mirror of
https://github.com/aljazceru/mailing-list-archive-generator.git
synced 2025-12-16 22:14:25 +01:00
Add thread indexes
This commit is contained in:
@@ -12,10 +12,13 @@ tagarray: []
|
||||
|
||||
collections:
|
||||
years:
|
||||
permalink: /:collection/:path/
|
||||
permalink: /archive/:path/
|
||||
output: true
|
||||
months:
|
||||
permalink: /archive/:path/
|
||||
output: true
|
||||
emails:
|
||||
permalink: /years/:path/
|
||||
permalink: /archive/:path/
|
||||
output: true
|
||||
|
||||
social:
|
||||
|
||||
@@ -1,51 +0,0 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-04 - Secure IRC
|
||||
|
||||
## Header Data
|
||||
|
||||
From: tcmay@netcom.com (Timothy C. May)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: ee4f48790b0b67f5a81916a65e53d6db4e431405f1287833b50b9630a07694d6<br>
|
||||
Message ID: \<7w969B2w164w@ideath.goldenbear.com\><br>
|
||||
Reply To: \<9309010251.AA03303@netcom5.netcom.com\><br>
|
||||
UTC Datetime: Tue, 31 Feb 92 17:19:10<br>
|
||||
Raw Date: Tue, 31 Aug 93 17:19:10 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
From: Arthur Abraham <a2@well.sf.ca.us>
|
||||
Date: Fri, 16 Oct 92 18:04:53 PDT
|
||||
To: hh@soda.berkeley.edu
|
||||
Subject: Re: Game items...
|
||||
Message-ID: <199210170104.AA06520@well.sf.ca.us>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
re RU-486: has recently been proven to make a nifty "morning-after" pill (is
|
||||
this abortion? only if you believe in the sanctity of blastula) and a study
|
||||
in (I believe) S. CA. is beginning on effectiveness in brain tumors... seems
|
||||
as if this drug has possible wide theropeutic (aw, who can spell?) uses
|
||||
beyond directly sex-lined situations. And RU-P5 is due out 2Q93.
|
||||
-a2.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ [Return to January 1992](/years/1992/02/)
|
||||
+ [Return to February 1992](/years/1992/02/)
|
||||
|
||||
+ 1992-10-01 (Thu, 1 Oct 92 17:43:51 -0400) - [Secure IRC](/years/1992/02/ee4f48790b0b67f5a81916a65e53d6db4e431405f1287833b50b9630a07694d6/) - _postmastuh@dawkmastuh.guv_
|
||||
+ 1992-10-04 (Sun, 4 Oct 92 19:06:41 -0700) - [Secure IRC](/years/1992/02/ee4f48790b0b67f5a81916a65e53d6db4e431405f1287833b50b9630a07694d6/) - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
+ 1992-10-04 (Sun, 4 Oct 92 19:06:41 -0700) - Secure IRC - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
+ 1992-10-04 (Sun, 4 Oct 92 19:06:41 -0700) - [Secure IRC](/years/1992/02/ee4f48790b0b67f5a81916a65e53d6db4e431405f1287833b50b9630a07694d6/) - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
+ 1992-10-04 (Sun, 4 Oct 92 19:06:41 -0700) - [Secure IRC](/years/1992/02/ee4f48790b0b67f5a81916a65e53d6db4e431405f1287833b50b9630a07694d6/) - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
@@ -0,0 +1,75 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-09-23 - KPFA interview went well
|
||||
|
||||
## Header Data
|
||||
|
||||
From: tcmay@netcom.com (Timothy C. May)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 114d62fabc9ea292aa291c6e0f0a85d514e73fe329f645d92916e8012e9d4a2e<br>
|
||||
Message ID: \<9209232007.AA03117@netcom.com\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-09-23 20:25:19 UTC<br>
|
||||
Raw Date: Wed, 23 Sep 92 13:25:19 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: tcmay@netcom.com (Timothy C. May)
|
||||
Date: Wed, 23 Sep 92 13:25:19 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: KPFA interview went well
|
||||
Message-ID: <9209232007.AA03117@netcom.com>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
This is my first test of this list...hope it works...and a brief
|
||||
opinion on the KPFA (etc.) interview with our own John Gilmore,
|
||||
representing the EFF, Jim Bidzos, of RSA Data Security, and Jim
|
||||
Kellstrom (sp?) of the FBI.
|
||||
|
||||
I made a tape of it and can bring it to the 10/10/92 crypto meeting.
|
||||
|
||||
John did an excellent job of raising the constitutional issues, while
|
||||
the FBI guy basically said "Trust us." Jim Bidzos of RSA Data Security
|
||||
didn't say much, as the thrust of the discussion was more on
|
||||
wiretapping and the proposed Digital Telephony bill, with not much of
|
||||
substance said about RSA and public key cryptography.
|
||||
|
||||
I waited on the 1-800-464-5732 line to ask about the status of use of
|
||||
encryption, especially with RSA and RSA-like systems, but the show ran
|
||||
out of time before I could get on.
|
||||
|
||||
This series seems timely. Every Wednesday at noon on KPFA. Check your
|
||||
local listings and the announcement list John sent out a few days ago.
|
||||
|
||||
--Tim
|
||||
|
||||
--
|
||||
..........................................................................
|
||||
Timothy C. May | Crypto Anarchy: encryption, digital money,
|
||||
tcmay@netcom.com | anonymous networks, digital pseudonyms, zero
|
||||
408-688-5409 | knowledge, reputations, information markets,
|
||||
W.A.S.T.E.: Aptos, CA | black markets, collapse of governments.
|
||||
Higher Power: 2^756839 | RSA MailSafe Public Key: by arrangement
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [September 1992](/years/1992/09)
|
||||
|
||||
+ 1992-09-23 (Wed, 23 Sep 92 13:25:19 PDT) - KPFA interview went well - _tcmay@netcom.com (Timothy C. May)_
|
||||
+ 1992-09-24 (Thu, 24 Sep 92 10:28:07 PDT) - [Re: KPFA interview went well](/years/1992/09/484d54b869575b86e1f5f4cbe21959684137e0c875004ff63c502b11f717fb7a) - _pozar@kumr.lns.com (Tim Pozar)_
|
||||
+ 1992-09-24 (Thu, 24 Sep 92 11:13:21 PDT) - [The aural Tim Pozar](/years/1992/09/17a09f8ed3e4c3e98e902c889e53518adfcf481d9d8ac1c147fbf572113bebf2) - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
+ 1992-09-24 (Thu, 24 Sep 92 16:42:21 PDT) - [Re: The aural Tim Pozar](/years/1992/09/90aa886e6ed977b1d1f23bb41ecef6ad549dd017bc141b6bdefb8b0b42e038f2) - _pozar@kumr.lns.com (Tim Pozar)_
|
||||
|
||||
@@ -0,0 +1,54 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-09-24 - The aural Tim Pozar
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Eric Hughes \<hughes@soda.berkeley.edu\><br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 17a09f8ed3e4c3e98e902c889e53518adfcf481d9d8ac1c147fbf572113bebf2<br>
|
||||
Message ID: \<9209241811.AA23823@soda.berkeley.edu\><br>
|
||||
Reply To: \<m0mXwxx-00029lC@kumr.lns.com\><br>
|
||||
UTC Datetime: 1992-09-24 18:13:21 UTC<br>
|
||||
Raw Date: Thu, 24 Sep 92 11:13:21 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Eric Hughes <hughes@soda.berkeley.edu>
|
||||
Date: Thu, 24 Sep 92 11:13:21 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: The aural Tim Pozar
|
||||
In-Reply-To: <m0mXwxx-00029lC@kumr.lns.com>
|
||||
Message-ID: <9209241811.AA23823@soda.berkeley.edu>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
Tim Pozar writes:
|
||||
|
||||
>I am also the technical consultant to the show, so your mail will not be
|
||||
>falling on deft ears...
|
||||
|
||||
Just for the record, Tim's _are_ deft, but they are _not_ deaf.
|
||||
|
||||
Eric
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [September 1992](/years/1992/09)
|
||||
|
||||
+ 1992-09-23 (Wed, 23 Sep 92 13:25:19 PDT) - [KPFA interview went well](/years/1992/09/114d62fabc9ea292aa291c6e0f0a85d514e73fe329f645d92916e8012e9d4a2e) - _tcmay@netcom.com (Timothy C. May)_
|
||||
+ 1992-09-24 (Thu, 24 Sep 92 10:28:07 PDT) - [Re: KPFA interview went well](/years/1992/09/484d54b869575b86e1f5f4cbe21959684137e0c875004ff63c502b11f717fb7a) - _pozar@kumr.lns.com (Tim Pozar)_
|
||||
+ 1992-09-24 (Thu, 24 Sep 92 11:13:21 PDT) - The aural Tim Pozar - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
+ 1992-09-24 (Thu, 24 Sep 92 16:42:21 PDT) - [Re: The aural Tim Pozar](/years/1992/09/90aa886e6ed977b1d1f23bb41ecef6ad549dd017bc141b6bdefb8b0b42e038f2) - _pozar@kumr.lns.com (Tim Pozar)_
|
||||
|
||||
@@ -0,0 +1,197 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-09-25 - secretions
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Judith Milhon \<stjude@well.sf.ca.us\><br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 276aeba05fb25fa848ecbc81e28d6955ccf33532c4d011a74c023ef15ce2c9bc<br>
|
||||
Message ID: \<199209251001.AA16909@well.sf.ca.us\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-09-25 10:02:38 UTC<br>
|
||||
Raw Date: Fri, 25 Sep 92 03:02:38 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Judith Milhon <stjude@well.sf.ca.us>
|
||||
Date: Fri, 25 Sep 92 03:02:38 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: secretions
|
||||
Message-ID: <199209251001.AA16909@well.sf.ca.us>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
|
||||
"The alternative to mutual trust, which is indeed a risky gamble, is the
|
||||
security of the police state."
|
||||
-- Alan Watts
|
||||
|
||||
This text may be published in MONDO2000 as my regular column, Irresponsible
|
||||
Journalism. Eric Hughes suggested the coda with the toad address, adding
|
||||
that it would be amusing to have it almost completely blotted by magic
|
||||
marker, as if inadequately censored.
|
||||
|
||||
I don't want to be the venom in this toad. <I'd like to be one of the
|
||||
jewels
|
||||
it wears in its head -- I can't quote that precisely, but it's something
|
||||
like, "the venomous toad, which yet in its head wears a precious
|
||||
jewel"...>
|
||||
the idea is to draw in other useful minds. we can assume the WRONG PEOPLE
|
||||
already know the address.
|
||||
|
||||
lady ada won't apologize for the gonzo wrapping for the ideas; she is
|
||||
concerned only that they be correct and clearly stated. clarifications,
|
||||
expansions, corrections are welcome. also abuse and threats, for that
|
||||
matter... any feedback, please feed me...
|
||||
|
||||
|
||||
THE CYPHERPUNK MOVEMENT
|
||||
by St. Jude
|
||||
|
||||
I don't face-to-face all that much. And I don't like clubs. I was in the
|
||||
Black Hole for a reason: The Screamin' Memes were in town for one night
|
||||
only -- Thursday, of course. Thursday's the night, now that the weekend
|
||||
has annexed Fri. and Mon. I was lurking in the back, hoping not to see
|
||||
anybody, when the Jones brothers staked me out. Damn. They are deep into
|
||||
the street drugs. Keeping up with the Joneses is nigh impossible; their
|
||||
most trivial chitchat is an exercise in decryption. Eddy -- or maybe he
|
||||
was being Ellis that night -- was implying something about somebody when my
|
||||
right foot detonated down to its steel toe. I looked up -- way up -- to a
|
||||
face that wasn't there at all. Just a dome of black cloth, with goggles.
|
||||
Three-eyed goggles. Ah: a Chador. I'd heard of that. I screamed: "You
|
||||
stomped my foot FLAT!"
|
||||
"Sorry." "Are you okay?" "Oh maaaang." Many overlapping voices, all
|
||||
of them synthesized, blurted from above. Out of two tiny speakers hanging
|
||||
like earrings off a basketweave headband like a cop's belt. The head
|
||||
bowed, bringing it almost within biting range.
|
||||
"Gah. Ow. Ooo." Pretending to be demented with pain, I lurched deep
|
||||
into the Chador. But I was cool: I was rootling in there for clues. Ha!
|
||||
Male pheromones. Hardish male torso. I was jostling this lumpy equipment
|
||||
hanging off him, trying to get a good feel of it without alerting him. Nuh
|
||||
uh: _I_ meant electronics... what did _you_ think? Okay: I had some data
|
||||
to work with. Male with gadgets. Quelle surprise.
|
||||
"What the hell have you got on your feet? HORSESHOES?"
|
||||
A voice like rushing water: "Kothurni." The Chador shifted a
|
||||
little...
|
||||
and under his full black skirts I saw them: big weighted club-foot boots
|
||||
with concealed lifts, to disguise the wearer's height. Wicked.
|
||||
The pain and the espionage cleared my head. I was ready to deal.
|
||||
"So you're protecting your meat identity, right?"
|
||||
The Chador seemed to teeter a little. It goggled down at me as if I
|
||||
were a smear on a slide. Its third-eye goggle was a lens. Check. Out of
|
||||
the ambient murk loomed another Chador. Exactly the same height. Right.
|
||||
"How come you guys are in full drag?"
|
||||
"We're here for a... uh... party." The voice from the other Chador was
|
||||
a flanged saxophone, but I could swear it had a Texas accent.
|
||||
"Rubbish. You're having a cell meeting, right? "
|
||||
The near Chador, the one I had groped, seemed to teeter again. What
|
||||
sounded like a tape player on fast-forward came faintly from its interior.
|
||||
An earphone?
|
||||
The saxophone honked: "If I said I even understood what you meant, what
|
||||
kind of a chump would that make me?"
|
||||
"I could hazard a guess. I think you're cryptoanarchists -- what I'd
|
||||
call cypherpunks!"
|
||||
My Chador cracked up. I could tell. The farther one seemed to stiffen;
|
||||
I think it was giving me a hate stare. Hard to manage behind the whole 9
|
||||
yards o' cloth.
|
||||
"Is that clever or what? I'm onto you like psilocybe on cowshit, dudes.
|
||||
You want to take over the world. Haha hahaha haaaaa."
|
||||
Both of them rocked back a little. I went in after them. "You want to
|
||||
talk encryption schemes? Let's talk cryptic. Tales from the cryp'ed. But
|
||||
make it fast: The Memes are comin' on." Oh, I was bluffing. I don't know
|
||||
much about cryptography. I was just 'tuding them from tech envy. Damn:
|
||||
Chadors. And me without the first widget.
|
||||
From the far guy came a cello, very suave: "The world has already been
|
||||
taken over. You may have noticed this. We're just trying to get some of
|
||||
it back." And the accent was -- Dutch?
|
||||
Bob's yr uncle. Gotcha. I hadn't been certain. Maybe chadors were now
|
||||
trendy club gear -- what do I know? "Hey -- that cello's another guy? How
|
||||
many you PACKIN' in there?"
|
||||
Out of my Chador a sawtooth rasped: "Variable. People are ringing in
|
||||
and out."
|
||||
"You're on line?"
|
||||
"This is a bridge. International." Sawtooth again.
|
||||
The cello resumed, an annoyed cello: "We don't believe in takeovers.
|
||||
In fact, we are working to make things UNTAKEOVERABLE."
|
||||
A theremin quivered, "And to make the world safe for anarchy. _We want
|
||||
the air-waves, baby_." It snickered across many frequencies.
|
||||
The Tejana saxophone chuckled, (and an eerie treat that was, too):
|
||||
"Problem is, how to guarantee privacy for pseudonyms. So you can have a
|
||||
pseudonymous economy."
|
||||
A toad croaked: "So, full-RSA encrypted EVERYTHING. No back doors.
|
||||
Secure digital money. Swiss bank accounts for the millions."
|
||||
The theremin: "A global monetary system that makes governments obsolete.
|
||||
Down come the governments. Goodbye the feds." It sang, whoopingly: "BYE
|
||||
BYE, LAWWww." Horrible broad-band snickering.
|
||||
The toad croaked: "Er... yes. Real freedom of speech, too.
|
||||
Libertech!"
|
||||
The Dutch cello was all business: "Okay, what does it take? You need
|
||||
real-time protocols to prove you own your pseudonym. And your pseudonyms
|
||||
have online reputations, via people you've done biz with -- like a
|
||||
distributed credit rating system. With maybe designated angels -- Fair
|
||||
Witnesses."
|
||||
I was charmed. "And you wear the chador when you face-to-face somebody
|
||||
who knows your handle!"
|
||||
The theremin wheeped: "Actually, unmasking your real identity could be
|
||||
the ultimate collateral -- your killable, _torturable_ body. Even without
|
||||
kids, you've got a hostage to fortune -- your own meat."
|
||||
I was reeling. "Oh yas yas. As Dylan said: 'They asked me for some
|
||||
collateral/ and I pulled down my pants'."
|
||||
Orchestral chuckles rained down on me. Was I an international hit?
|
||||
But at that exact moment The Memes hit the stage. The crowd did a 9.1
|
||||
Richter lurch and the other Chador pitched onto my LEFT toe, maybe denting
|
||||
the steel.
|
||||
"AAIEEeeee. That's great COVERT GEAR you got there, guys. You couldn't
|
||||
sneak up on Helen Keller in a HAILSTORM." I was trying to spin down. "And
|
||||
dudes -- this is not the neighborhood for flashing the hardware. Getting
|
||||
rolled by winos is pretty LOW TECH."
|
||||
A spike-knuckled glove slithered out of the farther guy, clutching what
|
||||
looked, in the near-dark, like an electric razor. "_Gonna menace 'em with
|
||||
a clean shave_?"
|
||||
The sax: "Stunner. Bottom of the line. But." A hot line of pure
|
||||
energy cracked across its little trodes. Of course.
|
||||
Rushing water: "See ya." And they did a fade into the smoke.
|
||||
|
||||
The Screamin' Memes were worthless. To hell with clubs. To hell with
|
||||
lots o' things, maybe. I am now sensing my roots, mahn; dey who are my
|
||||
bredren. Nerds.
|
||||
Nerds as mainstreamed by the grainy but still fetching Robt Redford in
|
||||
Sneakers... Nerds who will have their revenge at last, by making the
|
||||
online realer than our current regrettable reality... No, I'm not quite
|
||||
delusional. I've heard the cypherpunks are already distributing their
|
||||
encrypted email software, which is quick and slick. I might even join the
|
||||
revolution, which is, heh, already in progress.
|
||||
Yeah. Why not? Give me libertech or give me... _DES_?
|
||||
|
||||
---------------------------------------------------------------------------
|
||||
-------------------------
|
||||
St. Jude, aka Lady Ada Lovelace, wrote "The Spook in the Machine" for MONDO
|
||||
#1, describing the enforcement of DES, the Data Encryption Scam with the
|
||||
handy backdoor. She can be reached online as stjude@well.sf.ca.us. Note:
|
||||
a definitely false rumor is now circulating that the revolutionists can be
|
||||
contacted via cypherpunks@toad.com.
|
||||
|
||||
--------------------------------------------------------------------------
|
||||
|
||||
feed me?
|
||||
|
||||
>jude<
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [September 1992](/years/1992/09)
|
||||
|
||||
+ 1992-09-25 (Fri, 25 Sep 92 03:02:38 PDT) - secretions - _Judith Milhon \<stjude@well.sf.ca.us\>_
|
||||
|
||||
@@ -0,0 +1,149 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-09-25 - the hopping remailer is done
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Eric Hughes \<hughes@soda.berkeley.edu\><br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 2fe5a28bc8c23820dc93de1603b58c1ac84c93a16bc852a9b51eb3faed1aa231<br>
|
||||
Message ID: \<9209251835.AA00599@soda.berkeley.edu\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-09-25 18:37:12 UTC<br>
|
||||
Raw Date: Fri, 25 Sep 92 11:37:12 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Eric Hughes <hughes@soda.berkeley.edu>
|
||||
Date: Fri, 25 Sep 92 11:37:12 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: the hopping remailer is done
|
||||
Message-ID: <9209251835.AA00599@soda.berkeley.edu>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
The hopping remailer is finished. I wrote it this morning.
|
||||
|
||||
The change to make a hopping remailer is very easy. Here's the new
|
||||
perl script:
|
||||
|
||||
--------- cut here ---------
|
||||
while (<>) {
|
||||
last if /^$/ ;
|
||||
$subject = $_ if /^Subject:/ ;
|
||||
if (/^Request-Remailing-To:/) {
|
||||
chop ;
|
||||
s/^.*:// ;
|
||||
$addressee = $_ ;
|
||||
}
|
||||
}
|
||||
|
||||
#open( OUTPUT, ">foo" ) || die "Cannot open 'foo'." ;
|
||||
open( OUTPUT, "| /usr/lib/sendmail " . $addressee ) ;
|
||||
select( OUTPUT ) ;
|
||||
|
||||
print "To:" . $addressee . "\n" ;
|
||||
print "From: nobody\n" ;
|
||||
print $subject ;
|
||||
print "Remailed-By: Eric Hughes <hughes@soda.berkeley.edu>\n" ;
|
||||
|
||||
#
|
||||
# check to see if there are header lines in the body to collapse
|
||||
# into the full header.
|
||||
#
|
||||
|
||||
if ( $_ = <> ) {
|
||||
if (/^##$/) {
|
||||
# do nothing if the pasting token appears
|
||||
# the rest of the body will be directly appended
|
||||
# this allows for extra header lines to be added
|
||||
} else {
|
||||
# normal line
|
||||
print "\n" ;
|
||||
print $_ ;
|
||||
}
|
||||
} else {
|
||||
# empty body
|
||||
exit ;
|
||||
}
|
||||
|
||||
while (<>) {
|
||||
} continue {
|
||||
print ;
|
||||
}
|
||||
--------- cut here ---------
|
||||
|
||||
Short explanation. The 'print "\n" ;' line was moved inside the new
|
||||
if statement. The if statement reads a line of the body and stops the
|
||||
script if there is no body. The line read is tested to see if it
|
||||
contains the two characters "##" alone on the line. "##" is the ANSI
|
||||
C token pasting operator. If there is no pasting, a blank line is
|
||||
printed to mark the end of the header and the first line of the body
|
||||
is printed. If there is pasting, then the conditional does nothing,
|
||||
which has the effect that the body is appended directly onto the end
|
||||
of the header, allowing you to add more header lines after the header
|
||||
is rewritten.
|
||||
|
||||
|
||||
Here is a sample message that I sent myself after the new script was
|
||||
installed:
|
||||
|
||||
--------- cut here ---------
|
||||
To: hughes
|
||||
Subject: multiple hops
|
||||
Request-Remailing-To: hughes
|
||||
|
||||
##
|
||||
X-Hop: 1
|
||||
Request-Remailing-To: hughes
|
||||
|
||||
##
|
||||
X-Hop: 2
|
||||
Request-Remailing-To: hughes
|
||||
|
||||
##
|
||||
X-Hop: 3
|
||||
|
||||
This is a test message of multiple hops.
|
||||
|
||||
Eric
|
||||
--------- cut here ---------
|
||||
|
||||
|
||||
I received four pieces of mail after sending this to myself. The
|
||||
first was the actual letter, which is still delivering normally and
|
||||
not being filtered. The next two were the first and second
|
||||
remailings; they had X-Hop: 1 and 2. The last message was the final
|
||||
one, had X-Hop: 3 in its header and was delivered normally.
|
||||
|
||||
At each stage, the header got rewritten and a new
|
||||
Request-Remailing-To: line inserted. When that mail got delivered, it
|
||||
was again rewritten, with a new remailing request. This process is
|
||||
extensible up to the 50K or so practical limitatation on mail size.
|
||||
|
||||
Note that this system is not at all secure by itself. But if each
|
||||
message body were encrypted first, and the message first decrypted
|
||||
before the header re-write took place, the routing instructions as a
|
||||
whole would be hidden from prying eyes.
|
||||
|
||||
That's the next project.
|
||||
|
||||
Eric
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [September 1992](/years/1992/09)
|
||||
|
||||
+ 1992-09-25 (Fri, 25 Sep 92 11:37:12 PDT) - the hopping remailer is done - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
|
||||
@@ -0,0 +1,56 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-09-25 - Pointing out the obvious....
