s NLS made him one of the earliest people to stand on both sides of a line that even today distinguishes two rival engineering communities. One of these communities has relentlessly pursued the automation of the human experience — artificial intelligence. The other, human-computer interaction — what Engelbart called intelligence augmentation — has concerned itself with “man-machine symbiosis.” What separates AI and IA is partly their technical approaches, but the distinction also implies differing ethical stances toward the relationship of man to machine. D uring the 1970s and 1980s the field of artificial intelligence drew a generation of brilliant engineers, but it often disappointed them in much the way that it had disappointed Duvall. Like him, many of these engineers turned to the contrasting ideal of intelligence augmentation. But today, AI is beginning to meet some of the promises made for it by SAIL and SRI researchers half a century ago, and artificial intelligence is poised to have an impact on society that may be greater than the effect of personal computing and the Internet. Although their project has now largely been forgotten, the designers of Shakey pioneered computing technologies that are now used by more than a billion people. The mapping software in our cars and our smartphones is based on techniques the team first developed. Their A* algorithm is the best-known way to find the shortest path between two locations. Toward the end of the Shakey project, speech control was added as a research task; Apple’s Siri, whose name is a nod to SRI, is a distant descendent of the machine that began life as a stack of rolling sensors and actuators. While Engelbart’s original research led directly to the PC and the Internet, McCarthy’s lab did not provide a single dramatic breakthrough. Rather, the falling costs of sensors, computer processing, and information storage, along with the gradual shift away from symbolic logic and toward more pragmatic statistical and machine-learning algorithms, have made it possible for engineers and programmers to create computerized systems that see, speak, listen, and move around in the world. As a result, AI has been transformed from an academic curiosity into a force that is altering countless aspects of the modern world. This has created an increasingly clear choice for designers — a choice that has become philosophical and ethical, rather than simply technical: will we design humans into or out of the systems that transport us, that grow our food, manufacture our goods, and provide our entertainment? A s computing and robotics systems have grown from laboratory curiosities into the fabric that weaves together modern life, the AI and IA communities have continued to speak past each other. The field of human-computer interface has largely operated within the philosophical framework originally set down by Engelbart — that computers should be used to assist humans. In contrast, the artificial-intelligence community has for the most part remained unconcerned with preserving a role for individual humans in the systems it creates. Terry Winograd was one of the first to see the two extremes clearly and to consider their consequences. As a graduate student at MIT in the 1960s, Winograd studied human language in order to build a software robot that was capable of interacting with humans in conversation. During the 1980s, he was part of a small group of AI researchers who engaged in seminars at Berkeley with the philosophers Hubert Dreyfus and John Searle. The philosophers persuaded Winograd that there were real limits to the capabilities of intelligent machines. In part because of his changing views, he left the field of artificial intelligence. A decade later, as the faculty adviser for Google cofounder Larry Page, Winograd counseled the young graduate student to focus on Web search rather than more far-fetched technologies. Page’s original PageRank algorithm, the heart of Google’s search engine, can perhaps be seen as the most powerful example of human augmentation in history. The algorithm systematically collected human decisions about the value of information and pooled those decisions to prioritize search results. Although some criticized the process for siphoning intellectual labor from vast numbers of unwitting humans, the algorithm established an unstated social contract: Google mined the wealth of human knowledge and returned it in searchable form to society, while reserving for itself the right to monetize the results. Since it established its search box as the world’s most powerful information monopoly, Google has yo-yoed between IA and AI applications and services. The ill-fated Google Glass was intended as a “reality-augmentation system,” while the company’s driverless-car project represents a pure AI — replacing human agency and intelligence with a machine. Recently, Google has undertaken what it loosely identifies as “brain” projects, which suggests a new wave of AI. In 2012, Google researchers presented a paper on a machine-vision system. After training itself on 10 million digital images taken from YouTube videos, the system dramatically outperformed previous efforts at an automated-vision network, roughly doubling their accuracy in recognizing objects from a list of 20,000 distinct items. Among other things, the system taught itself to recognize cats — perhaps not surprising, given the overabundance of cat videos on YouTube — with a mechanism that the scientists described as a cybernetic cousin to what takes place in the brain’s visual cortex. The experiment was made possible by Google’s immense computing resources, which allowed researchers to turn loose a cluster of 16,000 processors on the problem — though that number still, of course, represented a tiny fraction of the billions of neurons in a human brain, a huge portion of which are devoted to vision. S peculation about whether Google is on the trail of a genuine artificial brain has become increasingly rampant. There is certainly no question that a growing group of Silicon Valley engineers and scientists believe themselves to be closing in on “strong” AI — the creation of a self-aware machine with human or greater intelligence. Whether or not this goal is ever achieved, it is becoming increasingly possible — and “rational” — to design humans out of systems for both performance and cost reasons. In manufacturing, where robots can directly replace human labor, the impact of artificial intelligence will be easily visible. In other cases the direct effects will be more difficult to discern. Winston Churchill said, “We shape our buildings, and afterwards our buildings shape us.” Today our computational systems have become immense edifices that define the way we interact with our society. In Silicon Valley it is fashionable to celebrate this development, a trend that is most clearly visible in organizations like the Singularity Institute and in books like Kevin Kelly’s *What Technology Wants* (2010). In an earlier book, *Out of Control* (1994), Kelly came down firmly on the side of the machines: The problem with our robots today is that we don’t respect them. They are stuck in factories without windows, doing jobs that humans don’t want to do. We take machines as slaves, but they are not that. That’s what Marvin Minsky, the mathematician who pioneered artificial intelligence, tells anyone who will listen. Minsky goes all the way as an advocate for downloading human intelligence into a computer. Doug Engelbart, on the other hand, is the legendary guy who invented word processing, the mouse, and hypermedia, and who is an advocate for computers-for-the-people. When the two gurus met at MIT in the 1950s, they are reputed to have had the following conversation: minsky: We’re going to make machines intelligent. We are going to make them conscious! engelbart: You’re going to do all that for the machines? What are you going to do for the people? This story is usually told by engineers working to make computers more friendly, more humane, more people centered. But I’m squarely on Minsky’s side — on the side of the made. People will survive. We’ll train our machines to serve us. But what are we going to do for the machines? But to say that people will “survive” understates the possible consequences: Minsky is said to have responded to a question about the significance of the arrival of artificial intelligence by saying, “If we’re lucky, they’ll keep us as pets.” Until recently, the artificial-intelligence community has largely chosen to ignore the ethics of systems that they consider merely powerful tools. When I asked one engineer who is building next-generation robots about the impact of automation on people, he told me, “You can’t think about that; you just have to decide that you are going to do the best you can to improve the world for humanity as a whole.” AI and machine-learning algorithms have already led to transformative applications in areas as diverse as science, manufacturing, and entertainment. Machine vision and pattern recognition have been essential to improving quality in semiconductor design. Drug-discovery algorithms have systematized the creation of new pharmaceuticals. The same breakthroughs have also brought us increased government surveillance and social-media companies whose business model depends on invading privacy for profit. Optimists hope that the potential abuses of our computer systems will be minimized if the application of artificial intelligence, genetic engineering, and robotics remains focused on humans rather than algorithms. But the tech industry has not had a track record that speaks to moral enlightenment. It would be truly remarkable if a Silicon Valley company rejected a profitable technology for ethical reasons. Today, decisions about implementing technology are made largely on the basis of profitability and efficiency. What is needed is a new moral calculus. -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 17039 bytes Desc: not available URL: From grarpamp at gmail.com Sun Mar 20 14:21:17 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 20 Mar 2016 17:21:17 -0400 Subject: [tor-talk] Traffic shaping attack In-Reply-To: References: Message-ID: On 3/18/16, Oskar Wendel wrote: > Let's set up a service in a way that it will modulate the traffic, so the > download would look like: That's active manipulation in / at one endpoint node. > Then, we monitor traffic flowing into various entry nodes (remember we're > a global adversary, having direct access to infrastructure around the > globe) and spot the traffic that matches our pattern. That's global / regional passive listening, needing be concerned minimally visibility with just any other G/R IP endpoints without needing track entire path. Which, if presumed and likely to be deployed, combine to be nicely effective, whether finding such clients, or services on Tor, I2P, etc. Attack could be made much more difficult quite possibly defeated if all nodes engaged in bucketed reclocked and jittered fill traffic with each other (possibly along some virtual path distance >=1 hop) and enforced peering relationships based upon receipt of same expected and contractually obligated traffic (would you talk to or retransmit for a node that acted sent packets as you say... fuck no). From grarpamp at gmail.com Sun Mar 20 14:41:23 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 20 Mar 2016 17:41:23 -0400 Subject: [tor-talk] Traffic shaping attack In-Reply-To: References: Message-ID: Tor and other overlays also uses only TCP, which may provide some sort of enhanced end2end specific directable observability stream container. Opposed to UDP or raw packet which may offer more options to develop / layer various anti active / passive attack methods, including traffic spreading and recombination. Do not expect any possible solutions to come without potential overhead / tradeoff costs, only if you can use them to your needs, or adapt your needs to live in their context. And never underestimate a lorry full of tapes. From grarpamp at gmail.com Sun Mar 20 15:05:39 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 20 Mar 2016 18:05:39 -0400 Subject: Building A Global Network Of Open Source SDR Receivers Message-ID: https://news.slashdot.org/story/16/03/20/0242204/building-a-global-network-of-open-source-sdr-receivers http://www.jks.com/KiwiSDR/ http://beagleboard.org/ A fellow Kiwi is attempting to crowdfund a world-wide network of open-source, software-defined, radio receivers. Once in place, this will allow anybody anywhere in the world to scan the 0 to 30MHz RF spectrum from the comfort of their HTML-5 web browser. Built on top of the Beaglebone, the "KiwiSDR" RF board also includes a GPS receiver front-end, which will allow timing between receivers to be correlated, giving a lot of options for projects like long baseline interferometry and lightning detection. Prototypes are already deployed, and I've been RXing in Sweden, Australia and New Zealand. [The KiwiSDR design has been detailed on JKS.com, where there is a link to the project's Kickstarter page.] From hozer at hozed.org Sun Mar 20 16:30:36 2016 From: hozer at hozed.org (Troy Benjegerdes) Date: Sun, 20 Mar 2016 18:30:36 -0500 Subject: Apple engineers... Will they (snigger) crack under pressure In-Reply-To: <20160319223129.GB1779@fedora-21-dvm> References: <56EC367C.8030103@riseup.net> <20160318180200.4B227A06D95@palinka.tinho.net> <56edd1c6.055f8c0a.f8c71.ffff8db7@mx.google.com> <20160319223129.GB1779@fedora-21-dvm> Message-ID: <20160320233036.GA3544@nl.grid.coop> On Sat, Mar 19, 2016 at 06:31:30PM -0400, J.M. Porup wrote: > At 02:02 PM 3/18/2016, you wrote: > >Apple will have its Snowden. > > > >--dan > > We are players in this drama, not observers. > > If you think someone at Apple should leak sensitive documents in the > public interest, why don't you drive over to Cupertino and encourage > your contacts there to leak? > > Evil men take power when good men do nothing. > > Which are you? Yes indeed, all the world's a security theatre stage. What part are you playing? How many of your fellow actors are collecting paychecks both from Apple, and from foreign and domestic government services? The only part here that's surprising is the blatant public admission by the FBI that they can't afford to pay the market rates for apple insiders. Or was that an intentional leak by the FBI's Snowden, who, unlike Snowden, seems to know how to stay hidden and cause a lot more damage. I also find it hard to believe that Apple's employees would be so willing to sacrifice themselves to save the user's private keys. I find it more likely the cost-benefit calculation determined that locking out unauthorized apple cloners exceeds the cost of litigation, and the marketing and PR side-show was a brand-building bonus of a lifetime. The FBI just got the short end of the stick, and is now getting an education of why it's a bad idea to try to bully a smarter bully with a bigger bankroll. http://www.cbsnews.com/news/apples-ad-budget-hits-1-billion/ https://www.fbi.gov/news/testimony/fbi-budget-request-for-fiscal-year-2016 From carimachet at gmail.com Sun Mar 20 10:32:17 2016 From: carimachet at gmail.com (Cari Machet) Date: Sun, 20 Mar 2016 18:32:17 +0100 Subject: [Cryptography] USG v. Lavabit-Snowden Files Unsealed In-Reply-To: References: Message-ID: And the guy that started telegram wasnt even treated this way in russia ... they asked to access accounts for a platform he developed he said no and left the country never to return thats why we have telegram ... he just moves around the planet prolly has a swiss like untouchable bank account or 2 If people are surprised by this kind of USG action then that for me is scary .. USG been seriously dead long time now - never was really alive as it likes to propagandize On Mar 17, 2016 3:55 PM, "Bill Cox" wrote: > Wow, this is scary. It sounds like Lavabit was fined $5,000 per day until > it handed over the encryption keys for its email service, and that Lavabit > further had a gag order and could say nothing about it. Here's the text of > this order: > > ORDER > > This matter comes before the Court on the motion of the government for > sanctions for failure to comply with this Court's order entered August 2, > 2013. For the reasons stated in the government's motion, and pursuantto > Title 18, United States Code. Section 401, it is hereby ORDERED that the > motion for sanctions is granted; It isfurther ORDERED that, if the > encryption keys necessary to implement the pen register and trap and trace > device are not provided to the FBI in PEM or equivalent electronic formal > by noon (CDT) on August 5, 2013, a fine of five thousand dollars > ($5,000.00) shall be imposed on Lavabit LLC and Mr. Levison; It is further > ORDERED that, if the encryption keys necessary to implement the pen > register and trap and trace device are not provided to the FBI in PEM or > equivalent electronic format by noon (CDT) each day thereafter beginning > August 6, 2013, a fine of five thousand dollars ($5,000.00) shall be > imposed on Lavabit LLC and Mr. Levison for each day of noncompliance; and > It is further ORDERED that the government's motion for sanctions and this > Order shall remain under seal until further order of this Court > > As an ethical matter, I believe our government should tell its citizens > what form of spying on our private communications it is doing, and under > what conditions. Seeing our government do this sort of thing in secret > scares the heck out of me. It is certainly not what I thought would happen > in the USA. > > Bill > > On Wed, Mar 16, 2016 at 5:39 PM, John Young wrote: > >> USG v. Lavabit-Snowden Files Unsealed: >> >> https://cryptome.org/2016/03/usg-lavabit-unsealed.pdf (560 pp, 140MB) >> >> Precursor to USG v. Apple. >> >> >> _______________________________________________ >> The cryptography mailing list >> cryptography at metzdowd.com >> http://www.metzdowd.com/mailman/listinfo/cryptography > > > > _______________________________________________ > The cryptography mailing list > cryptography at metzdowd.com > http://www.metzdowd.com/mailman/listinfo/cryptography > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3935 bytes Desc: not available URL: From grarpamp at gmail.com Sun Mar 20 15:49:50 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 20 Mar 2016 18:49:50 -0400 Subject: [tor-talk] Traffic shaping attack In-Reply-To: <20160320221427.GE15350@torproject.org> References: <20160319034044.GQ8732@moria.seul.org> <20160320015647.GR8732@moria.seul.org> <20160320221427.GE15350@torproject.org> Message-ID: On 3/20/16, Mike Perry wrote: > For example, I wonder if users see such interrupts on all of their Tor > traffic at that time, or just hidden service traffic? Or just hidden > service traffic to specific services? ... the OP appears to know the onion url and refers to fora discussion the situation. So OP should post those links for others to review analyse formulate hypothesis etc. Not as if OP and all have not already been shaped / confirmed themselves or that links [to links] mean anything. Oh noes, thousands links in your mbox... http://skunksworkedp2cg.onion/ From grarpamp at gmail.com Sun Mar 20 16:29:49 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 20 Mar 2016 19:29:49 -0400 Subject: [tor-talk] Traffic shaping attack In-Reply-To: <20160320221427.GE15350@torproject.org> References: <20160319034044.GQ8732@moria.seul.org> <20160320015647.GR8732@moria.seul.org> <20160320221427.GE15350@torproject.org> Message-ID: On 3/20/16, Mike Perry wrote: > It could also be due to the fact that Tor is effectively > single-threaded. If something on the user's guard node, intermediate > node, or hidden service is taking large amounts of CPU time, this will > prevent traffic from flowing while that operation is happening. See: > https://trac.torproject.org/projects/tor/ticket/16585 (though that > ticket could use some help with clarity). Related... why a traffic fill solution may need to reclock and transmit new own random jitter and self limit to processable / expected bandwidth contracts to mask network induced computation and provide for CPU headroom therein. As with [John Gilmore's?] IEEE fill layer suggestion, there should be a group establish outside just Tor calling for participants to look at various crypted network fill models against now known / surmised G[P]A methods. From grarpamp at gmail.com Sun Mar 20 17:10:53 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 20 Mar 2016 20:10:53 -0400 Subject: [cryptography] USG-Apple - 3/22/16 Hearing Procedures, Add 3 USGs In-Reply-To: References: Message-ID: On 3/18/16, Jeffrey Walton wrote: > It sounds like its turning into a circus sideshow: > > ... in addition to Courtroom 4, there will be additional overflow > rooms in which the hearing will be shown on video screens. All of > these rooms together can accommodate up to a total of 324 spectators. > Admission tickets for these seats will be distributed outside the > courthouse starting at 7:00 a.m. on March 22, 2016. > > I hope it gets good media coverage, like the OJ Simpson trial. If the With 360 possibly pro Apple seats, odds are someone there is bound to be recording at least audio and will release it anonymously in full immediately that night. > government sides with the government (what a surprise that would be) I > hope the US citizen riot orders of magnitude larger than Rodney King. Could be interesting how the Apple-Customer relationship plays out. Particularly if Apple [has been] conditioning them right. From Rayzer at riseup.net Sun Mar 20 20:18:03 2016 From: Rayzer at riseup.net (Rayzer) Date: Sun, 20 Mar 2016 20:18:03 -0700 Subject: [cryptography] USG-Apple - 3/22/16 Hearing Procedures, Add 3 USGs In-Reply-To: References: Message-ID: <56EF67EB.3060000@riseup.net> grarpamp wrote: > With 360 possibly pro Apple seats, odds are someone there is > bound to be recording at least audio and will release it anonymously > in full immediately that night. Read the doc. "Courtroom 4 can accommodate 54 individuals sitting in the gallery seats" and 18 are reserved for lawyers working specifically for the two clients leaving *36*. I mentioned this to my manager and she said "Riverside courthouse?" and started a ROTF fit... Apparently the county DOES have larger facilities. -- RR "Through counter-intelligence it should be possible to pinpoint potential trouble-makers ... And neutralize them, neutralize them, neutralize them" -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From grarpamp at gmail.com Sun Mar 20 17:24:38 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 20 Mar 2016 20:24:38 -0400 Subject: [Cryptography] DoJ/FBI's "nuclear"/Lavabit option In-Reply-To: References: Message-ID: On 3/17/16, John Young wrote: > At 01:05 PM 3/17/2016, you wrote: >>FYI -- >>https://www.techdirt.com/articles/20160316/15292633927/how-apple-could-lose-winning-dojs-next-move-could-be-worse.shtml > >>The court then ordered Levison to provide a more useful electronic >>copy, which then resulted in the $5,000/day fine for failing to live >>up to that, and then the closure of the site. > > An Apple fine commensurate with Lavabit's revenue should end the > daredevilry with investors' stakeholdings. Judges really like to > takedown justice defiers as warning to potential emulators. Try to > wear Levison's boots with a red dot on forehead. > > Apple revenue for Q1 2016 was $75B. A fine of $1B a day should induce > Apple's investors to stampede toward disinvestment, Apple to > bankruptcy minimization, fragmented ATT, entrapped like RSA, > Microsoft and IBM. Before the foot shooting calamity, Tim Cook is > ordered to take a hike with platinum buyout to counsel risk-averse > VCs aboard world-circling craft of detumescent billionaire playboys > enjoying quasi-carnal pleasure in climate change, disease and > population control, retro-2001 space travel, moist-dreaming of POTUS. AAPL's stock price is up about 12+% on moderate volume in the 4+ weeks since the filing, more than enough time to for the news to date to reach price discovery. From grarpamp at gmail.com Sun Mar 20 17:32:03 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 20 Mar 2016 20:32:03 -0400 Subject: Noam Chomsky on the 2016 Republicans: 'I Have Never Seen Such Lunatics in the Political System' In-Reply-To: <56ED69B0.9040605@pilobilus.net> References: <20160314055759.GA679@sivokote.iziade.m$> <56ED69B0.9040605@pilobilus.net> Message-ID: On 3/19/16, Steve Kinney wrote: > When > well funded politicians appear to be "lunatics", keep your > back to the wall and your eyes on the nearest exit. Better yet, > leave quickly and quietly if you can. One's terrist is another's freedom fighter? From grarpamp at gmail.com Sun Mar 20 18:04:36 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 20 Mar 2016 21:04:36 -0400 Subject: Apple engineers... Will they (snigger) crack under pressure In-Reply-To: <56EC641D.6010203@cajuntechie.org> References: <20160318180200.4B227A06D95@palinka.tinho.net> <56EC641D.6010203@cajuntechie.org> Message-ID: On 3/18/16, Anthony Papillion wrote: > On 03/18/2016 01:02 PM, dan at geer.org wrote: >> Apple will have its Snowden. > > That's not a given. Everyone believes that Windows has backdoors and > spying components in it but we've not seen a single Snowden from > Microsoft. Why would we from Apple, an even more secretive company > than Microsoft? [American] entities have been infiltrated by moles loyal to government[s] (and other entities). You may read that the "Snowden" above is not some expose misdeed or vulnerability or code / doc dump to the people for their benefit (though that can exist too). But private dumps back to their masters, and actions on their behest. These lists have linked to documented cases of such interplay such that it should be obvious possibility. Human tactics since prehistoric times. From Rayzer at riseup.net Sun Mar 20 21:24:40 2016 From: Rayzer at riseup.net (Rayzer) Date: Sun, 20 Mar 2016 21:24:40 -0700 Subject: Facebook - champion of ... (of course, you knew that means the 'competition' is Hosted by the NSA's BFFs) In-Reply-To: References: Message-ID: <56EF7788.5020703@riseup.net> Seen.life HEARTS your privacy. That why it's DNS'd by... wait for it... Cloudflare along with: Seen.com Seen.net Seen.org Seen.info Seen.biz Seen.us Domain Name: seen.life Domain ID: 070463d7578343cfbfa41be09935670a-DONUTS WHOIS Server: who.godaddy.com/ Referral URL: http://www.godaddy.com/domains/search.aspx?ci=8990 Updated Date: 2015-11-29T20:25:03Z Creation Date: 2015-08-24T19:11:46Z Registry Expiry Date: 2017-08-24T19:11:46Z Sponsoring Registrar: Godaddy LLC Sponsoring Registrar IANA ID: 146 Domain Status: clientDeleteProhibited https://www.icann.org/epp#clientDeleteProhibited Domain Status: clientRenewProhibited https://www.icann.org/epp#clientRenewProhibited Domain Status: clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited Domain Status: clientUpdateProhibited https://www.icann.org/epp#clientUpdateProhibited Registrant ID: cr202965082 Registrant Name: Registration Private Registrant Organization: Domains By Proxy, LLC Registrant Street: DomainsByProxy.com 14747 N Northsight Blvd Suite 111, PMB 309 Registrant City: Scottsdale Registrant State/Province: Arizona Registrant Postal Code: 85260 Registrant Country: US Registrant Phone: +1.4806242599 Registrant Phone Ext: Registrant Fax: +1.4806242598 Registrant Fax Ext: Registrant Email: Admin ID: cr202965084 Admin Name: Registration Private Admin Organization: Domains By Proxy, LLC Admin Street: DomainsByProxy.com 14747 N Northsight Blvd Suite 111, PMB 309 Admin City: Scottsdale Admin State/Province: Arizona Admin Postal Code: 85260 Admin Country: US Admin Phone: +1.4806242599 Admin Phone Ext: Admin Fax: +1.4806242598 Admin Fax Ext: Admin Email: Tech ID: cr202965083 Tech Name: Registration Private Tech Organization: Domains By Proxy, LLC Tech Street: DomainsByProxy.com 14747 N Northsight Blvd Suite 111, PMB 309 Tech City: Scottsdale Tech State/Province: Arizona Tech Postal Code: 85260 Tech Country: US Tech Phone: +1.4806242599 Tech Phone Ext: Tech Fax: +1.4806242598 Tech Fax Ext: Tech Email: Name Server: eva.ns.cloudflare.com Name Server: hans.ns.cloudflare.com DNSSEC: unsigned http://whois.domaintools.com/seen.life Zenaan Harkness wrote: > “Citizens must learn to weigh their words very carefully. That’s a > way of teaching them to weigh their very thoughts carefully, > internally policing themselves, lest external social-justice police > have to be called in. We are told to accept this new, constrained > view of free expression because only “bad” thoughts will be suppressed > " > http://beforeitsnews.com/police-state/2016/03/facebook-launches-a-new-initiative-thatll-infuriate-you-find-out-if-your-profiles-targeted-1000s-being-shut-down-3014.html > > And so, a "solution" is a new website, "seen.life": > "it’s high time you readied yourself to switch over to Seen.life. It > is a fairly new site that is similar to Facebook but without all the > censorship crap. > Here are some of the differences you’ll find at Seen.Life: > No censorship! Keep in mind they do have a Terms of Service that will > need to be followed for things like pornography, copyright violations > and defamation. If they receive a complaint, they’ll investigate." > > No censorship at all. > > "NO ID required. Facebook is now asking certain people for their ID’s. > That’s beyond the pale. You can use whatever name you’d like at Seen > and no ID required." > > Until ID is considered useful for, IDK, perhaps account recovery... > > "They won’t sell your data, in fact they don’t even collect it (other > than your email so you can receive notifications). " > > Because compulsory email address is part of privacy, see. And about > data collection - they have this little thing called a "ucantrustus", > although I'm not sure what it's supposed to mean - some sort of > talisman I think. > > "No limit to your account’s friends. If you’re popular enough to get > over 5,000 friends, we think that’s great! More power to you!" > > We --definitely-- need an alternative global relationships map db > since Facebook might be seen to be a little tainted. Heave a sigh of > relief since this site is still centralised, so it'll fill the gap > nicely once FB becomes so hot even sheep start to take notice... > > "Private and secure chat rooms! These are strongly encrypted and > there’s no snooping." > > They left out one import thing here - "Military grade encryption." > because sheep need military protection!! > > "With the way Facebook is headed it’s not going to be a place you want > to stay. Sign up and create an account at Seen.Life and get away from > this invasive censorship!" > > Since here at new site (please join), our censorship is currently > minimal (please join), we currently promise to not collect any^B[damn, > we're already collecting some] "too much" data (please join), we won't > require you to refine your personal network graph for us by limiting > your friend count at least for the time being (please join), and we > use military grade encryption so you are SAFE. Don't even think about > being NOT SAFE, since we use MILITARY GRADE ENCRYPTION that's so > powerful even the military could not crack it, until you get to the > chat room, and unless they grab a sub key from one of our many > friendly certificate providers (please join). > > By the way, please join. > > I guess they thought they were using some sophisticated marketing... > at least they're not using any free libre open source software (that > they're admitting) - Facebook uses PHP so that must be bad, well it > probably is but anyway... > > -- RR "Through counter-intelligence it should be possible to pinpoint potential trouble-makers ... And neutralize them, neutralize them, neutralize them" -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From grarpamp at gmail.com Sun Mar 20 18:26:52 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 20 Mar 2016 21:26:52 -0400 Subject: Apple engineers... Will they (snigger) crack under pressure In-Reply-To: References: <56EC367C.8030103@riseup.net> <20160318180200.4B227A06D95@palinka.tinho.net> Message-ID: On 3/19/16, John Young wrote: > Marc Zwillinger, top tech lawyer for Apple in several cases, is an > ex-DoJ top tech lawyer. > > Several of the Apple and amici lawyers are ex-USG, a stepping onto > > All sharks are dual-hatted officers http://fortune.com/2016/03/18/apple-hires-corporate-security-chief/ Apple just hired Stathakopoulos (Amazon, Microsoft) as EVP of internal corporate infosec. If these seemingly principled battles grow, expect corps to be going in deep on candidates with their own SSBI-like anal probes. From grarpamp at gmail.com Sun Mar 20 21:26:58 2016 From: grarpamp at gmail.com (grarpamp) Date: Mon, 21 Mar 2016 00:26:58 -0400 Subject: [cryptography] USG-Apple - 3/22/16 Hearing Procedures, Add 3 USGs In-Reply-To: <56EF67EB.3060000@riseup.net> References: <56EF67EB.3060000@riseup.net> Message-ID: On 3/20/16, Rayzer wrote: > Read the doc. ... sec 5: Overflow rooms with cctv. Grab a seat near the speakers. From zen at freedbms.net Sun Mar 20 17:48:14 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Mon, 21 Mar 2016 00:48:14 +0000 Subject: Facebook - champion of free speech (of course, you knew that already) Message-ID: “Citizens must learn to weigh their words very carefully. That’s a way of teaching them to weigh their very thoughts carefully, internally policing themselves, lest external social-justice police have to be called in. We are told to accept this new, constrained view of free expression because only “bad” thoughts will be suppressed " http://beforeitsnews.com/police-state/2016/03/facebook-launches-a-new-initiative-thatll-infuriate-you-find-out-if-your-profiles-targeted-1000s-being-shut-down-3014.html And so, a "solution" is a new website, "seen.life": "it’s high time you readied yourself to switch over to Seen.life. It is a fairly new site that is similar to Facebook but without all the censorship crap. Here are some of the differences you’ll find at Seen.Life: No censorship! Keep in mind they do have a Terms of Service that will need to be followed for things like pornography, copyright violations and defamation. If they receive a complaint, they’ll investigate." No censorship at all. "NO ID required. Facebook is now asking certain people for their ID’s. That’s beyond the pale. You can use whatever name you’d like at Seen and no ID required." Until ID is considered useful for, IDK, perhaps account recovery... "They won’t sell your data, in fact they don’t even collect it (other than your email so you can receive notifications). " Because compulsory email address is part of privacy, see. And about data collection - they have this little thing called a "ucantrustus", although I'm not sure what it's supposed to mean - some sort of talisman I think. "No limit to your account’s friends. If you’re popular enough to get over 5,000 friends, we think that’s great! More power to you!" We --definitely-- need an alternative global relationships map db since Facebook might be seen to be a little tainted. Heave a sigh of relief since this site is still centralised, so it'll fill the gap nicely once FB becomes so hot even sheep start to take notice... "Private and secure chat rooms! These are strongly encrypted and there’s no snooping." They left out one import thing here - "Military grade encryption." because sheep need military protection!! "With the way Facebook is headed it’s not going to be a place you want to stay. Sign up and create an account at Seen.Life and get away from this invasive censorship!" Since here at new site (please join), our censorship is currently minimal (please join), we currently promise to not collect any^B[damn, we're already collecting some] "too much" data (please join), we won't require you to refine your personal network graph for us by limiting your friend count at least for the time being (please join), and we use military grade encryption so you are SAFE. Don't even think about being NOT SAFE, since we use MILITARY GRADE ENCRYPTION that's so powerful even the military could not crack it, until you get to the chat room, and unless they grab a sub key from one of our many friendly certificate providers (please join). By the way, please join. I guess they thought they were using some sophisticated marketing... at least they're not using any free libre open source software (that they're admitting) - Facebook uses PHP so that must be bad, well it probably is but anyway... From guninski at guninski.com Mon Mar 21 01:36:35 2016 From: guninski at guninski.com (Georgi Guninski) Date: Mon, 21 Mar 2016 10:36:35 +0200 Subject: Why bash only Apple? Message-ID: <20160321083635.GA733@sivokote.iziade.m$> Not following all the Apple show, so this may be wrong. Most people here bash only Apple and USG. If Apple quietly unlocked the phone, likely they would have been bashed even more. Are the other corporations any better? How Apple scores on corporate scumbagness? From drwho at virtadpt.net Mon Mar 21 11:42:52 2016 From: drwho at virtadpt.net (The Doctor) Date: Mon, 21 Mar 2016 11:42:52 -0700 Subject: Apple engineers... Will they (snigger) crack under pressure In-Reply-To: References: <56EC367C.8030103@riseup.net> <20160318180200.4B227A06D95@palinka.tinho.net> Message-ID: <20160321114252.525ce834af93196b44d5a768@virtadpt.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On Sun, 20 Mar 2016 21:26:52 -0400 grarpamp wrote: > If these seemingly principled battles grow, expect corps to be > going in deep on candidates with their own SSBI-like anal probes. They already have what amounts to an internal counter-intelligence unit that occasionally runs mole hunts looking for employees that leak information on upcoming products or projects to the news media. I'm kind of surprised they're not doing this already. - -- The Doctor [412/724/301/703/415] [ZS] PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1 WWW: https://drwho.virtadpt.net/ "What number are we thinkin' of?" -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJW8ECtAAoJED1np1pUQ8Rk4OkP/RjKKt48ZSZR5ey4E3SBZERK uohmlauwFczF2tqGKeAbbLP2saKk2VIQ3r9d6K4b7kuk0ki0H/31wFjkHOwcvj7d 8LsSPD7FLJj6BPSO6hU6CVYc0V+cct6gdLsN2SaA6Iz2ySyPsUiEVzXfMkmQTqYJ 2R7il0x1Qi5+fsHIXZVJ/0/hK7FTV5/NiZgVy4jHtkUdju4vqWSOdAvjXcqmmeuv zc+gJB2zw2OhP4cTyNiVNW6CAFRoWCK5bryxEfhWea+R5OkdYi+fqV+jllrdpF40 Tt/yYpQv5QSd5CsPiFEma9gQwUgv/E12f+pWGVdPvggSbubtYIDbm8VhW/+xdvKz adkWcuFcITGoq5vNtVLqQKLNTqTLPviAavfLqJIHDY1o18g7qeCfNooD3HjL/04E nR4LPbz/U4AUOcvcJdAd3U1oN967QJGC5pD7Iczy2DdwzuJtKslZ2HMqmQWuqLUz YpchDTeVpg66FJobyxrAWGIeUVzGH11fdmIcAj0uwprAe/g0K4ov9wqba/OoioSy IVzEiXHBJsT3PRo+bswvearOpoA7yIrebLVJNcK39Xwdx19sXDk0rSe2Lkfz31dI jDOoAyhOms2Gt4n+B5cZOcoQ0pae5zm3DnzLxrrdOdkS0GPQoh4cAr6NbTBsq+fr qcrNZC+Kv6QMEkl1lB3g =bzqU -----END PGP SIGNATURE----- From seanl at literati.org Mon Mar 21 12:40:42 2016 From: seanl at literati.org (Sean Lynch) Date: Mon, 21 Mar 2016 12:40:42 -0700 Subject: Facebook - champion of free speech (of course, you knew that already) In-Reply-To: References: Message-ID: On Sun, Mar 20, 2016 at 5:48 PM, Zenaan Harkness wrote: > Here are some of the differences you’ll find at Seen.Life: > No censorship! Keep in mind they do have a Terms of Service that will > need to be followed for things like pornography, copyright violations > and defamation. If they receive a complaint, they’ll investigate." > > No censorship at all. > (whoops, originally sent this only to Zenaan, re-sending to the list) Many doublespeak. Such Orwell! If you're going to put in the effort to switch, why switch to to yet another corporation that controls what you can post just because they exert slightly less control? No, we need decentralized publication platforms that can't censor even if they want to. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1353 bytes Desc: not available URL: From jya at pipeline.com Mon Mar 21 15:48:53 2016 From: jya at pipeline.com (John Young) Date: Mon, 21 Mar 2016 18:48:53 -0400 Subject: USG moves to vacate hearing tomorrow due to possible method to unlock iPhone Message-ID: USG moves to vacate hearing tomorrow due to possible method to unlock iPhone https://cryptome.org/2016/03/usg-apple-191.pdf From tbiehn at gmail.com Mon Mar 21 16:12:56 2016 From: tbiehn at gmail.com (Travis Biehn) Date: Mon, 21 Mar 2016 19:12:56 -0400 Subject: USG moves to vacate hearing tomorrow due to possible method to unlock iPhone In-Reply-To: References: Message-ID: Looks like they figured they couldn't win this time around, and they want to make sure they can put this particular arrow back into the quiver (before risking precedent they don't want to accept.) -Travis On Mon, Mar 21, 2016 at 6:48 PM, John Young wrote: > USG moves to vacate hearing tomorrow due to possible method to unlock > iPhone > > https://cryptome.org/2016/03/usg-apple-191.pdf > > -- Twitter | LinkedIn | GitHub | TravisBiehn.com | Google Plus -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1302 bytes Desc: not available URL: From jya at pipeline.com Mon Mar 21 17:43:23 2016 From: jya at pipeline.com (John Young) Date: Mon, 21 Mar 2016 20:43:23 -0400 Subject: USG-Apple Hearing Vacated, Decrypt Order Stayed Message-ID: https://cryptome.org/2016/03/usg-apple-199.pdf Quote: The court and counsel conferred regarding the government's Ex Parte Application for a Continuance (docket no. 191). Based on the good cause shown in that application, and based on Apple's nonobjection to vacating the hearing, the court ORDERS: 1. The hearing in this matter set for March 22, 2016 at 1:00 p.m. is VACATED; 2. As there is presently uncertainty surrounding the government's need for Apples's assistance, the court's February 16, 2016 Order Compelling Apple, Inc. to Assist Agents in Search, in case number ED 15-451-M, is hereby stayed, pending further submissions in this case; and 3. The government is ordered to file a status report by April 5, 2016. Unquote Docket No. 191: https://cryptome.org/2016/03/usg-apple-191.pdf From jya at pipeline.com Mon Mar 21 17:54:41 2016 From: jya at pipeline.com (John Young) Date: Mon, 21 Mar 2016 20:54:41 -0400 Subject: [cryptography] USG moves to vacate hearing tomorrow due to possible method to unlock iPhone In-Reply-To: <005c01d183c5$ceb6d6a0$6c2483e0$@jstyre.com> References: <005c01d183c5$ceb6d6a0$6c2483e0$@jstyre.com> Message-ID: At 07:02 PM 3/21/2016, you wrote: >(But who is the outside party? A lone wolf? The NSA? Other?) > >-- >James S. Tyre Would Apple be the outside party? As in its offshore stashing of foreign revenue as foreign entity? From grarpamp at gmail.com Mon Mar 21 21:46:42 2016 From: grarpamp at gmail.com (grarpamp) Date: Tue, 22 Mar 2016 00:46:42 -0400 Subject: Apple engineers... Will they (snigger) crack under pressure In-Reply-To: <20160321114252.525ce834af93196b44d5a768@virtadpt.net> References: <56EC367C.8030103@riseup.net> <20160318180200.4B227A06D95@palinka.tinho.net> <20160321114252.525ce834af93196b44d5a768@virtadpt.net> Message-ID: On 3/21/16, The Doctor wrote: > On Sun, 20 Mar 2016 21:26:52 -0400 > grarpamp wrote: > >> If these seemingly principled battles grow, expect corps to be >> going in deep on candidates with their own SSBI-like anal probes. > > They already have what amounts to an internal counter-intelligence > unit that occasionally runs mole hunts looking for employees that > leak information on upcoming products or projects to the news media. > I'm kind of surprised they're not doing this already. Maybe before Snowden corps never thought govts would be in heavy conflict with the corp-customer relationship, essentially attacking one of its essential foundations... crypto, (others being features, price, usability, apps, brand, quality, etc). ie: Previously known govt activities were relagated to tax / structure / employment / trade / safety regulation etc which didn't directly impact users. Too bad corps were just starting to recognize advertise and capitilize on the crypto relationship, with market / user awareness results starting to develop. Which is why Apple must win and be given every possible support from everyone in doing so... to reject clipper v2 forever. From grarpamp at gmail.com Tue Mar 22 00:08:45 2016 From: grarpamp at gmail.com (grarpamp) Date: Tue, 22 Mar 2016 03:08:45 -0400 Subject: [Cryptography] This is not the end... In-Reply-To: References: <20160321211846.45dfb152@jabberwock.cb.piermont.com> Message-ID: > On Mon, Mar 21, 2016 at 9:18 PM, Perry E. Metzger > wrote: >> The FBI dropping its request under the All Writs Act https://cryptome.org/2016/03/usg-apple-191.pdf https://cryptome.org/2016/03/usg-apple-199.pdf They didn't "drop" their request, they asked and received time to play with the phone in their sandbox with their friends. The court actually went further and stayed order, perhaps pusuant to an Apple request for that in conference call. Regardless, ball's still in feds ballcourt, though they'd have a hard time pressing it for spite were it shown they have unlock solution in hand. A FOIA should be filed to discover for reference all "outside parties" contacting govt offering services and their proposed "methods" therein. > The iPhone 5 was not sold as being secure Don't worry, they still have hundreds of phones to file new cases and/or make new law with. Unless... curiosly... the new "Hayden" style arguments coming from other govt forces and think tanks are for real and win out. https://www.youtube.com/watch?v=6HNnVcp6NYA (Or if you believe the iPhone 6 with iOS 9.3 is actually a top selling TOP SECRET tricked out scam, thereby making a quit acceptable.) Or the people and the cryptos win out. > this is not about concealing your porn Regarding a lot of users and media, it's actually quite a bit and rather effective about "seeing my dick", etc... https://www.youtube.com/watch?v=XEVlyP4_11M https://www.youtube.com/watch?v=zsjZ2r9Ygzw From juan.g71 at gmail.com Mon Mar 21 23:13:36 2016 From: juan.g71 at gmail.com (juan) Date: Tue, 22 Mar 2016 03:13:36 -0300 Subject: Apple engineers... Will they (snigger) crack under pressure In-Reply-To: References: <56EC367C.8030103@riseup.net> <20160318180200.4B227A06D95@palinka.tinho.net> <20160321114252.525ce834af93196b44d5a768@virtadpt.net> Message-ID: <56f0e2c1.8af68c0a.1e252.ffffd9ca@mx.google.com> On Tue, 22 Mar 2016 00:46:42 -0400 grarpamp wrote: > Maybe before Snowden corps never thought govts would be in > heavy conflict with the corp-customer relationship, essentially > attacking one of its essential foundations... crypto, There isn't any such 'heavy conflict'. And if you look at shitbags like apple, microsoft, google and the like you'll clearly see that 'crypto' is not an 'essential foundation' for them at all. Whereas their relationship to the US government is certainly 'foundational' Furthermore, it's possible for the IT mafia to sabotage security to a great extent with no real consequences. What, evil hackers are going to steal joe six pack's pirated mp3s and porn? That's a serious security threat. Or maybe the terrists will destroy the world by hacking i-turds and hotmail? Such dire threats to 'national security' eh. bottom line : this year's marketing campaign for retarded phones for retarded 'customers' is getting REALLY annoying. > (others being features, price, usability, apps, brand, quality, etc). > ie: Previously known govt activities were relagated to tax / > structure / employment / trade / safety regulation etc which didn't > directly impact users. > > Too bad corps were just starting to recognize advertise and > capitilize on the crypto relationship, with market / user awareness > results starting to develop. > > Which is why Apple must win and be given every possible > support from everyone in doing so... to reject clipper v2 forever. From jya at pipeline.com Tue Mar 22 15:32:54 2016 From: jya at pipeline.com (John Young) Date: Tue, 22 Mar 2016 18:32:54 -0400 Subject: USG-Apple Oral Proceedings Transcript 21 March 2016 Message-ID: USG-Apple Oral Proceedings Transcript 21 March 2016 https://cryptome.org/2016/03/usg-apple-transcript-16-0321.pdf From grarpamp at gmail.com Tue Mar 22 23:01:55 2016 From: grarpamp at gmail.com (grarpamp) Date: Wed, 23 Mar 2016 02:01:55 -0400 Subject: Why We Should Fear A Cashless World Message-ID: http://www.theguardian.com/money/commentisfree/2016/mar/21/fear-cashless-world-contactless https://en.wikipedia.org/wiki/Operation_Choke_Point https://news.slashdot.org/story/16/03/22/2154231/why-we-should-fear-a-cashless-world " What cash is, is something that can not be refused because it is your cash ie, how may I serve you today, oh you want to buy that loaf of bread, some milk and some baloney, sure and thank you for your money, oh wait the system says that money is shit because it's your money and I must refuse it, if it was someone else's that is OK but the banks have collectively decided that you can not eat today, please contact you nearest treasury officer for assistance. A pocket full of cash and you eat, a pocket full of credit cards and you ask permission to eat. That is exactly how anonymous cash is, you do not need to ask permission to fucking spend it, it can not be rejected just because it is yours (most glaring example of exactly that, racism) and when it comes to stealing it, it takes real effort, rather than curruptly shifting around bits to enrich the minority at the majorities expence in some of the biggest scandals in history. Also, don't ever forget, that the banks what to charge you too look after your money and pay no interest to use it for what ever they want to. Don't like that idea, tough fucking luck, we wont let you have that money we will only allow you to transfer it to one of our cartel members and charge a fee for that, so that then they can charge fees for gambling your money. The whole cashless society in capitalism thing is one huge scam, to basically enslave the majority. " From Rayzer at riseup.net Wed Mar 23 08:31:00 2016 From: Rayzer at riseup.net (Rayzer) Date: Wed, 23 Mar 2016 08:31:00 -0700 Subject: Israeli company contracts to US for Cellie Data Extraction Message-ID: <56F2B6B4.4010003@riseup.net> FBI using Israeli firm Cellebrite to help break into San Bernardino terrorist's iPhone By Roger Fingas Wednesday, March 23, 2016, 07:04 am PT (10:04 am ET) An Israeli forensic software company, Cellebrite, is helping the FBI try to unlock the iPhone 5c used by San Bernardino shooter Syed Farook, according to a national newspaper. If the firm succeeds the FBI will be able to drop requests for help from Apple, reported Yedioth Ahronoth, as quoted by Reuters. The paper didn't say how Cellebrite was attempting to break into the phone, or what kind of progress it might be making. More: http://appleinsider.com/articles/16/03/23/fbi-using-israeli-firm-cellebrite-to-help-break-into-san-bernardino-terrorists-iphone http://www.cellebrite.com/ -- RR "Through counter-intelligence it should be possible to pinpoint potential trouble-makers ... And neutralize them, neutralize them, neutralize them" -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From guninski at guninski.com Wed Mar 23 01:44:29 2016 From: guninski at guninski.com (Georgi Guninski) Date: Wed, 23 Mar 2016 10:44:29 +0200 Subject: Why We Should Fear A Cashless World In-Reply-To: References: Message-ID: <20160323084429.GA1002@sivokote.iziade.m$> On Wed, Mar 23, 2016 at 02:01:55AM -0400, grarpamp wrote: > http://www.theguardian.com/money/commentisfree/2016/mar/21/fear-cashless-world-contactless > https://en.wikipedia.org/wiki/Operation_Choke_Point > https://news.slashdot.org/story/16/03/22/2154231/why-we-should-fear-a-cashless-world > I think bigger problem is that most of the "money" actually doesn't really exist. It is just made up numbers stored somewhere. Cash is small fraction of all money. Possibly the easiest way to change the system is enough people to withdraw cash -- the domino effect will take care of the rest. This will have grave consequence for people and likely won't hurt oligarhs. From guninski at guninski.com Wed Mar 23 02:37:35 2016 From: guninski at guninski.com (Georgi Guninski) Date: Wed, 23 Mar 2016 11:37:35 +0200 Subject: cyberwar in action: FBI wants syrian hackers, offers $100K Message-ID: <20160323093735.GB1002@sivokote.iziade.m$> http://www.theregister.co.uk/2016/03/22/sea_fbi_cyber_most_wanted/ FBI's Most Wanted: Syrian Electronic Army hacktivists $100,000 reward on hackers' heads From jya at pipeline.com Wed Mar 23 08:58:47 2016 From: jya at pipeline.com (John Young) Date: Wed, 23 Mar 2016 11:58:47 -0400 Subject: Israeli company contracts to US for Cellie Data Extraction In-Reply-To: <56F2B6B4.4010003@riseup.net> References: <56F2B6B4.4010003@riseup.net> Message-ID: Cellebrite (IL) outlines its phone hack tech in a copyright suit against competitor Oxygen (RU). https://cryptome.org/2016/03/cellebrite-oxygen-001.pdf According to the suit both firms sell phone hack tools to USG agencies. Suggests phone hacking is as lucrative as 0-days and bug bounties. Dirty-fingernailed hackers getting so celebrated they may become fancy barbered and removed-tats l0phties angling for photoshopped slick mag portraits with Naked Celeb Perps Assange, Snowden, Dotcom. At 11:31 AM 3/23/2016, you wrote: >FBI using Israeli firm Cellebrite to help break into San Bernardino >terrorist's iPhone > >By Roger Fingas > >Wednesday, March 23, 2016, 07:04 am PT (10:04 am ET) > >An Israeli forensic software company, Cellebrite, is helping the FBI try >to unlock the iPhone 5c used by San Bernardino shooter Syed Farook, >according to a national newspaper. > >If the firm succeeds the FBI will be able to drop requests for help from >Apple, reported Yedioth Ahronoth, as quoted by Reuters. The paper didn't >say how Cellebrite was attempting to break into the phone, or what kind >of progress it might be making. > > >More: >http://appleinsider.com/articles/16/03/23/fbi-using-israeli-firm-cellebrite-to-help-break-into-san-bernardino-terrorists-iphone > >http://www.cellebrite.com/ > >-- >RR >"Through counter-intelligence it should be possible to pinpoint >potential trouble-makers ... And neutralize them, neutralize them, >neutralize them" > > > From jya at pipeline.com Wed Mar 23 11:57:21 2016 From: jya at pipeline.com (John Young) Date: Wed, 23 Mar 2016 14:57:21 -0400 Subject: Cellebrite describes 10 steps to hack a Blackberry and other tips Message-ID: Cellebrite describes 10 steps to hack a Blackberry and other tips https://cryptome.org/2016/03/cellebrite-msab-001.pdf From zen at freedbms.net Thu Mar 24 06:25:35 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Thu, 24 Mar 2016 13:25:35 +0000 Subject: Hillary Emails, Gold Dinars and Arab Springs Message-ID: Well well well - what a tangled and hellish web the West weaves (see below)... the sad and indicting facts of reality are steadily going public. "Conspiracy nuts" have no joy in this. The evil is beyond a London Has Fallen or "Benghazi" propaganda movie. City of London and Wall Street 'had to take down Qaddafi' to stop his pan-African/Arabic gold backed currency "initiative", so unfortunately lost him his life. The odd speech I've watched, Qaddafi was compelling, and with heart for his people and those beyond his nations boundaries. Now we can see why the West acted and continues to act so brutishly. French oligarchs - your number's called! City of London and Wall Street bankers - you can't hide your deeds! Western oligarchs - you stand with despotic authority. How small minded are the West's oligarchs? So narrow minded, so belligerently addicted to control of currencies and nations, as though there's not enough abundance to go round... major cases of small dick syndrome are evidently in abundance all around the West's 'halls of power' - how absolutely fucking pathetic! (Evidently Hillary and Merkel are thoroughly bound - so this is nothing that men have any monopoly on.) I'm guessing that at least in hindsight it might be seen to have been in Qaddafi's interest to work with Russia on that particular gold backed currency initiative. Still surprised he not took the lesson from Saddam's "oil for Euros" hanging. Perhaps Russia was seen as weak, or rather if we be frank "devastated" as it was when the USSR was destroyed, only now beginning to get back her stride. The sanctions against Russia and the CIA sponsored "colored springs" (turmoil) around Russia in the last few years take on a more poignant appearance in the face of Hillary's emails - attempts to keep the bear occupied, hey hey, Wall Street's version of "Occupy Russia" - I only wish it were a laughing matter. Is difficult for me to comprehend the acceptance of Hillary Clinton by at least some faction of American's in the face of her ghastly "we came, we saw, he died" laughter - the acceptance of such insanity is a sign, and more than "the 'leaders' have lost touch with the people" but really that (the American) people have lost touch with the despotic evil reality of their 'leaders'. We have a duty to stand against such evil. Small mercies that we get these little leaks of information here and there... Z http://journal-neo.org/2016/03/17/hillary-emails-gold-dinars-and-arab-springs/ Hillary Emails, Gold Dinars and Arab Springs Column: Society Region: Middle East Country: Libya Buried amid tens of thousands of pages of former US Secretary of State Hillary Clinton’s secret emails, now being made public by the US Government, is a devastating email exchange between Clinton and her confidential adviser, Sid Blumenthal. It’s about Qaddafi and the US-coordinated intervention in 2011 to topple the Libyan ruler. It’s about gold and a potentially existential threat to the future of the US dollar as world reserve currency. It’s about Qaddafi’s plans then for the gold-based Dinar for Africa and the Arab oil world. Two paragraphs in a recently declassified email from the illegal private server used by then-Secretary of State Hillary Clinton during the US-orchestrated war to destroy Libya’s Qaddafi in 2011 reveal a tightly-held secret agenda behind the Obama Administration’s war against Qaddafi, cynically named “Responsibility to Protect.” Barack Obama, an indecisive and weak President, delegated all presidential responsibility for the Libya war to his Secretary of State, Hillary Clinton. Clinton, who was an early backer of an Arab “regime change,” using the secret Muslim Brotherhood, invoked the new, bizarre principle of “responsibility to protect” (R2P) to justify the Libyan war, which she quickly turned into a NATO-led war. Under R2P, a silly notion promoted by the networks of George Soros’ Open Society Foundations, Clinton claimed, with no verifiable proof, that Qaddafi was bombing innocent Libyan civilians in the Benghazi region ( http://www.cfr.org/libya/libya-responsibility-protect/p24480 ). According to a New York Times report at the time, citing Obama Administration senior sources, it was Hillary Clinton, backed by Samantha Power, then a senior aide at the National Security Council and today Obama’s UN Ambassador; and Susan Rice, then Obama’s ambassador to the United Nations, and now National Security Adviser. That triad pushed Obama into military action against Libya’s Qaddafi. Clinton, flanked by Powers and Rice, was so powerful that Clinton managed to overrule Defense Secretary Robert Gates, Tom Donilon, Obama’s national security adviser, and John Brennan, Obama’s counterterrorism chief, today CIA head ( http://www.thenation.com/article/obamas-women-advisers-pushed-war-against-libya/ ). Secretary of State Clinton was also knee-deep in the conspiracy to unleash what came to be dubbed the “Arab Spring,” the wave of US-financed regime changes across the Arab Middle East ( http://www.state.gov/secretary/20092013clinton/rm/2011/01/154595.htm ), part of the Greater Middle East project unveiled in 2003 by the Bush Administration after occupation of Iraq. The first three target countries of that 2011 US “Arab Spring”–an action in which Washington used its “human rights” NGOs such as Freedom House and National Endowment for Democracy, in cahoots as usual, with the Open Society Foundations of billionaire speculator, George Soros, along with US State Department and CIA operatives–were Ben Ali’s Tunisia, Mubarak’s Egypt and Qaddafi’s Libya. Now the timing and targeting of Washington’s 2011 “Arab Spring” destabilizations of select Middle East states assume a new light in relation to just-released declassified Clinton emails to her private Libya “adviser” and friend, Sid Blumenthal. Blumenthal is the slick lawyer who defended then-President Bill Clinton in the Monika Lewinsky and other sex scandal affairs when Bill was President and facing impeachment. Qaddafi’s gold dinar For many it remains a mystery just why Washington decided that Qaddafi personally must be destroyed, murdered, not just sent into exile like Mubarak. Clinton, when informed of Qaddafi’s brutal murder by US-financed Al Qaeda “democratic opposition” terrorists, told CBS news, in a sick, joking paraphrase of Julius Caesar, “We came, we saw, he died,” words spoken by her with a hearty, macabre laugh ( http://www.cbsnews.com/news/clinton-on-qaddafi-we-came-we-saw-he-died ). Little is known in the West about what Muammar Qaddafi did in Libya or, for that matter, in Africa and in the Arab world. Now, release of a new portion of Hillary Clinton’s emails as Secretary of State, at the time she was running Obama Administration war on Qaddafi, sheds dramatic new light on the background. It was not a personal decision of Hillary Clinton to eliminate Qaddafi and destroy his entire state infrastructure. The decision, it’s now clear, came from circles very high in the US money oligarchy. She was merely another Washington political tool implementing the mandate of those oligarchs. The intervention was about killing Qaddafi’s well-laid plans to create a gold-based African and Arabic currency to replace the dollar in oil trades. Since the US dollar abandoned gold exchange for dollars in 1971 the dollar in terms of gold has dramatically lost value. Arab and African OPEC oil states have long objected to the vanishing purchasing power of their oil sales, mandated since the 1970’s by Washington to be solely in US dollars, as dollar inflation soared more than 2000% to 2001. In a newly declassified Clinton email from Sid Blumenthal to Secretary of State Hillary Clinton dated April 2, 2011, Blumenthal reveals the reason that Qaddafi must be eliminated. Using the pretext of citing an unidentified “high source” Blumenthal writes to Clinton, “According to sensitive information available to this source, Qaddafi’s government holds 143 tons of gold, and a similar amount in silver… This gold was accumulated prior to the current rebellion and was intended to be used to establish a pan-African currency based on the Libyan golden Dinar. This plan was designed to provide the Francophone African Countries with an alternative to the French franc (CFA https://www.foia.state.gov/searchapp/DOCUMENTS/HRCEmail_DecWebClearedMeta/31-C1/DOC_0C05779612/C05779612.pdf ).” That French aspect was only the tip of the Qaddafi gold dinar iceberg. Golden Dinar and more During the first decade of this century, Gulf Arab OPEC countries, including Saudi Arabia, Qatar and others, began seriously diverting a significant portion of the revenues from their vast oil and gas sales into state sovereign wealth funds, many based on the success of Norway’s Oil Fund. Growing discontent with the US War on Terror, with the wars in Iraq and in Afghanistan, and with overall US Middle East policies after September 2001, led most OPEC Arab states to divert a growing share of oil revenues into state-controlled funds rather than trusting it to the sticky fingers of New York and London bankers as had been the custom since the 1970’s when oil prices went through the roof, creating what Henry Kissinger fondly called the “petro-dollar” to replace the gold-backed dollar Washington walked away from on August 15, 1971. The present Sunni-Shi’ite war or clash of civilizations is in fact a result of the US manipulations after 2003 in the region— “divide and rule.” By 2008 the prospect of sovereign control by a growing number of African and Arab oil states of their state oil and gas revenues was causing serious concern in Wall Street as well as the City of London. It was huge liquidity, in the trillions, they potentially no longer controlled. The timing of the Arab Spring, in retrospect, increasingly looks tied to Washington and Wall Street efforts to control not only the huge Arab Middle East oil flows. It is now clear it was equally aimed at controlling their money, their trillions of dollars accumulating in their new sovereign wealth funds. However, as is now confirmed in the latest Clinton-Blumenthal April 2, 2011 email exchange, there was a qualitatively new threat emerging for Wall Street and the City of London “gods of money,” from the African and Arab oil world. Libya’s Qaddafi, Tunisia’s Ben Ali and Mubarak’s Egypt were about to launch a gold-backed Islamic currency independent of the US dollar. I was first told of this plan in early 2012, at a Swiss financial and geopolitical conference, by an Algerian with extensive knowledge of the project. Documentation was scarce at the time and the story remained in my mental back-burner. Now a far more interesting picture emerges that puts the ferocity of Washington’s Arab Spring and its urgency in the case of Libya into perspective. ‘United States of Africa’ In 2009, Qaddafi, who was at the time the President of the African Union, had proposed that the economically depressed continent adopt the “Gold Dinar” ( http://www.wnd.com/2011/08/337881/#fQbTdeRLfVczxYqc.99 ). In the months prior to the US decision, with British and French backing, to get a UN Security Council resolution that would give them the legal fig-leaf for a NATO destruction of the Qaddafi regime, Muammar Qaddafi had been organizing the creation of a gold-backed dinar that would be used by African oil states as well as Arab OPEC countries in their sales of oil on the world market. Had that happened at the time Wall Street and the City of London were deep into the financial crisis of 2007-2008, the challenge to the reserve currency role of the dollar would have been more than serious. It would be a death knell to American financial hegemony, and to the Dollar System. Africa is one of the world’s richest continents, with vast unexplored gold and mineral wealth, had been intentionally kept for centuries underdeveloped or in wars to prevent their development. The International Monetary Fund and World Bank for the recent decades have been the Washington instruments to suppress African real development. Gaddafi had called upon African oil producers in the African Union and in Muslim nations to join an alliance that would make the gold dinar their primary form of money and foreign exchange. They would sell oil and other resources to the US and the rest of the world only for gold dinars. As President of the African Union in 2009, Qaddafi introduced for discussion to African Union member states Qaddafi’s proposal to use the Libyan dinar and the silver dirham as the only possible money for the rest of the world to buy African oil ( http://www.youshouldbuygold.com/2011/10/end-of-african-gold-standard-the-oil-gold-relationship/ ). Along with the Arab OPEC sovereign wealth funds for their oil, other African oil nations, specifically Angola and Nigeria, were moving to create their own national oil wealth funds at the time of the 2011 NATO bombing of Libya ( http://www.thisisafricaonline.com/Policy/Rise-of-the-African-sovereign-wealth-fund?ct=true ). Those sovereign national wealth funds, tied to Qaddafi’s concept of the gold dinar, would make Africa’s long-held dream of independence from colonial monetary control, whether of the British Pound, the French Franc, the euro or the US dollar, a reality. Qaddafi was moving forward, as head of the African Union, at the time of his assassination, with a plan to unify the sovereign States of Africa with one gold currency, a United States of Africa. In 2004, a Pan-African Parliament of 53 nations had laid plans for an African Economic Community – with a single gold currency by 2023. African oil-producing nations were planning to abandon the petro-dollar, and demand gold payment for their oil and gas. The list included Egypt, Sudan, South Sudan, Equatorial Guinea, Congo, Democratic Republic of Congo, Tunisia, Gabon, South Africa, Uganda, Chad, Suriname, Cameroon, Mauritania, Morocco, Zambia, Somalia, Ghana, Ethiopia, Kenya, Tanzania, Mozambique, Cote d’Ivoire, plus Yemen which had just made significant new oil discoveries. The four African member-states of OPEC–Algeria, Angola, Nigeria, a giant oil producer and the largest natural gas producer in Africa with huge natural gas reserves, and Libya with the largest reserves–would be in the new gold dinar system. Little wonder that French President Nicolas Sarkozy, who was given the up-front role in the war on Qaddafi by Washington, went so far as to call Libya a “threat” to the financial security of the world ( http://www.thenewamerican.com/economy/markets/item/4630-gadhafi-s-gold-money-plan-would-have-devastated-dollar ). Hillary’s ‘rebels’ create a central bank One of the most bizarre features of Hillary Clinton’s war to destroy Qaddafi was the fact that the US-backed “rebels” in Benghazi, in the oil-rich eastern part of Libya, in the midst of battle, well before it was at all clear if they would topple the Qaddafi regime, declared they had created a Western-style central bank, “in exile.” In the very first weeks of the rebellion, the rebel leaders declared that they had created a central bank to replace Gadhafi’s state-owned monetary authority. The rebel council, in addition to creating their own oil company to sell the oil they captured announced: “Designation of the Central Bank of Benghazi as a monetary authority competent in monetary policies in Libya and appointment of a Governor to the Central Bank of Libya, with a temporary headquarters in Benghazi ( http://www.thenewamerican.com/economy/markets/item/4630-gadhafi-s-gold-money-plan-would-have-devastated-dollar ).” Commenting on the odd decision, before the outcome of battle was even decided, to create a western-style central bank to replace Qaddafi’s sovereign national bank that was issuing gold-backed dinars, Robert Wenzel in the Economic Policy Journal, remarked, “I have never before heard of a central bank being created in just a matter of weeks out of a popular uprising. This suggests we have a bit more than a rag tag bunch of rebels running around and that there are some pretty sophisticated influences ( http://www.thenewamerican.com/economy/markets/item/4630-gadhafi-s-gold-money-plan-would-have-devastated-dollar ).” It becomes clear now in light of the Clinton-Blumenthal emails that those “pretty sophisticated influences” were tied to Wall Street and the City of London. The person brought in by Washington to lead the rebels in March 2011, Khalifa Hifter, had spent the previous twenty years of his life in suburban Virginia, not far from CIA headquarters, after a break with Libya as a leading military commander of Qaddafi ( http://www.mcclatchydc.com/news/nation-world/world/middle-east/article24618421.html#storylink=cpy ). The risk to the future of the US dollar as world reserve currency, if Qaddafi had been allowed to proceed–together with Egypt, Tunisia and other Arab OPEC and African Union members– to introduce oil sales for gold not dollars, would clearly have been the financial equivalent of a Tsunami. New Gold Silk Road The Qaddafi dream of an Arabic and African gold system independent of the dollar, unfortunately, died with him. Libya, after Hillary Clinton’s cynical “responsibility to protect” destruction of the country, today is a shambles, torn by tribal warfare, economic chaos, al-Qaeda and DAESH or ISIS terrorists. The monetary sovereignty held by Qaddafi’s 100% state-owned national monetary agency and its issuance of gold dinars is gone, replaced by an “independent” central bank tied to the dollar. Despite that setback, it’s more than notable that now an entirely new grouping of nations is coming together to build a similar gold-backed monetary system. This is the group led by Russia and China, the world’s number three and number one gold producing countries, respectively. This group is tied to the construction of China’s One Belt, One Road New Silk Road Eurasian infrastructure great project. It involves China’s $16 billion Gold Development Fund, and very firm steps by China to replace the City of London and New York as the center of world gold trade. The Eurasian gold system emerging now poses an entirely new quality of challenge to American financial hegemony. This Eurasian challenge, its success or failure, could well determine whether we allow our civilization to survive and prosper under entirely different conditions, or whether we decide to sink along with the bankrupt dollar system ( http://journal-neo.org/2015/08/12/the-worth-of-gold-growing-by-the-day/ ). F. William Engdahl is strategic risk consultant and lecturer, he holds a degree in politics from Princeton University and is a best-selling author on oil and geopolitics, exclusively for the online magazine “New Eastern Outlook”. From grarpamp at gmail.com Thu Mar 24 22:13:43 2016 From: grarpamp at gmail.com (grarpamp) Date: Fri, 25 Mar 2016 01:13:43 -0400 Subject: [Cryptography] Hayden on encryption v. metadata In-Reply-To: <20160324133318.GB1785@fedora-21-dvm> References: <20160324133318.GB1785@fedora-21-dvm> Message-ID: On 3/24/16, J.M. Porup wrote: > On Wed, Mar 23, 2016 at 05:11:11PM -0700, Henry Baker wrote: >> https://www.lawfareblog.com/lawfare-podcast-general-michael-hayden-discusses-american-intelligence-age-terror >> >> Highly recommended, *especially* if you disagree with Hayden. >> >> Basically, Hayden is ok with just about anything -- including torture -- >> so long as it is approved by someone higher up. Methinks he might not >> fare so well in a Nuremburg-type trial, but perhaps those ethics are sooo >> last century. > > Maybe it's time to start publicly calling for Nuremberg-style war crimes > tribunals to arrest, prosecute, convict, imprison, and execute senior > surveillance state officials? Who exactly is going to post these prosecutors... congress, courts, doj, Obama? They already excused / ignored / approved of Bush, Cheney, cabinets et al, telecoms, NSA, too big to fail, QE[n], deficits and debt, overclassification, droning, ubiquitous surveillance, murder, papers please, pollution, Abu Gitmo, torture, revolving door, CIA, tech backdoors, rendition and infinite detention, databases, etc.......... What are you gonna do, round up a posse, pin on some badges, saddle up and ride on over to DC? Where and when exactly does the buck stop? Putin / Ecuador? Collapse? Seriously. You might want to figure that out... From grarpamp at gmail.com Thu Mar 24 22:31:25 2016 From: grarpamp at gmail.com (grarpamp) Date: Fri, 25 Mar 2016 01:31:25 -0400 Subject: Apple engineers... Will they (snigger) crack under pressure In-Reply-To: <56f0e2c1.8af68c0a.1e252.ffffd9ca@mx.google.com> References: <56EC367C.8030103@riseup.net> <20160318180200.4B227A06D95@palinka.tinho.net> <20160321114252.525ce834af93196b44d5a768@virtadpt.net> <56f0e2c1.8af68c0a.1e252.ffffd9ca@mx.google.com> Message-ID: On 3/22/16, juan wrote: > Furthermore, it's possible for [...] In this game everything is possible, even possibly probable. Game on. From zen at freedbms.net Thu Mar 24 19:27:40 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Fri, 25 Mar 2016 02:27:40 +0000 Subject: Hillary Emails, Gold Dinars and Arab Springs In-Reply-To: References: Message-ID: Further links, in particular this one: https://wikileaks.org/clinton-emails/emailid/6528 The exposure of our current overlords and their despotism is an important step - how can sheep consider and motivate their own action when they do not know the foundations for that action? Well yes, individual human rights and dignity should be enough causes for action, but evidently not... Z --- http://russia-insider.com/en/one-pager-latest-developments-russia-rf-sitrep-20160324/ri13562 One-Pager on Latest Developments in Russia (RF Sitrep 20160324). Only this section: The truth dribbles out: "The Big Lie About the Libyan War" https://foreignpolicy.com/2016/03/22/libya-and-the-myth-of-humanitarian-intervention/ "Secret cables from the United States embassy in Beijing have shown there was no bloodshed inside Tiananmen Square" http://www.telegraph.co.uk/news/worldnews/wikileaks/8555142/Wikileaks-no-bloodshed-inside-Tiananmen-Square-cables-claim.html "A 2006 cable from US Ambassador to Syria William Roebuck discussed 'potential vulnerabilities' of the Assad administration and the 'possible means to exploit them'." http://www.ronpaulinstitute.org/archives/featured-articles/2016/march/21/google-this-hillary-clinton-and-the-syrian-regime-change-conspiracy/ All that hype about Syria was actually about Israel and Iran. https://wikileaks.org/clinton-emails/emailid/18328 CIA was in Afghanistan before the Soviets entered. https://www.les-crises.fr/oui-la-cia-est-entree-en-afghanistan-avant-les-russes-par-zbigniew-brzezinski/ All that hype about Libya? don't forget Qaddafi's gold. https://wikileaks.org/clinton-emails/emailid/6528 Veterans Today permits itself a victory lap for getting Ghouta right. http://www.veteranstoday.com/2016/03/13/obama-admits-vt-was-right-on-syrian-gas-attacks/ From Rayzer at riseup.net Fri Mar 25 09:47:59 2016 From: Rayzer at riseup.net (Rayzer) Date: Fri, 25 Mar 2016 09:47:59 -0700 Subject: Cloudflare blogs on their Cert Tech Message-ID: <56F56BBF.9040706@riseup.net> Wondering if their cert tech can spoof a cert to look like