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Mark Pesce \<osendai@well.sf.ca.us\><br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 31baaacc209deb13a95a3cb83d8cdc149943000deccc15c41b37ee3219550d01<br>
|
||||
Message ID: \<199209252326.AA19540@well.sf.ca.us\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-09-25 23:27:24 UTC<br>
|
||||
Raw Date: Fri, 25 Sep 92 16:27:24 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Mark Pesce <osendai@well.sf.ca.us>
|
||||
Date: Fri, 25 Sep 92 16:27:24 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Pointing out the obvious....
|
||||
Message-ID: <199209252326.AA19540@well.sf.ca.us>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
Hey, Kidz....
|
||||
|
||||
|
||||
I don't mean to point out the obvious, but when you mention a certain
|
||||
scheme for secure transfer (3 initials, you guess), or a certain organization
|
||||
dedicated to keeping it from the public (3 initals, you guess again),
|
||||
THEY READ IT.
|
||||
|
||||
OK? Did I make my point?
|
||||
If not, we're going to unsubscribe from this list like a bat out of hell.
|
||||
|
||||
Over,
|
||||
OS Corp.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [September 1992](/years/1992/09)
|
||||
|
||||
+ 1992-09-25 (Fri, 25 Sep 92 16:27:24 PDT) - Pointing out the obvious.... - _Mark Pesce \<osendai@well.sf.ca.us\>_
|
||||
|
||||
@@ -0,0 +1,63 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-09-24 - Re: KPFA interview went well
|
||||
|
||||
## Header Data
|
||||
|
||||
From: pozar@kumr.lns.com (Tim Pozar)<br>
|
||||
To: tcmay@netcom.com (Timothy C. May)<br>
|
||||
Message Hash: 484d54b869575b86e1f5f4cbe21959684137e0c875004ff63c502b11f717fb7a<br>
|
||||
Message ID: \<m0mXwxx-00029lC@kumr.lns.com\><br>
|
||||
Reply To: \<9209232007.AA03117@netcom.com\><br>
|
||||
UTC Datetime: 1992-09-24 17:28:07 UTC<br>
|
||||
Raw Date: Thu, 24 Sep 92 10:28:07 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: pozar@kumr.lns.com (Tim Pozar)
|
||||
Date: Thu, 24 Sep 92 10:28:07 PDT
|
||||
To: tcmay@netcom.com (Timothy C. May)
|
||||
Subject: Re: KPFA interview went well
|
||||
In-Reply-To: <9209232007.AA03117@netcom.com>
|
||||
Message-ID: <m0mXwxx-00029lC@kumr.lns.com>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Timothy C. May wrote:
|
||||
> This is my first test of this list...hope it works...and a brief
|
||||
> opinion on the KPFA (etc.) interview with our own John Gilmore,
|
||||
> representing the EFF, Jim Bidzos, of RSA Data Security, and Jim
|
||||
> Kellstrom (sp?) of the FBI.
|
||||
> [...]
|
||||
|
||||
Thanks for your input. If anyone else wants to feed back to the
|
||||
program, they can send me email and I will pass it along to the producers.
|
||||
I am also the technical consultant to the show, so your mail will not be
|
||||
falling on deft ears...
|
||||
|
||||
Tim
|
||||
--
|
||||
Internet: pozar@kumr.lns.com FidoNet: Tim Pozar @ 1:125/555
|
||||
UUCP: ...!uunet!kumr.lns.com!pozar
|
||||
Snail: Tim Pozar / KKSF / 77 Maiden Lane / San Francisco CA 94108 / USA
|
||||
Voice: +1 415 788 2022
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [September 1992](/years/1992/09)
|
||||
|
||||
+ 1992-09-23 (Wed, 23 Sep 92 13:25:19 PDT) - [KPFA interview went well](/years/1992/09/114d62fabc9ea292aa291c6e0f0a85d514e73fe329f645d92916e8012e9d4a2e) - _tcmay@netcom.com (Timothy C. May)_
|
||||
+ 1992-09-24 (Thu, 24 Sep 92 10:28:07 PDT) - Re: KPFA interview went well - _pozar@kumr.lns.com (Tim Pozar)_
|
||||
+ 1992-09-24 (Thu, 24 Sep 92 11:13:21 PDT) - [The aural Tim Pozar](/years/1992/09/17a09f8ed3e4c3e98e902c889e53518adfcf481d9d8ac1c147fbf572113bebf2) - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
+ 1992-09-24 (Thu, 24 Sep 92 16:42:21 PDT) - [Re: The aural Tim Pozar](/years/1992/09/90aa886e6ed977b1d1f23bb41ecef6ad549dd017bc141b6bdefb8b0b42e038f2) - _pozar@kumr.lns.com (Tim Pozar)_
|
||||
|
||||
@@ -0,0 +1,179 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-09-29 - SEIZING THE MEDIA- A NETWOR
|
||||
|
||||
## Header Data
|
||||
|
||||
From: "Fen Labalme" \<fen@genmagic.com\><br>
|
||||
To: "Cypher Punks" \<cypherpunks@toad.com\><br>
|
||||
Message Hash: 63838c4c1c21215f4440e8cd823b5208586a474466b0784d8d9ce6cc851237ee<br>
|
||||
Message ID: \<9209290409.AA25631@relay2.UU.NET\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-09-29 04:01:24 UTC<br>
|
||||
Raw Date: Mon, 28 Sep 92 21:01:24 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: "Fen Labalme" <fen@genmagic.com>
|
||||
Date: Mon, 28 Sep 92 21:01:24 PDT
|
||||
To: "Cypher Punks" <cypherpunks@toad.com>
|
||||
Subject: SEIZING THE MEDIA- A NETWOR
|
||||
Message-ID: <9209290409.AA25631@relay2.UU.NET>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Mail*Link( Remote SEIZING THE MEDIA: A NETWORKER CONGRESS
|
||||
|
||||
from PeaceNet ACTIV-L:
|
||||
|
||||
Date: Sat, 26 Sep 1992 23:33:10 CDT
|
||||
Sender: Activists Mailing List <ACTIV-L%MIZZOU1.BITNET@pucc.Princeton.EDU>
|
||||
From: "(Rich Winkel)" <rich@pencil.cs.missouri.edu>
|
||||
Subject: PAX: SEIZING THE MEDIA: A NETWORKER CONGRESS
|
||||
To: Multiple recipients of ACTIV-L <ACTIV-L%MIZZOU1.BITNET@pucc.Princeton.EDU>
|
||||
|
||||
/** gen.media: 141.0 **/
|
||||
** Topic: SEIZING THE MEDIA: NETWORKER CONGR **
|
||||
** Written 6:39 pm Sep 25, 1992 by openmedia in cdp:gen.media **
|
||||
|
||||
SEIZING THE MEDIA: A NETWORKER CONGRESS
|
||||
A weekend of activity to discuss, self-educate,
|
||||
and put into practice the creation of subversive media.
|
||||
|
||||
1:30pm Saturday 24 October to 6pm Sunday 25 October 1992
|
||||
|
||||
Media and resource exchange; slides, fax, posters,
|
||||
pamphlets, computer files, ideas, proposals, tactics
|
||||
|
||||
Practical action on billboard improvement and removal;
|
||||
Big Art and postering
|
||||
|
||||
E-mail and fax facility to receive material
|
||||
to be discussed and implemented during the weekend
|
||||
|
||||
Documentation to all participants
|
||||
|
||||
Materials supplied: photocopier reproduction/enlargement
|
||||
and the streets of Oxford
|
||||
Bloomin Arts, Princes Street, Cowley Road, Oxford, OX4, U.K.
|
||||
|
||||
If you can't make it in person, you can take part
|
||||
in the Seizing the Media Congress by post, fax, E-mail.
|
||||
|
||||
Send documents, comments, proposals, art, ideas, and posters.
|
||||
|
||||
Post to: BM Jed, London WC1N 3XX, United Kingdom
|
||||
Fax to: (011 441) 0865 72 4317
|
||||
E-Mail to: Eastoxcomcen@GN.APC.ORG
|
||||
|
||||
Accommodation and other information are available from Friday night
|
||||
onwards. To make arrangements or get more information, get in
|
||||
touch with Oxfin between 1-4pm Mondays to Fridays at: (0865) 240545
|
||||
>From the United States: 011 41865 240 545
|
||||
|
||||
Background:
|
||||
|
||||
SEIZING THE MEDIA is the title of pamphlet written by the
|
||||
Immediast Underground and first released in Amsterdam ,
|
||||
New York City, and Seattle in early 1992. The 26 pamphlet
|
||||
combines theory, graphics, research and proposals that examine:
|
||||
|
||||
* Information control
|
||||
* Propaganda and advertising
|
||||
* CIA
|
||||
* Mind control
|
||||
* Immediast counter-offensives
|
||||
* tactics, subversive networking, public empowerment
|
||||
* multi-media
|
||||
* Public production libraries
|
||||
* the liberation of public space
|
||||
|
||||
...Just when Jesse Helms thought he made the world safe from
|
||||
poetic terrorism, along come the Immediasts, a cadre of media
|
||||
hackers who are fed up with the ecology of coercion that
|
||||
surrounds them. Their booklet SEIZING THE MEDIA proposes an
|
||||
all-out artistic assault on coercive communication, cultural
|
||||
monologue, and media control. They want all media insurgents
|
||||
to take back the airwaves with pirate radio, cable access TV,
|
||||
altering ads and billboards, and otherwise hacking the
|
||||
datasphere to break the spell of State/corporate media control.
|
||||
. . . from Gareth Branwyns STREET NOISE, Issue 7 of Mondo 2000
|
||||
|
||||
SEIZING THE MEDIA Version 1.1 is available for $3 from
|
||||
Open Media PO Box 2726 Westfield New Jersey 07091 USA
|
||||
|
||||
THE IMMEDIAST UNDERGROUND is a centerless network of artists,
|
||||
writiers, hackers, culture jammers, pirate broadcasters, and
|
||||
posterists who connect with one another through information
|
||||
systems, mail art, networker congresses, and the underground
|
||||
press, and who communicate with the public through actions
|
||||
against all forms of coercive communication, space
|
||||
infringement, and media control.
|
||||
For more info contact:
|
||||
Immediast U. PO Box 2726 Westfield New Jersey 07091 USA
|
||||
|
||||
DECENTRALIZED WORLD-WIDE NETWORKER CONGRESSES
|
||||
Since the beginning of the year, members of alternative
|
||||
info-nets, artists, insurgents, and cultural workers have
|
||||
been holding networker congresses, transnational engagements
|
||||
in cultural production, dialogue, collaborations, open
|
||||
exchange, subversive brainstorming, and collective
|
||||
disruptions of dominant culture.
|
||||
|
||||
THE NETWORKER, A NEW PERCEPTION
|
||||
In societies where information is money and media is power,
|
||||
public access is as controlled as the corporate states grip
|
||||
on communication law, censorship, commerce, covert action
|
||||
and surveillance. In this context, uninhibited public
|
||||
communication, expression, and cultural production are acts
|
||||
of freedom, sovereignty, and defiance. Rooted in the drive to
|
||||
connect and exchange with others, Networker Congress engage
|
||||
in culture and media as the battleground for greater openness
|
||||
and freedom.
|
||||
|
||||
MORE INFORMATION about NETWORKER CONGRESSES contact:
|
||||
|
||||
H.R. Fricker
|
||||
Buro fur kunsterische Umtriebe
|
||||
CH 9043 Trogen Switzerland
|
||||
|
||||
Retrofuturism
|
||||
PO Box 2278
|
||||
Iowa City, Iowa 52244
|
||||
|
||||
Face of the Congress
|
||||
FaGaGaGa
|
||||
Po Box 1382
|
||||
Youngstown, Ohio 44501
|
||||
|
||||
Peter Kaufman
|
||||
Bergenwissenstrasse 11
|
||||
CH-8123 EbmatigenDecentralized Networker Congresses
|
||||
Switzerland
|
||||
|
||||
Decentralized Networker Congresses
|
||||
|
||||
Netshaker
|
||||
PO Box 978
|
||||
Hanover, New Hampshire 03766
|
||||
|
||||
** End of text from cdp:gen.media **
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [September 1992](/years/1992/09)
|
||||
|
||||
+ 1992-09-29 (Mon, 28 Sep 92 21:01:24 PDT) - SEIZING THE MEDIA- A NETWOR - _"Fen Labalme" \<fen@genmagic.com\>_
|
||||
|
||||
@@ -0,0 +1,270 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-09-24 - Returned mail: Unable to deliver mail
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Mailer-Daemon@atdt.org (Mail Delivery Subsystem)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 6dcabcb0ac94c59c64f95177c1a985dfc027584f9a22e2aed8114ee95c861c01<br>
|
||||
Message ID: \<9209242349.AB06629@atdt.org\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-09-24 23:49:37 UTC<br>
|
||||
Raw Date: Thu, 24 Sep 92 16:49:37 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Mailer-Daemon@atdt.org (Mail Delivery Subsystem)
|
||||
Date: Thu, 24 Sep 92 16:49:37 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Returned mail: Unable to deliver mail
|
||||
Message-ID: <9209242349.AB06629@atdt.org>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
----- Transcript of session follows -----
|
||||
554 cypherpunks@toad.com... Recipient names must be specified
|
||||
|
||||
----- Unsent message follows -----
|
||||
Return-Path: <cypherpunks@toad.com>
|
||||
Received: by atdt.org (5.61+++/JLK-atdt)
|
||||
id AA06629; Thu, 24 Sep 92 19:49:05 -0400
|
||||
Date: Thu, 24 Sep 92 19:49:05 -0400
|
||||
From: cypherpunks@toad.com
|
||||
Message-Id: <9209242349.AA06629@atdt.org>
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Information Brokers
|
||||
|
||||
____________________________________________________________________________
|
||||
|
||||
|
||||
SYDNEY MORNING HERALD
|
||||
August 13 1992
|
||||
|
||||
|
||||
HUGE TRADE IN PERSONAL FILES
|
||||
By MALCOLM BROWN
|
||||
|
||||
|
||||
Westpac, National Australia Bank, NRMA Insurance Ltd, Custom Credit
|
||||
and
|
||||
Citicorp are some of the big names in a damning report by the ICAC
|
||||
Assistant Commissioner, Mr Adrian Roden, QC, on the unauthorised
|
||||
release of
|
||||
confidential government information.
|
||||
|
||||
|
||||
Mr Roden found that there was a multi-million-dollar trade in such
|
||||
information which involved public servants, including police, and
|
||||
private
|
||||
inquiry agents.
|
||||
""Information, from a variety of State and Commonwealth government
|
||||
sources
|
||||
and the private sector has been freely and regularly sold and
|
||||
exchanged for
|
||||
many years," he said. "NSW public officials have been heavily
|
||||
involved."
|
||||
|
||||
|
||||
Mr Roden heard 446 witnesses in public and private hearings over 168
|
||||
days
|
||||
before compiling his 1,300-page report.
|
||||
|
||||
|
||||
Even so, he said, it was necessary to be selective; thousands of
|
||||
private
|
||||
and commercial inquiry agents had not examined.
|
||||
|
||||
|
||||
Mr Roden found that more than 250 people had participated in the
|
||||
illicit
|
||||
trade or had contributed to it.
|
||||
|
||||
OOf these, 155 had engaged in corrupt conduct. A further 101 had
|
||||
engaged in
|
||||
conduct which allowed, encouraged or caused the occurrence of corrupt
|
||||
conduct.
|
||||
|
||||
|
||||
Many are NSW and Commonwealth public servants who sold information
|
||||
collected by the agencies where they work, including the Roads and
|
||||
Traffic
|
||||
Authority (RTA), police force, Telecom and Sydney County Council.
|
||||
|
||||
|
||||
The Attorney-General, Mr Hannaford, announced that the Director of
|
||||
Public
|
||||
Prosecutions had set up a task force to consider laying charges
|
||||
against
|
||||
more than 100 people named in the report.
|
||||
|
||||
HHe said many of the public servants named could expect to lose their
|
||||
jobs
|
||||
and that the heads of all the government departments involved had been
|
||||
told
|
||||
to examine the report and take action against those involved.
|
||||
|
||||
|
||||
The Assistant Police Commissioner, Mr Col Cole, confirmed yesterday
|
||||
that
|
||||
five police officers had been suspended and announced that three task
|
||||
forces had been set up and computer security upgraded.
|
||||
|
||||
|
||||
Mr Hannaford foreshadowed the introduction of privacy legislation to
|
||||
make
|
||||
the unauthorised use of confidential information a criminal offence.
|
||||
|
||||
|
||||
The major banks said that they could not condone what their staff had
|
||||
done
|
||||
but said the staff had believed that they were acting in the best
|
||||
interests
|
||||
of their employers and the community.
|
||||
|
||||
|
||||
None of the banks was planning to sack staff found to be corrupt
|
||||
although
|
||||
several said the staff had been counselled or "educated".
|
||||
|
||||
MMr Roden said the trade involved banks, insurance companies and other
|
||||
financial institutions which had provided "a ready market".
|
||||
|
||||
|
||||
The link was provided by private and commercial inquiry agents. With
|
||||
some
|
||||
banks, codes had been used to conceal the nature of the transactions.
|
||||
|
||||
|
||||
"As they have gone about their corrupt trade, commercial interest has
|
||||
prevailed over commercial ethics, greed ha~ prevailed over public
|
||||
duty;
|
||||
laws and regulations designed to protect confidentiality have been
|
||||
ignored," Mr Roden said.
|
||||
|
||||
|
||||
"Frequently the client, generally an insurance company, bank or other
|
||||
financial institution, ordered the information from the agent with a
|
||||
full
|
||||
appreciation of how it was to be obtained.
|
||||
|
||||
""The evidence disclosed that in the collection and recovery
|
||||
departments of
|
||||
a number of those institutions, it has long been standard practice to
|
||||
use
|
||||
confidential government information . . . as a means of locating
|
||||
debtors."
|
||||
|
||||
|
||||
Some finance and insurance companies had directed agents to keep all
|
||||
references to the trade off invoices and reports.
|
||||
|
||||
|
||||
"Some even directed that the agents falsely state the source of the
|
||||
information in their reports," Mr Roden said.
|
||||
|
||||
|
||||
"Some solicitors in private practice have sought and purchased
|
||||
confidential
|
||||
government information in circumstances in which they must have known
|
||||
that
|
||||
it could not have been properly obtained."
|
||||
|
||||
|
||||
Mr Kevin Rindfleish, an unlicensed private inquiry agent, had sold
|
||||
Department of Motor Transport/Roads and Traffic Authority and social
|
||||
security information "on a large scale". His principal client had been
|
||||
the
|
||||
ANZ Bank.
|
||||
AA private investigator, Mr Terence John Hancock, and his company, All
|
||||
Cities Investigations Pty Ltd, had sold confidential government
|
||||
information
|
||||
to the National Australia Bank and Westpac on a regular basis.
|
||||
|
||||
|
||||
Two employees of the NAB had used prior contacts to provide the bank
|
||||
with
|
||||
access to RTA, social security, Australia Post and immigration
|
||||
information.
|
||||
Between them, the employees also provided silent numbers and
|
||||
information on
|
||||
electricity consumers.
|
||||
|
||||
|
||||
The Advance Bank had "over a period of years" obtained information
|
||||
improperly released from the RTA, the Department of Social Security
|
||||
and the
|
||||
Department of Immigration. The practice was "known and approved at
|
||||
least to
|
||||
senior management level".
|
||||
|
||||
|
||||
New Zealand Insurance and Manufacturers Mutual had bought confidential
|
||||
government information from private investigators.
|
||||
|
||||
|
||||
NRMA Insurance Ltd and the Government Insurance Office were "found to
|
||||
have
|
||||
participated as freely in the illicit trade in confidential government
|
||||
information as their more commercially orientated competitors".
|
||||
|
||||
|
||||
"Evidence relating to NRMA Insurance Ltd established not only that it
|
||||
purchased confidential government information through private
|
||||
investigators, but also that investigators were required to obtain
|
||||
relevant
|
||||
government information by unauthorised means if they were to retain
|
||||
the
|
||||
company's work."
|
||||
EEsanda Finance Corporation Ltd had bought confidential information
|
||||
over at
|
||||
least 23 years. Custom Credit Corporation Ltd which had engaged in the
|
||||
illicit trade over "many years", had maintained false records to
|
||||
conceal
|
||||
how it obtained information.
|
||||
|
||||
|
||||
Alston de Zilwa, former underwriter and operations manager of Citicorp
|
||||
Ltd
|
||||
and later, Toyota Finance Australia Limited's credit operations
|
||||
manager,
|
||||
had established for each of the two companies a system for obtaining
|
||||
confidential information.
|
||||
|
||||
|
||||
The companies would seek information directly from employees of the
|
||||
DMA and
|
||||
RTA and pay a private inquiry agent, Mr Kevin Robinson, who would
|
||||
"launder"
|
||||
it, then invoice the companies for the corresponding sum.
|
||||
|
||||
|
||||
Mr Roden said that hundreds of thousands of dollars had changed hands
|
||||
in
|
||||
the trade uncovered. One agent had estimated that he had paid $40,000
|
||||
to
|
||||
$50,000 a year for Social Security information alone.
|
||||
|
||||
|
||||
Another had said he received $100,000 over two years for government
|
||||
information.
|
||||
YYet another had, according to records, charged a bank $186,000 for
|
||||
"inquiry
|
||||
services" over a period of 18 months.
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [September 1992](/years/1992/09)
|
||||
|
||||
+ 1992-09-24 (Thu, 24 Sep 92 16:49:37 PDT) - Returned mail: Unable to deliver mail - _Mailer-Daemon@atdt.org (Mail Delivery Subsystem)_
|
||||
|
||||
@@ -0,0 +1,258 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-09-24 - No Subject
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Eric Hughes \<hughes@soda.berkeley.edu\><br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 736e7c10f33ebf5915a11376d9bb00bd63e298a9770ccbe3072397ca30e5526a<br>
|
||||
Message ID: \<9209241809.AA23637@soda.berkeley.edu\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-09-24 18:10:30 UTC<br>
|
||||
Raw Date: Thu, 24 Sep 92 11:10:30 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Eric Hughes <hughes@soda.berkeley.edu>
|
||||
Date: Thu, 24 Sep 92 11:10:30 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: No Subject
|
||||
Message-ID: <9209241809.AA23637@soda.berkeley.edu>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
How to Make an Automated Remailer in Your Copious Spare Time with Easy
|
||||
to Find and Inexpensive Software Tools You May Have Lying Around.
|
||||
|
||||
<reprinted from Popular Cryptography, September 1992. Used with permission>
|
||||
|
||||
|
||||
The basic remailer illustrates how to hook in automated software
|
||||
processing into the Unix mail system. Here are the basic elements.
|
||||
|
||||
1. .forward
|
||||
2. slocal and .maildelivery
|
||||
3. remail.perl
|
||||
4. /usr/lib/sendmail
|
||||
|
||||
--------------------------------------------
|
||||
1. .forward
|
||||
|
||||
Unix mail provides a way to have accounts on many different machines
|
||||
but to receive all your mail in one place. That facility is the
|
||||
.forward file, which resides in the home directory. The file is one
|
||||
line long and contains the email address to which the mail will be
|
||||
forwarded.
|
||||
|
||||
But the .forward file has another mode of operation. If the string
|
||||
begins with the pipe character '|', the mail will be piped through the
|
||||
program listed. Enclose the string with double quotes if you need
|
||||
spaces included. Here is my .forward file:
|
||||
|
||||
"| /usr/local/lib/mh/slocal -user hughes"
|
||||
|
||||
Thus all my mail gets processed by the slocal program, described next.
|
||||
|
||||
I don't know where the man page for .forward is. Perhaps someone
|
||||
could provide a reference.
|
||||
|
||||
---------
|
||||
|
||||
2. slocal and .maildelivery
|
||||
|
||||
The software system MH contains a bunch of useful tools for handling
|
||||
mail, only one of which we need. For details on MH, do 'man mh'.
|
||||
|
||||
MH has a nice little mail hook processor called slocal. Its docs can
|
||||
be found by 'man mhook'. slocal can conditionally perform operations
|
||||
on mail messages and consider them either delivered or not. It allows
|
||||
multiple operations on individual mail messages.
|
||||
|
||||
slocal reads the file .maildelivery when it starts up for
|
||||
instructions. Here is my .maildelivery file:
|
||||
|
||||
#
|
||||
# field pattern action/ string
|
||||
# result (quote included spaces)
|
||||
#
|
||||
Request-Remailing-To "" pipe R "perl remail.perl"
|
||||
Request-Remailing-To "" file R archive.remailer
|
||||
|
||||
The various pieces of the .maildelivery file are fully documented in
|
||||
the man page. I'll just explain what mine does. Each line describes
|
||||
one operation to be performed on each incoming mail message. Fields
|
||||
are separated by whitespace, so if you need to include spaces, use
|
||||
quotes.
|
||||
|
||||
The first field, labelled field, is the mail header field to look for.
|
||||
slocal can selectively process on any header line. If the header line
|
||||
does not exist, then the mail does not match this line and no
|
||||
operation is performed. If the header line does exist, processing
|
||||
continues.
|
||||
|
||||
The second field, pattern, is a text string to match with the contents
|
||||
of that header line, i.e. with everything after the colon. In my
|
||||
case, I put the empty string in, which matches everything. You need
|
||||
the pair of quotes to have a placeholder for the field contents.
|
||||
|
||||
The next field, action, tells what to do with the message. 'pipe'
|
||||
sends the message to the standard input of the named program. 'file'
|
||||
appends the message to an archive or log file. A useful pipe command
|
||||
for testing is "tee foo", which makes a copy of the message in file
|
||||
foo, but does not append, so that you get an exact copy of what slocal
|
||||
is going to pass to your pipe. This allows testing of the pipe
|
||||
program without sending yourself mail all the time.
|
||||
|
||||
The next field, result, tells what to do with the message after
|
||||
processing. I am currently using R for Regardless to indicate that
|
||||
this action should always be performed no matter what. The code R
|
||||
indicates that the mail should be considered not delivered after
|
||||
processing; thus slocal writes the mail back into my local spool and I
|
||||
see it as normal. Later, after I'm sick of looking at all the
|
||||
forwarded mail, I'll change this code to A, meaning if the processing
|
||||
succeeds, then the mail is considered delivered. The archive file
|
||||
will always remain R.
|
||||
|
||||
The last field, string, is the parameter to the action. It is a file
|
||||
name or program. Use quotes to include spaces. The name of my mail
|
||||
processor is "perl remail.perl", which is to run the perl script
|
||||
remail.perl on the mail.
|
||||
|
||||
The .maildelivery file is also the place to put encryption hooks to
|
||||
automatically decrypt the bodies of messages. More on that in a
|
||||
future version.
|
||||
|
||||
---------
|
||||
|
||||
3. remail.perl
|
||||
|
||||
Perl is a wonderful language for doing all sorts of useful work like
|
||||
processing mail headers. Do 'man perl' for details, or get the
|
||||
O'Reilly book and really learn how to use it.
|
||||
|
||||
The perl script, in summary, strips off the mail headers, saving the
|
||||
Subject: line, rewrites a new header, and appends the body of the
|
||||
previous message. Here is the script:
|
||||
|
||||
--------- cut here ---------
|
||||
while (<>) {
|
||||
last if /^$/ ;
|
||||
$subject = $_ if /^Subject:/ ;
|
||||
if (/^Request-Remailing-To:/) {
|
||||
chop ;
|
||||
s/^.*:// ;
|
||||
$addressee = $_ ;
|
||||
}
|
||||
}
|
||||
|
||||
#open( OUTPUT, ">foo" ) || die "Cannot open 'foo'." ;
|
||||
open( OUTPUT, "| /usr/lib/sendmail " . $addressee ) ;
|
||||
select( OUTPUT ) ;
|
||||
|
||||
print "To:" . $addressee . "\n" ;
|
||||
print "From: nobody\n" ;
|
||||
print $subject ;
|
||||
print "Remailed-By: Eric Hughes <hughes@soda.berkeley.edu>\n" ;
|
||||
print "\n" ;
|
||||
|
||||
while (<>) {
|
||||
} continue {
|
||||
print ;
|
||||
}
|
||||
--------- cut here ---------
|
||||
|
||||
Here is a summary of the operation. To really understand this, you'll
|
||||
have to learn perl.
|
||||
|
||||
The while loop processes standard input. 'last' terminates the loop
|
||||
as soon as a blank line is seen. A blank line separates the header
|
||||
from the body. The subject line, if seen, sets the subject variable
|
||||
to the whole subject line. The Request- header line has its final
|
||||
newline removed, the contents up to the colon substituted into
|
||||
nonexistence, and saves the rest in the addressee variable.
|
||||
|
||||
Next the pipe to sendmail is opened and its output is selected so that
|
||||
all print commands will go to the pipe. There is a comment for a
|
||||
different output channel to the file foo which can be commented in for
|
||||
testing.
|
||||
|
||||
Next the remailed header is constructed out of print statements.
|
||||
|
||||
Lastly the rest of the standard input is passed through unmodified to
|
||||
the output channel. The while loop terminates when there is no more
|
||||
input.
|
||||
|
||||
---------
|
||||
|
||||
4. sendmail
|
||||
|
||||
sendmail is the backend mailer; it expects complete mail messages and
|
||||
does not usually generate any line itself except for the first "From"
|
||||
(with no colon) line. Any header you construct will thus get passed
|
||||
through mostly unmodified. Hence you can put in any "From:" line you
|
||||
want and any other header info, such as my "Remailed-By:" line.
|
||||
|
||||
sendmail expects the name of the addressee on its command line,
|
||||
otherwise it puts an "Apparently-To:" line in the header.
|
||||
|
||||
Any mail processor which remails should probably go through sendmail,
|
||||
although it would also be possible to talk to an SMTP port directly,
|
||||
were you so motivated. MH also has some remailing programs; see 'man
|
||||
mhook'.
|
||||
|
||||
---------
|
||||
|
||||
A few words for tinkerers.
|
||||
|
||||
-- You can always send mail to yourself. Especially after you've done
|
||||
one kind of mail processing and want to pass the mail through the
|
||||
filters again.
|
||||
|
||||
-- When getting started, create an empty .maildelivery file first and
|
||||
then get your .forward file working. Test it by sending messages to
|
||||
yourself. If you're not getting them, they are going into the bit
|
||||
bucket. All your other mail will as well, in this case, so if you
|
||||
can't afford to lose mail, do it right the first time or work on a
|
||||
spare account.
|
||||
|
||||
-- Any mail slocal does not process will get delivered as normal.
|
||||
Running a remailer will not interfere with your other work.
|
||||
|
||||
-- Remember to use quote marks.
|
||||
|
||||
-- You don't need to be a sysadmin to run this kind of remailer.
|
||||
There is nothing, however, to prevent a sysadmin from running this
|
||||
sofware under an alias. The sysadmin is also a 'trusted user' to
|
||||
sendmail and can get rid of pesky "From"-no-colon lines.
|
||||
|
||||
-- Perl has a random function which could be used to automatically
|
||||
choose various "From:" lines from a database. Remember to include
|
||||
yeltsy@kremvax.rus.
|
||||
|
||||
-- postnews or inews could be substituted for sendmail. Different
|
||||
header lines would have to be created. Such a service could run in
|
||||
parallel with a remailer. You too can now repost to alt.sex.bondage!
|
||||
|
||||
|
||||
Enjoy. And watch for interesting improvements like encryption.
|
||||
|
||||
|
||||
Eric
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [September 1992](/years/1992/09)
|
||||
|
||||
+ 1992-09-24 (Thu, 24 Sep 92 11:10:30 PDT) - No Subject - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
|
||||
@@ -0,0 +1,62 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-09-24 - Re: The aural Tim Pozar
|
||||
|
||||
## Header Data
|
||||
|
||||
From: pozar@kumr.lns.com (Tim Pozar)<br>
|
||||
To: hughes@soda.berkeley.edu (Eric Hughes)<br>
|
||||
Message Hash: 90aa886e6ed977b1d1f23bb41ecef6ad549dd017bc141b6bdefb8b0b42e038f2<br>
|
||||
Message ID: \<m0mY2oA-00029tC@kumr.lns.com\><br>
|
||||
Reply To: \<9209241811.AA23823@soda.berkeley.edu\><br>
|
||||
UTC Datetime: 1992-09-24 23:42:21 UTC<br>
|
||||
Raw Date: Thu, 24 Sep 92 16:42:21 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: pozar@kumr.lns.com (Tim Pozar)
|
||||
Date: Thu, 24 Sep 92 16:42:21 PDT
|
||||
To: hughes@soda.berkeley.edu (Eric Hughes)
|
||||
Subject: Re: The aural Tim Pozar
|
||||
In-Reply-To: <9209241811.AA23823@soda.berkeley.edu>
|
||||
Message-ID: <m0mY2oA-00029tC@kumr.lns.com>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Eric Hughes wrote:
|
||||
> Tim Pozar writes:
|
||||
>
|
||||
> >I am also the technical consultant to the show, so your mail will not be
|
||||
> >falling on deft ears...
|
||||
>
|
||||
> Just for the record, Tim's _are_ deft, but they are _not_ deaf.
|
||||
|
||||
Thanks... :-)
|
||||
|
||||
Tim
|
||||
|
||||
--
|
||||
Internet: pozar@kumr.lns.com FidoNet: Tim Pozar @ 1:125/555
|
||||
UUCP: ...!uunet!kumr.lns.com!pozar
|
||||
Snail: Tim Pozar / KKSF / 77 Maiden Lane / San Francisco CA 94108 / USA
|
||||
Voice: +1 415 788 2022
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [September 1992](/years/1992/09)
|
||||
|
||||
+ 1992-09-23 (Wed, 23 Sep 92 13:25:19 PDT) - [KPFA interview went well](/years/1992/09/114d62fabc9ea292aa291c6e0f0a85d514e73fe329f645d92916e8012e9d4a2e) - _tcmay@netcom.com (Timothy C. May)_
|
||||
+ 1992-09-24 (Thu, 24 Sep 92 10:28:07 PDT) - [Re: KPFA interview went well](/years/1992/09/484d54b869575b86e1f5f4cbe21959684137e0c875004ff63c502b11f717fb7a) - _pozar@kumr.lns.com (Tim Pozar)_
|
||||
+ 1992-09-24 (Thu, 24 Sep 92 11:13:21 PDT) - [The aural Tim Pozar](/years/1992/09/17a09f8ed3e4c3e98e902c889e53518adfcf481d9d8ac1c147fbf572113bebf2) - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
+ 1992-09-24 (Thu, 24 Sep 92 16:42:21 PDT) - Re: The aural Tim Pozar - _pozar@kumr.lns.com (Tim Pozar)_
|
||||
|
||||
@@ -0,0 +1,51 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-09-24 - Fake Mail
|
||||
|
||||
## Header Data
|
||||
|
||||
From: cliff_stoll@harvard.edu<br>
|
||||
To: hughes@soda.berkeley.edu<br>
|
||||
Message Hash: b4b554a32aff1742f72a2dd539e78d65c7adb945500134a33e2174f795a7e928<br>
|
||||
Message ID: \<9209240552.AA04259@atdt.org\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-09-24 05:53:12 UTC<br>
|
||||
Raw Date: Wed, 23 Sep 92 22:53:12 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: cliff_stoll@harvard.edu
|
||||
Date: Wed, 23 Sep 92 22:53:12 PDT
|
||||
To: hughes@soda.berkeley.edu
|
||||
Subject: Fake Mail
|
||||
Message-ID: <9209240552.AA04259@atdt.org>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Pssst!
|
||||
|
||||
I have a nice fake mail program that interfaces with emacs.
|
||||
I'll send it along to anyone who wants it.
|
||||
|
||||
PS: Have you seen my latest chocolate chip cookie recipe?
|
||||
Too bad about Martha. Maybe people like me are wed
|
||||
to science...and great cookies.
|
||||
|
||||
ADFGVX
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [September 1992](/years/1992/09)
|
||||
|
||||
+ 1992-09-24 (Wed, 23 Sep 92 22:53:12 PDT) - Fake Mail - _cliff_stoll@harvard.edu_
|
||||
|
||||
@@ -0,0 +1,582 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-09-21 - Long but good: Hammill on encryption
|
||||
|
||||
## Header Data
|
||||
|
||||
From: whitakerNeternity.demon.co.uk.demon.co.uk ("Russell E. Whitaker")<br>
|
||||
To: _N/A_<br>
|
||||
Message Hash: b5e24ee5d6a00a60a5cdd485ad3b67fa4016296e3d5df8faa2c6181e88494b20<br>
|
||||
Message ID: \<717081867snx@eternity.demon.co.uk.demon.co.uk\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-09-21 13:24:27 UTC<br>
|
||||
Raw Date: Mon, 21 Sep 1992 13:24:27 +0000<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: whitakerNeternity.demon.co.uk.demon.co.uk ("Russell E. Whitaker")
|
||||
Date: Mon, 21 Sep 1992 13:24:27 +0000
|
||||
Subject: Long but good: Hammill on encryption
|
||||
Message-ID: <717081867snx@eternity.demon.co.uk.demon.co.uk>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
The following is the text of a *very* interesting speech
|
||||
given in 1987 by mathematician Chuck Hammill. The Soviet
|
||||
Union is mentioned; while this may be a little dated, there's
|
||||
always China... and Cuba... and a few other places...
|
||||
|
||||
Enjoy,
|
||||
|
||||
Russell
|
||||
|
||||
|
||||
|
||||
FROM CROSSBOWS TO CRYPTOGRAPHY: THWARTING THE STATE VIA
|
||||
TECHNOLOGY
|
||||
|
||||
Given at the Future of Freedom Conference, November 1987
|
||||
|
||||
|
||||
You know, technology--and particularly computer
|
||||
technology--has often gotten a bad rap in Libertarian cir-
|
||||
cles. We tend to think of Orwell's 1984, or Terry Gilliam's
|
||||
Brazil, or the proximity detectors keeping East Berlin's
|
||||
slave/citizens on their own side of the border, or the so-
|
||||
phisticated bugging devices Nixon used to harass those on
|
||||
his "enemies list." Or, we recognize that for the price of
|
||||
a ticket on the Concorde we can fly at twice the speed of
|
||||
sound, but only if we first walk thru a magnetometer run by
|
||||
a government policeman, and permit him to paw thru our be-
|
||||
longings if it beeps.
|
||||
|
||||
But I think that mind-set is a mistake. Before there
|
||||
were cattle prods, governments tortured their prisoners with
|
||||
clubs and rubber hoses. Before there were lasers for
|
||||
eavesdropping, governments used binoculars and lip-readers.
|
||||
Though government certainly uses technology to oppress, the
|
||||
evil lies not in the tools but in the wielder of the tools.
|
||||
|
||||
In fact, technology represents one of the most promis-
|
||||
ing avenues available for re-capturing our freedoms from
|
||||
those who have stolen them. By its very nature, it favors
|
||||
the bright (who can put it to use) over the dull (who can-
|
||||
not). It favors the adaptable (who are quick to see the
|
||||
merit of the new( over the sluggish (who cling to time-
|
||||
tested ways). And what two better words are there to de-
|
||||
scribe government bureaucracy than "dull" and "sluggish"?
|
||||
|
||||
One of the clearest, classic triumphs of technology
|
||||
over tyranny I see is the invention of the man-portable
|
||||
crossbow. With it, an untrained peasant could now reliably
|
||||
and lethally engage a target out to fifty meters--even if
|
||||
that target were a mounted, chain-mailed knight. (Unlike
|
||||
the longbow, which, admittedly was more powerful, and could
|
||||
get off more shots per unit time, the crossbow required no
|
||||
formal training to utilize. Whereas the longbow required
|
||||
elaborate visual, tactile and kinesthetic coordination to
|
||||
achieve any degree of accuracy, the wielder of a crossbow
|
||||
could simply put the weapon to his shoulder, sight along the
|
||||
arrow itself, and be reasonably assured of hitting his tar-
|
||||
get.)
|
||||
|
||||
Moreover, since just about the only mounted knights
|
||||
likely to visit your average peasant would be government
|
||||
soldiers and tax collectors, the utility of the device was
|
||||
plain: With it, the common rabble could defend themselves
|
||||
not only against one another, but against their governmental
|
||||
masters. It was the medieval equivalent of the armor-
|
||||
piercing bullet, and, consequently, kings and priests (the
|
||||
medieval equivalent of a Bureau of Alcohol, Tobacco and
|
||||
Crossbows) threatened death and excommunication, respec-
|
||||
tively, for its unlawful possession.
|
||||
|
||||
Looking at later developments, we see how technology
|
||||
like the firearm--particularly the repeating rifle and the
|
||||
handgun, later followed by the Gatling gun and more advanced
|
||||
machine guns--radically altered the balance of interpersonal
|
||||
and inter-group power. Not without reason was the Colt .45
|
||||
called "the equalizer." A frail dance-hall hostess with one
|
||||
in her possession was now fully able to protect herself
|
||||
against the brawniest roughneck in any saloon. Advertise-
|
||||
ments for the period also reflect the merchandising of the
|
||||
repeating cartridge rifle by declaring that "a man on
|
||||
horseback, armed with one of these rifles, simply cannot be
|
||||
captured." And, as long as his captors were relying upon
|
||||
flintlocks or single-shot rifles, the quote is doubtless a
|
||||
true one.
|
||||
|
||||
Updating now to the present, the public-key cipher
|
||||
(with a personal computer to run it) represents an equiv-
|
||||
alent quantum leap--in a defensive weapon. Not only can
|
||||
such a technique be used to protect sensitive data in one's
|
||||
own possession, but it can also permit two strangers to ex-
|
||||
change information over an insecure communications
|
||||
channel--a wiretapped phone line, for example, or
|
||||
skywriting, for that matter)--without ever having previously
|
||||
met to exchange cipher keys. With a thousand-dollar com-
|
||||
puter, you can create a cipher that a multi-megabuck CRAY
|
||||
X-MP can't crack in a year. Within a few years, it should
|
||||
be economically feasible to similarly encrypt voice communi-
|
||||
cations; soon after that, full-color digitized video images.
|
||||
Technology will not only have made wiretapping obsolete, it
|
||||
will have totally demolished government's control over in-
|
||||
formation transfer.
|
||||
|
||||
I'd like to take just a moment to sketch the mathemat-
|
||||
ics which makes this principle possible. This algorithm is
|
||||
called the RSA algorithm, after Rivest, Shamir, and Adleman
|
||||
who jointly created it. Its security derives from the fact
|
||||
that, if a very large number is the product of two very
|
||||
large primes, then it is extremely difficult to obtain the
|
||||
two prime factors from analysis of their product. "Ex-
|
||||
tremely" in the sense that if primes p and q have 100
|
||||
digits apiece, then their 200-digit product cannot in gen-
|
||||
eral be factored in less than 100 years by the most powerful
|
||||
computer now in existence.
|
||||
|
||||
The "public" part of the key consists of (1) the prod-
|
||||
uct pq of the two large primes p and q, and (2) one fac-
|
||||
tor, call it x , of the product xy where xy = {(p-1) *
|
||||
(q-1) + 1}. The "private" part of the key consists of the
|
||||
other factor y.
|
||||
|
||||
Each block of the text to be encrypted is first turned
|
||||
into an integer--either by using ASCII, or even a simple
|
||||
A=01, B=02, C=03, ... , Z=26 representation. This integer
|
||||
is then raised to the power x (modulo pq) and the resulting
|
||||
integer is then sent as the encrypted message. The receiver
|
||||
decrypts by taking this integer to the (secret) power y
|
||||
(modulo pq). It can be shown that this process will always
|
||||
yield the original number started with.
|
||||
|
||||
What makes this a groundbreaking development, and why
|
||||
it is called "public-key" cryptography," is that I can
|
||||
openly publish the product pq and the number x , while
|
||||
keeping secret the number y --so that anyone can send me
|
||||
an encrypted message, namely
|
||||
x
|
||||
a (mod pq) ,
|
||||
but only I can recover the original message a , by taking
|
||||
what they send, raising it to the power y and taking the
|
||||
result (mod pq). The risky step (meeting to exchange cipher
|
||||
keys) has been eliminated. So people who may not even trust
|
||||
each other enough to want to meet, may still reliably ex-
|
||||
change encrypted messages--each party having selected and
|
||||
disseminated his own pq and his x , while maintaining
|
||||
the secrecy of his own y.
|
||||
|
||||
Another benefit of this scheme is the notion of a "dig-
|
||||
ital signature," to enable one to authenticate the source of
|
||||
a given message. Normally, if I want to send you a message,
|
||||
I raise my plaintext a to your x and take the result (mod
|
||||
your pq) and send that.
|
||||
|
||||
However, if in my message, I take the plaintext a and
|
||||
raise it to my (secret) power y , take the result (mod my
|
||||
pq), then raise that result to your x (mod your pq) and
|
||||
send this, then even after you have normally "decrypted" the
|
||||
message, it will still look like garbage. However, if you
|
||||
then raise it to my public power x , and take the result
|
||||
(mod my public pq ), so you will not only recover the ori-
|
||||
ginal plaintext message, but you will know that no one but I
|
||||
could have sent it to you (since no one else knows my secret
|
||||
y).
|
||||
|
||||
And these are the very concerns by the way that are to-
|
||||
day tormenting the Soviet Union about the whole question of
|
||||
personal computers. On the one hand, they recognize that
|
||||
American schoolchildren are right now growing up with com-
|
||||
puters as commonplace as sliderules used to be--more so, in
|
||||
fact, because there are things computers can do which will
|
||||
interest (and instruct) 3- and 4-year-olds. And it is pre-
|
||||
cisely these students who one generation hence will be going
|
||||
head-to-head against their Soviet counterparts. For the
|
||||
Soviets to hold back might be a suicidal as continuing to
|
||||
teach swordsmanship while your adversaries are learning
|
||||
ballistics. On the other hand, whatever else a personal
|
||||
computer may be, it is also an exquisitely efficient copying
|
||||
machine--a floppy disk will hold upwards of 50,000 words of
|
||||
text, and can be copied in a couple of minutes. If this
|
||||
weren't threatening enough, the computer that performs the
|
||||
copy can also encrypt the data in a fashion that is all but
|
||||
unbreakable. Remember that in Soviet society publicly ac-
|
||||
cessible Xerox machines are unknown. (The relatively few
|
||||
copying machines in existence are controlled more inten-
|
||||
sively than machine guns are in the United States.)
|
||||
|
||||
Now the "conservative" position is that we should not
|
||||
sell these computers to the Soviets, because they could use
|
||||
them in weapons systems. The "liberal" position is that we
|
||||
should sell them, in the interests of mutual trade and
|
||||
cooperation--and anyway, if we don't make the sale, there
|
||||
will certainly be some other nation willing to.
|
||||
|
||||
For my part, I'm ready to suggest that the Libertarian
|
||||
position should be to give them to the Soviets for free, and
|
||||
if necessary, make them take them . . . and if that doesn't
|
||||
work load up an SR-71 Blackbird and air drop them over
|
||||
Moscow in the middle of the night. Paid for by private sub-
|
||||
scription, of course, not taxation . . . I confess that this
|
||||
is not a position that has gained much support among members
|
||||
of the conventional left-right political spectrum, but, af-
|
||||
ter all, in the words of one of Illuminatus's characters, we
|
||||
are political non-Euclideans: The shortest distance to a
|
||||
particular goal may not look anything like what most people
|
||||
would consider a "straight line." Taking a long enough
|
||||
world-view, it is arguable that breaking the Soviet govern-
|
||||
ment monopoly on information transfer could better lead to
|
||||
the enfeeblement and, indeed, to the ultimate dissolution of
|
||||
the Soviet empire than would the production of another dozen
|
||||
missiles aimed at Moscow.
|
||||
|
||||
But there's the rub: A "long enough" world view does
|
||||
suggest that the evil, the oppressive, the coercive and the
|
||||
simply stupid will "get what they deserve," but what's not
|
||||
immediately clear is how the rest of us can escape being
|
||||
killed, enslaved, or pauperized in the process.
|
||||
|
||||
When the liberals and other collectivists began to at-
|
||||
tack freedom, they possessed a reasonably stable, healthy,
|
||||
functioning economy, and almost unlimited time to proceed to
|
||||
hamstring and dismantle it. A policy of political
|
||||
gradualism was at least conceivable. But now, we have
|
||||
patchwork crazy-quilt economy held together by baling wire
|
||||
and spit. The state not only taxes us to "feed the poor"
|
||||
while also inducing farmers to slaughter milk cows and drive
|
||||
up food prices--it then simultaneously turns around and sub-
|
||||
sidizes research into agricultural chemicals designed to in-
|
||||
crease yields of milk from the cows left alive. Or witness
|
||||
the fact that a decline in the price of oil is considered as
|
||||
potentially frightening as a comparable increase a few years
|
||||
ago. When the price went up, we were told, the economy
|
||||
risked collapse for for want of energy. The price increase
|
||||
was called the "moral equivalent of war" and the Feds swung
|
||||
into action. For the first time in American history, the
|
||||
speed at which you drive your car to work in the morning be-
|
||||
came an issue of Federal concern. Now, when the price of
|
||||
oil drops, again we risk problems, this time because Ameri-
|
||||
can oil companies and Third World basket-case nations who
|
||||
sell oil may not be able to ever pay their debts to our
|
||||
grossly over-extended banks. The suggested panacea is that
|
||||
government should now re-raise the oil prices that OPEC has
|
||||
lowered, via a new oil tax. Since the government is seeking
|
||||
to raise oil prices to about the same extent as OPEC did,
|
||||
what can we call this except the "moral equivalent of civil
|
||||
war--the government against its own people?"
|
||||
|
||||
And, classically, in international trade, can you imag-
|
||||
ine any entity in the world except a government going to
|
||||
court claiming that a vendor was selling it goods too
|
||||
cheaply and demanding not only that that naughty vendor be
|
||||
compelled by the court to raise its prices, but also that it
|
||||
be punished for the act of lowering them in the first place?
|
||||
|
||||
So while the statists could afford to take a couple of
|
||||
hundred years to trash our economy and our liberties--we
|
||||
certainly cannot count on having an equivalent period of
|
||||
stability in which to reclaim them. I contend that there
|
||||
exists almost a "black hole" effect in the evolution of
|
||||
nation-states just as in the evolution of stars. Once free-
|
||||
dom contracts beyond a certain minimum extent, the state
|
||||
warps the fabric of the political continuum about itself to
|
||||
the degree that subsequent re-emergence of freedom becomes
|
||||
all but impossible. A good illustration of this can be seen
|
||||
in the area of so-called "welfare" payments. When those who
|
||||
sup at the public trough outnumber (and thus outvote) those
|
||||
whose taxes must replenish the trough, then what possible
|
||||
choice has a democracy but to perpetuate and expand the tak-
|
||||
ing from the few for the unearned benefit of the many? Go
|
||||
down to the nearest "welfare" office, find just two people
|
||||
on the dole . . . and recognize that between them they form
|
||||
a voting bloc that can forever outvote you on the question
|
||||
of who owns your life--and the fruits of your life's labor.
|
||||
|
||||
So essentially those who love liberty need an "edge" of
|
||||
some sort if we're ultimately going to prevail. We obvi-
|
||||
ously can't use the altruists' "other-directedness" of
|
||||
"work, slave, suffer, sacrifice, so that next generation of
|
||||
a billion random strangers can live in a better world."
|
||||
Recognize that, however immoral such an appeal might be, it
|
||||
is nonetheless an extremely powerful one in today's culture.
|
||||
If you can convince people to work energetically for a
|
||||
"cause," caring only enough for their personal welfare so as
|
||||
to remain alive enough and healthy enough to continue
|
||||
working--then you have a truly massive reservoir of energy
|
||||
to draw from. Equally clearly, this is just the sort of ap-
|
||||
peal which tautologically cannot be utilized for egoistic or
|
||||
libertarian goals. If I were to stand up before you tonight
|
||||
and say something like, "Listen, follow me as I enunciate my
|
||||
noble "cause," contribute your money to support the "cause,"
|
||||
give up your free time to work for the "cause," strive
|
||||
selflessly to bring it about, and then (after you and your
|
||||
children are dead) maybe your children's children will actu-
|
||||
ally live under egoism"--you'd all think I'd gone mad. And
|
||||
of course you'd be right. Because the point I'm trying to
|
||||
make is that libertarianism and/or egoism will be spread if,
|
||||
when, and as, individual libertarians and/or egoists find it
|
||||
profitable and/or enjoyable to do so. And probably only
|
||||
then.
|
||||
|
||||
While I certainly do not disparage the concept of poli-
|
||||
tical action, I don't believe that it is the only, nor even
|
||||
necessarily the most cost-effective path toward increasing
|
||||
freedom in our time. Consider that, for a fraction of the
|
||||
investment in time, money and effort I might expend in try-
|
||||
ing to convince the state to abolish wiretapping and all
|
||||
forms of censorship--I can teach every libertarian who's in-
|
||||
terested how to use cryptography to abolish them
|
||||
unilaterally.
|
||||
|
||||
There is a maxim--a proverb--generally attributed to
|
||||
the Eskimoes, which very likely most Libertarians have al-
|
||||
ready heard. And while you likely would not quarrel with
|
||||
the saying, you might well feel that you've heard it often
|
||||
enough already, and that it has nothing further to teach us,
|
||||
and moreover, that maybe you're even tired of hearing it. I
|
||||
shall therefore repeat it now:
|
||||
|
||||
If you give a man a fish, the saying runs, you feed him
|
||||
for a day. But if you teach a man how to fish, you feed him
|
||||
for a lifetime.
|
||||
|
||||
Your exposure to the quote was probably in some sort of
|
||||
a "workfare" vs. "welfare" context; namely, that if you
|
||||
genuinely wish to help someone in need, you should teach him
|
||||
how to earn his sustenance, not simply how to beg for it.
|
||||
And of course this is true, if only because the next time he
|
||||
is hungry, there might not be anybody around willing or even
|
||||
able to give him a fish, whereas with the information on how
|
||||
to fish, he is completely self sufficient.
|
||||
|
||||
But I submit that this exhausts only the first order
|
||||
content of the quote, and if there were nothing further to
|
||||
glean from it, I would have wasted your time by citing it
|
||||
again. After all, it seems to have almost a crypto-altruist
|
||||
slant, as though to imply that we should structure our ac-
|
||||
tivities so as to maximize the benefits to such hungry
|
||||
beggars as we may encounter.
|
||||
|
||||
But consider:
|
||||
|
||||
Suppose this Eskimo doesn't know how to fish, but he
|
||||
does know how to hunt walruses. You, on the other hand,
|
||||
have often gone hungry while traveling thru walrus country
|
||||
because you had no idea how to catch the damn things, and
|
||||
they ate most of the fish you could catch. And now suppose
|
||||
the two of you decide to exchange information, bartering
|
||||
fishing knowledge for hunting knowledge. Well, the first
|
||||
thing to observe is that a transaction of this type
|
||||
categorically and unambiguously refutes the Marxist premise
|
||||
that every trade must have a "winner" and a "loser;" the
|
||||
idea that if one person gains, it must necessarily be at the
|
||||
"expense" of another person who loses. Clearly, under this
|
||||
scenario, such is not the case. Each party has gained some-
|
||||
thing he did not have before, and neither has been dimin-
|
||||
ished in any way. When it comes to exchange of information
|
||||
(rather than material objects) life is no longer a zero-sum
|
||||
game. This is an extremely powerful notion. The "law of
|
||||
diminishing returns," the "first and second laws of
|
||||
thermodynamics"--all those "laws" which constrain our possi-
|
||||
bilities in other contexts--no longer bind us! Now that's
|
||||
anarchy!
|
||||
|
||||
Or consider another possibility: Suppose this hungry
|
||||
Eskimo never learned to fish because the ruler of his
|
||||
nation-state had decreed fishing illegal. Because fish
|
||||
contain dangerous tiny bones, and sometimes sharp spines, he
|
||||
tells us, the state has decreed that their consumption--and
|
||||
even their possession--are too hazardous to the people's
|
||||
health to be permitted . . . even by knowledgeable, willing
|
||||
adults. Perhaps it is because citizens' bodies are thought
|
||||
to be government property, and therefore it is the function
|
||||
of the state to punish those who improperly care for govern-
|
||||
ment property. Or perhaps it is because the state gener-
|
||||
ously extends to competent adults the "benefits" it provides
|
||||
to children and to the mentally ill: namely, a full-time,
|
||||
all-pervasive supervisory conservatorship--so that they need
|
||||
not trouble themselves with making choices about behavior
|
||||
thought physically risky or morally "naughty." But, in any
|
||||
case, you stare stupefied, while your Eskimo informant re-
|
||||
lates how this law is taken so seriously that a friend of
|
||||
his was recently imprisoned for years for the crime of "pos-
|
||||
session of nine ounces of trout with intent to distribute."
|
||||
|
||||
Now you may conclude that a society so grotesquely
|
||||
oppressive as to enforce a law of this type is simply an
|
||||
affront to the dignity of all human beings. You may go far-
|
||||
ther and decide to commit some portion of your discretion-
|
||||
ary, recreational time specifically to the task of thwarting
|
||||
this tyrant's goal. (Your rationale may be "altruistic" in
|
||||
the sense of wanting to liberate the oppressed, or
|
||||
"egoistic" in the sense of proving you can outsmart the
|
||||
oppressor--or very likely some combination of these or per-
|
||||
haps even other motives.)
|
||||
|
||||
But, since you have zero desire to become a martyr to
|
||||
your "cause," you're not about to mount a military campaign,
|
||||
or even try to run a boatload of fish through the blockade.