it belongs to a site they DNS when it really belongs to them and you've never really visited the site at all. TLS Certificate Optimization: The Technical Details behind "No Browser Left Behind" Overview Back in early December we announced our "no browser left behind" initiative to the world. Since then, we have served well over 500 billion SHA-1 certificates to visitors that otherwise would not have been able to communicate securely with our customers’ sites using HTTPS. All the while, we’ve continued to present newer SHA-2 certificates to modern browsers using the latest in elliptic curve cryptography, demonstrating that one does not have to sacrifice security to accommodate all the world’s Internet users. (If you weren’t able to acquire a SHA-1 certificate before CAs ceased issuing them on 2015/12/31, you can still sign up for a paid plan and we will immediately generate one to serve to your legacy visitors.) Shortly after we announced these new benefits for our paid Universal SSL customers, we started hearing from other technology leaders who were implementing (or already had implemented) similar functionality. At first glance, the logic to identify incoming connections that only support SHA-1 seems straightforward, but as we spoke with our friends at Facebook, Twitter, and Mozilla, I realized that everyone was taking a slightly different approach. Complicating the matter even further was the fact that at CloudFlare we not only wanted to optimize between SHA-1 and SHA-2, but also between RSA and the newer, but less universally supported ECDSA certificates. Solve the "optimal certificate" question incorrectly, and the TLS handshake will fail — or get explicitly aborted by browsers that have deprecated SHA-1 entirely; solve it correctly, and the client and server will establish the most performant, secure connection available between the two endpoints. Certificate Optimization Logic After several trillion requests, we’re confident that our approach works quite well for CloudFlare’s customers and their visitors. If you have taken an alternative approach to implementation, or have found any exceptions/potential refinements to our logic, please chime in below. We remain committed to withdrawing SHA-1 support if, as our CEO said, "a vulnerability is discovered [in our certificate optimization logic] which allows some form of downgrade attack—where a modern browser can be tricked into receiving a certificate signed with an insecure protocol—and the vulnerability cannot be patched". TLS Handshake Before your web browser can securely exchange "application data" such as HTTP GET or POST requests and responses with a web server, it must first establish the cryptographic parameters of the secure session. This well-choreographed dance, known as the SSL/TLS handshake, commences as soon as you click, type, or get redirected to a URL containing the "https://" scheme. (The process described below also applies to connections from any user agent — not just browsers—so substitute "mobile app", "command-line utility", or anything else that can communicate via HTTPS.) More: https://blog.cloudflare.com/tls-certificate-optimization-technical-details/ -- RR "Through counter-intelligence it should be possible to pinpoint potential trouble-makers ... And neutralize them, neutralize them, neutralize them" -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4288 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From guninski at guninski.com Fri Mar 25 02:28:25 2016 From: guninski at guninski.com (Georgi Guninski) Date: Fri, 25 Mar 2016 11:28:25 +0200 Subject: Can we legally borrow some sploits from TLAs? Message-ID: <20160325092825.GE960@sivokote.iziade.m$> Public list for this is not a good idea. Can we legally borrow some sploits from TLAs? Maybe sufficiently sophisticated honeypot? (I am not good at this). Anything already implemented? From tbiehn at gmail.com Fri Mar 25 08:28:53 2016 From: tbiehn at gmail.com (Travis Biehn) Date: Fri, 25 Mar 2016 11:28:53 -0400 Subject: Is Gutmann critical of DJB in "On the Impending Crypto Monoculture" In-Reply-To: <20160325144605.GF960@sivokote.iziade.m$> References: <20160325144605.GF960@sivokote.iziade.m$> Message-ID: Short version: He isn't. -Travis On Fri, Mar 25, 2016 at 10:46 AM, Georgi Guninski wrote: > > http://www.metzdowd.com/pipermail/cryptography/2016-March/028824.html > > On the Impending Crypto Monoculture > Peter Gutmann > > Is Gutmann critical of DJB (the creator of the divine qmail)? > (there is some disagreement about this with alleged > linux admins). > > Maybe I will troll DJB no matter which way it is ;) > -- Twitter | LinkedIn | GitHub | TravisBiehn.com | Google Plus -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1381 bytes Desc: not available URL: From zen at freedbms.net Fri Mar 25 04:37:54 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Fri, 25 Mar 2016 11:37:54 +0000 Subject: On money - "Why we need to beat Russia" Message-ID: http://thesaker.is/why-we-need-to-beat-russia/ Quotes: "Our Imperial weapons give definite form to our Empire. And nothing has shaped our Empire more than the FIAT. The deformation began in 1971, when the US imposed her Power to re-define the rules of the monetary system for her sole benefit. The ability to print IOU’s in exchange for real value is more clever than theft as we borrow and do not pay back in kind due to inflation. Our enemies, adversaries and vassals must found their financial systems upon the printed dollar which they must purchase with hard earned money. That seizure has financed a vast network of military bases, bribery, assassinations, coup d´états and perpetual war. What’s not to like? All that Power without taxing the produce of the American people. So why have we lost in Syria?" "But whom, may we ask, has the power to decree wealth? And with such great power to do so, who can be trusted with such great responsibility? No one. That is who." "Inequality of Wealth, therefore, always reaches its peak at the end of the FIAT timeline." "That is the death blow. The Fiat produced a parasite – the financial sector – that in its greed is killing the real economy." "Monsanto can darken the sunflower harvest in the Ukraine, and Allianz can steal a few tranquil Greek islands, but the ambience is never quite the same as when hard working people had their just rewards, and goodness and charity and kind souls rejoiced – with compassion and cooperation – while loving the narrative of a life written while desiring only the product of their work. The world this Global Reserve Fiat creates is one of misery and strife where evil and greed feeds upon the spirit, and the world becomes an immoral wasteland of modernity [I would add: "and war"]. The worker is discriminated against as all pressure and stress is heaped upon his future, as the law discriminates between debts held as an asset vs. debt held as a liability." "Now, the East – China / Russia / India – challenge the Global Reserve Fiat. And when the dollar fails, and it will: For debt is the essence of fiat, and when it defaults, the system defaults with it." "And when the 98% – their future burdened by intolerable debt, unemployment and declining wages – decide to walk away? The fear of that decision has been driving interest rates down for decades, to make it bearable not for the good of mankind but to prolong the system. This brings into relief an internal contradiction: wages decline in sync with interest rates because the bargaining power of workers evaporates as Central Bankers reduce the cost of capital, contributing to the substitution of labour and labour wages by that of the machines and AI software [should just have said "by mechanisation and automation", but hey, who's quibbling...]." "As we look at the precarious nature of our faith-based money, we must acknowledge the moral implications of “dishonest money”. Seizure by decree, whether judged just by Constituted Power, is immoral. But the fact that dishonest money is so easy to create, control and redistribute helps one understand the wave of immorality that has swept over our world." ["faith based money" - great phrase!] "Our Imperial weapon will die by both edges of its own sword, one being the contempt with which it is so easily created to bend the will of the world to its bidding, and the other sharp edge which the wicked are blind to recognize: The evil that sound money prohibits." "The Dynasties of Wealth - Have you ever wondered how we hedge our holdings through turmoil? The top 85 patricians of which own more wealth than the bottom 3.5 billion humans – will move first. The 1%, then 2% and whoever else left standing will be forced to follow through." "They easily control men through greed and are beholden to Gold alone. Gold transitions their wealth recycling system through change." From grarpamp at gmail.com Fri Mar 25 09:02:46 2016 From: grarpamp at gmail.com (grarpamp) Date: Fri, 25 Mar 2016 12:02:46 -0400 Subject: Fwd: [secu-share] Whatsapp, a Trojan horse for seekers of easy privacy? In-Reply-To: <20150115132650.GC6067@lo.psyced.org> References: <20150115132650.GC6067@lo.psyced.org> Message-ID: ---------- Forwarded message ---------- From: carlo von lynX Date: Thu, 15 Jan 2015 14:26:50 +0100 Subject: [secu-share] Whatsapp, a Trojan horse for seekers of easy privacy? To: liberationtech at mailman.stanford.edu Concerning Whatsapp there is a very interesting clue in a thread on "messaging" that suggests users will never know if end-to-end encryption is being used, since the server decides whether they are allowed to, and the user is not informed. Knowing the NSA that means that Whatsapp would never encrypt anything end-to-end. Whatsapp should therefore be considered a Trojan horse for people seeking easy to use privacy. Read about that at https://moderncrypto.org/mail-archive/messaging/2014/001133.html Careful on using that mailing list however. If I understood correctly it is being maintained by one of the developers of TextSecure, which is the end-to-end encryption system that has been integrated into Whatsapp, possibly with the purpose of looking good, making good headlines and never being actually run. http://www.wired.com/2014/11/whatsapp-encrypted-messaging/ Of course I assume everyone is operating in the best of intentions, including the NSA. This is just FYI. -- http://youbroketheinternet.org ircs://psyced.org/youbroketheinternet -- secu-share at lists.secushare.org https://lists.secushare.org/mailman/listinfo.cgi/secu-share From tbiehn at gmail.com Fri Mar 25 10:02:06 2016 From: tbiehn at gmail.com (Travis Biehn) Date: Fri, 25 Mar 2016 13:02:06 -0400 Subject: Cloudflare blogs on their Cert Tech In-Reply-To: <56F56BBF.9040706@riseup.net> References: <56F56BBF.9040706@riseup.net> Message-ID: This particular feature has no bearing on that specific attack. In general, it looks like Cloudflare will 'handle cert generation for you' - if that extends to a relationship with CAs - who will sign those, then yes regardless. The real question here is whether the feature detection is done in a way that is susceptible to downgrade attack. If your threat model involves Cloudflare behaving maliciously - then you shouldn't use Cloudflare. If your threat model involves attacker controlled PKI - as it should - then you should 'cert-pin the leaf.' -Travis On Fri, Mar 25, 2016 at 12:47 PM, Rayzer wrote: > Wondering if their cert tech can spoof a cert to look like it belongs to a > site they DNS when it really belongs to them and you've never really > visited the site at all. > > TLS Certificate Optimization: The Technical Details behind "No Browser > Left Behind" > > Overview > > Back in early December we announced our "no browser left behind" > initiative to the world. Since then, we have served well over 500 billion > SHA-1 certificates to visitors that otherwise would not have been able to > communicate securely with our customers’ sites using HTTPS. All the while, > we’ve continued to present newer SHA-2 certificates to modern browsers > using the latest in elliptic curve cryptography, demonstrating that one > does not have to sacrifice security to accommodate all the world’s Internet > users. (If you weren’t able to acquire a SHA-1 certificate before CAs > ceased issuing them on 2015/12/31, you can still sign up for a paid plan > and we will immediately generate one to serve to your legacy visitors.) > > Shortly after we announced these new benefits for our paid Universal SSL > customers, we started hearing from other technology leaders who were > implementing (or already had implemented) similar functionality. At first > glance, the logic to identify incoming connections that only support SHA-1 > seems straightforward, but as we spoke with our friends at Facebook, > Twitter, and Mozilla, I realized that everyone was taking a slightly > different approach. Complicating the matter even further was the fact that > at CloudFlare we not only wanted to optimize between SHA-1 and SHA-2, but > also between RSA and the newer, but less universally supported ECDSA > certificates. Solve the "optimal certificate" question incorrectly, and the > TLS handshake will fail — or get explicitly aborted by browsers that have > deprecated SHA-1 entirely; solve it correctly, and the client and server > will establish the most performant, secure connection available between the > two endpoints. > > Certificate Optimization Logic > > After several trillion requests, we’re confident that our approach works > quite well for CloudFlare’s customers and their visitors. If you have taken > an alternative approach to implementation, or have found any > exceptions/potential refinements to our logic, please chime in below. We > remain committed to withdrawing SHA-1 support if, as our CEO said, "a > vulnerability is discovered [in our certificate optimization logic] which > allows some form of downgrade attack—where a modern browser can be tricked > into receiving a certificate signed with an insecure protocol—and the > vulnerability cannot be patched". > TLS Handshake > > Before your web browser can securely exchange "application data" such as > HTTP GET or POST requests and responses with a web server, it must first > establish the cryptographic parameters of the secure session. This > well-choreographed dance, known as the SSL/TLS handshake, commences as soon > as you click, type, or get redirected to a URL containing the "https://" > scheme. (The process described below also applies to connections from any > user agent — not just browsers—so substitute "mobile app", "command-line > utility", or anything else that can communicate via HTTPS.) > > > More: > https://blog.cloudflare.com/tls-certificate-optimization-technical-details/ > > -- > RR > "Through counter-intelligence it should be possible to pinpoint potential trouble-makers ... And neutralize them, neutralize them, neutralize them" > > -- Twitter | LinkedIn | GitHub | TravisBiehn.com | Google Plus -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5790 bytes Desc: not available URL: From tbiehn at gmail.com Fri Mar 25 10:04:53 2016 From: tbiehn at gmail.com (Travis Biehn) Date: Fri, 25 Mar 2016 13:04:53 -0400 Subject: Cloudflare blogs on their Cert Tech In-Reply-To: References: <56F56BBF.9040706@riseup.net> Message-ID: + I'll re-iterate the need for non-dynamic/safe JavaScript (e.g. Caja) & a form of 'web asset versioning and integrity'. -Travis On Fri, Mar 25, 2016 at 1:02 PM, Travis Biehn wrote: > This particular feature has no bearing on that specific attack. > > In general, it looks like Cloudflare will 'handle cert generation for you' > - if that extends to a relationship with CAs - who will sign those, then > yes regardless. > > The real question here is whether the feature detection is done in a way > that is susceptible to downgrade attack. > > If your threat model involves Cloudflare behaving maliciously - then you > shouldn't use Cloudflare. > > If your threat model involves attacker controlled PKI - as it should - > then you should 'cert-pin the leaf.' > > -Travis > > On Fri, Mar 25, 2016 at 12:47 PM, Rayzer wrote: > >> Wondering if their cert tech can spoof a cert to look like it belongs to >> a site they DNS when it really belongs to them and you've never really >> visited the site at all. >> >> TLS Certificate Optimization: The Technical Details behind "No Browser >> Left Behind" >> >> Overview >> >> Back in early December we announced our "no browser left behind" >> initiative to the world. Since then, we have served well over 500 billion >> SHA-1 certificates to visitors that otherwise would not have been able to >> communicate securely with our customers’ sites using HTTPS. All the while, >> we’ve continued to present newer SHA-2 certificates to modern browsers >> using the latest in elliptic curve cryptography, demonstrating that one >> does not have to sacrifice security to accommodate all the world’s Internet >> users. (If you weren’t able to acquire a SHA-1 certificate before CAs >> ceased issuing them on 2015/12/31, you can still sign up for a paid plan >> and we will immediately generate one to serve to your legacy visitors.) >> >> Shortly after we announced these new benefits for our paid Universal SSL >> customers, we started hearing from other technology leaders who were >> implementing (or already had implemented) similar functionality. At first >> glance, the logic to identify incoming connections that only support SHA-1 >> seems straightforward, but as we spoke with our friends at Facebook, >> Twitter, and Mozilla, I realized that everyone was taking a slightly >> different approach. Complicating the matter even further was the fact that >> at CloudFlare we not only wanted to optimize between SHA-1 and SHA-2, but >> also between RSA and the newer, but less universally supported ECDSA >> certificates. Solve the "optimal certificate" question incorrectly, and the >> TLS handshake will fail — or get explicitly aborted by browsers that have >> deprecated SHA-1 entirely; solve it correctly, and the client and server >> will establish the most performant, secure connection available between the >> two endpoints. >> >> Certificate Optimization Logic >> >> After several trillion requests, we’re confident that our approach works >> quite well for CloudFlare’s customers and their visitors. If you have taken >> an alternative approach to implementation, or have found any >> exceptions/potential refinements to our logic, please chime in below. We >> remain committed to withdrawing SHA-1 support if, as our CEO said, "a >> vulnerability is discovered [in our certificate optimization logic] which >> allows some form of downgrade attack—where a modern browser can be tricked >> into receiving a certificate signed with an insecure protocol—and the >> vulnerability cannot be patched". >> TLS Handshake >> >> Before your web browser can securely exchange "application data" such as >> HTTP GET or POST requests and responses with a web server, it must first >> establish the cryptographic parameters of the secure session. This >> well-choreographed dance, known as the SSL/TLS handshake, commences as soon >> as you click, type, or get redirected to a URL containing the "https://" >> scheme. (The process described below also applies to connections from any >> user agent — not just browsers—so substitute "mobile app", "command-line >> utility", or anything else that can communicate via HTTPS.) >> >> >> More: >> https://blog.cloudflare.com/tls-certificate-optimization-technical-details/ >> >> -- >> RR >> "Through counter-intelligence it should be possible to pinpoint potential trouble-makers ... And neutralize them, neutralize them, neutralize them" >> >> > > > -- > Twitter | LinkedIn > | GitHub > | TravisBiehn.com | > Google Plus > -- Twitter | LinkedIn | GitHub | TravisBiehn.com | Google Plus -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6842 bytes Desc: not available URL: From guninski at guninski.com Fri Mar 25 07:46:05 2016 From: guninski at guninski.com (Georgi Guninski) Date: Fri, 25 Mar 2016 16:46:05 +0200 Subject: Is Gutmann critical of DJB in "On the Impending Crypto Monoculture" Message-ID: <20160325144605.GF960@sivokote.iziade.m$> http://www.metzdowd.com/pipermail/cryptography/2016-March/028824.html On the Impending Crypto Monoculture Peter Gutmann Is Gutmann critical of DJB (the creator of the divine qmail)? (there is some disagreement about this with alleged linux admins). Maybe I will troll DJB no matter which way it is ;) From guninski at guninski.com Fri Mar 25 09:24:25 2016 From: guninski at guninski.com (Georgi Guninski) Date: Fri, 25 Mar 2016 18:24:25 +0200 Subject: Is Gutmann critical of DJB in "On the Impending Crypto Monoculture" In-Reply-To: References: <20160325144605.GF960@sivokote.iziade.m$> Message-ID: <20160325162425.GG960@sivokote.iziade.m$> On Fri, Mar 25, 2016 at 11:28:53AM -0400, Travis Biehn wrote: > Short version: > He isn't. > Just for a start, why the elliptic curve is of so small order, only 256 bits? I am pretty sure in the early days of PGP, some PGP advocate claimed something along the lines "we can't factor 128 bit modulus till the end of time". Not to mention quantum computer will fuck the curve fast. From grarpamp at gmail.com Fri Mar 25 20:34:05 2016 From: grarpamp at gmail.com (grarpamp) Date: Fri, 25 Mar 2016 23:34:05 -0400 Subject: More Bad Govt Shit To Fight (Burner Verizon FBI) Message-ID: https://politics.slashdot.org/story/16/03/25/2047211/bill-introduced-to-require-id-when-purchasing-burner-phones Give us all your papers please. For no effective impact or purpose whatsoever, other than fucking you. Other than hundred thousand insecure stores having it to be lost, stolen, abused, even by shopkeeper. BTW, you cant sell your phone anymore either... that's TWO years in Gitmo and loss of your life $avings. https://developers.slashdot.org/story/16/03/25/1918226/15-million-verizon-customer-records-put-up-for-sale Now share all it with these retards too, but only MAY use crypto, which as we know doesn't matter. So hackers can steal it. And they can datamine you and sell it to whoever for the same. And share it with the NSA / FBI, for the same, and.... https://politics.slashdot.org/story/16/03/25/1657247/have-a-political-bumper-sticker-the-fbi-might-be-snapping-photos-of-you Also so these jackasses can track and molest you when you go buy some fucking FAYGO. Better fight this bill too. From grarpamp at gmail.com Fri Mar 25 21:53:45 2016 From: grarpamp at gmail.com (grarpamp) Date: Sat, 26 Mar 2016 00:53:45 -0400 Subject: Can we legally borrow some sploits from TLAs? In-Reply-To: <20160325092825.GE960@sivokote.iziade.m$> References: <20160325092825.GE960@sivokote.iziade.m$> Message-ID: On 3/25/16, Georgi Guninski wrote: > Public list for this is not a good idea. > Can we legally borrow some sploits from TLAs? Hey guys, join my list. (public announce... oops) Hey Jane, join my list. (private to Jane, who isn't who you think she is... oops) Hey NSA, grok my headers over clearnet, FISA all VPS servers nightly to Utah. (oops) No traditional "email" list is nonpublic to TLA's and various other adversaries. You might hide the participants with crypto and anonymous p2p overlay networks, even nullifiy central service with message distribution / broadcast / blockchain. That's fun. But never will content be unshareable once received. > Anything already implemented? Plenty of honeypot research groups you can search for and join. (Or engineer your way into.) Though your TLA's already did and know the list of boxes not to hit. From grarpamp at gmail.com Fri Mar 25 22:03:27 2016 From: grarpamp at gmail.com (grarpamp) Date: Sat, 26 Mar 2016 01:03:27 -0400 Subject: More Bad Govt Shit To Fight (Burner Verizon FBI) In-Reply-To: References: Message-ID: On 3/26/16, Zenaan Harkness wrote: > Had ID requirements for all phones in Australia for years now... 1984 Doubt that applies to the box of activated and paid up phones someone's about to tourist your way via DHL... or the same stuff at your local swap meet. Doesn't matter, laws prevent nothing. Especially mindcrime. Get your think on. From zen at freedbms.net Fri Mar 25 21:32:40 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Sat, 26 Mar 2016 04:32:40 +0000 Subject: More Bad Govt Shit To Fight (Burner Verizon FBI) In-Reply-To: References: Message-ID: Had ID requirements for all phones in Australia for years now... 1984 - the gift that keeps on giving. From jdb10987 at yahoo.com Fri Mar 25 22:16:57 2016 From: jdb10987 at yahoo.com (jim bell) Date: Sat, 26 Mar 2016 05:16:57 +0000 (UTC) Subject: Is Gutmann critical of DJB in "On the Impending Crypto Monoculture" In-Reply-To: <20160325162425.GG960@sivokote.iziade.m$> References: <20160325162425.GG960@sivokote.iziade.m$> Message-ID: <1710295221.142709.1458969417175.JavaMail.yahoo@mail.yahoo.com> From: Georgi Guninski >I am pretty sure in the early days of PGP, some PGP advocate claimed >something along the lines "we can't factor 128 bit modulus till the end >of time". >Not to mention quantum computer will fuck the curve fast. Is there a mathematical estimate as to how much quantum computers will accelerate cracking codes, over traditional methods?             Jim Bell -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1828 bytes Desc: not available URL: From guninski at guninski.com Sat Mar 26 00:14:36 2016 From: guninski at guninski.com (Georgi Guninski) Date: Sat, 26 Mar 2016 09:14:36 +0200 Subject: Can we legally borrow some sploits from TLAs? In-Reply-To: References: <20160325092825.GE960@sivokote.iziade.m$> Message-ID: <20160326071436.GA880@sivokote.iziade.m$> On Sat, Mar 26, 2016 at 12:53:45AM -0400, grarpamp wrote: > Plenty of honeypot research groups you can search for and join. > (Or engineer your way into.) > Though your TLA's already did and know the list of boxes not to hit. Isn't this very good defense if true? How they passively recognize honeypot which is disposable computer connected to public wifi and then possibly over Tor/public proxy? From guninski at guninski.com Sat Mar 26 00:26:01 2016 From: guninski at guninski.com (Georgi Guninski) Date: Sat, 26 Mar 2016 09:26:01 +0200 Subject: Is Gutmann critical of DJB in "On the Impending Crypto Monoculture" In-Reply-To: <1710295221.142709.1458969417175.JavaMail.yahoo@mail.yahoo.com> References: <20160325162425.GG960@sivokote.iziade.m$> <1710295221.142709.1458969417175.JavaMail.yahoo@mail.yahoo.com> Message-ID: <20160326072601.GB880@sivokote.iziade.m$> On Sat, Mar 26, 2016 at 05:16:57AM +0000, jim bell wrote: > > > From: Georgi Guninski >I am pretty sure in the early days of PGP, some PGP advocate claimed > >something along the lines "we can't factor 128 bit modulus till the end > >of time". > >Not to mention quantum computer will fuck the curve fast. > Is there a mathematical estimate as to how much quantum computers will accelerate cracking codes, over traditional methods?             Jim Bell > Yes, it is known that quantum computers will break at least most of today's public key crypto (factoring, discrete logarithms) very efficiently. Several years ago IBM tested this in practice with the toy experiment of factoring 15. Some cryptographers are preparing for the day when quantum computers will come -- the buzzword is "post-quantum cryptography". I am a newbie at this and suspect the full potential of quantum computers is not currently known (AFAICT it is open if they will break SAT). From zen at freedbms.net Sat Mar 26 04:48:29 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Sat, 26 Mar 2016 11:48:29 +0000 Subject: Oracle slurs PostgreSQL - was Re: Russia bans purchase of foreign non-niche software in Russian state agencies Message-ID: Dear Russian computing punk friends - enjoy, and holler for any questions you might have - now is the time to sieze the day. pgsql-general email thread link is below - best for specific database tech questions. We figured some backlash might come to Putin's pro-local (i.e. effectively also "libre") software policy ("nasty protectionists" say the globalisation nuts), and Oracle the corporate $LUT$ they are, recently leaped right in Lucifer Style (Gangnam eat your heart out). This attack on local in particular smaller Russian businesses, by Oracle against PostgreSQL is some evidence that Putin's policy is having an effect in Russia which Oracle is disliking (does your heart bleed for Oracle's loss of profits in Russia? Those poor, poor American billionaires...). Now is a fantastic opportunity for those individual and business entrepreneurs in Russia to use your words and advocacy to fight this particular American bully. Enjoy :) This is free publicity you just can't beat, couldn't purchase. Find good word smiths in Russia, play the various cards - "Oracle attacks the little guy", "Oracle attacks community", "Oracle tries to maniuplate Russia" "no Oracle, we're not that stupid, basic facts are not, like, rocket science or anything" and every other combination that makes sense in Russia. Pump it to your media, bounce your links to the PostgreSQL mailing list linked below, build that nationalist/ community/ local guys spirit. A multi billion dollar American bully trying to shirt-front Russia! Gold! Just gold! Marketing material you could never buy! Little guys vs Billion dollar bullies. Fantastic! Once this publicity is milked, letters should be sent to Larry Ellison and the rest of the Oracle board, thanking them sincerely for their efforts to promote Russian local business and Russian computing self confidence - as well as for raising awareness of the aggressive and bullying nature of American money, Starikov style :) : http://russia-insider.com/en/politics/russian-patriotic-party-thanks-obama-and-kerry-re-union-crimea/ri13529 "Russian Political Party Trolls Obama and Kerry by Sending Thank-You Cards" Perhaps Oracle should try to sell their wares in the CIA's project Ukraine?: http://russia-insider.com/en/politics/ukrainian-refugees-flood-eu-poland-considers-building-wall/ri13566 "Poland Considers Building a Wall - Against Ukrainians" (Just as well the western Ukrainians are wealthy folk, honourable with their many multi-billion dollar IMF loans, and about to join the EU eh? Oracle should fit right in, feel right at home...) http://momjian.us/main/blogs/pgblog/2016.html#March_22_2016 Oracle Attacks Postgres in Russia Bruce Momjian "Tuesday, March 22, 2016 During my twenty years with Postgres, I knew the day would come when proprietary databases could no longer ignore Postgres and would start attacking us. Well, that day has come, at least in Russia. During the past few weeks, Oracle sent a letter (Russian http://www.postgresql.org/message-id/attachment/43080/PostgreSQL_Oracle.pdf , English translation https://www.metachris.com/download/PostgreSQL_Oracle_en.pdf ) to Russian partners and customers comparing Oracle favorably to Postgres as a way of cirumventing a new law ( http://www.themoscowtimes.com/business/article/russia-restricts-use-of-foreign-software-in-battle-for-information-sovereignty/550106.html ) favoring Russian-produced software. This is the first direct attack I have seen on Postgres, and is probably representative of the kinds of attacks we will see from other vendors and in other countries in the years to come. The press has picked up on the news (Russian http://momjian.us/main/blogs/pgblog/www.vedomosti.ru/technology/articles/2016/03/17/633926-importnii-soft-zamenit , English http://www.theregister.co.uk/2016/03/21/oracle_fights_russian_software_policy_with_postgres_smear/ ) and given balanced coverage. Comments ( http://forums.theregister.co.uk/forum/1/2016/03/21/oracle_fights_russian_software_policy_with_postgres_smear/ ) on the English article were, in general, positive — I particularly liked this one ( http://forums.theregister.co.uk/forum/1/2016/03/21/oracle_fights_russian_software_policy_with_postgres_smear/#c_2814730 ). There are two Hacker News threads about it (1 https://news.ycombinator.com/item?id=11317899 , 2 https://news.ycombinator.com/item?id=11332449 ), a community thread ( http://www.postgresql.org/message-id/flat/CANNMO++6tPiwBv2OKcy-HhiYmByhL+XSSUH3NDvOs3G1VVg++g at mail.gmail.com#CANNMO++6tPiwBv2OKcy-HhiYmByhL+XSSUH3NDvOs3G1VVg++g at mail.gmail.com ) about it, and another community thread about Oracle RAC ( http://www.postgresql.org/message-id/flat/ncotsa$lhg$1 at pye-srv-01.telemetry.co.uk#ncotsa$lhg$1 at pye-srv-01.telemetry.co.uk ). Taken together, this is an interesting time for Postgres. " http://www.msearcher.info/blog-en/software/oracle-fights-russian-software-policy-with-postgres-smear/ Oracle fights Russian software policy with Postgres smear An email calling for links to pro-PostgreSQL advocacy http://www.postgresql.org/message-id/ncotsa$lhg$1 at pye-srv-01.telemetry.co.uk The whole thread: http://www.postgresql.org/message-id/flat/ncotsa$lhg$1 at pye-srv-01.telemetry.co.uk Begins: "If anybody puts together a "just the facts" document after Oracle's attack on PostgreSQL in Russia, please make sure it's drawn to the attention of this mailing list for the benefit of those who aren't in -advocacy." From grarpamp at gmail.com Sat Mar 26 10:35:53 2016 From: grarpamp at gmail.com (grarpamp) Date: Sat, 26 Mar 2016 13:35:53 -0400 Subject: Bitcoin GoldBugs / Ghetto Gold Message-ID: On 3/26/16, elrippo wrote: > *Want to trade Bitcoin for physical GOLD* -> > https://www.vaultoro.com/?a=100345 Their logical gold, needs minor KYC. And to get their physical, needs anal probing KYC. Bitcoiners who care about that are better off going btc > localcash > gold. Or skip btc and go cash > gold at any ghetto shop. Nice try at referral link tho bruh. From o.wendel at wp.pl Sat Mar 26 08:34:39 2016 From: o.wendel at wp.pl (Oskar Wendel) Date: Sat, 26 Mar 2016 15:34:39 +0000 (UTC) Subject: Traffic shaping attack References: <20160319034044.GQ8732@moria.seul.org> <20160320015647.GR8732@moria.seul.org> <20160320221427.GE15350@torproject.org> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 grarpamp : > ... the OP appears to know the onion url and refers to fora > discussion the situation. So OP should post those links for > others to review analyse formulate hypothesis etc. Yes, I know the URL, but (as notwith already said): 1. The site contains content illegal in many (most?) jurisdictions. 2. The site needs registration to access anything, and the registration is now closed. Therefore, I think it would be best not to post the link, at least not on the list. - -- Oskar Wendel, o.wendel at wp.pl.REMOVE.THIS Pubkey: http://pgp.mit.edu/pks/lookup?op=get&search=0xB5E3846CD40F08E3 -----BEGIN PGP SIGNATURE----- iQEcBAEBAgAGBQJW9qwHAAoJELXjhGzUDwjjk4kH/AikIGXsPKH2iOUR1iJvCU7u dFORYeVTp+1r3CuIf/YsnVRDfvhx2h6NoML7y51dpNoiOEpulWwudrt0b4P6svcq fkClLdoPONWwOGgktUFfm5SoMhx8nQsvd8KweC3BdI9PlCyf1NatBwDY9JMurXP0 gTulcf3eeEWvk4Wwrgi5CLuENt8tq+8GAb/i9SGwBvy5QGz9ylC0vsR8e/y7xHtl UZ1OVAJ15fK9KrehoFw0gYTsC/1osEn1NTBRufn+R0qL41zMoB4iymsJJ+Q+wKSH FfhJj0fRu+MeS08QpunZA4ZyodL9J749679sSGc9m65KQlYP6Onxyir4vxtfPmw= =rhIU -----END PGP SIGNATURE----- From grarpamp at gmail.com Sat Mar 26 14:53:30 2016 From: grarpamp at gmail.com (grarpamp) Date: Sat, 26 Mar 2016 17:53:30 -0400 Subject: Privacy Centric Naming of Humans Message-ID: https://developers.slashdot.org/story/16/03/26/2017231/names-that-break-computers https://cpunks.org/pipermail/cypherpunks/2015-May/007632.html Breaking the db as a means of remaining out of the db, or hiding in it among hundred thousands of Smiths. Be own corp / trust. From grarpamp at gmail.com Sun Mar 27 01:32:33 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 27 Mar 2016 04:32:33 -0400 Subject: [Cryptography] More Bad Govt Shit To Fight (Burner Verizon FBI) In-Reply-To: <56F7422A.50103@sonic.net> References: <56F7422A.50103@sonic.net> Message-ID: On 3/26/16, Ray Dillinger wrote: > > > On 03/26/2016 07:24 AM, Henry Baker wrote: >> It'll be interesting to see how this bill is received. >> >> IMHO the vast majority of these phones -- at least here in California -- >> are used by undocumented residents, who have no papers, no driver's >> licenses, no bank accounts, and operate 100% on cash. >> > > I'm also in California but the main use I see is at halfway > houses and womens' shelters. There are a lot of scared battered > women out there who can't disentangle exes from their financial > crap fast enough to establish independent phone service without > them, and a lot of shelters that go through them like tissues. > > It's a pretty big deal for them because there are *LOTS* of violent > loons who are trying to find those places, and everyone who winds > up there is completely inexperienced in the art of Not Being Seen. > Lots of chances for one person's mistake to become everybody's > problem, and phones are like the "ablative surface" that can be > gotten rid of for mutual protection when someone makes a mistake. > > I see their IT manager at Urban Ore, buying a basket full of > old used phones, almost every time I'm over there. You would be surprised how many *men* have to deal with crazy battering women and need to seek refuge in shelters and safe supportive halfway houses for men. Either way, all such people who are innocent enjoy the right for the government and commerce not to impede upon their right to privacy, including shielding their innocent selves from warrantless govt and commercial tracking and datakeeping. Stop giving away your rights and taking those of other innocents. For it is not the criminal they are after, but control over you. From Rayzer at riseup.net Sun Mar 27 07:41:51 2016 From: Rayzer at riseup.net (Rayzer) Date: Sun, 27 Mar 2016 07:41:51 -0700 Subject: [Cryptography] More Bad Govt Shit To Fight (Burner Verizon FBI) In-Reply-To: References: <56F7422A.50103@sonic.net> Message-ID: <56F7F12F.6070108@riseup.net> grarpamp wrote: > You would be surprised how many *men* have to deal > with crazy battering women and need to seek refuge > in shelters and safe supportive halfway houses for men. They're called a "Pub" or "Bar". -- RR "Through counter-intelligence it should be possible to pinpoint potential trouble-makers ... And neutralize them, neutralize them, neutralize them" -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From juan.g71 at gmail.com Sun Mar 27 11:48:06 2016 From: juan.g71 at gmail.com (juan) Date: Sun, 27 Mar 2016 15:48:06 -0300 Subject: More Bad Govt Shit To Fight (Burner Verizon FBI) In-Reply-To: <20160327144652.GC924@sivokote.iziade.m$> References: <20160327144652.GC924@sivokote.iziade.m$> Message-ID: <56f82b09.c8908c0a.7cfbf.ffff9323@mx.google.com> On Sun, 27 Mar 2016 17:46:52 +0300 Georgi Guninski wrote: > On Fri, Mar 25, 2016 at 11:34:05PM -0400, grarpamp wrote: > > Better fight this bill too. > > Fight whom? The government is the people's will. > > People elected the government (modulo voting manipulations). > > You suggesting fighting billions of sheeple? And what are you suggesting? =) From guninski at guninski.com Sun Mar 27 07:13:21 2016 From: guninski at guninski.com (Georgi Guninski) Date: Sun, 27 Mar 2016 17:13:21 +0300 Subject: GitHub's 2014 Transparency Report (and dmca repo) Message-ID: <20160327141321.GB924@sivokote.iziade.m$> GitHub's 2014 Transparency Report https://github.com/blog/1987-github-s-2014-transparency-report dmca repo: https://github.com/github/dmca From guninski at guninski.com Sun Mar 27 07:46:52 2016 From: guninski at guninski.com (Georgi Guninski) Date: Sun, 27 Mar 2016 17:46:52 +0300 Subject: More Bad Govt Shit To Fight (Burner Verizon FBI) In-Reply-To: References: Message-ID: <20160327144652.GC924@sivokote.iziade.m$> On Fri, Mar 25, 2016 at 11:34:05PM -0400, grarpamp wrote: > Better fight this bill too. Fight whom? The government is the people's will. People elected the government (modulo voting manipulations). You suggesting fighting billions of sheeple? From mirimir at riseup.net Mon Mar 28 01:09:11 2016 From: mirimir at riseup.net (Mirimir) Date: Mon, 28 Mar 2016 02:09:11 -0600 Subject: More Bad Govt Shit To Fight (Burner Verizon FBI) In-Reply-To: <56f82b09.c8908c0a.7cfbf.ffff9323@mx.google.com> References: <20160327144652.GC924@sivokote.iziade.m$> <56f82b09.c8908c0a.7cfbf.ffff9323@mx.google.com> Message-ID: <56F8E6A7.40001@riseup.net> On 03/27/2016 12:48 PM, juan wrote: > On Sun, 27 Mar 2016 17:46:52 +0300 > Georgi Guninski wrote: > >> On Fri, Mar 25, 2016 at 11:34:05PM -0400, grarpamp wrote: >>> Better fight this bill too. >> >> Fight whom? The government is the people's will. >> >> People elected the government (modulo voting manipulations). >> >> You suggesting fighting billions of sheeple? > > > And what are you suggesting? =) Far better to just ignore them, discretely ;) From zen at freedbms.net Sun Mar 27 20:04:41 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Mon, 28 Mar 2016 03:04:41 +0000 Subject: give all citizens six weeks of police training before eliminating the police Message-ID: This "Rojava" process of training every adult member of the population to be competent as a police officer, then (intending to) ditching the police force, is something I have pondered over the years, my first awareness is from the Swiss concept - every household has a rifle (at least) and at least one person able to use it. Here in Australia we are well fed fat cows it seems, with no particularly egregious external threats, only the steady degradation by our own government corrupt activities and extortive practices towards us "citizens", and therefore little motivation within the population to be competent at anything much other than telly, tinnies and trivia. "The existing police force is trained in non-violent conflict resolution as well as feminist theory before being allowed access to a weapon. Directors of the Asayiş police academy have said that the long-term goal is to give all citizens six weeks of police training before ultimately eliminating the police.