|
||||
However, it is here that technology--and in particular in-
|
||||
formation technology--can multiply your efficacy literally a
|
||||
hundredfold. I say "literally," because for a fraction of
|
||||
the effort (and virtually none of the risk) attendant to
|
||||
smuggling in a hundred fish, you can quite readily produce a
|
||||
hundred Xerox copies of fishing instructions. (If the tar-
|
||||
geted government, like present-day America, at least permits
|
||||
open discussion of topics whose implementation is re-
|
||||
stricted, then that should suffice. But, if the government
|
||||
attempts to suppress the flow of information as well, then
|
||||
you will have to take a little more effort and perhaps write
|
||||
your fishing manual on a floppy disk encrypted according to
|
||||
your mythical Eskimo's public-key parameters. But as far as
|
||||
increasing real-world access to fish you have made genuine
|
||||
nonzero headway--which may continue to snowball as others
|
||||
re-disseminate the information you have provided. And you
|
||||
have not had to waste any of your time trying to convert id-
|
||||
eological adversaries, or even trying to win over the unde-
|
||||
cided. Recall Harry Browne's dictum from "Freedom in an
|
||||
Unfree World" that the success of any endeavor is in general
|
||||
inversely proportional to the number of people whose persua-
|
||||
sion is necessary to its fulfilment.
|
||||
|
||||
If you look at history, you cannot deny that it has
|
||||
been dramatically shaped by men with names like Washington,
|
||||
Lincoln, . . . Nixon . . . Marcos . . . Duvalier . . .
|
||||
Khadaffi . . . and their ilk. But it has also been shaped
|
||||
by people with names like Edison, Curie, Marconi, Tesla and
|
||||
Wozniak. And this latter shaping has been at least as per-
|
||||
vasive, and not nearly so bloody.
|
||||
|
||||
And that's where I'm trying to take The LiberTech
|
||||
Project. Rather than beseeching the state to please not en-
|
||||
slave, plunder or constrain us, I propose a libertarian net-
|
||||
work spreading the technologies by which we may seize
|
||||
freedom for ourselves.
|
||||
|
||||
But here we must be a bit careful. While it is not (at
|
||||
present) illegal to encrypt information when government
|
||||
wants to spy on you, there is no guarantee of what the fu-
|
||||
ture may hold. There have been bills introduced, for exam-
|
||||
ple, which would have made it a crime to wear body armor
|
||||
when government wants to shoot you. That is, if you were to
|
||||
commit certain crimes while wearing a Kevlar vest, then that
|
||||
fact would constitute a separate federal crime of its own.
|
||||
This law to my knowledge has not passed . . . yet . . . but
|
||||
it does indicate how government thinks.
|
||||
|
||||
Other technological applications, however, do indeed
|
||||
pose legal risks. We recognize, for example, that anyone
|
||||
who helped a pre-Civil War slave escape on the "underground
|
||||
railroad" was making a clearly illegal use of technology--as
|
||||
the sovereign government of the United States of America at
|
||||
that time found the buying and selling of human beings quite
|
||||
as acceptable as the buying and selling of cattle. Simi-
|
||||
larly, during Prohibition, anyone who used his bathtub to
|
||||
ferment yeast and sugar into the illegal psychoactive drug,
|
||||
alcohol--the controlled substance, wine--was using technol-
|
||||
ogy in a way that could get him shot dead by federal agents
|
||||
for his "crime"--unfortunately not to be restored to life
|
||||
when Congress reversed itself and re-permitted use of this
|
||||
drug.
|
||||
|
||||
So . . . to quote a former President, un-indicted co-
|
||||
conspirator and pardoned felon . . . "Let me make one thing
|
||||
perfectly clear:" The LiberTech Project does not advocate,
|
||||
participate in, or conspire in the violation of any law--no
|
||||
matter how oppressive, unconstitutional or simply stupid
|
||||
such law may be. It does engage in description (for educa-
|
||||
tional and informational purposes only) of technological
|
||||
processes, and some of these processes (like flying a plane
|
||||
or manufacturing a firearm) may well require appropriate li-
|
||||
censing to perform legally. Fortunately, no license is
|
||||
needed for the distribution or receipt of information it-
|
||||
self.
|
||||
|
||||
So, the next time you look at the political scene and
|
||||
despair, thinking, "Well, if 51% of the nation and 51% of
|
||||
this State, and 51% of this city have to turn Libertarian
|
||||
before I'll be free, then somebody might as well cut my
|
||||
goddamn throat now, and put me out of my misery"--recognize
|
||||
that such is not the case. There exist ways to make your-
|
||||
self free.
|
||||
|
||||
If you wish to explore such techniques via the Project,
|
||||
you are welcome to give me your name and address--or a fake
|
||||
name and mail drop, for that matter--and you'll go on the
|
||||
mailing list for my erratically-published newsletter. Any
|
||||
friends or acquaintances whom you think would be interested
|
||||
are welcome as well. I'm not even asking for stamped self-
|
||||
addressed envelopes, since my printer can handle mailing la-
|
||||
bels and actual postage costs are down in the noise compared
|
||||
with the other efforts in getting an issue out. If you
|
||||
should have an idea to share, or even a useful product to
|
||||
plug, I'll be glad to have you write it up for publication.
|
||||
Even if you want to be the proverbial "free rider" and just
|
||||
benefit from what others contribute--you're still welcome:
|
||||
Everything will be public domain; feel free to copy it or
|
||||
give it away (or sell it, for that matter, 'cause if you can
|
||||
get money for it while I'm taking full-page ads trying to
|
||||
give it away, you're certainly entitled to your capitalist
|
||||
profit . . .) Anyway, every application of these principles
|
||||
should make the world just a little freer, and I'm certainly
|
||||
willing to underwrite that, at least for the forseeable fu-
|
||||
ture.
|
||||
|
||||
I will leave you with one final thought: If you don't
|
||||
learn how to beat your plowshares into swords before they
|
||||
outlaw swords, then you sure as HELL ought to learn before
|
||||
they outlaw plowshares too.
|
||||
|
||||
--Chuck Hammill
|
||||
|
||||
THE LIBERTECH PROJECT
|
||||
3194 Queensbury Drive
|
||||
Los Angeles, California
|
||||
90064
|
||||
310-836-4157
|
||||
|
||||
[The above LiberTech address was updated June 1992, with the
|
||||
permission of Chuck Hammill, by:
|
||||
|
||||
Russell Earl Whitaker whitaker@eternity.demon.co.uk
|
||||
Communications Editor 71750.2413@compuserve.com
|
||||
EXTROPY: The Journal of Transhumanist Thought AMIX: RWHITAKER
|
||||
Board member, Extropy Institute (ExI)
|
||||
[.sig revised 11 September 1992 /// Send mail to eternity node]
|
||||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
Version: 2.0
|
||||
|
||||
mQCNAiqwg10AAAEEAMVNMI766ljeuW01xqXKYYV5lmDPvb+6dCQK3m1iBQdan0no
|
||||
pm35j1DIRp3UJZogAe5eimsQg1TALDhTq310OZs9+L6B/HxeX3+4BadIDad4g+xI
|
||||
lvaFY1Ut/hMdZNkw0tzNZOdUPiO4jYIyirReAUiMCm6jXzkTRITj7/vxxWtPAAUR
|
||||
tDNSdXNzZWxsIEUuIFdoaXRha2VyIDx3aGl0YWtlckBldGVybml0eS5kZW1vbi5j
|
||||
by51az4=
|
||||
=LOCL
|
||||
-----END PGP PUBLIC KEY BLOCK-----
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
That's it from here.
|
||||
|
||||
Over.
|
||||
Ono-Sendai Corporation
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [September 1992](/years/1992/09)
|
||||
|
||||
+ 1992-09-21 (Mon, 21 Sep 1992 13:24:27 +0000) - Long but good: Hammill on encryption - _whitakerNeternity.demon.co.uk.demon.co.uk ("Russell E. Whitaker")_
|
||||
|
||||
@@ -0,0 +1,47 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-09-25 - through mr. crypto
|
||||
|
||||
## Header Data
|
||||
|
||||
From: nobody@soda.berkeley.edu<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: bd1e6c9886e9a2f9780afa9c3aa25f128a88366fc2ee4796813ce0a27f66ca77<br>
|
||||
Message ID: \<9209250231.AA10851@soda.berkeley.edu\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-09-25 02:32:44 UTC<br>
|
||||
Raw Date: Thu, 24 Sep 92 19:32:44 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: nobody@soda.berkeley.edu
|
||||
Date: Thu, 24 Sep 92 19:32:44 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: through mr. crypto
|
||||
Message-ID: <9209250231.AA10851@soda.berkeley.edu>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
** I am also the technical consultant to the show, so your mail will not be
|
||||
** falling on deft ears...
|
||||
|
||||
Awwww.... it wasn't that badly engineered.
|
||||
|
||||
sho3t
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [September 1992](/years/1992/09)
|
||||
|
||||
+ 1992-09-25 (Thu, 24 Sep 92 19:32:44 PDT) - through mr. crypto - _nobody@soda.berkeley.edu_
|
||||
|
||||
@@ -0,0 +1,62 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-09-24 - New! Eric's Cheap Remailing Service. Free!
|
||||
|
||||
## Header Data
|
||||
|
||||
From: nobody@soda.berkeley.edu<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: bdccb11e37262b96d2fae5d7defb5b431acc6fb83513bf85f49373e0ee6376b5<br>
|
||||
Message ID: \<9209240027.AA27179@soda.berkeley.edu\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-09-24 00:28:41 UTC<br>
|
||||
Raw Date: Wed, 23 Sep 92 17:28:41 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: nobody@soda.berkeley.edu
|
||||
Date: Wed, 23 Sep 92 17:28:41 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: New! Eric's Cheap Remailing Service. Free!
|
||||
Message-ID: <9209240027.AA27179@soda.berkeley.edu>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
Pssst.
|
||||
|
||||
You don't know where you heard this. There's a new service available,
|
||||
and it's free.
|
||||
|
||||
If you send mail to
|
||||
|
||||
hughes@soda.berkeley.edu
|
||||
|
||||
with a header line of the form
|
||||
|
||||
Request-Remailing-To: <addressee>
|
||||
|
||||
then the software will strip off all the header lines (except the
|
||||
Subject: line) and remail it to the addressee of your choice.
|
||||
|
||||
But there's this rumor that he's saving all the message that pass
|
||||
through. Damn.
|
||||
|
||||
Mr. Crypto
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [September 1992](/years/1992/09)
|
||||
|
||||
+ 1992-09-24 (Wed, 23 Sep 92 17:28:41 PDT) - New! Eric's Cheap Remailing Service. Free! - _nobody@soda.berkeley.edu_
|
||||
|
||||
@@ -0,0 +1,95 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-09-22 - Radio program on wiretaps and encryption: Wednesday at noon
|
||||
|
||||
## Header Data
|
||||
|
||||
From: gnu<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: cf16d07098fa4977f67d9fbeb8ff6eec1d0a578559b800f719727d00fd753581<br>
|
||||
Message ID: \<9209221917.AA02319@toad.com\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-09-22 19:17:43 UTC<br>
|
||||
Raw Date: Tue, 22 Sep 92 12:17:43 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: gnu
|
||||
Date: Tue, 22 Sep 92 12:17:43 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Radio program on wiretaps and encryption: Wednesday at noon
|
||||
Message-ID: <9209221917.AA02319@toad.com>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Newsgroups: sci.crypt,alt.privacy,alt.activism
|
||||
Subject: Radio program on wiretaps and encryption: Wednesday at noon
|
||||
Message-Id: <35449@hoptoad.uucp>
|
||||
Date: 22 Sep 92 19:15:19 GMT
|
||||
|
||||
The Telecommunications Radio Project at KPFA is producing a series of
|
||||
thirteen hour-long radio programs on issues in communications. The
|
||||
first program is on the FBI's `Digital Telephony' e-z-wiretap proposal
|
||||
and the politics of encryption.
|
||||
|
||||
The first half-hour will be an introduction and a panel discussion,
|
||||
featuring Jim Bidzos of RSA Data Security; Jim Kalstrom, head of
|
||||
investigative technology for the FBI; and me, representing the
|
||||
Electronic Frontier Foundation. You can phone in questions and comments
|
||||
in the second half of the show. The call-in number is:
|
||||
|
||||
+1 800 464 5732
|
||||
|
||||
This program will be broadcast live on Wed, September 23, at noon, on
|
||||
these California stations:
|
||||
|
||||
KPFA Berkeley
|
||||
KPFK Los Angeles
|
||||
KHSU Arcata
|
||||
|
||||
These other stations will be picking up the broadcast,
|
||||
and probably transmitting it at a later time. Phone the station to find
|
||||
out when it's scheduled.
|
||||
|
||||
KMUD Redway, California KCBL Sacramento, California
|
||||
KPBS San Diego, California WMNF Tampa, Florida
|
||||
KSUI Iowa City, Iowa KSAI Minneapolis, Minnesota
|
||||
KSMU Springfield, Missouri WCPN Cleveland, Ohio
|
||||
WYSO Yellow Springs, Ohio WBAI New York, New York
|
||||
WXXI Rochester, New York WEOS Geneva, New York
|
||||
KRCL Salt Lake City, Utah KPBX Spokane, Washington
|
||||
KUOW Seattle, Washington
|
||||
|
||||
If you are not with in reach of a station that is broadcasting the
|
||||
Communications Revolution, please call your local station and pitch it
|
||||
to the program director. Have them call the Telecommincations Radio
|
||||
Project at KPFA, at +1 510 848 6767 x263 or x264.
|
||||
|
||||
Future shows (Wednesdays at noon) will cover isses like how the concept
|
||||
of libraries is changing; what information is availible to (and held
|
||||
back from) the public; and electronic democracy where the voters can
|
||||
feed back directly to goverment agencies or change the outcome of an
|
||||
election via computer networks.
|
||||
|
||||
Please tune in, and phone in good questions. See you in the airwaves!
|
||||
--
|
||||
John Gilmore gnu@toad.com -- gnu@cygnus.com -- gnu@eff.org
|
||||
"It isn't given to us to know those rare moments when people
|
||||
are wide open and the lightest touch can wither or heal."
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [September 1992](/years/1992/09)
|
||||
|
||||
+ 1992-09-22 (Tue, 22 Sep 92 12:17:43 PDT) - Radio program on wiretaps and encryption: Wednesday at noon - _gnu_
|
||||
|
||||
@@ -0,0 +1,50 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-09-26 - Hints
|
||||
|
||||
## Header Data
|
||||
|
||||
From: not_root@nowhere.com<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: dea8962389f95a613d81ddd1ee911ba94d52c9ffa1af91c5f3e2b33da1145de1<br>
|
||||
Message ID: \<9209260027.AA08573@atdt.org\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-09-26 00:27:32 UTC<br>
|
||||
Raw Date: Fri, 25 Sep 92 17:27:32 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: not_root@nowhere.com
|
||||
Date: Fri, 25 Sep 92 17:27:32 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Hints
|
||||
Message-ID: <9209260027.AA08573@atdt.org>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Most internet traffic is archived (and later Grep'd) anyway.
|
||||
If you're really that worried about it, then we should have
|
||||
been speaking in Aramaic all this time, or using encrypted
|
||||
e-mail (and I'm sure traffic which mentions the characters
|
||||
"crypt" draws attention as well, and most of the msgs on this
|
||||
mailing list have already violated that one.) I'm interested
|
||||
to see the PGP addition to the re-mailer.
|
||||
|
||||
-- Concerned, yet not overly unrealistic about it.
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [September 1992](/years/1992/09)
|
||||
|
||||
+ 1992-09-26 (Fri, 25 Sep 92 17:27:32 PDT) - Hints - _not_root@nowhere.com_
|
||||
|
||||
@@ -0,0 +1,44 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-09-24 - Interesting post to alt.cyberpunk.tech
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Mark Pesce \<osendai@well.sf.ca.us\><br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: edabc89a8f270cafcb5d558d067e5198da549c2b69c3664e175a4606e39f0898<br>
|
||||
Message ID: \<199209240744.AA20447@well.sf.ca.us\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-09-24 07:45:30 UTC<br>
|
||||
Raw Date: Thu, 24 Sep 92 00:45:30 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Mark Pesce <osendai@well.sf.ca.us>
|
||||
Date: Thu, 24 Sep 92 00:45:30 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Interesting post to alt.cyberpunk.tech
|
||||
Message-ID: <199209240744.AA20447@well.sf.ca.us>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
Thought ya'll might be interested in this....
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [September 1992](/years/1992/09)
|
||||
|
||||
+ 1992-09-24 (Thu, 24 Sep 92 00:45:30 PDT) - Interesting post to alt.cyberpunk.tech - _Mark Pesce \<osendai@well.sf.ca.us\>_
|
||||
|
||||
@@ -0,0 +1,91 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-09-22 - No Subject
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Eric Hughes \<hughesNsoda.berkeley.edu\><br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: fdf9c19e77ec3f1a9bbc6bc19266d565b89d19dbd0ad369f5a2e800af3fc9558<br>
|
||||
Message ID: \<9209220543.AA25094@soda.berkeley.edu\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-09-22 05:47:51 UTC<br>
|
||||
Raw Date: Mon, 21 Sep 92 22:47:51 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Eric Hughes <hughesNsoda.berkeley.edu>
|
||||
Date: Mon, 21 Sep 92 22:47:51 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: No Subject
|
||||
Message-ID: <9209220543.AA25094@soda.berkeley.edu>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
Welcome to the cypherpunks mailing list.
|
||||
|
||||
We have a real mailing list now, and not just a mail alias on my
|
||||
account. Thanks to John Gilmore for space on hoptoad and Hugh Daniel
|
||||
for setting things up.
|
||||
|
||||
Mail to the list members at
|
||||
|
||||
cypherpunks@toad.com
|
||||
|
||||
Request additions or deletions, talk to the list maintainer (me, Eric
|
||||
Hughes) at
|
||||
|
||||
cypherpunks-request@toad.com
|
||||
|
||||
Tell your friends about the list and have them join if they wish, and
|
||||
have them do the same, but please do not post the list address yet.
|
||||
We'd like to have a core group working before we advertise to avoid
|
||||
diffusion of interest at the outset.
|
||||
|
||||
----------------------
|
||||
|
||||
ANNOUNCEMENT
|
||||
|
||||
Second Meeting -- October 10, 1992
|
||||
|
||||
|
||||
The second meeting will be held at the new Cygnus offices. Exact
|
||||
address and directions to follow.
|
||||
|
||||
We do not have an exact agenda yet, but one should be arriving in the
|
||||
next few days. Please mark you calendars now and start telling your
|
||||
friends.
|
||||
|
||||
For this meeting and until further announced, we are using a
|
||||
transitive trust system for invitations. Invite anybody you want and
|
||||
let them invite anybody they want and so on.
|
||||
|
||||
The crypto-anarchy game we tried out at the first meeting was as good
|
||||
a success as we could have hoped for from an untested idea. The game
|
||||
seems useful and fun enough to warrant continued play and play
|
||||
testing, so we'll be playing again at this and future meetings.
|
||||
|
||||
We observed several interesting emergent behaviors in the first
|
||||
session, including resellers and reputation behaviors. We'll play a
|
||||
two hour session this time and discuss it afterwards.
|
||||
|
||||
|
||||
Eric
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [September 1992](/years/1992/09)
|
||||
|
||||
+ 1992-09-22 (Mon, 21 Sep 92 22:47:51 PDT) - No Subject - _Eric Hughes \<hughesNsoda.berkeley.edu\>_
|
||||
|
||||
@@ -0,0 +1,79 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-30 - Subscribe
|
||||
|
||||
## Header Data
|
||||
|
||||
From: edgar@spectrx.Saigon.COM (Edgar W. Swank)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 0162570b9d666ee011a10386b278f1a79e9e438ad0c6f94161324578b3c0974c<br>
|
||||
Message ID: \<iykFTB5w165w@spectrx.saigon.com\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-30 19:02:40 UTC<br>
|
||||
Raw Date: Fri, 30 Oct 92 12:02:40 PPE<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: edgar@spectrx.Saigon.COM (Edgar W. Swank)
|
||||
Date: Fri, 30 Oct 92 12:02:40 PPE
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Subscribe
|
||||
Message-ID: <iykFTB5w165w@spectrx.saigon.com>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
I got this address off Extropians. Sorry if there's a separate
|
||||
"request" address I should be using, but I don't know what it is.
|
||||
|
||||
Please add me to your mailing list.
|
||||
|
||||
Please use one of these addresses:
|
||||
|
||||
Internet: edgar@spectrx.saigon.com
|
||||
UUCP: szebra!spectrx!edgar
|
||||
|
||||
The address in the network header may not work.
|
||||
|
||||
I'm familiar with how PGP 2.0 works, including some bugs. I'm trying
|
||||
to start a low-cost public key registry, which can verify public
|
||||
keys independent of the network.
|
||||
|
||||
Here is my signed 512-bit public key:
|
||||
|
||||
-----Type bits/keyID Date User ID
|
||||
-----pub 512/4F0C47 1992/09/26 Edgar W. Swank <edgar@spectrx.saigon.com>
|
||||
-----sig! 67F70B 1992/10/14 Philip R. Zimmermann
|
||||
<prz@sage.cgd.ucar.edu>
|
||||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
Version: 2.02
|
||||
|
||||
mQBNAirEvxwAAAECAMUkLHrx6JH45BMd4bxZDNQO3HrLmhZSvsHJzLH9+90BTbuX
|
||||
3Kvo0pSLCh98m2Abu/LtoHDggJOKxRGee+5PDEcABRG0KUVkZ2FyIFcuIFN3YW5r
|
||||
IDxlZGdhckBzcGVjdHJ4LnNhaWdvbi5jb20+iQCVAgUQKtu1h+J13g7/Z/cLAQFg
|
||||
nAQAjRlKmmSvDMZUWKM2BQFmpqHBiaCg7OLKEFng9pZGx2qzYHCZOL+a9A0exN9P
|
||||
RAtV6bEm9+F8VoOEpVyF346XJwwE1e/13IETHFi7Jd9fbjsw8voQFqz69X2p8xoE
|
||||
LxYtqSlwfOQ3S7JOyyx4/p04fG/JZuRJicVaUIRlDKHJPJ0=
|
||||
=tsbS
|
||||
-----END PGP PUBLIC KEY BLOCK-----
|
||||
|
||||
--
|
||||
edgar@spectrx.saigon.com (Edgar W. Swank)
|
||||
SPECTROX SYSTEMS +1.408.252.1005 Silicon Valley, Ca
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-30 (Fri, 30 Oct 92 12:02:40 PPE) - Subscribe - _edgar@spectrx.Saigon.COM (Edgar W. Swank)_
|
||||
|
||||
@@ -0,0 +1,47 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-17 - Re: Game items...
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Arthur Abraham \<a2@well.sf.ca.us\><br>
|
||||
To: hh@soda.berkeley.edu<br>
|
||||
Message Hash: 019cdf477893905cbdcbdba0dcfe5805886c1a979a064b38f898dc8d87e9e89d<br>
|
||||
Message ID: \<199210170104.AA06520@well.sf.ca.us\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-17 01:04:53 UTC<br>
|
||||
Raw Date: Fri, 16 Oct 92 18:04:53 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Arthur Abraham <a2@well.sf.ca.us>
|
||||
Date: Fri, 16 Oct 92 18:04:53 PDT
|
||||
To: hh@soda.berkeley.edu
|
||||
Subject: Re: Game items...
|
||||
Message-ID: <199210170104.AA06520@well.sf.ca.us>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
re RU-486: has recently been proven to make a nifty "morning-after" pill (is
|
||||
this abortion? only if you believe in the sanctity of blastula) and a study
|
||||
in (I believe) S. CA. is beginning on effectiveness in brain tumors... seems
|
||||
as if this drug has possible wide theropeutic (aw, who can spell?) uses
|
||||
beyond directly sex-lined situations. And RU-P5 is due out 2Q93.
|
||||
-a2.
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-17 (Fri, 16 Oct 92 18:04:53 PDT) - Re: Game items... - _Arthur Abraham \<a2@well.sf.ca.us\>_
|
||||
|
||||
@@ -0,0 +1,55 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-19 - one time pads.
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Eric Hughes \<hughes@soda.berkeley.edu\><br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 01dd3338e31b454f5ddf16d8d379d36e6690381811c64d219d0f07c6a96a902b<br>
|
||||
Message ID: \<9210191548.AA01490@soda.berkeley.edu\><br>
|
||||
Reply To: \<9210190136.1.13588@cup.portal.com\><br>
|
||||
UTC Datetime: 1992-10-19 15:48:48 UTC<br>
|
||||
Raw Date: Mon, 19 Oct 92 08:48:48 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Eric Hughes <hughes@soda.berkeley.edu>
|
||||
Date: Mon, 19 Oct 92 08:48:48 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: one time pads.
|
||||
In-Reply-To: <9210190136.1.13588@cup.portal.com>
|
||||
Message-ID: <9210191548.AA01490@soda.berkeley.edu>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
Keith's CD-for-a-pad idea is a variant of a book code. In a book
|
||||
code, parts of the key are in various standard books, often the bible.
|
||||
|
||||
Advantages: easier key distribution.
|
||||
|
||||
Disadvantages: key material is public. Should an internal spy learn
|
||||
the few bits of addressing information (which CD, where), the cipher
|
||||
is compromised.
|
||||
|
||||
Eric
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-19 (Mon, 19 Oct 92 02:21:17 PDT) - [one time pads.](/years/1992/10/ed656b95f52bf63782f7b835e6ae14c1bd892422ed6422815953acd9285309f7) - _hkhenson@cup.portal.com_
|
||||
+ 1992-10-19 (Mon, 19 Oct 92 08:48:48 PDT) - one time pads. - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
+ 1992-10-20 (Mon, 19 Oct 92 17:09:14 PDT) - [one time pads.](/years/1992/10/aa4ce8970b83924042b4db610a7bd986514f98bf7dffd14a05363fce934e7c9c) - _pmetzger@shearson.com (Perry E. Metzger)_
|
||||
|
||||
@@ -0,0 +1,45 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-16 - Re: Who uses ethernet (Mr Squirrel?)
|
||||
|
||||
## Header Data
|
||||
|
||||
From: George A. Gleason \<gg@well.sf.ca.us\><br>
|
||||
To: shipley@tfs.COM<br>
|
||||
Message Hash: 01dddd6d92298c29d33c6a80d463aafff03a2ab4ad339017eeac7855d5d198f5<br>
|
||||
Message ID: \<199210160927.AA11421@well.sf.ca.us\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-16 09:28:15 UTC<br>
|
||||
Raw Date: Fri, 16 Oct 92 02:28:15 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: George A. Gleason <gg@well.sf.ca.us>
|
||||
Date: Fri, 16 Oct 92 02:28:15 PDT
|
||||
To: shipley@tfs.COM
|
||||
Subject: Re: Who uses ethernet (Mr Squirrel?)
|
||||
Message-ID: <199210160927.AA11421@well.sf.ca.us>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Tom, if you're interested in ISDN, my organisation (Integrated Signal) will
|
||||
probably be in a position to hook you up early next year. We're 90% certain
|
||||
to be putting in a network very close to your neighborhood.
|
||||
-gg
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-16 (Fri, 16 Oct 92 02:28:15 PDT) - Re: Who uses ethernet (Mr Squirrel?) - _George A. Gleason \<gg@well.sf.ca.us\>_
|
||||
|
||||
@@ -0,0 +1,182 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-13 - New remailer...
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Hal \<74076.1041@CompuServe.COM\><br>
|
||||
To: CYPHERPUNKS \<CYPHERPUNKS@TOAD.COM\><br>
|
||||
Message Hash: 027aedd907cd2259e85e2d6a68d28423eb507129b907c2ae6cff84c4d4d1fe90<br>
|
||||
Message ID: \<921013203148_74076.1041_DHJ21-1@CompuServe.COM\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-13 20:37:43 UTC<br>
|
||||
Raw Date: Tue, 13 Oct 92 13:37:43 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Hal <74076.1041@CompuServe.COM>
|
||||
Date: Tue, 13 Oct 92 13:37:43 PDT
|
||||
To: CYPHERPUNKS <CYPHERPUNKS@TOAD.COM>
|
||||
Subject: New remailer...
|
||||
Message-ID: <921013203148_74076.1041_DHJ21-1@CompuServe.COM>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
I have been experimenting with Eric's remailing software on
|
||||
the Sun 4 I use at work. This is what I've found.
|
||||
|
||||
First, Eric's descriptions of how all the different software
|
||||
components work together have been very helpful. The software
|
||||
has gone through three revisions as Eric added new features, so
|
||||
I implemented them in that order - first the basic remailer,
|
||||
then adding the "##" and "::" support for header management.
|
||||
|
||||
(I had to get perl and slocal before I could get started.
|
||||
Luckily my system already uses sendmail.)
|
||||
|
||||
Basically, I was able to put the parts together the way Eric
|
||||
described and have it work. I was able to send messages and
|
||||
have them remailed. I even did some tests bouncing mail between
|
||||
my remailer and Eric's.
|
||||
|
||||
Then I tried adding a new feature to the remailer - automatic
|
||||
message decryption using PGP. It's not really very secure since
|
||||
anyone with root privileges at my site can see my pass phrase,
|
||||
but my site is pretty isolated (a 2400 baud modem is the only link
|
||||
to the outside world). For this I had to add one line to Eric's
|
||||
model .maildelivery file to invoke my PGP filter, and had to write
|
||||
about a five line shell script to run PGP in a useful way. I
|
||||
am still tuning this a little bit but I can send the exact scripts
|
||||
out when people are ready for them.
|
||||
|
||||
One nice thing about this is that, with my remailer plus Eric's,
|
||||
and with the decryption option, you can now send anonymous messages
|
||||
for which no one person can tell that you did it. What you would
|
||||
do is to send the message first through Eric's remailer, so I
|
||||
don't know where it came from, then through my remailer, but with
|
||||
the message encrypted so that Eric can't tell where it's going after
|
||||
it leaves me. If more people will run remailers then we'll have
|
||||
much more security.
|
||||
|
||||
I will now tell you how to use it, in case you want to experiment.
|
||||
But remember that all messages are going across an intermittently-
|
||||
polled 2400 baud modem, so don't expect fast turnaround and please
|
||||
don't send a large volume of messages. Also, please don't pass
|
||||
information about this remailer beyond this list, for now.
|
||||
|
||||
The remailer is at hal@ghs.com. The basic remailing operation is
|
||||
as Eric has described: either put "Request-Remailing-To: <dest>" in
|
||||
the header of the message, or put, as the first two lines of the
|
||||
body of your message:
|
||||
|
||||
::
|
||||
Request-Remailing-To: <dest>
|
||||
|
||||
And follow these two lines with a blank line, then the message to
|
||||
be forwarded.
|
||||
|
||||
Decryption is just a little complicated. The thing to remember is
|
||||
that you want to do more than just have me decrypt the message. You
|
||||
want me to then remail the message after decryption. This means
|
||||
that you should prepare a message with remailing instructions as
|
||||
above, then encrypt the whole thing, including the "::" and
|
||||
"Request-Remailing-To:" lines. Encrypt using PGP with the public
|
||||
key I show below, and use the -a flag for Ascii output.
|
||||
|
||||
This will create a PGP output file, typically with the extension .asc.
|
||||
The first line will be:
|
||||
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
Now, you can send this message to me, but you have to do one more
|
||||
thing. You have to mark it as an encrypted message, by putting the
|
||||
line "Encrypted: PGP" in the header. If you can't put stuff into
|
||||
the headers of messages, then use Eric's "::" feature and add the
|
||||
following two lines, then a blank line, before "-----BEGIN PGP MESSAGE-----":
|
||||
|
||||
::
|
||||
Encrypted: PGP
|
||||
|
||||
Don't forget the blank line after these two.
|
||||
|
||||
Now, this message can be sent to my remailer. It will be decrypted
|
||||
and then remailed to whomever you requested.
|
||||
|
||||
I know this sounds complicated, so let me break it down into steps:
|
||||
|
||||
1. Create the message.
|
||||
|
||||
2. Add "::" and "Request-Remailing-To: <dest>" and a blank line to the
|
||||
top.
|
||||
|
||||
3. Encrypt the whole file using PGP and the public key below.
|
||||
|
||||
4. Add "::" and "Encrypted: PGP" and a blank line to the top of
|
||||
the encrypted file.
|
||||
|
||||
5. Send it to hal@ghs.com.
|
||||
|
||||
That's not so bad, is it?
|
||||
|
||||
Now, if you're really adventurous, here's how to do the double-remailing
|
||||
process I described above, the one which keeps any one remailer from
|
||||
knowing who's talking to whom.
|
||||
|
||||
1. Create the message.
|
||||
|
||||
2. Add "::" and "Request-Remailing-To: <dest>" and a blank line to the
|
||||
top.
|
||||
|
||||
3. Encrypt the whole file using PGP and the public key below.
|
||||
|
||||
4. Add "::" and "Request-Remailing-To: hal@ghs.com", then a blank line,
|
||||
then "##" then "Encrypted: PGP", then a blank line, to the top of
|
||||
the encrypted file.
|
||||
|
||||
5. Send it to hughes@soda.berkeley.edu
|
||||
|
||||
The only complicated step is step 4, where you put in the remailing
|
||||
request to go from Eric's system to mine, and use the "##" line so
|
||||
that the outgoing message has "Encrypted: PGP" in the header.
|
||||
|
||||
If you want real security, encrypt the message using your friend's
|
||||
public key after step 1 and send that. Then nobody will even know
|
||||
what you're saying, let alone who you're talking to.
|
||||
|
||||
As promised, here's the public key for my remailer:
|
||||
|
||||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
Version: 2.01
|
||||
|
||||
mQBNAirY9EoAAAEB/iuDBqpeJ8gsNQwJNRYWBxH7uP95ApQ92CDhCmuSEJ0Tta0l
|
||||
oCrC+8Br+D7Nfotb7hJlI0A1CYGAlmCsRO8VEmkABRO0H1JlbWFpbGluZyBTZXJ2
|
||||
aWNlIDxoYWxAZ2hzLmNvbT6JAJUCBRAq2ISQqBMDr1ghTDcBARYlBADCjkCkIDvA
|
||||
7QFtpYUlYjz/2U+/oDuMZBDlmAw8BCg3sdJG7hnxPE4yVgKoH/ozsb23pbFTPB8H
|
||||
WNEjqTqixNybOKSKH9T8iCaRDA8+bS6xPN4YlWKD/Wg2EiyuOjD3v/vWgiZXzMR5
|
||||
hpe0CYVJ6bM++hptXu+JxqDReJIot5FFbQ==
|
||||
=p8FS
|
||||
-----END PGP PUBLIC KEY BLOCK-----
|
||||
|
||||
|
||||
Hal
|
||||
74076.1041@compuserve.com
|
||||
|
||||
P.S. Coming soon: anonymous return addresses!
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-13 (Tue, 13 Oct 92 13:37:43 PDT) - New remailer... - _Hal \<74076.1041@CompuServe.COM\>_
|
||||
|
||||
@@ -0,0 +1,53 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-31 - Re: remove from mailing list
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Andrew Purshottam \<andy@autodesk.com\><br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 028104239841ce7ed12abdf25e98b3f8d6f6ed3ca45ae4c095e115cb184c3b35<br>
|
||||
Message ID: \<9210302349.AA01575@meefun.YP.acad\><br>
|
||||
Reply To: \<9210242237.aa22143@src4src.linet.org\><br>
|
||||
UTC Datetime: 1992-10-31 00:50:53 UTC<br>
|
||||
Raw Date: Fri, 30 Oct 92 17:50:53 PPE<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Andrew Purshottam <andy@autodesk.com>
|
||||
Date: Fri, 30 Oct 92 17:50:53 PPE
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Re: remove from mailing list
|
||||
In-Reply-To: <9210242237.aa22143@src4src.linet.org>
|
||||
Message-ID: <9210302349.AA01575@meefun.YP.acad>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Are you Jethroes still using berkeley mail? Get a real mail user
|
||||
agent, like MH, and you can write a pattern that collects all the mail
|
||||
sent to a given address into a mail folder, effectively making your
|
||||
own digest.
|
||||
|
||||
Andy
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-25 (Sat, 24 Oct 92 21:11:19 PDT) - [remove from mailing list](/years/1992/10/9bfdbcec27940a27cd9e7024fe2b938174899c51cbfa7016369746042e754a55) - _joeb@arden.linet.org_
|
||||
+ 1992-10-31 (Fri, 30 Oct 92 17:50:53 PPE) - Re: remove from mailing list - _Andrew Purshottam \<andy@autodesk.com\>_
|
||||
|
||||
@@ -0,0 +1,48 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-12 - Next meeting: Nov. 21
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Eric Hughes \<hughes@soda.berkeley.edu\><br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 033ae3ee73aaa2679f7aa880c4601e687ba98804670907595faf860d3d0c2981<br>
|
||||
Message ID: \<9210121527.AA23015@soda.berkeley.edu\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-12 15:20:43 UTC<br>
|
||||
Raw Date: Mon, 12 Oct 92 08:20:43 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Eric Hughes <hughes@soda.berkeley.edu>
|
||||
Date: Mon, 12 Oct 92 08:20:43 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Next meeting: Nov. 21
|
||||
Message-ID: <9210121527.AA23015@soda.berkeley.edu>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
The next physical cypherpunks meeting was decided on Saturday at
|
||||
that meeting. It will be Saturday, November 21, starting at noon at
|
||||
the Cygnus Support offices in Mountain View. I am announcing the date
|
||||
now so that you can put it on your calendar.
|
||||
|
||||
Eric
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-12 (Mon, 12 Oct 92 08:20:43 PDT) - Next meeting: Nov. 21 - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
|
||||
@@ -0,0 +1,60 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-21 - TEMPEST, Eavesdropping
|
||||
|
||||
## Header Data
|
||||
|
||||
From: pmetzger@shearson.com (Perry E. Metzger)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 041ccd8442454608e3dec5534526a715161e63caf6d81ac5e2f5ea068bf6c330<br>
|
||||
Message ID: \<9210211934.AA09886@newsu.shearson.com\><br>
|
||||
Reply To: \<9210211711.AA11833@soda.berkeley.edu\><br>
|
||||
UTC Datetime: 1992-10-21 21:07:37 UTC<br>
|
||||
Raw Date: Wed, 21 Oct 92 14:07:37 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: pmetzger@shearson.com (Perry E. Metzger)
|
||||
Date: Wed, 21 Oct 92 14:07:37 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: TEMPEST, Eavesdropping
|
||||
In-Reply-To: <9210211711.AA11833@soda.berkeley.edu>
|
||||
Message-ID: <9210211934.AA09886@newsu.shearson.com>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
>From: Eric Hughes <hughes@soda.berkeley.edu>
|
||||
|
||||
>>Their chief concern doesn't seem to be folks like us, but rather
|
||||
>>concerns about vans parking outside high tech and defense contractors
|
||||
>>and slurping up what they can [...]
|
||||
|
||||
>When banks start signing with private keys, then we get an even more
|
||||
>interesting monitoring problem.
|
||||
|
||||
Consider that the international clearing and settlement systems for
|
||||
interbank transactions process several TRILLION a day in electronic
|
||||
transactions, and then consider what diverting just a tiny little bit
|
||||
of that to yourself would be worth. Security in banks is ALREADY
|
||||
crucial.
|
||||
|
||||
Perry
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-21 (Wed, 21 Oct 92 10:11:42 PDT) - [TEMPEST, Eavesdropping](/years/1992/10/4d3c0b68b446f11f664d02d6696ac26026c7e92e0e14c93cbc6235b7eb4495c3) - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
+ 1992-10-21 (Wed, 21 Oct 92 14:07:37 PDT) - TEMPEST, Eavesdropping - _pmetzger@shearson.com (Perry E. Metzger)_
|
||||
|
||||
@@ -0,0 +1,88 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-09 - New feature of the remailer
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Eric Hughes \<hughes@soda.berkeley.edu\><br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 07ae1782d78a668866ed682f440cba74ebbd27148657ab8bcb66f1a7d5c36516<br>
|
||||
Message ID: \<9210090703.AA26448@soda.berkeley.edu\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-09 06:56:11 UTC<br>
|
||||
Raw Date: Thu, 8 Oct 92 23:56:11 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Eric Hughes <hughes@soda.berkeley.edu>
|
||||
Date: Thu, 8 Oct 92 23:56:11 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: New feature of the remailer
|
||||
Message-ID: <9210090703.AA26448@soda.berkeley.edu>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
New! Just finished. Fidonet support. Dumb mailer support. Incoming
|
||||
header line pasting.
|
||||
|
||||
Here's what's going on. There are a lot of mailers, the Fidonet
|
||||
gateway in particular, which don't allow you to put arbitrary header
|
||||
lines in your outgoing messages. Previously people using these
|
||||
systems couldn't use the remailer because they couldn't put the
|
||||
necessary "Request-Remailing-To:" in the header.
|
||||
|
||||
Now they can. Instead of putting header lines into actual header, I
|
||||
now support a syntax which allows header lines to be _added_ to the
|
||||
header on incoming mail. These extended header lines are in the body
|
||||
of the message proper, but a filter on incoming mail effectively
|
||||
adds them to the header.
|
||||
|
||||
This allows anybody who can send me mail with a reasonably unmangled
|
||||
body to use any feature of the remailer that should ever get written.
|
||||
|
||||
Example:
|
||||
|
||||
------- cut here -------
|
||||
|
||||
To: hughes@soda.berkeley.edu
|
||||
From: Secret_Squirrel@treehouse.com
|
||||
Subject: Mrs. Tree's secret recipe for pinole
|
||||
|
||||
::
|
||||
Request-Remailing-To: Crusader_Rabbit@rocky.moosylvania.org
|
||||
|
||||
I just paid $2600 for this recipe [etc. etc.]
|
||||
[...]
|
||||
|
||||
------- cut here -------
|
||||
|
||||
If "::" is on the first body line all by itself, whatever lines follow
|
||||
up to the first blank line will be appended to the header when it is
|
||||
scanned for special instruction lines.
|
||||
|
||||
This new feature is completely modular. It doesn't (seem to) break
|
||||
any of the other existing features. I'll post the source with an
|
||||
explanation tomorrow.
|
||||
|
||||
In the meantime, try it out.
|
||||
|
||||
Eric
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-09 (Thu, 8 Oct 92 23:56:11 PDT) - New feature of the remailer - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
+ 1992-10-09 (Fri, 9 Oct 92 00:14:13 PDT) - [Re: New feature of the remailer](/years/1992/10/469abb614c7863da4b08c8492ddedd9268dc6c9ee9e116c72675887290677963) - _Peter Shipley \<shipley@tfs.COM\>_
|
||||
|
||||
@@ -0,0 +1,218 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-28 - Threat to our privacy
|
||||
|
||||
## Header Data
|
||||
|
||||
From: pmetzger@shearson.com (Perry E. Metzger)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 098ca600122482f9530453b1ebec0212ca1c89ee459be44f395c8b1c1a939bde<br>
|
||||
Message ID: \<9210272346.AA11735@newsu.shearson.com\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-28 00:23:08 UTC<br>
|
||||
Raw Date: Tue, 27 Oct 92 17:23:08 PPE<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: pmetzger@shearson.com (Perry E. Metzger)
|
||||
Date: Tue, 27 Oct 92 17:23:08 PPE
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Threat to our privacy
|
||||
Message-ID: <9210272346.AA11735@newsu.shearson.com>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
For Cypherpunks: A copy of mail I just sent to...
|
||||
libernet@dartmouth.edu, extropians@gnu.ai.mit.edu,
|
||||
prz@sage.cgd.ucar.edu, mike@eff.org, mkapor@eff.org
|
||||
|
||||
|
||||
[This is being sent out to a wide audiance. If you receive this, its
|
||||
because
|
||||
|
||||
My friends, its rare of me to try to encourage panic. Occassionally,
|
||||
however, by panicing early we can avert a disaster later on.
|
||||
|
||||
Risks, an internet mailing list, reported about a week ago on a
|
||||
proposal by Dr. Dorothy Denning, one of the most prominent people in
|
||||
the field of cryptography, that copies of all private encryption keys
|
||||
associated with public key cryptographic systems be held, effectively
|
||||
by the government, to permit them to read people's encrypted messages
|
||||
to each other. Naturally, such invasions of privacy will only be
|
||||
permitted "when a warrant is produced". It has been suggested that
|
||||
this idea might be taken up by several government agencies for
|
||||
"review".
|
||||
|
||||
Many have noted that the dawning of cheap and effective cryptographic
|
||||
systems could spell the end of the ability of governments to invade
|
||||
people's privacy. Unfortunately, it appears that the government and
|
||||
its cronies have also realized this, and intend to take preemptive
|
||||
action. Our notion of civil rights has decayed so far that it is now
|
||||
considered a citizen's duty to not merely be quiet while he is
|
||||
enslaved but to actively cooperate with his own enslavement. Not
|
||||
merely must we put up with the indignity of the government being
|
||||
granted the right to read our papers and communications to each other,
|
||||
not merely has the FBI attempted to get legislation passed to make
|
||||
phone companies give them easier access to tap phone lines under color
|
||||
of "maintaining the current capability in the presense of new
|
||||
technology", but now it is suggested that we ordinary citizens must
|
||||
personally cooperate to make it easier for them to read our
|
||||
communications. We will be branded criminals if we fail to cooperate,
|
||||
presuming that ideas like this are enacted.
|
||||
|
||||
It is crucial that the fiends proposing this be convinced that
|
||||
resistance will be too high to implement their plan. It is crucial
|
||||
that before they can even propose legislation that the threat here be
|
||||
brought to the attention of the news media. If the currently proposed
|
||||
FBI legislation were passed, a dictatorial government would have all
|
||||
the tools it would need to tap all the phones in the country -- the
|
||||
only thing restraining that behavior would be a system of warrants
|
||||
that could disappear with a mere change in attitude. If Denning's more
|
||||
serious and sinister idea were proposed for future enactment as
|
||||
legislation (this has not yet been proposed), it would become
|
||||
impossible for individuals to take any action to protect their own
|
||||
communications privacy from a dictatorial regime, even ignoring the
|
||||
question of abuses that could occur right now. I'm convinced that the
|
||||
only thing that prevented the FBI bill from passing this year was the
|
||||
fact that media attention was brought to bear. Its important that this
|
||||
new proposal be exposed to similar sunshine. Far be it for me to
|
||||
suggest restraint of free speech, but I would like to see people
|
||||
think of making such suggestions as having the social acceptability of
|
||||
calling a black person "nigger".
|
||||
|
||||
Here, for reference, is a copy of an article Dr. Denning just posted
|
||||
to sci.crypt on usenet.
|
||||
|
||||
I encourage people, rather than discussing this matter on libernet or
|
||||
extropians, to discuss this on sci.crypt where the topic is just
|
||||
breaking.
|
||||
|
||||
Perry Metzger
|
||||
|
||||
----------------------------------------------------------------------
|
||||
|
||||
Article 6275 of sci.crypt:
|
||||
Path: shearson.com!uunet!uunet!think.com!sdd.hp.com!zaphod.mps.ohio-state.edu!darwin.sura.net!guvax.acc.georgetown.edu!denning
|
||||
From: denning@guvax.acc.georgetown.edu
|
||||
Newsgroups: sci.crypt
|
||||
Subject: Re: A Trial Balloon on Registered Keys
|
||||
Message-ID: <1992Oct27.143737.1574@guvax.acc.georgetown.edu>
|
||||
Date: 27 Oct 92 14:37:37 -0500
|
||||
Distribution: world
|
||||
Organization: Georgetown University
|
||||
Lines: 94
|
||||
|
||||
The posting about the proposal I made at the NCSC for key registration
|
||||
is essentially correct. Let me add to it the following:
|
||||
|
||||
1. The government is not taking any action to curb crypto and is
|
||||
unlikely to take any such action in the near future. No proposal has
|
||||
been made and no government agency that I am aware of has plans to
|
||||
make such a proposal. The closest we've had to a proposal was a "Sense
|
||||
of Congress" resolution in Senate Bill 266 over a year ago. This
|
||||
would not have mandated anything, but said it was the sense of
|
||||
Congress that service providers should provide accesss to the
|
||||
plaintext of encrypted communications under a court order. It got a lot of
|
||||
opposition and was withdrawn. Thus, don't panic folks -- this was just me
|
||||
making a suggestion. I didn't realize I had that much clout to cause
|
||||
such a stir and call to arms! I expect that the next step will be government
|
||||
sponsored discussions about crypto policy, probably sponsored by NIST,
|
||||
at the recommendation of the Computer System Security Advisory Board
|
||||
headed by Willis Ware. That will provide a forum to work through these
|
||||
issues.
|
||||
|
||||
2. The reason I made the proposal is because I am concerned that we
|
||||
may be facing a major crisis in law enforcement. I expect many of
|
||||
you will say "that's wonderful" but I don't see it that way.
|
||||
Electronic surveillance has been an essential tool in preventing
|
||||
serious crimes such as terrorist attacks and destabilizing organized crime.
|
||||
The economic benefits alone are estimated to be in the billions. This
|
||||
issue is not about snooping on innocent citizens but about doing what
|
||||
we can do prevent major crimes that could seriously disrupt other
|
||||
liberties. The problem is likely to get even worse if criminals know
|
||||
they use the telecommunications systems without any chance of getting
|
||||
caught.
|
||||
|
||||
3. My proposal was to register your private key with a trustee,
|
||||
different from the government. The key would be encrypted under some
|
||||
other public key so the trustee couldn't decrypt it. I have suggested
|
||||
it be the key of the DOJ, but it could be another independent trustee.
|
||||
I believe this would provide acceptably good protection since someone
|
||||
would need to get a court order and then the cooperation of 3 agencies
|
||||
to get at your communications: the telecommunications provider (to get
|
||||
the bit stream), the first trustee (to get the encrypted key), and
|
||||
the second to decrypt it. Experience with the telecom providers has
|
||||
been that they are very fussy about court orders -- you have to get
|
||||
the semicolons right!
|
||||
|
||||
You can get even more security by using Silvio Micali's "fair
|
||||
public-key cryptosystem" approach. Called "fair" because it is
|
||||
designed to strike a balance between the needs of the Government and
|
||||
those of the citizens. With his approach, you would break your key
|
||||
up into 5 parts and give it to different trustees. All 5 parts
|
||||
are needed to reassemble it, but it is possible to veryify the parts
|
||||
individually and as a whole without putting them together --
|
||||
ingenious! He presented this at CRYPTO '92.
|
||||
|
||||
4. Someone suggested that law enforcement routinely taps without
|
||||
court order. This is an ungrounded claim for which I have never
|
||||
seen any evidence. Regardless, their ability to do this is
|
||||
disappearing with the new digital based technologies. They need the
|
||||
help of the service providers, who in turn ask for court orders.
|
||||
Court orders are not all that easy to get as law enforcers have to
|
||||
document why other approaches have failed etc.
|
||||
|
||||
5. Many people have noted that you could not enforce key
|
||||
registration. They may be right, but I am not throwing in the towel
|
||||
yet. Let's take phones, which is what law enforcers are most
|
||||
interested in. Products are emerging that you can attach to your
|
||||
phone and that will do DES encryption. Criminals and everyone
|
||||
else are most likely to use commercial products -- easiest to
|
||||
get and cheapest. The products could be designed so key registration
|
||||
would essentially be part of the sales process.
|
||||
|
||||
There can be social benefit to government regulation even when
|
||||
regulation is not 100% successful. None of our laws prevent the
|
||||
acts they outlaw. But this does not mean we should get rid of
|
||||
all laws.
|
||||
|
||||
6. Some people have said we should not give up our privacy to the
|
||||
government. But the constitution does not give us absolute privacy.
|
||||
We are protected from unreasonable searches and seizures, but not
|
||||
reasonable ones in response to "probable cause" of crime. In all
|
||||
areas of our lives, the government can invade our privacy if they
|
||||
have good reason to believe we are engaged in major criminal activity.
|
||||
They can break into our homes, our safes, and so on. Do we really
|
||||
want a society where electronic communications cannot ever be broken
|
||||
when there is good reason to believe some major threat against society
|
||||
is being planned?
|
||||
|
||||
Thank you for your comments and for encouraging those on the other
|
||||
news groups to move over to sci.crypt. I'll try to keep up with
|
||||
this newsgroup and respond to other comments if appropriate, but
|
||||
I honestly can't track them all.
|
||||
|
||||
Dorothy Denning
|
||||
denning@cs.georgetown.edu (posting from guvax)
|
||||
|
||||
|
||||
|
||||
|
||||
----------------------------------------------------------------------
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-28 (Tue, 27 Oct 92 17:23:08 PPE) - Threat to our privacy - _pmetzger@shearson.com (Perry E. Metzger)_
|
||||
|
||||
@@ -0,0 +1,73 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-23 - Re: Keystone
|
||||
|
||||
## Header Data
|
||||
|
||||
From: gnu@cygnus.com<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 0bfa1d7d1f80cbd3ce39cc23172cc4e724e96af15fbdaf8df16e75cb89f68a9c<br>
|
||||
Message ID: \<9210230728.AA25822@cygnus.com\><br>
|
||||
Reply To: \<9210230622.AA26831@soda.berkeley.edu\><br>
|
||||
UTC Datetime: 1992-10-23 07:28:19 UTC<br>
|
||||
Raw Date: Fri, 23 Oct 92 00:28:19 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: gnu@cygnus.com
|
||||
Date: Fri, 23 Oct 92 00:28:19 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Re: Keystone
|
||||
In-Reply-To: <9210230622.AA26831@soda.berkeley.edu>
|
||||
Message-ID: <9210230728.AA25822@cygnus.com>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
> "A provider of communications services cannot be held liable for the
|
||||
> consequences of encrypted communications that pass though its system."
|
||||
|
||||
Far too simple. Suppose the provider is a BBS operator who *knows* what
|
||||
their users are passing through the system? Suppose the provider has
|
||||
keys to the encrypted communications? Suppose those keys are only to be
|
||||
used under duress (e.g. under a court order)? Suppose the provider
|
||||
is a parent and the user is their teenage daughter? Suppose the
|
||||
encryption is easily breakable?
|
||||
|
||||
The principle you are looking for is that if the service provider has
|
||||
no *control* over the content, then they should have no *liability*
|
||||
for it either. The courts are gradually making that happen. But
|
||||
control relates directly to the specific facts of the particular case --
|
||||
not whether encryption is in use.
|
||||
|
||||
The case law on liability for content is gradually being made. So
|
||||
far, no particularly horrible precedents have been set (I don't think
|
||||
there are precedents yet in the arrest-the-record-store-owner-for-rap-
|
||||
records-the-cops-don't-like issue). In a good decision, Compuserve
|
||||
was let off the hook for a message sent by someone who Compuserve even
|
||||
paid to moderate a corner of their service -- because Compuserve
|
||||
didn't control the content of that corner.
|
||||
|
||||
I realize that this group has a tendency toward extremism, but let's
|
||||
temper that with a bit of wisdom, too.