[100] https://zcomm.org/znetarticle/no-this-is-a-genuine-revolution/ " I'm -reasonably- sure they mean 'retiring' or 'dissolving' the police force. From guninski at guninski.com Mon Mar 28 01:59:20 2016 From: guninski at guninski.com (Georgi Guninski) Date: Mon, 28 Mar 2016 11:59:20 +0300 Subject: More Bad Govt Shit To Fight (Burner Verizon FBI) In-Reply-To: <56F8E6A7.40001@riseup.net> References: <20160327144652.GC924@sivokote.iziade.m$> <56f82b09.c8908c0a.7cfbf.ffff9323@mx.google.com> <56F8E6A7.40001@riseup.net> Message-ID: <20160328085920.GB675@sivokote.iziade.m$> On Mon, Mar 28, 2016 at 02:09:11AM -0600, Mirimir wrote: > >> You suggesting fighting billions of sheeple? > > > > > > And what are you suggesting? =) > > Far better to just ignore them, discretely ;) Or maybe own the world for its own good. This appears moral per the current practical definition ;) Cons: very difficult and risky. From jya at pipeline.com Mon Mar 28 15:27:05 2016 From: jya at pipeline.com (John Young) Date: Mon, 28 Mar 2016 18:27:05 -0400 Subject: USG Moves to Vacate Apple Decrypt Order Message-ID: USG Moves to Vacate Apple Decrypt Order https://cryptome.org/2016/03/usg-apple-209.pdf From jya at pipeline.com Tue Mar 29 03:35:37 2016 From: jya at pipeline.com (John Young) Date: Tue, 29 Mar 2016 06:35:37 -0400 Subject: [Cryptography] USG Moves to Vacate Apple Decrypt Order In-Reply-To: References: Message-ID: At 11:22 PM 3/28/2016, Phillip Hallam-Baker wrote: >Some random thoughts > >* Apple wins big. First, they beat off the FBI warrant, second >everyone with less than a 5s has to buy a new phone. > >* The new phone might still be crackable by someone who has the tools >to reverse the secure enclave. But Apple isn't one of the parties that >can do that. > >* FBI might in future be able to subpoena information to use it for >making a break attempt against the secure enclave. > >* If your security depends on someone else refusing to obey a >subpoena, change your security. > >* If their security depends on you refusing to obey a subpoena, get >another job. USG wins by assault, PR, obscurity, secrecy, and sanctification of the justice-court system. No substantiation yet of USG access to Farook's phone. The claim could be a ploy to raise doubt about Apple security, and have the same effect as if access was successful. This would take the public and political pressure off USG without having to disclose how access was obtained. As well as improve USG reputation for prowess, determination and triumph. Deception, lies, bluffs and ploys are obligatory in legal proceedings and all stripes of security. Doubt, braggardy, obscurity and secrecy are essential features of defensive and aggressive security whether governmental, commercial or personal. From zen at freedbms.net Tue Mar 29 04:07:45 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Tue, 29 Mar 2016 11:07:45 +0000 Subject: =?UTF-8?Q?The_World=E2=80=99s_Most_Famous_Economic_Hitman_Confesses_?= =?UTF-8?Q?=E2=80=93_They=E2=80=99re_Coming_for_Your_Democracy?= Message-ID: Very disheartening, the battle rages on... Chickens will come home to roost one day, I think soonish. Z http://www.blacklistednews.com/The_World%E2%80%99s_Most_Famous_Economic_Hitman_Confesses_%E2%80%93_They%E2%80%99re_Coming_for_Your_Democracy/50047/0/38/38/Y/M.html The World’s Most Famous Economic Hitman Confesses – They’re Coming for Your Democracy Published: March 26, 2016 Source: Michael Krieger Allen Dulles, the CIA director under presidents Eisenhower and Kennedy, the younger brother of Secretary of State John Foster Dulles, and the architect of a secretive national security apparatus that functioned as essentially an autonomous branch of government. Talbot offers a portrait of a black-and-white Cold War-era world full of spy games and nuclear brinkmanship, in which everyone is either a good guy or a bad guy. Dulles—who deceived American elected leaders and overthrew foreign ones, who backed ex-Nazis and thwarted left-leaning democrats—falls firmly in the latter camp. But what I was really trying to do was a biography on the American power elite from World War II up to the 60s. That was the key period when the national security state was constructed in this country, and where it begins to overshadow American democracy. It’s almost like Game of Thrones to me, where you have the dynastic struggles between these power groups within the American system for control of the country and the world… Absolutely. The surveillance state that Snowden and others have exposed is very much a legacy of the Dulles past. I think Dulles would have been delighted by how technology and other developments have allowed the American security state to go much further than he went. He had to build a team of cutthroats and assassins on the ground to go around eliminating the people he wanted to eliminate, who he felt were in the way of American interests. He called them communists. We call them terrorists today. And of course the most controversial part of my book, I’m sure, will be the end, where I say there was blowback from that. Because that killing machine in some way was brought back home. Most readers will be familiar with John Perkins and his best-selling novel Confessions of an Economic Hitman. What you may not know, is he’s currently making the rounds warning us that all the corporatist mercenary tactics employed against third-world nations to financially benefit U.S. conglomerates are now being turned inward on American communities. Twelve years ago, John Perkins published his book, Confessions of an Economic Hit Man, and it rapidly rose up The New York Times’ best-seller list. In it, Perkins describes his career convincing heads of state to adopt economic policies that impoverished their countries and undermined democratic institutions. These policies helped to enrich tiny, local elite groups while padding the pockets of U.S.-based transnational corporations. If economic pressure and threats didn’t work, Perkins says, the jackals were called to either overthrow or assassinate the noncompliant heads of state. That is, indeed, what happened to Allende, with the backing of the CIA. Perkins has just reissued his book with major updates. The basic premise of the book remains the same, but the update shows how the economic hit man approach has evolved in the last 12 years. Among other things, U.S. cities are now on the target list. The combination of debt, enforced austerity, underinvestment, privatization, and the undermining of democratically elected governments is now happening here. Sarah van Gelder: What’s changed in our world since you wrote the first Confessions of an Economic Hit Man? John Perkins: Things have just gotten so much worse in the last 12 years since the first Confessions was written. Economic hit men and jackals have expanded tremendously, including the United States and Europe. Back in my day we were pretty much limited to what we called the third world, or economically developing countries, but now it’s everywhere. van Gelder: So how has this switched from us being the beneficiaries of this hit-man economy, perhaps in the past, to us now being more of the victims of it? Perkins: It’s been interesting because, in the past, the economic hit man economy was being propagated in order to make America wealthier and presumably to make people here better off, but as this whole process has expanded in the U.S. and Europe, what we’ve seen is a tremendous growth in the very wealthy at the expense of everybody else. On a global basis we now know that 62 individuals have as many assets as half the world’s population. van Gelder: Is this the same kind of dynamic about debt that leads to emergency managers who then turn over the reins of the economy to private enterprises? The same thing that you are seeing in third-world countries? Perkins: Yes, when I was an economic hit man, one of the things that we did, we raised these huge loans for these countries, but the money never actually went to the countries, it went to our own corporations to build infrastructure in those countries. And when the countries could not pay off their debt, we insisted that they privatize their water systems, their sewage systems, their electric systems. van Gelder: I want to ask you about the Trans-Pacific Partnership, and other trade deals. Is there any way that we can beat these things back so they don’t continue supercharging the corporate sphere at the expense of local democracies? Perkins: They’re devastating; they give sovereignty to corporations over governments. It’s ridiculous. I was just in Central America and what we talk about in the U.S. as being an immigration problem is really a trade agreement problem. They’re not allowed to impose tariffs under the trade agreements—NAFTA and CAFTA—but the U.S. is allowed to subsidize its farmers. Those governments can’t afford to subsidize their farmers. So our farmers can undercut theirs, and that’s destroyed the economies, and a number of other things, and that’s why we’ve got immigration problems. van Gelder: Can you talk about the violence that people are fleeing in Central America, and how that links back to the role the U.S. has had there? Perkins: Three or four years ago the CIA orchestrated a coup against the democratically elected president of Honduras, President Zelaya, because he stood up to Dole and Chiquita and some other big, global, basically U.S.-based corporations. He wanted to raise the minimum wage to a reasonable level, and he wanted some land reform that would make sure that his own people were able to make money off their own land, rather than having big international corporations do it. The big corporations couldn’t stand for this. He wasn’t assassinated but he was overthrown in a coup and sent to another country, and replaced by a terribly brutal dictator, and today Honduras is one of the most violent, homicidal countries in the hemisphere. It’s frightening what we’ve done. And when that happens to a president, it sends a message to every other president throughout the hemisphere, and in fact throughout the world: Don’t mess with us. Don’t mess with the big corporations. Either cooperate and get rich in the process, and have all your friends and family get rich in the process, or go get overthrown or assassinated. It’s a very strong message. That is how a once proud nation gets transformed into a rancid, oligarch-controlled Banana Republic. From gmoss82 at gmail.com Tue Mar 29 17:17:19 2016 From: gmoss82 at gmail.com (Greg Moss) Date: Tue, 29 Mar 2016 17:17:19 -0700 Subject: USG-Apple Orders to Assist Search and Decrypt Vacated In-Reply-To: References: Message-ID: Stop spamming Apple shit. Nobody gives a shit. On Mar 29, 2016 5:14 PM, "John Young" wrote: > USG-Apple Orders to Assist Search and Decrypt Vacated > > https://cryptome.org/2016/03/usg-apple-210.pdf > > > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 569 bytes Desc: not available URL: From gmoss82 at gmail.com Tue Mar 29 18:41:56 2016 From: gmoss82 at gmail.com (Greg Moss) Date: Tue, 29 Mar 2016 18:41:56 -0700 Subject: USG-Apple Orders to Assist Search and Decrypt Vacated In-Reply-To: <1459297909.4169274.563084394.0D1C36B7@webmail.messagingengine.com> References: <1459297909.4169274.563084394.0D1C36B7@webmail.messagingengine.com> Message-ID: Its all propaganda bs. Gov have owned those phones for years. BTW sure hope you using super super onion type triple layer proxy accessing all the files - no not mbest On Mar 29, 2016 5:31 PM, "Alfie John" wrote: > On Wed, Mar 30, 2016, at 10:17 AM, Greg Moss wrote: > > Stop spamming Apple shit. Nobody gives a shit. > > Actually, a lot of us here give a shit. > > Please continue John. > > Alfie > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 684 bytes Desc: not available URL: From jya at pipeline.com Tue Mar 29 17:11:50 2016 From: jya at pipeline.com (John Young) Date: Tue, 29 Mar 2016 20:11:50 -0400 Subject: USG-Apple Orders to Assist Search and Decrypt Vacated Message-ID: USG-Apple Orders to Assist Search and Decrypt Vacated https://cryptome.org/2016/03/usg-apple-210.pdf From fw at deneb.enyo.de Tue Mar 29 11:43:56 2016 From: fw at deneb.enyo.de (Florian Weimer) Date: Tue, 29 Mar 2016 20:43:56 +0200 Subject: [Cryptography] USG Moves to Vacate Apple Decrypt Order In-Reply-To: (Phillip Hallam-Baker's message of "Mon, 28 Mar 2016 23:22:48 -0400") References: Message-ID: <87a8lhi0pf.fsf@mid.deneb.enyo.de> * Phillip Hallam-Baker: > Some random thoughts > > * Apple wins big. First, they beat off the FBI warrant, second > everyone with less than a 5s has to buy a new phone. Surely consumers will get a refund because the iPhone 5c has a world-ending, critical security flaw? And we are expected to believe that this flaw happened by accident, as the result of their engineering practices, and not through a deliberate assault of their best brains on their own technology. I find the media reporting on the outcome rather puzzling. From juan.g71 at gmail.com Tue Mar 29 18:00:09 2016 From: juan.g71 at gmail.com (juan) Date: Tue, 29 Mar 2016 22:00:09 -0300 Subject: nsa taxis Message-ID: <56fb253d.cbc3370a.9679a.381d@mx.google.com> so I took a look at 'uber argentina' - as usual the amount of self parody is almost unreal... 1) nsa-uber steals 25% of the driver's earnings. 2) They have all sorts of draconian requirements, including new cars, age requirements, and all kinds of ID shit from the government nazis. Razer would love it. 3) only credit cards accepted - meaning everything is fully tracked and TAXED And all that for the benefit of having your taxi fares monitored by the pentagon and stored in a datacenter forever. Ah yes, when it comes to freedom enhancing 'innovation', the americunts are the masters of the universe. From rysiek at hackerspace.pl Tue Mar 29 15:53:19 2016 From: rysiek at hackerspace.pl (rysiek) Date: Wed, 30 Mar 2016 00:53:19 +0200 Subject: Apple engineers... Will they (snigger) crack under pressure In-Reply-To: <56EC641D.6010203@cajuntechie.org> References: <20160318180200.4B227A06D95@palinka.tinho.net> <56EC641D.6010203@cajuntechie.org> Message-ID: <32444327.BIj8LRMT36@tanglap> Dnia piątek, 18 marca 2016 15:25:01 Anthony Papillion pisze: > On 03/18/2016 01:02 PM, dan at geer.org wrote: > > Apple will have its Snowden. > > That's not a given. Everyone believes that Windows has backdoors and > spying components in it but we've not seen a single Snowden from > Microsoft. Why would we from Apple, an even more secretive company > than Microsoft? Caspar Bowden. Not a "technical" Snowden, but a whistleblower (that has gone ignored, by most) nonetheless. -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From rysiek at hackerspace.pl Tue Mar 29 16:02:54 2016 From: rysiek at hackerspace.pl (rysiek) Date: Wed, 30 Mar 2016 01:02:54 +0200 Subject: [Cryptography] USG v. Lavabit-Snowden Files Unsealed In-Reply-To: References: Message-ID: <2688313.pQuHQy1bOa@tanglap> Dnia niedziela, 20 marca 2016 18:32:17 Cari Machet pisze: > And the guy that started telegram wasnt even treated this way in russia ... > they asked to access accounts for a platform he developed he said no and > left the country never to return thats why we have telegram ... he just > moves around the planet prolly has a swiss like untouchable bank account or > 2 Sure... https://www.washingtonpost.com/news/the-intersect/wp/2015/11/23/the-secret-american-origins-of-telegram-the-encrypted-messaging-app-favored-by-the-islamic-state/ -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From rysiek at hackerspace.pl Tue Mar 29 16:07:15 2016 From: rysiek at hackerspace.pl (rysiek) Date: Wed, 30 Mar 2016 01:07:15 +0200 Subject: solutions for source code take downs due to DMCA? In-Reply-To: References: Message-ID: <4002754.KTskbBlyaO@tanglap> Dnia sobota, 19 marca 2016 13:04:55 Zenaan Harkness pisze: > brief github session: > (...) 