|
||||
|
||||
John
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-22 (Thu, 22 Oct 92 11:19:49 PDT) - [re: Keystone](/years/1992/10/90acf83b11143d2b8c4c4029e49ae5df05278a74166799409280e6de432e0a6a) - _Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)_
|
||||
+ 1992-10-23 (Thu, 22 Oct 92 23:22:28 PDT) - [Keystone](/years/1992/10/dbefe9ce00cd47ed9ef4144315bc660edb3c2704e4ded25c391ab61617053e53) - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
+ 1992-10-23 (Fri, 23 Oct 92 00:28:19 PDT) - Re: Keystone - _gnu@cygnus.com_
|
||||
+ 1992-10-23 (Fri, 23 Oct 92 10:27:18 PDT) - [Keystone](/years/1992/10/7eafa220d02ff7674103b943a51cc62015c3bc371211bcd6d8b3a9f5e836b8a1) - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
|
||||
@@ -0,0 +1,74 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-22 - temporary request
|
||||
|
||||
## Header Data
|
||||
|
||||
From: DELTORTO@AppleLink.Apple.COM (Imaja, David Del Torto,PAS)<br>
|
||||
To: CYPHERPUNKS@TOAD.COM<br>
|
||||
Message Hash: 0dc2cf15ce93cba1ee63387f52280c165516ebf5779bfeb873d6e38425e5e49a<br>
|
||||
Message ID: \<719795393.8323950@AppleLink.Apple.COM\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-22 23:28:44 UTC<br>
|
||||
Raw Date: Thu, 22 Oct 92 16:28:44 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: DELTORTO@AppleLink.Apple.COM (Imaja, David Del Torto,PAS)
|
||||
Date: Thu, 22 Oct 92 16:28:44 PDT
|
||||
To: CYPHERPUNKS@TOAD.COM
|
||||
Subject: temporary request
|
||||
Message-ID: <719795393.8323950@AppleLink.Apple.COM>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Greetings CypherFolk,
|
||||
|
||||
I, one of your newest members, am on vacation in Europe (right now I'm in
|
||||
Holland enjoying the "coffee" shops) and am temporarily restricted to using
|
||||
AppleLink as my gateway to Internet. Because it costs $0.50 to $0.80 per piece
|
||||
of email, I asked Eric to _temporarily_ remove me from the general alias until
|
||||
I return to the US in December, saving me major bucks. When I get back, I'll
|
||||
announce that you can send me mail at "ddt@well.sf.ca.us". I enjoyed the
|
||||
repartee I sampled and look forward to joining in as I learn more.
|
||||
|
||||
Offer of the Week:
|
||||
If anyone needs me to physically pick up a PGP key from someone here in Europe,
|
||||
I have a train pass good for another month (maybe longer if I can alter it
|
||||
again) and will consider any request that will take me to interesting locations
|
||||
and connect me with interesting folks.
|
||||
|
||||
Further Request:
|
||||
If any of you send any interesting stuff to the group alias (e.g. Russ
|
||||
Whitaker's article on "computer cryptography" from the Economist) and think it
|
||||
might be of general interest to someone learning about the whole encryption
|
||||
process (i.e. me), please cc me at "deltorto@applelink.apple.com" anytime. This
|
||||
would be appreciated. I also encourage anyone who has helpful learning material
|
||||
to forward it to me so I can get up to speed. I am working on an interesting
|
||||
project I would like to share with the right people, but I am not prepared to
|
||||
discuss it in public.
|
||||
|
||||
Does anyone have a copy of PGP 2.0 that runs on a Macintosh? If you email it to
|
||||
me, I will cover any costs you incur. Coolness.
|
||||
|
||||
Until we all meet in person,
|
||||
|
||||
dave
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-22 (Thu, 22 Oct 92 16:28:44 PDT) - temporary request - _DELTORTO@AppleLink.Apple.COM (Imaja, David Del Torto,PAS)_
|
||||
|
||||
@@ -0,0 +1,61 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-24 - Multiple messages + entropy
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Hal \<74076.1041@CompuServe.COM\><br>
|
||||
To: \<cypherpunks@toad.com\><br>
|
||||
Message Hash: 0eec0ebc8ca754a17d7524fa51a07b6557113dffeb3bd13e9f3da940001c47f9<br>
|
||||
Message ID: \<921024155350_74076.1041_DHJ67-1@CompuServe.COM\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-24 16:02:41 UTC<br>
|
||||
Raw Date: Sat, 24 Oct 92 09:02:41 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Hal <74076.1041@CompuServe.COM>
|
||||
Date: Sat, 24 Oct 92 09:02:41 PDT
|
||||
To: <cypherpunks@toad.com>
|
||||
Subject: Multiple messages + entropy
|
||||
Message-ID: <921024155350_74076.1041_DHJ67-1@CompuServe.COM>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
The Internet PEM (Privacy Enhanced Mail) standard uses the
|
||||
concept which Dean Tribble mentioned of multiple encryption
|
||||
(using each recipient's public key) of a single session key
|
||||
which encrypts the message. PGP's data structures do not
|
||||
currently provide for this but could be extended pretty easily
|
||||
to allow it.
|
||||
|
||||
On the entropy measure - I thought entropy was how many bits
|
||||
of information you get per character. Encrypted binary text
|
||||
would be pretty close to 8 bits per character. The RFC1113
|
||||
Ascii encoding used by PGP reduces this to 6 bits per character
|
||||
(e.g. a character set with 64 printable characters) neglecting
|
||||
line separators and message beginnings and endings. So there
|
||||
should be a little less than 6 bits per character for encrypted,
|
||||
Ascii-encoded messages.
|
||||
|
||||
Hal
|
||||
74076.1041@compuserve.com
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-24 (Sat, 24 Oct 92 09:02:41 PDT) - Multiple messages + entropy - _Hal \<74076.1041@CompuServe.COM\>_
|
||||
+ 1992-10-26 (Mon, 26 Oct 92 09:53:38 PPE) - [entropy](/years/1992/10/372c96cffd382696c685f18f23b0868ec033ccb4cd1e33b39fcededb8cc5f91d) - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
|
||||
@@ -0,0 +1,49 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-28 - Messages in the Least Significant Bits
|
||||
|
||||
## Header Data
|
||||
|
||||
From: tcmay@netcom.com (Timothy C. May)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 0f6bbccf741960b8c34c3990dace27fba9fb2d8092b51b0f79b3ac8353ccbdc5<br>
|
||||
Message ID: \<9210280303.AA21744@netcom2.netcom.com\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-28 03:06:05 UTC<br>
|
||||
Raw Date: Tue, 27 Oct 92 20:06:05 PPE<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: tcmay@netcom.com (Timothy C. May)
|
||||
Date: Tue, 27 Oct 92 20:06:05 PPE
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Messages in the Least Significant Bits
|
||||
Message-ID: <9210280303.AA21744@netcom2.netcom.com>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Cypherpunks,
|
||||
|
||||
Here's a message I just posted to another mailing list. It has rather
|
||||
strict policies against cross-posting, so I've edited out the headers
|
||||
and the initial chunk of text I quoted. That should make me kosher.
|
||||
|
||||
(This topic also came up in some e-mail with George Gleason.)
|
||||
|
||||
Forwarded message:
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-28 (Tue, 27 Oct 92 20:06:05 PPE) - Messages in the Least Significant Bits - _tcmay@netcom.com (Timothy C. May)_
|
||||
|
||||
@@ -0,0 +1,59 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-27 - list status
|
||||
|
||||
## Header Data
|
||||
|
||||
From: pmetzger@shearson.com (Perry E. Metzger)<br>
|
||||
To: hughes@soda.berkeley.edu<br>
|
||||
Message Hash: 0fc82407e8fa8a6ef671268b6a7f0783f2980e9ede01ea33ac59ac5e564b0027<br>
|
||||
Message ID: \<9210271954.AA07709@newsu.shearson.com\><br>
|
||||
Reply To: \<9210271856.AA03357@soda.berkeley.edu\><br>
|
||||
UTC Datetime: 1992-10-27 20:24:00 UTC<br>
|
||||
Raw Date: Tue, 27 Oct 92 13:24:00 PPE<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: pmetzger@shearson.com (Perry E. Metzger)
|
||||
Date: Tue, 27 Oct 92 13:24:00 PPE
|
||||
To: hughes@soda.berkeley.edu
|
||||
Subject: list status
|
||||
In-Reply-To: <9210271856.AA03357@soda.berkeley.edu>
|
||||
Message-ID: <9210271954.AA07709@newsu.shearson.com>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
>From: Eric Hughes <hughes@soda.berkeley.edu>
|
||||
>Breakdown of the list by top-level domain:
|
||||
|
||||
>U.S. domains:
|
||||
> 42 com
|
||||
> 42 edu
|
||||
> 1 gov
|
||||
> 1 mil
|
||||
> 10 org
|
||||
> 6 us
|
||||
|
||||
Hmm... Wonder who Mr. .gov and Mr. .mil are...
|
||||
|
||||
(1/2 :-)
|
||||
|
||||
Perry
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-27 (Tue, 27 Oct 92 11:57:12 PPE) - [list status](/years/1992/10/77250e97ac7c83428c993340774581a44c7395bc5a6b955b6a3bfd78ec75ec7c) - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
+ 1992-10-27 (Tue, 27 Oct 92 13:24:00 PPE) - list status - _pmetzger@shearson.com (Perry E. Metzger)_
|
||||
|
||||
@@ -0,0 +1,67 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-21 - Put me on your mailing list!
|
||||
|
||||
## Header Data
|
||||
|
||||
From: "Campbell James A" \<UJACAMPBE@memstvx1.memst.edu\><br>
|
||||
To: "cypherpunks" \<cypherpunks@toad.com\><br>
|
||||
Message Hash: 12951b10c85d64c94a33420c3f2b983a727031d9401a623cc5c0b8940927614e<br>
|
||||
Message ID: \<9210212129.AA27437@toad.com\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-21 21:29:41 UTC<br>
|
||||
Raw Date: Wed, 21 Oct 92 14:29:41 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: "Campbell James A" <UJACAMPBE@memstvx1.memst.edu>
|
||||
Date: Wed, 21 Oct 92 14:29:41 PDT
|
||||
To: "cypherpunks" <cypherpunks@toad.com>
|
||||
Subject: Put me on your mailing list!
|
||||
Message-ID: <9210212129.AA27437@toad.com>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Hey, I'd like to be on the mailing list for CYPHERPUNKS. My address is:
|
||||
|
||||
ujacampbe@memstvx1.memst.edu
|
||||
|
||||
If you need this too, here's my PGP 2.0 public key:
|
||||
|
||||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
Version: 2.0
|
||||
|
||||
mQCNAirkL4AAAAEEANAomYnlPXopnms9RtU0ln9CiLJljssOeflC9A+QIDujXhPT
|
||||
yApbL6VPqSUSoFF/e72xTJixyrwBQhw5lAvfvQPEiGIFQQYxviF+Qg/+6/JVvLCj
|
||||
vnGVFl9kKTEYVeONxBNGiaXuSE0VMQLx47iP9AU+wYw62aXmTNtW1BUtX5BHAAUR
|
||||
tDBKYW1lcyBBLiBDYW1wYmVsbCA8dWphY2FtcGJlQG1lbXN0dngxLm1lbXN0LmVk
|
||||
dT4=
|
||||
=0rCj
|
||||
-----END PGP PUBLIC KEY BLOCK-----
|
||||
|
||||
|
||||
Thanks!
|
||||
|
||||
|
||||
James A. Campbell
|
||||
|
||||
Memphis State University
|
||||
Memphis, Tennessee
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-21 (Wed, 21 Oct 92 14:29:41 PDT) - Put me on your mailing list! - _"Campbell James A" \<UJACAMPBE@memstvx1.memst.edu\>_
|
||||
|
||||
@@ -0,0 +1,70 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-16 - Re: one time pads
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Peter Shipley \<shipley@tfs.COM\><br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 12bc0f85f9a646add4c5603e08fe8e538363c6c8b9aa6e63490461eea74314a6<br>
|
||||
Message ID: \<9210160103.AA06271@edev0.TFS\><br>
|
||||
Reply To: \<9210160007.AA18430@soda.berkeley.edu\><br>
|
||||
UTC Datetime: 1992-10-16 01:03:41 UTC<br>
|
||||
Raw Date: Thu, 15 Oct 92 18:03:41 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Peter Shipley <shipley@tfs.COM>
|
||||
Date: Thu, 15 Oct 92 18:03:41 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Re: one time pads
|
||||
In-Reply-To: <9210160007.AA18430@soda.berkeley.edu>
|
||||
Message-ID: <9210160103.AA06271@edev0.TFS>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
>
|
||||
>Physical security is not a big issue for RSA (in the pgp implementation)
|
||||
>because the secret key ring is itself encrypted. The problem is not so much
|
||||
>physical-intrusion-to-get-the-key as it is physical intrusion aimed at
|
||||
>modifying software.
|
||||
|
||||
To add my two cents, I once had some sensitive files solen from me.
|
||||
the cracker had modified the crypt command to record passwords
|
||||
and current directory (since crypt only works on stdin and stdout).
|
||||
|
||||
In a matter of a few days they have my crypt password and enough infomation
|
||||
from my file to raise some real hell.
|
||||
|
||||
Note that they did not bother with breaking the crypt or guessing the password
|
||||
they just rigged the system binaries.
|
||||
|
||||
-Pete
|
||||
|
||||
PS: this happend a year ago, and last month a copy of the files
|
||||
appeared on some systems owned by the Bay Area Air Quality Management
|
||||
District in SF (baaqmd).
|
||||
|
||||
PPS: I *know* that crypt is insecure but I had tared/compressed it and des
|
||||
was not avalible on the systems I was working on.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-15 (Thu, 15 Oct 92 02:23:21 PDT) - [Re: one time pads](/years/1992/10/5d5b98b544ddca1167fefcf884fb753cc1d761f014b8e779949d089d9d8109ee) - _George A. Gleason \<gg@well.sf.ca.us\>_
|
||||
+ 1992-10-16 (Thu, 15 Oct 92 17:08:10 PDT) - [Re: one time pads](/years/1992/10/6d1555d9ba7e7f5df99b0b1e6d959204e559a393d247f7263b6320400b221fe9) - _Eric Hollander \<hh@soda.berkeley.edu\>_
|
||||
+ 1992-10-16 (Thu, 15 Oct 92 18:03:41 PDT) - Re: one time pads - _Peter Shipley \<shipley@tfs.COM\>_
|
||||
|
||||
@@ -0,0 +1,63 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-14 - re: Matching Text, Headders and Signatures with Crypto Hashes
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 13448cebdb0e3f6fa278cb853f0f0e9221952f53a09470ce78415ecc4fe7835a<br>
|
||||
Message ID: \<2936.2ADBB282@fidogate.FIDONET.ORG\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-14 05:45:57 UTC<br>
|
||||
Raw Date: Tue, 13 Oct 92 22:45:57 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)
|
||||
Date: Tue, 13 Oct 92 22:45:57 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: re: Matching Text, Headders and Signatures with Crypto Hashes
|
||||
Message-ID: <2936.2ADBB282@fidogate.FIDONET.ORG>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
U> From: hugh@domingo.teracons.com (Hugh Daniel)
|
||||
|
||||
U> For example in NetNews I proposed changing the
|
||||
U> MessageId: headder such that part of the gobldyguk on the
|
||||
U> left side of the atsign was a crypto hash of the body of
|
||||
U> the message and some of the important sending host
|
||||
U> generated headders. With this system of MessageId:'s
|
||||
U> anyone who corrupts a message (intentionaly or otherwise)
|
||||
U> creates a bogus message, as the next machine that gets the
|
||||
U> message can see that the message does not match it
|
||||
U> MessageId: line.
|
||||
|
||||
There's a FidoNet mailer (Dutchie) that uses MD4 to generate message
|
||||
IDs in exactly this way... They did some cheat, to allow certain
|
||||
filters (CR/LF vs LF, etc) to work.
|
||||
|
||||
* Origin: World Power Systems / FidoNews / San Francisco CA (1:125/111)
|
||||
--
|
||||
Tom Jennings - via FidoNet node 1:125/555
|
||||
UUCP: ...!uunet!hoptoad!kumr!fidogate!111!Tom.Jennings
|
||||
INTERNET: Tom.Jennings@f111.n125.z1.FIDONET.ORG
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-14 (Tue, 13 Oct 92 22:45:57 PDT) - re: Matching Text, Headders and Signatures with Crypto Hashes - _Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)_
|
||||
|
||||
@@ -0,0 +1,118 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-05 - Meeting Sat. Oct. 10, noon, Mt. View
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Eric Hughes \<hughes@soda.berkeley.edu\><br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 13c718fd6a00a709360fa83486aabdfc938ad255783a4024fb7ca1487cbac0e9<br>
|
||||
Message ID: \<9210050830.AA03692@soda.berkeley.edu\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-05 08:23:23 UTC<br>
|
||||
Raw Date: Mon, 5 Oct 92 01:23:23 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Eric Hughes <hughes@soda.berkeley.edu>
|
||||
Date: Mon, 5 Oct 92 01:23:23 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Meeting Sat. Oct. 10, noon, Mt. View
|
||||
Message-ID: <9210050830.AA03692@soda.berkeley.edu>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
ANNOUNCEMENT
|
||||
============
|
||||
|
||||
Second Meeting
|
||||
|
||||
Saturday, October 10, 1992
|
||||
12:00 noon - 6:00 p.m.
|
||||
|
||||
Cygnus Support offices
|
||||
1937 Landings Drive
|
||||
Mountain View
|
||||
|
||||
|
||||
The second meeting of the cypherpunks will be Saturday at noon. John
|
||||
Gilmore has graciously provided us with a meeting space at the new
|
||||
Cygnus Support offices. These offices are so new, in fact, that
|
||||
Cygnus will not have moved in yet. This meeting will be
|
||||
bring-your-own-pillow (or chair), since it will be held in largely
|
||||
empty space. Directions are at the end of the message.
|
||||
|
||||
Attendance is transitive trust, arbitrarily deep. Invite whoever you
|
||||
want, and let them do so also, and so on. Invite them also to join
|
||||
the mailing list. Do not, however, just post the announcement. Time
|
||||
for that will come.
|
||||
|
||||
I'd like everyone who plans on attending the meeting to send me,
|
||||
hughes@soda.berkeley.edu, a message telling me so. I'd like to get a
|
||||
rough head count before Saturday for game planning.
|
||||
|
||||
We are starting at noon because of popular demand. Eat beforehand or
|
||||
bring a burrito or something. It will be fine to eat during the first
|
||||
segment; it won't be any more disruptive than the game is.
|
||||
|
||||
Bring your PGP public key for in-person key distribution, preferably
|
||||
on diskette. We'll need a portable PC or three to do key
|
||||
distribution; if you have one you can bring, post to the list and tell
|
||||
people.
|
||||
|
||||
We realized after the first meeting that a strict schedule was
|
||||
nonsense. This meeting has a very informal schedule.
|
||||
|
||||
|
||||
Schedule
|
||||
--------
|
||||
|
||||
Starting at noon, we're going to play session two of the
|
||||
crypto-anarchy game, in which players try to conduct business under
|
||||
the watchful eyes of others. We want to play for two hours and then
|
||||
have discuss experiences afterward for about an hour. Some of the
|
||||
improvements over last time will be flatter denominations of money,
|
||||
wider distribution of commodities, more watchers (governmental and
|
||||
otherwise), and perhaps some pre-printed forms.
|
||||
|
||||
We'll take a break to regroup for about ten or twenty minutes.
|
||||
|
||||
For the second half we'll talk about the security of remailers. I'll
|
||||
lead the discussion. We'll be designing protocols and analyzing
|
||||
attacks and defenses. I've done this with DigiCash for electronic
|
||||
money protocols, and remailers are much easier, but still probably
|
||||
more than an afternoon's discussion. We'll do this until six or so,
|
||||
when people will have to start leaving.
|
||||
|
||||
Everyone who wants to will go out for dinner. I don't know the
|
||||
restaurants down there; perhaps someone could suggest one?
|
||||
|
||||
|
||||
Directions
|
||||
----------
|
||||
It's at 1937 Landings Drive, Mt. View. 101 to Amphitheatre Parkway
|
||||
(the bay side of Rengstorff Ave), go right at the first light,
|
||||
pass a right turn, and just before the road crests a tiny hill,
|
||||
turn right into the Landings complex. We're in Building H.
|
||||
|
||||
|
||||
--
|
||||
Eric
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-05 (Mon, 5 Oct 92 01:23:23 PDT) - Meeting Sat. Oct. 10, noon, Mt. View - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
|
||||
@@ -0,0 +1,70 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-31 - re: Why I Don't Use PGP
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 150cc9075146bf18554193b2b52dfc56cd0a54da12fbd6bf8d9fcb1e1b285478<br>
|
||||
Message ID: \<3394.2AF2012B@fidogate.FIDONET.ORG\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-31 03:46:23 UTC<br>
|
||||
Raw Date: Fri, 30 Oct 92 20:46:23 PPE<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)
|
||||
Date: Fri, 30 Oct 92 20:46:23 PPE
|
||||
To: cypherpunks@toad.com
|
||||
Subject: re: Why I Don't Use PGP
|
||||
Message-ID: <3394.2AF2012B@fidogate.FIDONET.ORG>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
U> From: tcmay@netcom.com (Timothy C. May)
|
||||
|
||||
U> 10. Because I use a Mac and the Mac version is not out yet.
|
||||
|
||||
I'll ask in the FidoNet PUBLIC_KEYS echo about Smackintoshes.
|
||||
|
||||
U> 9. Because the Mac version may NEVER be out.
|
||||
|
||||
... prolly cuz noone can figger out how to make a lot of money from
|
||||
it!
|
||||
|
||||
U> 4. Because I'm not yet convinced it is needed.
|
||||
|
||||
Ayup. My feelings exackly. This is starting to sound just like my gun
|
||||
arguments... I don't need one on the street, but someday I may, no?
|
||||
|
||||
U> 3. Because ideally our mailers should handle this in a
|
||||
U> push-button way
|
||||
|
||||
Some do already...
|
||||
|
||||
|
||||
--- ReadMail
|
||||
* Origin: tomj@fidosw.fidonet.org / World Power Systems (1:125/111)
|
||||
--
|
||||
Tom Jennings - via FidoNet node 1:125/555
|
||||
UUCP: ...!uunet!hoptoad!kumr!fidogate!111!Tom.Jennings
|
||||
INTERNET: Tom.Jennings@f111.n125.z1.FIDONET.ORG
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-31 (Fri, 30 Oct 92 20:46:23 PPE) - re: Why I Don't Use PGP - _Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)_
|
||||
|
||||
@@ -0,0 +1,63 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-20 - Mac Version PGP
|
||||
|
||||
## Header Data
|
||||
|
||||
From: No_Such_Address@atdt.org<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 156252f47fbad0cd66b933fed873c3264c37a1109b19f5dad86089525996d53c<br>
|
||||
Message ID: \<9210201806.AA07990@atdt.org\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-20 18:06:12 UTC<br>
|
||||
Raw Date: Tue, 20 Oct 92 11:06:12 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: No_Such_Address@atdt.org
|
||||
Date: Tue, 20 Oct 92 11:06:12 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Mac Version PGP
|
||||
Message-ID: <9210201806.AA07990@atdt.org>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
No one has been able to get me the source-code to PGP, and when
|
||||
I ftp'd it from wherever, it came ZIP'd in a format that my
|
||||
unzipper doesn't recognize. (Maybe I've been ZIP superceded).
|
||||
Anyway, it hasn't been very convenient to get a hold of it for me.
|
||||
|
||||
But, it should be fairly straight forward to throw it into
|
||||
THINK C. THINK C supports a console with command-line. You
|
||||
would not necessarily have to Mac-ify it (although it would
|
||||
certainly make it more aesthetically pleasing); so porting
|
||||
to the Mac is not a dead-end port. THINK C should be
|
||||
able to compile and execute PGP as-is.
|
||||
|
||||
As soon as I can get the source, I'll put my words into action.
|
||||
|
||||
(re: Macifying it: It's simple enough to slap together an
|
||||
interface on top of something like PGP; that's one, maybe two
|
||||
dialog boxes with a bunch of radio buttons and check boxes
|
||||
and a routine to parse it all and hand the info over in a way
|
||||
PGP expects. BFD. So, criticisms I've heard about
|
||||
it being a hassle and a pointless exercise to port PGP to the
|
||||
Mac are without merit, as far as I'm concerned.)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-20 (Tue, 20 Oct 92 11:06:12 PDT) - Mac Version PGP - _No_Such_Address@atdt.org_
|
||||
|
||||
@@ -0,0 +1,95 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-26 - Registering Keys...
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Hal \<74076.1041@CompuServe.COM\><br>
|
||||
To: CYPHERPUNKS \<CYPHERPUNKS@TOAD.COM\><br>
|
||||
Message Hash: 15812353cae00b92b6950171b0944602902caba39821204d31a8223d50e1bff6<br>
|
||||
Message ID: \<921026155917_74076.1041_DHJ88-1@CompuServe.COM\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-26 16:23:21 UTC<br>
|
||||
Raw Date: Mon, 26 Oct 92 09:23:21 PPE<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Hal <74076.1041@CompuServe.COM>
|
||||
Date: Mon, 26 Oct 92 09:23:21 PPE
|
||||
To: CYPHERPUNKS <CYPHERPUNKS@TOAD.COM>
|
||||
Subject: Registering Keys...
|
||||
Message-ID: <921026155917_74076.1041_DHJ88-1@CompuServe.COM>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
This proposal to register keys was also mentioned in the July, 1992
|
||||
Communications of the ACM, in an article by Ron Rivest, one of the
|
||||
creators of the RSA algorithm. He was mostly criticizing the proposed
|
||||
government Digital Signature Standard, stating that he thought that
|
||||
the NSA was purposely trying to get "weak" cryptography installed as
|
||||
the standard. Then he goes on to say,
|
||||
|
||||
"Are there technical alternatives that would satisfy all parties?
|
||||
Perhaps. It is certainly the case that the formulation of the problem
|
||||
to be solved has never been made explicit for the cryptographic
|
||||
community to work on. I suspect that a solution based on 'escrowed
|
||||
secret keys' might be workable, wherein each user is legally required
|
||||
to depost his or her secret key with a trusted third party, such as
|
||||
the user's bank. Cryptographic hardware and software would only
|
||||
operate with public keys that were certified to having their corres-
|
||||
ponding secret keys appropriately escrowed. A federal agency could
|
||||
then obtain the secret key, or its use, with an appropriate warrant.
|
||||
Once their secret keys were escrowed, multinational corporations could
|
||||
even operate across borders with a high degree of authentication and
|
||||
privacy (except perhaps from court-ordered wiretaps). Cryptographic
|
||||
hardware and software manufactured in the U.S. would not operate
|
||||
abroad without public keys suitably certified as having their secret
|
||||
counterparts escrowed in the U.S. In an extension of this approach,
|
||||
users can escrow their secret keys with several trusted third parties
|
||||
in a 'secret-sharing' manner, so that no single third party can com-
|
||||
promise the user's key. While this approach may have its own difficulties,
|
||||
it does illustrate that weak cryptography is not the only technical
|
||||
approach available. There may be much better techniques for achieving
|
||||
a compromise between a number of conflicting national concerns."
|
||||
|
||||
At the time that I read this, I thought it was largely a rhetorical
|
||||
device, making the point that if the government wants to infringe on
|
||||
people's privacy, it should come out in the open and do so, rather
|
||||
than skulking about. (Like saying, "if the government _really_ wants
|
||||
to stop sexual immorality it would have to put a TV camera in every
|
||||
bedroom".) And of course (I thought) this kind of proposal would never
|
||||
be taken seriously. I'm shocked that Denning is now advocating it openly.
|
||||
|
||||
This proposal makes it illegal for people to communicate so secretly
|
||||
that the government can't find out what they are saying. It could
|
||||
apply to postal mail as well as email - it would be illegal to send
|
||||
a message via post which the government couldn't interpret. If this
|
||||
is really the government's purpose, then it should also require that all
|
||||
private conversations be recorded, and the resulting tapes be "escrowed"
|
||||
similarly in case the government needed to find out what was said,
|
||||
for which it would have to get a court order.
|
||||
|
||||
As Tim suggested, this is probably a "trial balloon" being floated to
|
||||
see what the reaction is. Let's see that it gets shot down.
|
||||
|
||||
Hal
|
||||
74076.1041@compuserve.com
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-26 (Mon, 26 Oct 92 09:23:21 PPE) - Registering Keys... - _Hal \<74076.1041@CompuServe.COM\>_
|
||||
+ 1992-10-26 (Mon, 26 Oct 92 10:08:45 PPE) - [Registering Keys...](/years/1992/10/2354d012d9195764785cc4d5b1fb9b3a566d8c08b2f3caadb23470bad07047e3) - _pmetzger@shearson.com (Perry E. Metzger)_
|
||||
|
||||
@@ -0,0 +1,46 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-25 - pgp
|
||||
|
||||
## Header Data
|
||||
|
||||
From: David Cabana (MTH) \<drcc@ultrix.csc.usf.edu.\><br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 1948a7ffa411c9042feb2752a23ce12790792008ce818a44ddb4efb02b7a3321<br>
|
||||
Message ID: \<9210250037.AA19290@ultrix.csc.usf.edu.\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-25 00:43:41 UTC<br>
|
||||
Raw Date: Sat, 24 Oct 92 17:43:41 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: David Cabana (MTH) <drcc@ultrix.csc.usf.edu.>
|
||||
Date: Sat, 24 Oct 92 17:43:41 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: pgp
|
||||
Message-ID: <9210250037.AA19290@ultrix.csc.usf.edu.>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Where in the U.S. can I ftp a copy of PGP? I tried Kauri.vuw.ac.nz,
|
||||
but their README asked that I not transfer files. I would like to
|
||||
respect their wishes...
|
||||
Thanks,
|
||||
drc
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-25 (Sat, 24 Oct 92 17:43:41 PDT) - pgp - _David Cabana (MTH) \<drcc@ultrix.csc.usf.edu.\>_
|
||||
|
||||
@@ -0,0 +1,114 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-13 - Re: one time pads
|
||||
|
||||
## Header Data
|
||||
|
||||
From: George A. Gleason \<gg@well.sf.ca.us\><br>
|
||||
To: hughes@soda.berkeley.edu<br>
|
||||
Message Hash: 1afebd35d2386ecbd3e928fbe8238aa1ae87a785db7db042acce1e283ed3cd16<br>
|
||||
Message ID: \<199210130821.AA03658@well.sf.ca.us\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-13 08:14:58 UTC<br>
|
||||
Raw Date: Tue, 13 Oct 92 01:14:58 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: George A. Gleason <gg@well.sf.ca.us>
|
||||
Date: Tue, 13 Oct 92 01:14:58 PDT
|
||||
To: hughes@soda.berkeley.edu
|
||||
Subject: Re: one time pads
|
||||
Message-ID: <199210130821.AA03658@well.sf.ca.us>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Good hard critique, Eric! Now if I might try to salvage my position...
|
||||
|
||||
"One time pads are very (much more) expensive on a per-link basis than
|
||||
public key systems..."
|
||||
|
||||
Yes, of course. However I don't envision OTPs as a standard for bulk
|
||||
encryption on large networks. Rather, for person-to-person communication in
|
||||
small networks. Examples: a group of civil rights attorneys suing the
|
||||
Federal govt., an international environmental organisation's main offices in
|
||||
the capital cities of a small number of countries, etc. Cases where the
|
||||
adversary is one or more powerful governments, and the number of links
|
||||
required is relatively small. Given the nature of the relationships between
|
||||
these kinds of networks and their adversaries, the expense would seem to be
|
||||
justified; in any case, the **incremental** cost of for instance a set of
|
||||
30MB cartridges as compared to a few floppy discs, is an minor fraction of
|
||||
the cost of the airline tickets and other expenses for trusted couriers.
|
||||
(oops: "a minor fraction...")
|
||||
|
||||
Your discussion of bandwidth can be met with a similar counter-arguement.
|
||||
First of all, I would reject the use of UPS or (God help us) the *Post
|
||||
Office* as a courier, particularly where one or more governments may be the
|
||||
adversaries against whom protection is needed.
|
||||
So your reference to those carriers is not relevant to the main point of my
|
||||
case. I'm assuming that key materials are transported by trusted courier
|
||||
and are guarded by same until they reach their intended recipient. Okay,
|
||||
that *really* drives up the cost, doesn't it...? Not if the key materials
|
||||
"hitch hike" on an existing travel plan: attorney A flies out to city B to
|
||||
visit attorney B... and happens to carry key material onboard in his/her
|
||||
shoulder bag. No added cost except for the storage devices, and that is not
|
||||
significant.
|
||||
|
||||
Re mathematical breakthroughs in factoring etc, you say, "we don't know when
|
||||
that will happen, and we don't know which will happen." Exactly my point.
|
||||
*We* don't know. But the NSA and so on, most certainly do know, and they
|
||||
won't be telling. If the breakthrough comes, then the period between that
|
||||
point and the point when it is publicised, will be one of false security.
|
||||
Was it Kahn who said nothing is more dangerous than a bad cipher? My point
|
||||
here comes down to nothing more or less than the principle of caution in the
|
||||
face of an unknown.
|
||||
|
||||
(Discussion of relative cost of brute force solutions, and the question of
|
||||
hard problems and scale.) I agree that my intuition about these things may
|
||||
be highly flawed. However this doesn't invalidate my point about the
|
||||
possibility of basic breakthroughs happening behind closed doors. Now in a
|
||||
way I'll admit that my arguement here sort of comes down to a black box.
|
||||
However, again I would assert that there are cases where the almost
|
||||
irrational caution is worthwhile.
|
||||
|
||||
You say in concluding, "Perfect security is not worth the cost in time,
|
||||
effort, or dollars when the marginal cost of perfection is less (do you mean
|
||||
more?) than perfection." You cite examples of international banking
|
||||
systems.
|
||||
|
||||
I would cite examples of political movements which have been sabotaged and
|
||||
destroyed by government covert action. One need not look far to run into
|
||||
COINTELPRO and the more recent French govt action of blowing up a Greenpeace
|
||||
vessel. Where your adversaries are the intelligence agencies of world
|
||||
powers, and where lives are at stake, I would say the cost of perfect
|
||||
security is justified. Now of course, the French terrorist bombing, the
|
||||
destruction of Black nationalist and student organising groups in the US,
|
||||
and other examples, may not (probably would not) have been prevented
|
||||
altogether by adoption of perfect communications security. Che Guevara
|
||||
after all used OTPs, and it was radio direction finding and traffic analysis
|
||||
(rather than cryptanalysis) which ultimately led to his murder by US-backed
|
||||
mercenaries.
|
||||
|
||||
If we are promoting a tendency which is inherently political, it implicitly
|
||||
recognises governments as its adversaries. Our choices of cryptographic
|
||||
systems should reflect a wide range of applications and not exclude some
|
||||
a-priori on grounds of cost or convenience.
|
||||
|
||||
-George (gg@well.sf.ca.us)
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-13 (Tue, 13 Oct 92 01:14:58 PDT) - Re: one time pads - _George A. Gleason \<gg@well.sf.ca.us\>_
|
||||
+ 1992-10-13 (Tue, 13 Oct 92 08:51:51 PDT) - [one time pads](/years/1992/10/59880107a8682ff630340193de22e9bf74179cc0b1399b38c188fa4c661518f3) - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
|
||||
@@ -0,0 +1,84 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-13 - Re: Mr. Squirrel
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Hal \<74076.1041@CompuServe.COM\><br>
|
||||
To: CYPHERPUNKS \<CYPHERPUNKS@TOAD.COM\><br>
|
||||
Message Hash: 1be047fb00ed9b8e7e62a36076bd875e747fc5da248ab50cd0ef9aff7be79589<br>
|
||||
Message ID: \<921013154244_74076.1041_DHJ92-2@CompuServe.COM\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-13 15:55:18 UTC<br>
|
||||
Raw Date: Tue, 13 Oct 92 08:55:18 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Hal <74076.1041@CompuServe.COM>
|
||||
Date: Tue, 13 Oct 92 08:55:18 PDT
|
||||
To: CYPHERPUNKS <CYPHERPUNKS@TOAD.COM>
|
||||
Subject: Re: Mr. Squirrel
|
||||
Message-ID: <921013154244_74076.1041_DHJ92-2@CompuServe.COM>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
||ugh Daniel raises some questions about using public keys to
|
||||
verify pseudonyms:
|
||||
|
||||
> Hal is somewhat right, anyone can use 'Secret Squirrel' and anyone
|
||||
> can use any public key they want also.
|
||||
|
||||
But, once person A creates public key X, nobody else can sign messages
|
||||
using X. So if all messages from A are signed under X, we can know
|
||||
that they are all from the same person, even if they are sent anonymously
|
||||
or under a pseudonym.
|
||||
|
||||
> So, in a many-to-one scope (as
|
||||
> in a maillist) where the sender can not use the one-on-one signed
|
||||
> signiture method how do we have proff of who the sender really is?
|
||||
|
||||
You can use signatures even in a many-to-one scope. Messages from
|
||||
a particular person could be signed and the signature appended to
|
||||
the message. Then anyone who has the public key can check to see
|
||||
who the message came from. The process is a little unwieldy now
|
||||
in PGP because you have to separate the signature and message into
|
||||
separate files and run PGP on the signature file. This should be
|
||||
streamlined.
|
||||
|
||||
> [Good points about keeping track of key-pseudonym pairs]
|
||||
> But all this needs to be done automaticly by the mailers and
|
||||
> interfaces, else the system will be mis-used and folks will tire of
|
||||
> the extra work that gets them little advantage.
|
||||
|
||||
Absolutely. The most crying need now, IMO, is to better integrate the
|
||||
cryptographic tools into mail readers and senders, so that it's not
|
||||
such a pain to use these things. People should be able to give a single
|
||||
command or press a button to decrypt an incoming message or encrypt an
|
||||
outgoing one. Only then will these features be used by average people.
|
||||
|
||||
There was a message posted on alt.security.pgp describing how to
|
||||
use PGP with the Emacs mail reading program. I'd like to see more
|
||||
messages telling how to use it with other systems.
|
||||
|
||||
Hal
|
||||
74076.1041@compuserve.com
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-13 (Tue, 13 Oct 92 08:55:18 PDT) - Re: Mr. Squirrel - _Hal \<74076.1041@CompuServe.COM\>_
|
||||
+ 1992-10-13 (Tue, 13 Oct 92 10:04:24 PDT) - [Re: Mr. Squirrel](/years/1992/10/fe748ec0459677318d9e9d5d0611919b35b8f6e096b4d2ede12008c07f006f28) - _nowhere@bsu-cs.bsu.edu (Chael Hall)_
|
||||
+ 1992-10-13 (Tue, 13 Oct 92 11:49:36 PDT) - [Mr. Squirrel](/years/1992/10/4449d8423a3d4ccea75be61a5bd0f1ff0f12e8a37191013726ee2d9bfc0c5fb6) - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
|
||||
@@ -0,0 +1,55 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-18 - Re: one time pads
|
||||
|
||||
## Header Data
|
||||
|
||||
From: George A. Gleason \<gg@well.sf.ca.us\><br>
|
||||
To: hughes@soda.berkeley.edu<br>
|
||||
Message Hash: 1cb41753bf65e002a001ebdff3469ba8c095aa151ce1f7a7b8fc22e578c215bd<br>
|
||||
Message ID: \<199210180820.AA24894@well.sf.ca.us\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-18 08:21:11 UTC<br>
|
||||
Raw Date: Sun, 18 Oct 92 01:21:11 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: George A. Gleason <gg@well.sf.ca.us>
|
||||
Date: Sun, 18 Oct 92 01:21:11 PDT
|
||||
To: hughes@soda.berkeley.edu
|
||||
Subject: Re: one time pads
|
||||
Message-ID: <199210180820.AA24894@well.sf.ca.us>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Sigh... well, I guess I can see if the people I know who are interested,
|
||||
would do it as a freebie...
|
||||
|
||||
Funny thing is, when I first looked into crypto for dissident purposes, back
|
||||
in 1981 or so, I was interested in a PKS implementation, but someone else in
|
||||
my circle persuaded me that OTPs would be preferable in some cases. Now
|
||||
here we are with a PKS and I'm still making noises about OTPs.
|
||||
|
||||
Guess the debate is closed for the moment... congratulations, y'all, for
|
||||
good arguements in a good tone.
|
||||
Now the well is about to close for the night, so I gotta scoot.
|
||||
Be back soon...
|
||||
|
||||
-gg
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-18 (Sun, 18 Oct 92 01:21:11 PDT) - Re: one time pads - _George A. Gleason \<gg@well.sf.ca.us\>_
|
||||
|
||||
@@ -0,0 +1,217 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-09 - The technical explanation of "::" incoming header pasting
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Eric Hughes \<hughes@soda.berkeley.edu\><br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 1ce894a4595e4385435ca9bc1f3f60cac623e7cf191fa1f6b08f23122cd86ff0<br>
|
||||
Message ID: \<9210091650.AA12173@soda.berkeley.edu\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-09 16:43:05 UTC<br>
|
||||
Raw Date: Fri, 9 Oct 92 09:43:05 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Eric Hughes <hughes@soda.berkeley.edu>
|
||||
Date: Fri, 9 Oct 92 09:43:05 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: The technical explanation of "::" incoming header pasting
|
||||
Message-ID: <9210091650.AA12173@soda.berkeley.edu>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
There's a new feature in the remailing software.
|
||||
|
||||
Some people can't add arbitrary header fields because of mailer or
|
||||
gateway restrictions. This restricts them from using the remailer. I
|
||||
have added a facility to allow new header fields to be pasted onto the
|
||||
end of a header when the mail arrives. This effectively happens
|
||||
before processing by the remailer software. These new fields exist
|
||||
during transit in the message body, where they remain untouched. Only
|
||||
after the message is delivered to my account does this operator
|
||||
take effect.
|
||||
|
||||
Syntax: If the first line of the body is the two characters "::", then
|
||||
the following lines are appended to the header, up to the next blank
|
||||
line.
|
||||
|
||||
Here's how it works.
|
||||
|
||||
First of all, here's my new .maildelivery file:
|
||||
|
||||
------- cut here -------
|
||||
#
|
||||
# field pattern action/ string
|
||||
# result (quote included spaces)
|
||||
#
|
||||
Request-Remailing-To "" pipe R "perl remailer/remail.perl"
|
||||
Request-Remailing-To "" file R remailer/archive
|
||||
* "" pipe R "/usr/local/lib/mh/rcvtty -biff"
|
||||
* "" pipe ? "perl remailer/incoming.header.perl"
|
||||
------- cut here -------
|
||||
|
||||
Comments are indicated by #. The Request-Remailing-To lines have been
|
||||
there. The second of the makes an archive for debugging purposes. It
|
||||
will go eventually. The third field, "*", indicates all fields, it
|
||||
runs 'rcvtty' on my mail; this replaces the function of biff, since
|
||||
mail is getting piped to slocal now, disabling biff.
|
||||
|
||||
The last line is the important one. It says "If the mail hasn't been
|
||||
delivered by now, run the incoming header rewrite script on it. If
|
||||
that doesn't work, continue trying to deliver it."
|
||||
|
||||
Now here's the trick. slocal has no way of taking the output of the
|
||||
rewrite and continuing to process it. (It should. It would make this
|
||||
whole job easy.) So in order to continue processing, you need to
|
||||
redeliver the mail. You could invoke sendmail and mail it back to
|
||||
yourself, but that would mangle the existing header. So the thing to
|
||||
do is to recursively invoke slocal from within the perl script.
|
||||
|
||||
Here's the perl script to do all this:
|
||||
|
||||
------- cut here -------
|
||||
# First read in the whole header.
|
||||
# We check for the Second-Pass: line to detect infinite loops.
|
||||
|
||||
while (<>) {
|
||||
last if /^$/ ;
|
||||
exit 1 if /^Second-Pass:/ ;
|
||||
$header .= $_ ;
|
||||
}
|
||||
|
||||
# We have just read the last line in the header.
|
||||
# Now we check to see if there is a pasting operator.
|
||||
|
||||
if ( ( $_ = <> ) && /^::$/ ) {
|
||||
while (<>) {
|
||||
last if /^$/ ;
|
||||
$header .= $_ ;
|
||||
}
|
||||
} else {
|
||||
# There is either an empty body or no pasting operator
|
||||
# Thus exit with a return code of 1 to indicate that
|
||||
# the mail has not been delivered.
|
||||
exit 1 ;
|
||||
}
|
||||
|
||||
# There was a header pasting operator.
|
||||
# So we open 'slocal' as a pipe, effectively redelivering the mail
|
||||
# back to ourselves.
|
||||
|
||||
#open( OUTPUT, ">foo" ) ;
|
||||
open( OUTPUT, "| /usr/local/lib/mh/slocal -user hughes" ) ;
|
||||
select( OUTPUT ) ;
|
||||
|
||||
# print a "From " line to satisfy slocal
|
||||
|
||||
@weekdays = ( "Sun","Mon","Tue","Wed","Thu","Fri", "Sat" ) ;
|
||||
@months = ( "Jan","Feb","Mar","Apr","May",
|
||||
"Jun","Jul","Aug","Sep","Oct","Nov","Dec" ) ;
|
||||
($sec,$min,$hour,$mday,$mon,$year,$wday,$yday,$isdst) = localtime ;
|
||||
printf "From hughes %s %s ", @weekdays[ $wday ], @months[ $mon ] ;
|
||||
printf "%2d %02d:%02d:%02d 19%d\n", $mday, $hour, $min, $sec, $year ;
|
||||
|
||||
# Now just print out the message
|
||||
|
||||
print $header ;
|
||||
print "Second-Pass:\n" ;
|
||||
print "\n" ;
|
||||
while (<>) {
|
||||
} continue {
|
||||
print ;
|
||||
}
|
||||
|
||||
------- cut here -------
|
||||
|
||||
Here's how the perl script works.
|
||||
|
||||
The first loop reads lines from the existing header. When it sees a
|
||||
blank line (regexp /^$/) it terminates the loop. If it sees a field
|
||||
"Second-Pass", it knows it has filtered this message before and exits
|
||||
with a return code indicating that the mail has not been delivered.
|
||||
The variable $header is appended with the current header line.
|
||||
$header contains the whole header when the loop terminates.
|
||||
|
||||
Properly speaking, the Second-Pass test is not necessary to detect
|
||||
infinite loops. Since the pasting operator gets removed during the
|
||||
rewrite, the script won't return an exit status of 0 more times than
|
||||
the pasting operator appears. But should something get screwed up,
|
||||
such as a different module adding pasting commands (how? I don't know),
|
||||
the Second-Pass test should prevent infinite recursion.
|
||||
|
||||
The next statement reads another line from the input file. This line
|
||||
is the first line of the message body. If this line is the pasting
|
||||
operator, then header lines are accumulated in $header as before until
|
||||
a blank line. The difference is that these header lines are being
|
||||
read from the body of the message. If there is no pasting operator,
|
||||
the script exits undelivered.
|
||||
|
||||
At this point we now have to redeliver the message back to ourselves.
|
||||
We first open slocal as the output pipe.
|
||||
|
||||
The next section is a kludge. It turns out that slocal strips off the
|
||||
out-of-band "From " (no colon) line that the mail delivery system
|
||||
uses. In other words, the message which slocal pipes into its pipes
|
||||
is not identical to the message it itself received. This means that
|
||||
slocal cannot be directly recursed. What this section does is to
|
||||
create a "From " line to make slocal happy. It calls localtime() and
|
||||
then formats those numbers into the proper form.
|
||||
|
||||
It turns out that slocal will deliver this mail without the "From "
|
||||
line, even to /usr/spool/mail, but it doesn't do so properly. On my
|
||||
system, in added some delimiters which I think I've tracked down to
|
||||
the 'mtstailor' file, namely mmdelivery1 and mmdelivery2. Since these
|
||||
are not null on my system, there's some garbage added which screws up
|
||||
separation of the spool file into messages. Adding a "From " line
|
||||
fixes that. This misbehavior may not be so surprising, considering
|
||||
that slocal was "meant" to be invoked only in a .forward file.
|
||||
|
||||
Now we print the variable $header which contains the whole header,
|
||||
including newlines. Using a single string removes the need for an
|
||||
array. We added the Second-Pass line and a blank line for the end of
|
||||
the header. The final loop prints out the rest of the message body.
|
||||
|
||||
There is another way to proceed to get the same functionality. One
|
||||
could write a filter to translate the first occurrence only of
|
||||
\n\n::\n into \n. We could then pass the message through this filter
|
||||
before slocal saw it. And for now, that would do the same thing.
|
||||
|
||||
But suppose we want more that one rewrite rule active? Then you would
|
||||
only be able to apply each rewrite rule exactly once in fixed order.
|
||||
You want to be able to rewrite a message and then apply all the
|
||||
rewrite rules again.
|
||||
|
||||
At least one other rewrite rule is planned: automatic decryption.
|
||||
Since decrypting a message will completely change the body, and since
|
||||
some of the header fields may need to be hidden, you have to be able
|
||||
to decrypt the body and then paste on header lines. But since you
|
||||
need to indicate an encrypted body by a header line (well, not really,
|
||||
but it's more reliable), and since some people can't add these header
|
||||
lines, you need to paste lines before encryption as well.
|
||||
|
||||
Thus the rewrite rules need to be applied asyncronously and hence I'm
|
||||
using a fairly complex slocal scheme to do a simple filter.
|
||||
Eventually I hope to write an equivalent to slocal which knows about
|
||||
message rewrites and simple filters, but that's for later.
|
||||
|
||||
Eric
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-09 (Fri, 9 Oct 92 09:43:05 PDT) - The technical explanation of "::" incoming header pasting - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
|
||||
@@ -0,0 +1,74 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-14 - Integrated privacy...
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 1eea0ede39035ff4b7e883851446a69768d6e4f5d546d0a5b37182f47cce4f4e<br>
|
||||
Message ID: \<2931.2ADB225F@fidogate.FIDONET.ORG\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-14 02:52:16 UTC<br>
|
||||
Raw Date: Tue, 13 Oct 92 19:52:16 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)
|
||||
Date: Tue, 13 Oct 92 19:52:16 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Integrated privacy...
|
||||
Message-ID: <2931.2ADB225F@fidogate.FIDONET.ORG>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
U> Absolutely. The most crying need now, IMO, is to better
|
||||
U> integrate the cryptographic tools into mail readers and
|
||||
U> senders, so that it's not such a pain to use these things.
|
||||
U> People should be able to give a single command or press a
|
||||
U> button to decrypt an incoming message or encrypt an
|
||||
U> outgoing one.
|
||||
|
||||
I just completed (well, it's in "beta") a mail-reader package for
|
||||
MSDOS and FidoNet. It does "rm" type stuff, and has PGP integrated
|
||||
reawonably well. Single character commands to decrypt, encrypt, sign,
|
||||
or encrypt/sign. It furnishes the distributed PGP.EXE program with
|
||||
it's imput (deriving it from the message itself). It'll extract keys
|
||||
from messages, and all that.
|
||||
|
||||
It's MSDOS and .MSG-type FidoNet message base oriented, but it does
|
||||
all it's work in pure ASCII (FidoNet .MSG files are mixed binary and
|
||||
text). It is intentionally "RFC-822 like", and will become fully
|
||||
RFC-822 "soon".
|
||||
|
||||
I was reasonably careful regarding de-cyphered plaintext laying about
|
||||
on disk, etc. It's available via Wazoo filerequest as magicname RM.
|
||||
(That's probably as obscure to you as FTP is to FidoNet.)
|
||||
|
||||
It will be released as "copyleft" with all sources. Binaries only
|
||||
this week til I get it shaken down.
|
||||
|
||||
|
||||
* Origin: World Power Systems / FidoNews / San Francisco CA (1:125/111)
|
||||
--
|
||||
Tom Jennings - via FidoNet node 1:125/555
|
||||
UUCP: ...!uunet!hoptoad!kumr!fidogate!111!Tom.Jennings
|
||||
INTERNET: Tom.Jennings@f111.n125.z1.FIDONET.ORG
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-14 (Tue, 13 Oct 92 19:52:16 PDT) - Integrated privacy... - _Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)_
|
||||
|
||||
@@ -0,0 +1,62 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-23 - Diffie-Hellman
|
||||
|
||||
## Header Data
|
||||
|
||||
From: "Scott Collins" \<scott_collins@genmagic.com\><br>
|
||||
To: "Cypher Punks" \<cypherpunks@toad.com\><br>
|
||||
Message Hash: 200d440b3ce47cfce824973681a175c86df247d92d5e7dc292012ab8bc88656a<br>
|
||||
Message ID: \<9210230706.AA04122@relay2.UU.NET\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-23 07:06:14 UTC<br>
|
||||
Raw Date: Fri, 23 Oct 92 00:06:14 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: "Scott Collins" <scott_collins@genmagic.com>
|
||||
Date: Fri, 23 Oct 92 00:06:14 PDT
|
||||
To: "Cypher Punks" <cypherpunks@toad.com>
|
||||
Subject: Diffie-Hellman
|
||||
Message-ID: <9210230706.AA04122@relay2.UU.NET>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Subject: Diffie-Hellman
|
||||
|
||||
>Since there's no perceived value and since all the software would
|
||||
>require license from RSADSI, it won't happen that way.
|
||||
|
||||
It was not my understanding that RSA held any patents, copyrights or other controls
|
||||
over Diffie-Hellman key exchange. The 'big-number' math required is not
|
||||
difficult and is fully documented in Knuth's "The Art of Computer Programming",
|
||||
vol2: Seminumerical Algorithms; section 4.3: Multiple Precision Arithmetic.
|
||||
Also note that this multiple precision code is available in the PGP source in
|
||||
the file mpilib.c.
|
||||
|
||||
The exchanged key could easily be a DES (or other fast symmetric cypher) key --
|
||||
and usually is. Unless you want to perform an authenticated key exchange with
|
||||
Diffie-Hellman as described in "Authentication and Authenticated Key Exchanges" [Diffie,
|
||||
Van Oorschot and Wiener in "Designs, Codes and Cryptography", 2, 107-125 (1992)]
|
||||
using certificates signed with the RSA algorithm, then RSA doesn't have to enter
|
||||
the picture at all.
|
||||
|
||||
Is my understanding of RSAs controls incorrect?
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-23 (Fri, 23 Oct 92 00:06:14 PDT) - Diffie-Hellman - _"Scott Collins" \<scott_collins@genmagic.com\>_
|
||||
|
||||
@@ -0,0 +1,58 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-08 - Subscriptions, etc.