1. use a centralized, corporate-operated service; 2. be surprised when corporate exercises their power based on centralisation by taking something down; 3. be completely appalled, write an angry blog post or e-mail; 4. start using a different centralized service; 5. rinse, repeat. > It seems "we" have yet to design a functional hidden service? It seems "we" have yet to take our heads out of our asses and stop using centralized shit because "it's convenient". -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From zen at freedbms.net Wed Mar 30 01:03:19 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Wed, 30 Mar 2016 08:03:19 +0000 Subject: solutions for source code take downs due to DMCA? In-Reply-To: <4002754.KTskbBlyaO@tanglap> References: <4002754.KTskbBlyaO@tanglap> Message-ID: On 3/29/16, rysiek wrote: > Dnia sobota, 19 marca 2016 13:04:55 Zenaan Harkness pisze: >> brief github session: >> (...) > > 1. use a centralized, corporate-operated service; > 2. be surprised when corporate exercises their power based on > centralisation > by taking something down; > 3. be completely appalled, write an angry blog post or e-mail; > 4. start using a different centralized service; > 5. rinse, repeat. > >> It seems "we" have yet to design a functional hidden service? > > It seems "we" have yet to take our heads out of our asses and stop using > centralized shit because "it's convenient". Good points, fair enough. I've promoted the "run it yourself or you don't control it and it will be used against you" principle a few times now... Is there a pseudonymous (all we can seem to even hope for at the moment) git hosting network, with discoverability? Perhaps my searching is simply not adequate, perhaps it's only relevant to those who do the development. I am aware that if you are a high-profile target, it's almost impossible to host anything - but perhaps tor hidden services are "adequate" for "entertainment industry" take downs? From rysiek at hackerspace.pl Wed Mar 30 00:41:57 2016 From: rysiek at hackerspace.pl (rysiek) Date: Wed, 30 Mar 2016 09:41:57 +0200 Subject: USG-Apple Orders to Assist Search and Decrypt Vacated In-Reply-To: References: <1459297909.4169274.563084394.0D1C36B7@webmail.messagingengine.com> Message-ID: <1660851.dxXnqBkvCS@tanglap> Dnia wtorek, 29 marca 2016 18:41:56 Greg Moss pisze: > Its all propaganda bs. Gov have owned those phones for years. Even if that's true (and it very well might), they (USG, FBI, Apple) might accidentally spill some beans. If you're not interested, you're welcome to ignore those threads, every mail user agent worth its salt out there has an "ignore thread" flag somewhere. -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From alfiej at fastmail.fm Tue Mar 29 17:31:49 2016 From: alfiej at fastmail.fm (Alfie John) Date: Wed, 30 Mar 2016 10:31:49 +1000 Subject: USG-Apple Orders to Assist Search and Decrypt Vacated In-Reply-To: References: Message-ID: <1459297909.4169274.563084394.0D1C36B7@webmail.messagingengine.com> On Wed, Mar 30, 2016, at 10:17 AM, Greg Moss wrote: > Stop spamming Apple shit. Nobody gives a shit. Actually, a lot of us here give a shit. Please continue John. Alfie From seanl at literati.org Wed Mar 30 11:19:44 2016 From: seanl at literati.org (Sean Lynch) Date: Wed, 30 Mar 2016 11:19:44 -0700 Subject: SPICE: Special Purpose Integrated Communications Equipment In-Reply-To: <56E7EDAF.9010608@pilobilus.net> References: <56E7EDAF.9010608@pilobilus.net> Message-ID: Imports fine for me, using gpg --import and then pasting just the part from the begin line to the end line (including the begin and end lines). I'm guessing you're either trying to import the entire message or you're leaving out the begin and end lines. On Tue, Mar 15, 2016 at 4:10 AM, Steve Kinney wrote: > On 03/14/2016 07:50 PM, Sean Lynch wrote: > > On Sat, Mar 12, 2016 at 3:29 PM, Zenaan Harkness > > wrote: > > > > I still find that signature of your Mike, just makes me so secure > > about your 1 sentence email -warm fuzzies in my heart. > > > > A toast, to Mike the trusty. > > > > :) > > > > > > The message is not actually signed. It just has a public key attached. > > Or a super sneaky secret message hidden in plain sight? > > gpg --import yields: > > gpg: invalid radix64 character 3A skipped > gpg: invalid radix64 character 2E skipped > gpg: invalid radix64 character 2E skipped > gpg: invalid radix64 character 3A skipped > gpg: invalid radix64 character 3A skipped > gpg: invalid radix64 character 2E skipped > gpg: invalid radix64 character 2E skipped > gpg: CRC error; 02A730 - 33E76E > gpg: [don't know]: invalid packet (ctb=55) > gpg: read_block: read error: Invalid packet > gpg: import from `[stdin]' failed: Invalid keyring > gpg: Total number processed: 0 > > :o) > > > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1963 bytes Desc: not available URL: From jason.mcvetta at gmail.com Wed Mar 30 12:40:25 2016 From: jason.mcvetta at gmail.com (Jason McVetta) Date: Wed, 30 Mar 2016 12:40:25 -0700 Subject: nsa taxis In-Reply-To: References: <56fb253d.cbc3370a.9679a.381d@mx.google.com> Message-ID: On Wed, Mar 30, 2016 at 12:24 PM, Brian wrote: > If you use a smart phone, there is probably not much difference in ability > to NSA location track and using uber. > Any cellphone, not just smartphones. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 624 bytes Desc: not available URL: From seanl at literati.org Wed Mar 30 13:20:47 2016 From: seanl at literati.org (Sean Lynch) Date: Wed, 30 Mar 2016 13:20:47 -0700 Subject: nsa taxis In-Reply-To: <56fc2f1f.454d370a.46fcd.ffffb8ec@mx.google.com> References: <56fb253d.cbc3370a.9679a.381d@mx.google.com> <56fc2f1f.454d370a.46fcd.ffffb8ec@mx.google.com> Message-ID: On Wed, Mar 30, 2016 at 12:54 PM, juan wrote: > On Wed, 30 Mar 2016 12:40:25 -0700 > Jason McVetta wrote: > > > On Wed, Mar 30, 2016 at 12:24 PM, Brian wrote: > > > > > If you use a smart phone, there is probably not much difference in > > > ability to NSA location track and using uber. > > > > > > > Any cellphone, not just smartphones. > > > That may be so, but I doubt the gov't can get as much track > information from all over the world as they get directly from > the 'centralized' uber servers. > > > Anyway, the fact that uber is yet another cover for > US spying is not the only reason why uber is a piece of > shit. I mentioned other reasons. In some ways uber is even more > hostile to a free market than the 'official' > state-licenced(like uber) taxi mafia. > > Anyone tried Arcade City yet? I have it installed, but the only time I've needed a ride since I heard of it, I had to catch a flight and wasn't willing to risk using a new service in an unfamiliar city. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1720 bytes Desc: not available URL: From Rayzer at riseup.net Wed Mar 30 14:04:55 2016 From: Rayzer at riseup.net (Rayzer) Date: Wed, 30 Mar 2016 14:04:55 -0700 Subject: nsa taxis In-Reply-To: <56fb253d.cbc3370a.9679a.381d@mx.google.com> References: <56fb253d.cbc3370a.9679a.381d@mx.google.com> Message-ID: <56FC3F77.8030808@riseup.net> juan wrote: > so I took a look at 'uber argentina' - as usual the amount > of self parody is almost unreal... > > > 1) nsa-uber steals 25% of the driver's earnings. > > > 2) They have all sorts of draconian requirements, including new > cars, age requirements, and all kinds of ID shit from the > government nazis. Razer would love it. Why do you say that? Because I think the so-called 'sharing economy' is a feudal fascist economy? That make me a Nazi? Because Uber's financial backers include scum like Goldman Sachs who I wouldn't care to enrich? That makes me a Nazi? Because they spy on you, the consumer of their services, and don't seem to do as well 'spying' on their contractors about thinks like carrying guns, criminal records, and so much more that someone getting in a car with a complete stranger might want to know? A formal complaint has been filed against Uber, the car ride company, by the Electronic Privacy Information Center (EPIC), a non-profit advocacy group. The NGO says Uber plans to use their smart phone app to access user’s locations at all times, and to send advertisements to user’s contact lists. Uber, a San Francisco-based company, has become worth over $40 billion in the five years since it launched its app that allows anyone to pay for rides from nearby drivers in 300 cities in 57 countries. Along the way, it has also gained a bad reputation for exploiting its employees and even some customers. Last September, users were horrified to discover that Uber was not only tracking them but boasting about this ability at private parties. The tracking system that the company used to follow the physical location of individuals was dubbed the “God View” by executives… http://www.corpwatch.org/article.php?id=16035 https://epic.org/privacy/internet/ftc/uber/Complaint.pdf That's it! I must be a Nazi because I don't like companies that spy on people full-time for profit. -- RR "Through counter-intelligence it should be possible to pinpoint potential trouble-makers ... And neutralize them, neutralize them, neutralize them" -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From rysiek at hackerspace.pl Wed Mar 30 05:22:54 2016 From: rysiek at hackerspace.pl (rysiek) Date: Wed, 30 Mar 2016 14:22:54 +0200 Subject: solutions for source code take downs due to DMCA? In-Reply-To: References: <4002754.KTskbBlyaO@tanglap> Message-ID: <42937397.dooDgijKVu@tanglap> Hi, Dnia środa, 30 marca 2016 08:03:19 Zenaan Harkness pisze: > >> It seems "we" have yet to design a functional hidden service? > > > > It seems "we" have yet to take our heads out of our asses and stop using > > centralized shit because "it's convenient". > > Good points, fair enough. > > I've promoted the "run it yourself or you don't control it and it will > be used against you" principle a few times now... > > Is there a pseudonymous (all we can seem to even hope for at the > moment) git hosting network, with discoverability? There are attempts: http://gitchain.org/ https://github.com/cjb/GitTorrent Also, a decentralized, distributed package manager: https://github.com/whyrusleeping/gx The fact that all of these projects are hosted on GitHub says a lot, though. > Perhaps my searching is simply not adequate, perhaps it's only > relevant to those who do the development. I am aware that if you are a > high-profile target, it's almost impossible to host anything - but > perhaps tor hidden services are "adequate" for "entertainment > industry" take downs? Perhaps. But what I believe and will keep saying over and over, and over again, is that we *need* to decentralize the application layer (and redecentralize all the lower OSI layers, but that's another thing). Hence my interest in stuff like Twister: http://twister.net.co/ -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From Rayzer at riseup.net Wed Mar 30 14:42:19 2016 From: Rayzer at riseup.net (Rayzer) Date: Wed, 30 Mar 2016 14:42:19 -0700 Subject: nsa taxis In-Reply-To: <56fc4467.848d1f0a.d186e.7040@mx.google.com> References: <56fb253d.cbc3370a.9679a.381d@mx.google.com> <56FC3F77.8030808@riseup.net> <56fc4467.848d1f0a.d186e.7040@mx.google.com> Message-ID: <56FC483B.6020306@riseup.net> juan wrote: > No, I was only referring to the fact that you are not > completely hostile to IDs, even gov't issued IDs You have selective amnesia . I said I want people who drive smog-belching one or two ton potential homicide machines to have a certification in homicide avoidance. It's called a "Drivers License" and albeit it doesn't preclude homicide on the part of the certified it helps provide justification-for-the-crushed that the person who did it knew how not to do so. -- RR "Through counter-intelligence it should be possible to pinpoint potential trouble-makers ... And neutralize them, neutralize them, neutralize them" -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From gmoss82 at gmail.com Wed Mar 30 16:49:45 2016 From: gmoss82 at gmail.com (Greg Moss) Date: Wed, 30 Mar 2016 16:49:45 -0700 Subject: nsa taxis In-Reply-To: <56FC483B.6020306@riseup.net> References: <56fb253d.cbc3370a.9679a.381d@mx.google.com> <56FC3F77.8030808@riseup.net> <56fc4467.848d1f0a.d186e.7040@mx.google.com> <56FC483B.6020306@riseup.net> Message-ID: <024001d18ade$d8b1d180$8a157480$@gmail.com> > I said I want people who drive smog-belching one or two ton potential homicide machines to have a certification in homicide avoidance. LMFAO - you must be from Alaska - last tank I saw rolling down the road in Cali few years back = no license. Dude was angry! -----Original Message----- From: cypherpunks [mailto:cypherpunks-bounces at cpunks.org] On Behalf Of Rayzer Sent: Wednesday, March 30, 2016 2:42 PM To: cypherpunks at cpunks.org Subject: Re: nsa taxis juan wrote: > No, I was only referring to the fact that you are not > completely hostile to IDs, even gov't issued IDs You have selective amnesia . I said I want people who drive smog-belching one or two ton potential homicide machines to have a certification in homicide avoidance. It's called a "Drivers License" and albeit it doesn't preclude homicide on the part of the certified it helps provide justification-for-the-crushed that the person who did it knew how not to do so. -- RR "Through counter-intelligence it should be possible to pinpoint potential trouble-makers ... And neutralize them, neutralize them, neutralize them" From juan.g71 at gmail.com Wed Mar 30 12:54:39 2016 From: juan.g71 at gmail.com (juan) Date: Wed, 30 Mar 2016 16:54:39 -0300 Subject: nsa taxis In-Reply-To: References: <56fb253d.cbc3370a.9679a.381d@mx.google.com> Message-ID: <56fc2f1f.454d370a.46fcd.ffffb8ec@mx.google.com> On Wed, 30 Mar 2016 12:40:25 -0700 Jason McVetta wrote: > On Wed, Mar 30, 2016 at 12:24 PM, Brian wrote: > > > If you use a smart phone, there is probably not much difference in > > ability to NSA location track and using uber. > > > > Any cellphone, not just smartphones. That may be so, but I doubt the gov't can get as much track information from all over the world as they get directly from the 'centralized' uber servers. Anyway, the fact that uber is yet another cover for US spying is not the only reason why uber is a piece of shit. I mentioned other reasons. In some ways uber is even more hostile to a free market than the 'official' state-licenced(like uber) taxi mafia. From juan.g71 at gmail.com Wed Mar 30 14:25:25 2016 From: juan.g71 at gmail.com (juan) Date: Wed, 30 Mar 2016 18:25:25 -0300 Subject: nsa taxis In-Reply-To: <56FC3F77.8030808@riseup.net> References: <56fb253d.cbc3370a.9679a.381d@mx.google.com> <56FC3F77.8030808@riseup.net> Message-ID: <56fc4467.848d1f0a.d186e.7040@mx.google.com> On Wed, 30 Mar 2016 14:04:55 -0700 Rayzer wrote: > juan wrote: > > so I took a look at 'uber argentina' - as usual the amount > > of self parody is almost unreal... > > > > > > 1) nsa-uber steals 25% of the driver's earnings. > > > > > > 2) They have all sorts of draconian requirements, including > > new cars, age requirements, and all kinds of ID shit from the > > government nazis. Razer would love it. > > Why do you say that? > > Because I think the so-called 'sharing economy' is a feudal fascist > economy? No, I was only referring to the fact that you are not completely hostile to IDs, even gov't issued IDs. I do agree that uber is a scam. I would describe it as the next step in the development of 'western' corporate cancer. I don't know why the masters of marketig would call something like uber 'sharing economy'. But then again by definition it's just meaningless marketing jargon. > > That make me a Nazi? > Because Uber's financial backers include scum like Goldman Sachs who I > wouldn't care to enrich? > > That makes me a Nazi? the 'nazi' adjective was attached to ID requirements from uber, which rely on the ID systems of different police states across the world. (and I was commenting about the 'local'(to me) case) > > Because they spy on you, the consumer of their services, and don't > seem to do as well 'spying' on their contractors about thinks like > carrying guns, criminal records, Well, as a matter of fact, one of the requirements for drivers is to present their STATE ISSUED 'criminal record'... > and so much more that someone > getting in a car with a complete stranger might want to know? > > A formal complaint has been filed against Uber, the car ride > company, by the Electronic Privacy Information Center (EPIC), a > non-profit advocacy group. The NGO says Uber plans to use their > smart phone app to access user’s locations at all times, and to > send advertisements to user’s contact lists. > > Uber, a San Francisco-based company, has become worth over $40 > billion in the five years since it launched its app that allows > anyone to pay for rides from nearby drivers in 300 cities in 57 > countries. Along the way, it has also gained a bad reputation for > exploiting its employees and even some customers. > > Last September, users were horrified to discover that Uber was not > only tracking them but boasting about this ability at private > parties. The tracking system that the company used to follow the > physical location of individuals was dubbed the “God View” by > executives… > > http://www.corpwatch.org/article.php?id=16035 > https://epic.org/privacy/internet/ftc/uber/Complaint.pdf > > That's it! I must be a Nazi because I don't like companies that spy on > people full-time for profit. > To clarify again : the part about uber I was teasing you with was their ID requirements...They obviously require a government issued driver's license... From brianbrian at gmail.com Wed Mar 30 12:24:41 2016 From: brianbrian at gmail.com (Brian) Date: Wed, 30 Mar 2016 19:24:41 +0000 Subject: nsa taxis In-Reply-To: <56fb253d.cbc3370a.9679a.381d@mx.google.com> References: <56fb253d.cbc3370a.9679a.381d@mx.google.com> Message-ID: If you use a smart phone, there is probably not much difference in ability to NSA location track and using uber. On Tue, Mar 29, 2016, 6:04 PM juan wrote: > > so I took a look at 'uber argentina' - as usual the amount > of self parody is almost unreal... > > > 1) nsa-uber steals 25% of the driver's earnings. > > > 2) They have all sorts of draconian requirements, including new > cars, age requirements, and all kinds of ID shit from the > government nazis. Razer would love it. > > > 3) only credit cards accepted - meaning everything is fully > tracked and TAXED > > > And all that for the benefit of having your taxi fares > monitored by the pentagon and stored in a datacenter forever. > Ah yes, when it comes to freedom enhancing 'innovation', the > americunts are the masters of the universe. > > > > > > > > > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1316 bytes Desc: not available URL: From zen at freedbms.net Thu Mar 31 00:52:45 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Thu, 31 Mar 2016 07:52:45 +0000 Subject: nsa taxis In-Reply-To: <56FC483B.6020306@riseup.net> References: <56fb253d.cbc3370a.9679a.381d@mx.google.com> <56FC3F77.8030808@riseup.net> <56fc4467.848d1f0a.d186e.7040@mx.google.com> <56FC483B.6020306@riseup.net> Message-ID: On 3/30/16, Rayzer wrote: > juan wrote: >> No, I was only referring to the fact that you are not >> completely hostile to IDs, even gov't issued IDs > > You have selective amnesia . I said I want people who drive > smog-belching one or two ton potential homicide machines to have a > certification in homicide avoidance. It's called a "Drivers License" and > albeit it doesn't preclude homicide on the part of the certified it > helps provide justification-for-the-crushed that the person who did it > knew how not to do so. "It" could also be called "certificate of minimum level competency" issued by a government-approved body, without having to be attached to a government link everything and everyone database nor issued by the state. Your vehemence in the past came across quite clearly in support of "state-issued" driver licenses. I would of course accept an alternate position by you, but round these parts, state-issued driver licenses are anathema to freedom, privacy, anonymity of travel and various other grievances we have with the endless slippery slope of demoncratic "government".