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Eric Hughes \<hughes@soda.berkeley.edu\><br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 20afd4cea4d9e2d57280c5afce0c3f16abf843ef65658c20b5cd90f7b78a1070<br>
|
||||
Message ID: \<9210081604.AA15870@soda.berkeley.edu\><br>
|
||||
Reply To: \<9210081541.AA03134@toad.com\><br>
|
||||
UTC Datetime: 1992-10-08 15:57:23 UTC<br>
|
||||
Raw Date: Thu, 8 Oct 92 08:57:23 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Eric Hughes <hughes@soda.berkeley.edu>
|
||||
Date: Thu, 8 Oct 92 08:57:23 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Subscriptions, etc.
|
||||
In-Reply-To: <9210081541.AA03134@toad.com>
|
||||
Message-ID: <9210081604.AA15870@soda.berkeley.edu>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
Yow! I'm a hypocrite!
|
||||
|
||||
Now _I_ forgot to look at the reply line. Damn.
|
||||
|
||||
Diligence, diligence.
|
||||
|
||||
--------------------------------------------
|
||||
|
||||
In other news, the list membership is up to 60 people and one local
|
||||
newsgroup gateway. I have five more to add, some of whose addresses I
|
||||
have to find out.
|
||||
|
||||
Eric
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-08 (Thu, 8 Oct 92 07:04:56 PDT) - [Subscribe](/years/1992/10/454afdeccfcfc12faec4a1c95227823ccd2317215802fba5cb077de5bba38b1f) - _whitaker@eternity.demon.co.uk (Russell E. Whitaker)_
|
||||
+ 1992-10-08 (Thu, 8 Oct 92 08:41:35 PDT) - [Subscribe](/years/1992/10/4dda48fae2f6e862d1a35aa019c82ecee26503b544f80ca323cc75f6238d3c42) - _hughes (Eric Hughes)_
|
||||
+ 1992-10-08 (Thu, 8 Oct 92 08:57:23 PDT) - Subscriptions, etc. - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
|
||||
@@ -0,0 +1,46 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-10 - random
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Eric Hollander \<hh@soda.berkeley.edu\><br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 21eb2845724e8c20b4bad621a09e57464c0ff3888812380cbecbb2b49bae4fbb<br>
|
||||
Message ID: \<9210102041.AA04891@soda.berkeley.edu\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-10 20:33:53 UTC<br>
|
||||
Raw Date: Sat, 10 Oct 92 13:33:53 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Eric Hollander <hh@soda.berkeley.edu>
|
||||
Date: Sat, 10 Oct 92 13:33:53 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: random
|
||||
Message-ID: <9210102041.AA04891@soda.berkeley.edu>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
So when are we going to start alt.crypt, where we just post a lot of
|
||||
uuencode'ed random data?
|
||||
|
||||
e
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-10 (Sat, 10 Oct 92 13:33:53 PDT) - random - _Eric Hollander \<hh@soda.berkeley.edu\>_
|
||||
|
||||
@@ -0,0 +1,51 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-23 - Eavesdropping on a printer's signature
|
||||
|
||||
## Header Data
|
||||
|
||||
From: nobody@soda.berkeley.edu<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 228284a4836f0d9252ddf094ef2c55dbc324950fbbc2b9e7af6b1106cd26051b<br>
|
||||
Message ID: \<9210230609.AA26646@soda.berkeley.edu\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-23 06:10:13 UTC<br>
|
||||
Raw Date: Thu, 22 Oct 92 23:10:13 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: nobody@soda.berkeley.edu
|
||||
Date: Thu, 22 Oct 92 23:10:13 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Eavesdropping on a printer's signature
|
||||
Message-ID: <9210230609.AA26646@soda.berkeley.edu>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
While doing a summer (1980?) co-op with Raytheon Submarine Signal
|
||||
division in Newport RI, a milk-truck-sized van pulled up out front
|
||||
and opened a sliding side door. Inside was a line printer
|
||||
that was busy printing out the same text that an internal (in the
|
||||
middle of the building, perhaps 150 feet away) line-printer was
|
||||
printing. There were mistakes, but it was readable.
|
||||
|
||||
My guess is that with all the electromechanical pulses the printer
|
||||
was emanating this was pretty easy. Probably harder to do with a
|
||||
laser printer...
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-23 (Thu, 22 Oct 92 23:10:13 PDT) - Eavesdropping on a printer's signature - _nobody@soda.berkeley.edu_
|
||||
|
||||
@@ -0,0 +1,65 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-26 - Registering Keys...
|
||||
|
||||
## Header Data
|
||||
|
||||
From: pmetzger@shearson.com (Perry E. Metzger)<br>
|
||||
To: 74076.1041@compuserve.com<br>
|
||||
Message Hash: 2354d012d9195764785cc4d5b1fb9b3a566d8c08b2f3caadb23470bad07047e3<br>
|
||||
Message ID: \<9210261643.AA16936@newsu.shearson.com\><br>
|
||||
Reply To: \<921026155917_74076.1041_DHJ88-1@CompuServe.COM\><br>
|
||||
UTC Datetime: 1992-10-26 17:08:45 UTC<br>
|
||||
Raw Date: Mon, 26 Oct 92 10:08:45 PPE<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: pmetzger@shearson.com (Perry E. Metzger)
|
||||
Date: Mon, 26 Oct 92 10:08:45 PPE
|
||||
To: 74076.1041@compuserve.com
|
||||
Subject: Registering Keys...
|
||||
In-Reply-To: <921026155917_74076.1041_DHJ88-1@CompuServe.COM>
|
||||
Message-ID: <9210261643.AA16936@newsu.shearson.com>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
>From: Hal <74076.1041@compuserve.com>
|
||||
|
||||
>This proposal makes it illegal for people to communicate so secretly
|
||||
>that the government can't find out what they are saying. It could
|
||||
>apply to postal mail as well as email - it would be illegal to send
|
||||
>a message via post which the government couldn't interpret. If this
|
||||
>is really the government's purpose, then it should also require that all
|
||||
>private conversations be recorded, and the resulting tapes be "escrowed"
|
||||
>similarly in case the government needed to find out what was said,
|
||||
>for which it would have to get a court order.
|
||||
|
||||
>As Tim suggested, this is probably a "trial balloon" being floated to
|
||||
>see what the reaction is. Let's see that it gets shot down.
|
||||
|
||||
I find it repugnant that we've gone all the way over to the notion
|
||||
that people must actively cooperate with their own enslavement. We'd
|
||||
better start getting organized flames against this idea mobilized.
|
||||
Denning is on the net -- anyone care to start flaming on sci.crypt?
|
||||
Its likely the place that will get the most response in the general
|
||||
community.
|
||||
|
||||
Perry
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-26 (Mon, 26 Oct 92 09:23:21 PPE) - [Registering Keys...](/years/1992/10/15812353cae00b92b6950171b0944602902caba39821204d31a8223d50e1bff6) - _Hal \<74076.1041@CompuServe.COM\>_
|
||||
+ 1992-10-26 (Mon, 26 Oct 92 10:08:45 PPE) - Registering Keys... - _pmetzger@shearson.com (Perry E. Metzger)_
|
||||
|
||||
@@ -0,0 +1,58 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-26 - Re: Alpha Particles and One Time Pads
|
||||
|
||||
## Header Data
|
||||
|
||||
From: marc@kg6kf.ampr.org (Marc de Groot - KG6KF)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 235c7c3e14ca0abdb4ef75a7cbe79f081cb2aae7eb5ca8ebfcc604717216bfc1<br>
|
||||
Message ID: \<9210261024.AA11069@kg6kf.ampr.org\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-26 10:44:55 UTC<br>
|
||||
Raw Date: Mon, 26 Oct 92 03:44:55 PPE<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: marc@kg6kf.ampr.org (Marc de Groot - KG6KF)
|
||||
Date: Mon, 26 Oct 92 03:44:55 PPE
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Re: Alpha Particles and One Time Pads
|
||||
Message-ID: <9210261024.AA11069@kg6kf.ampr.org>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Tim May sez:
|
||||
Here's a posting I just sent to sci.crypt, dealing with using alpha
|
||||
particle sources as noise sources for generating one-time pads.
|
||||
|
||||
Tim,
|
||||
Why not use a back-biased germanium diode, or other noisy semiconductor
|
||||
junction? Seriously, the NRC has allowed the smoke detector people to
|
||||
spread those little radioactive chunks of Americium for too long.
|
||||
|
||||
John Walker of AutoDesk actually built an IBM-PC card that generated
|
||||
random numbers from a radioactive source.
|
||||
|
||||
All the best,
|
||||
|
||||
^M
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-26 (Mon, 26 Oct 92 03:44:55 PPE) - Re: Alpha Particles and One Time Pads - _marc@kg6kf.ampr.org (Marc de Groot - KG6KF)_
|
||||
+ 1992-10-26 (Mon, 26 Oct 92 12:13:42 PPE) - [Re: Alpha Particles and One Time Pads](/years/1992/10/96f4cccc3f7dcec3807398d9e17c2ea77516a4daa35cb38c9570bec1fea0481d) - _Peter Shipley \<shipley@tfs.COM\>_
|
||||
|
||||
@@ -0,0 +1,62 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-16 - Re: Game items...
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Eric Hollander \<hh@soda.berkeley.edu\><br>
|
||||
To: Tom.Jennings@f111.n125.z1.fidonet.org (Tom Jennings)<br>
|
||||
Message Hash: 23def49fd60616a55ca036b06643363d86f2e3d62e1b1ead38adbf49d8495208<br>
|
||||
Message ID: \<9210160013.AA19109@soda.berkeley.edu\><br>
|
||||
Reply To: \<2962.2ADD350B@fidogate.FIDONET.ORG\><br>
|
||||
UTC Datetime: 1992-10-16 00:23:16 UTC<br>
|
||||
Raw Date: Thu, 15 Oct 92 17:23:16 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Eric Hollander <hh@soda.berkeley.edu>
|
||||
Date: Thu, 15 Oct 92 17:23:16 PDT
|
||||
To: Tom.Jennings@f111.n125.z1.fidonet.org (Tom Jennings)
|
||||
Subject: Re: Game items...
|
||||
In-Reply-To: <2962.2ADD350B@fidogate.FIDONET.ORG>
|
||||
Message-ID: <9210160013.AA19109@soda.berkeley.edu>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
>-- Access to genuine information on RU-48 (?) the so-called abortion
|
||||
>pill. Turns out it does some cool stuff re: breast cancer and even
|
||||
>morning-after abortion.
|
||||
|
||||
RU 486 (no, it's not Intel's pharmaceuticals division).
|
||||
|
||||
This is actually a really good example of something that could be the
|
||||
subject of the game. Medical researchers need it because it has the
|
||||
potential to save lives. However, synthesis and import of it into the
|
||||
United States is banned, no matter what quantities are needed or what use it
|
||||
is needed for. It is an interesting and powerful substance and we should be
|
||||
doing research on it, but instead we are letting a small minority of people
|
||||
with no medical knowledge dictate the policy of our entire nation. Oh
|
||||
well. I hope to have European citizenship someday (especially if Geroge
|
||||
wins).
|
||||
|
||||
e
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-15 (Thu, 15 Oct 92 02:10:13 PDT) - [re: Game items...](/years/1992/10/ce279b19b49d07d1574d291311a0733a6c7c3f25ba24f44c9ebe81f8b10d6b36) - _Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)_
|
||||
+ 1992-10-16 (Thu, 15 Oct 92 17:23:16 PDT) - Re: Game items... - _Eric Hollander \<hh@soda.berkeley.edu\>_
|
||||
|
||||
@@ -0,0 +1,59 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-22 - Re: Keystone
|
||||
|
||||
## Header Data
|
||||
|
||||
From: sdw@meaddata.com (Stephen Williams)<br>
|
||||
To: gnu@cygnus.com<br>
|
||||
Message Hash: 2414b4e9749952e702f40e3ab08b5c8c4f13ba6c41f4fd2ddcc01ba85e3079c8<br>
|
||||
Message ID: \<9210221600.AA21898@bugatti.meaddata.com\><br>
|
||||
Reply To: \<9210220637.AA20200@cygnus.com\><br>
|
||||
UTC Datetime: 1992-10-22 17:09:30 UTC<br>
|
||||
Raw Date: Thu, 22 Oct 92 10:09:30 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: sdw@meaddata.com (Stephen Williams)
|
||||
Date: Thu, 22 Oct 92 10:09:30 PDT
|
||||
To: gnu@cygnus.com
|
||||
Subject: Re: Keystone
|
||||
In-Reply-To: <9210220637.AA20200@cygnus.com>
|
||||
Message-ID: <9210221600.AA21898@bugatti.meaddata.com>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
..
|
||||
> real advantage, since you can get free source for just about program,
|
||||
> while "free" PC programs means free binaries. If anyone knows of a
|
||||
> reasonably popular PC terminal emulator for which source code is
|
||||
> freely available and distributable, let us know.
|
||||
PC Kermit, of course. The best vt100 emulator around, last I used them
|
||||
heavily.
|
||||
>
|
||||
|
||||
sdw
|
||||
--
|
||||
Stephen D. Williams Local Internet Gateway Co.; SDW Systems 513 496-5223APager
|
||||
LIG dev./sales Internet: sdw@world.std.com CIS 76244.210@compuserve.com
|
||||
OO R&D Source Dist. By Horse: 10028 Village Tree Ct., Miamisburg, OH 45342
|
||||
GNU Support ICBM: 39 34N 85 15W I love it when a plan comes together
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-22 (Wed, 21 Oct 92 22:35:21 PDT) - [Keystone](/years/1992/10/4b028509a502332d7eb20d667f19c0822f161f636956254fb21a228f7050899b) - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
+ 1992-10-22 (Wed, 21 Oct 92 23:35:44 PDT) - [Re: Keystone](/years/1992/10/fb6cd513252375d40032e5c92dc6f0e2a944525554d20788331d097d9233143d) - _gnu@cygnus.com_
|
||||
+ 1992-10-22 (Thu, 22 Oct 92 10:09:30 PDT) - Re: Keystone - _sdw@meaddata.com (Stephen Williams)_
|
||||
|
||||
@@ -0,0 +1,52 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-27 - Re: A Trial Balloon to Ban Encryption?
|
||||
|
||||
## Header Data
|
||||
|
||||
From: gnu<br>
|
||||
To: tcmay@netcom.com (Timothy C. May), cypherpunks<br>
|
||||
Message Hash: 26b81383c805929e3c002c3f7836848983275fee0cf94a079d7717bfd346d887<br>
|
||||
Message ID: \<9210270908.AA00325@toad.com\><br>
|
||||
Reply To: \<9210261819.AA07688@netcom2.netcom.com\><br>
|
||||
UTC Datetime: 1992-10-27 09:08:56 UTC<br>
|
||||
Raw Date: Tue, 27 Oct 92 02:08:56 PPE<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: gnu
|
||||
Date: Tue, 27 Oct 92 02:08:56 PPE
|
||||
To: tcmay@netcom.com (Timothy C. May), cypherpunks
|
||||
Subject: Re: A Trial Balloon to Ban Encryption?
|
||||
In-Reply-To: <9210261819.AA07688@netcom2.netcom.com>
|
||||
Message-ID: <9210270908.AA00325@toad.com>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
> I think it was John Gilmore who said: "If encryption is outlawed, only
|
||||
> outlaws will have encryption."
|
||||
|
||||
Maybe. But I like John Perry Barlow's formulation better:
|
||||
|
||||
"You can have my encryption algorithm when you pry my cold dead fingers
|
||||
from its private key."
|
||||
|
||||
John
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-26 (Mon, 26 Oct 92 11:22:35 PPE) - [(fwd) A Trial Balloon to Ban Encryption?](/years/1992/10/38fbbe375ba50d24f74e7a2036b91a85401f68ccf280d843e3d6930e6634d353) - _tcmay@netcom.com (Timothy C. May)_
|
||||
+ 1992-10-27 (Tue, 27 Oct 92 02:08:56 PPE) - Re: A Trial Balloon to Ban Encryption? - _gnu_
|
||||
|
||||
@@ -0,0 +1,68 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-22 - "Cypherpunks write code"
|
||||
|
||||
## Header Data
|
||||
|
||||
From: whitaker@eternity.demon.co.uk (Russell E. Whitaker)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 275154781ea5f331380a67d875964b36eacfaa5b6310d2811f94b1db35be8356<br>
|
||||
Message ID: \<2580@eternity.demon.co.uk\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-22 07:00:52 UTC<br>
|
||||
Raw Date: Thu, 22 Oct 92 00:00:52 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: whitaker@eternity.demon.co.uk (Russell E. Whitaker)
|
||||
Date: Thu, 22 Oct 92 00:00:52 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: "Cypherpunks write code"
|
||||
Message-ID: <2580@eternity.demon.co.uk>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Eric Hughes writes:
|
||||
|
||||
>
|
||||
> Cypherpunks write code.
|
||||
>
|
||||
> This will mean someone who knows Procomm, Crosstalk, Qmodem, Telix,
|
||||
> etc. for the PC, someone who knows the various Mac, Amiga, Atari, and
|
||||
> other machines. This will mean someone to write nice pretty visual
|
||||
> interfaces for PGP to put all the PGP options on menus where they are
|
||||
> all visible. This will mean people to think about BBS/terminal
|
||||
> protocols. This will mean lots of individual contributions, no single
|
||||
> of which need be large, but whose sum will be.
|
||||
>
|
||||
> Eric
|
||||
>
|
||||
|
||||
Count me in on the Procomm scripting. I *may* do something for Telix,
|
||||
too.
|
||||
|
||||
Who knows? I may sell the scripts/interfaces on AMiX. ;-)
|
||||
|
||||
|
||||
Russell Earl Whitaker whitaker@eternity.demon.co.uk
|
||||
Communications Editor 71750.2413@compuserve.com
|
||||
EXTROPY: The Journal of Transhumanist Thought AMiX: RWHITAKER
|
||||
Board member, Extropy Institute (ExI)
|
||||
================ PGP 2.0 public key available =======================
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-22 (Thu, 22 Oct 92 00:00:52 PDT) - "Cypherpunks write code" - _whitaker@eternity.demon.co.uk (Russell E. Whitaker)_
|
||||
|
||||
@@ -0,0 +1,81 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-20 - More private PGP...?
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Eric Hughes \<hughes@soda.berkeley.edu\><br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 27708d1bd342959acd3e40d9fa98d462c357f0b098de7f57772db854d4934a7f<br>
|
||||
Message ID: \<9210201533.AA07309@soda.berkeley.edu\><br>
|
||||
Reply To: \<9210200622.AA10349@soda.berkeley.edu\><br>
|
||||
UTC Datetime: 1992-10-20 15:33:46 UTC<br>
|
||||
Raw Date: Tue, 20 Oct 92 08:33:46 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Eric Hughes <hughes@soda.berkeley.edu>
|
||||
Date: Tue, 20 Oct 92 08:33:46 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: More private PGP...?
|
||||
In-Reply-To: <9210200622.AA10349@soda.berkeley.edu>
|
||||
Message-ID: <9210201533.AA07309@soda.berkeley.edu>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
>One of the things I've noticed about PGP is that it makes it pretty
|
||||
>obvious that you're sending an encrypted message. [...] Sending
|
||||
>encrypted messages may call unwelcome attention to yourself.
|
||||
|
||||
First, let me get on record as saying that Hal's "innocent mode" is a
|
||||
good idea that should be implemented.
|
||||
|
||||
But it's not really a good long-term solution from a social point of
|
||||
view. Encrypted traffic should become the norm, not the exception.
|
||||
Flagging that you're sending encrypted traffic should be encouraged.
|
||||
When questioned about this, people should respond in shocked tones
|
||||
"What do mean? Aren't you encrypting _your_ email?" and then proceed
|
||||
to suppress gentle laughter at them when they say no.
|
||||
|
||||
When it's cool to encrypt, only the uncool will be plain.
|
||||
|
||||
So, then, more peer pressure! Consider someone asking you about your
|
||||
encrypted mail to be an opportunity to start a conversation about
|
||||
their position on personal privacy. When your sysadmin asks why your
|
||||
mail can't be read, tell him you are defending your privacy and ask if
|
||||
there is any problem with that. Then, when the sysadmin puts in a
|
||||
filter for PGP traffic, use innocent mode.
|
||||
|
||||
>Another thing that I think is kind of bad about PGP in the context
|
||||
>of avoiding traffic analysis is that it puts the key ID of the
|
||||
>destination person in the header.
|
||||
|
||||
Absolutely. Ditto for signatures. Both should be able to be
|
||||
selectively removed. In any case, it should be possible to have
|
||||
nothing appear on the outer envelope.
|
||||
|
||||
Another feature for PGP would be automatic message padding. To
|
||||
properly do a mix you need to quantize the message lengths. If PGP
|
||||
were to automatically pad with random data, it would save a lot of
|
||||
integration work for the mix. PGP already has a random number
|
||||
generator, after all.
|
||||
|
||||
Eric
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-20 (Mon, 19 Oct 92 23:22:30 PDT) - [More private PGP...?](/years/1992/10/28d6b7fffe6975bc2644d84e8b632806749253c90050aafafcf27218d336ff2f) - _nobody@soda.berkeley.edu_
|
||||
+ 1992-10-20 (Tue, 20 Oct 92 08:33:46 PDT) - More private PGP...? - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
|
||||
@@ -0,0 +1,105 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-20 - More private PGP...?
|
||||
|
||||
## Header Data
|
||||
|
||||
From: nobody@soda.berkeley.edu<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 28d6b7fffe6975bc2644d84e8b632806749253c90050aafafcf27218d336ff2f<br>
|
||||
Message ID: \<9210200622.AA10349@soda.berkeley.edu\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-20 06:22:30 UTC<br>
|
||||
Raw Date: Mon, 19 Oct 92 23:22:30 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: nobody@soda.berkeley.edu
|
||||
Date: Mon, 19 Oct 92 23:22:30 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: More private PGP...?
|
||||
Message-ID: <9210200622.AA10349@soda.berkeley.edu>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
One of the things I've noticed about PGP is that it makes it pretty
|
||||
obvious that you're sending an encrypted message. The big
|
||||
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
at the start pretty much gives that away.
|
||||
|
||||
In most cases, this is fine, but sometimes it may not be desirable
|
||||
to make it this obvious. Sending encrypted messages may call
|
||||
unwelcome attention to yourself. Also, some people are experimenting
|
||||
with packet radio on the amateur bands, and it's not legal to send
|
||||
encrypted messages there.
|
||||
|
||||
What I think would be nice would be an "innocent" mode for PGP
|
||||
in which it created files which looked like something else. For
|
||||
example, what if your encrypted output file looked like:
|
||||
|
||||
begin 666 testpat.gif
|
||||
MI\44:#G4D>QQXR!-M,Z20O1K&5D<U"C;V<J#-I@:ANT,A+>0, 5-4F.X<%MT
|
||||
M2:V94,K;XE@B?]%IHF+_<VT=U! 3Q;;M-K<QT.N"?%IJTNU!%(KF7K]2^B6+
|
||||
M;&TTGTULW(4%:F@\&MB^ ^Y5Y\#2A6^*86F-Y"^%J$>WGI%(]#=F]/[LV+&!
|
||||
M,NH0(!3B35CW#!-Z7"B_L'=-C 8DLB-(J R"3?EE9<.>QE4Y?T$66IA7B@W?
|
||||
end
|
||||
|
||||
This will be recognizable, if you've seen many, as a uuencoded file,
|
||||
a common encoding for non-ascii files. The header line suggests
|
||||
that it is a graphics file. Tons of these types of files are sent
|
||||
across email networks every day. Sending your encrypted messages
|
||||
in this form would give you a lower profile.
|
||||
|
||||
Still, if someone goes to the effort to uudecode your message,
|
||||
and examines the resulting file, it will be obvious that it's not
|
||||
a GIF file because it lacks the proper headers. Instead, with
|
||||
the current PGP implementation it will be obvious that it is in
|
||||
fact a PGP file, because the header format matches the PGP spec.
|
||||
|
||||
Again, I think it would be better if PGP in this mode were able to
|
||||
produce a file without headers which will give away what it is. Even
|
||||
better would be the ability to mimic headers of some other types
|
||||
of files, such as the .ZIP, .ZOO, or Unix "compress" format which are
|
||||
often used in binary files people mail around.
|
||||
|
||||
Another thing that I think is kind of bad about PGP in the context
|
||||
of avoiding traffic analysis is that it puts the key ID of the
|
||||
destination person in the header. There was some discussion during
|
||||
development of a mode in which no key ID information would be in the
|
||||
header; the only way you'd have of knowing if the message was for
|
||||
you was to try decrypting it. (There is a checksum which is used
|
||||
internally to tell if the decryption was done with the right key.)
|
||||
This way you could broadcast messages to some group, and no one could
|
||||
know which person in the group you were sending to.
|
||||
|
||||
These "anonymous destination" messages could be encoded with a key
|
||||
ID of zeros, and the PGP software could easily be modified to let
|
||||
the user try a decryption on such a message, reporting success or
|
||||
failure.
|
||||
|
||||
How useful do these kinds of features seem to people? Would they
|
||||
really be helpful or is this just paranoia?
|
||||
|
||||
Hal
|
||||
74076.1041@compuserve.com
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-20 (Mon, 19 Oct 92 23:22:30 PDT) - More private PGP...? - _nobody@soda.berkeley.edu_
|
||||
+ 1992-10-20 (Tue, 20 Oct 92 08:33:46 PDT) - [More private PGP...?](/years/1992/10/27708d1bd342959acd3e40d9fa98d462c357f0b098de7f57772db854d4934a7f) - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
|
||||
@@ -0,0 +1,61 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-23 - BBS E-mail policy Now see if this number is in one of the following ranges:
|
||||
|
||||
## Header Data
|
||||
|
||||
From: tribble@xanadu.com (E. Dean Tribble)<br>
|
||||
To: uunet!soda.berkeley.edu!hughes@uunet.UU.NET<br>
|
||||
Message Hash: 298d86c630be7b06958a77a0e2a93e61224cded16c21ee64acb6bc0f39e9ecfd<br>
|
||||
Message ID: \<9210231641.AA11868@xanadu.xanadu.com\><br>
|
||||
Reply To: \<9210230601.AA26160@soda.berkeley.edu\><br>
|
||||
UTC Datetime: 1992-10-23 21:42:19 UTC<br>
|
||||
Raw Date: Fri, 23 Oct 92 14:42:19 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: tribble@xanadu.com (E. Dean Tribble)
|
||||
Date: Fri, 23 Oct 92 14:42:19 PDT
|
||||
To: uunet!soda.berkeley.edu!hughes@uunet.UU.NET
|
||||
Subject: BBS E-mail policy Now see if this number is in one of the following ranges:
|
||||
In-Reply-To: <9210230601.AA26160@soda.berkeley.edu>
|
||||
Message-ID: <9210231641.AA11868@xanadu.xanadu.com>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
[1.5 .. 2.5] encrypted text
|
||||
[3 .. 6] regular text
|
||||
[7 .. 8] line noise
|
||||
|
||||
This is a very simple measure. There are other measures to look for
|
||||
the deviation from an expected distribution, which give much more
|
||||
accurate distinctions. One can very easily separate languages from
|
||||
each other just by looking at such measures.
|
||||
|
||||
Where does uuencoded [compressed] binary lie? I would suspect it lies
|
||||
right around where encrypted text is. Presumably straight encrypted
|
||||
text is statistically random [7..8], but that when you8 encrypt to
|
||||
just the ascii subset is when you lose the entropy.
|
||||
|
||||
dean
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-22 (Thu, 22 Oct 92 09:25:56 PDT) - [BBS E-mail policy](/years/1992/10/8a24672636a42d5225524b26c5cc78e1b0ba1b62a4c1e1fe1825463951a6b9e0) - _omega@spica.bu.edu (The Omega)_
|
||||
+ 1992-10-23 (Thu, 22 Oct 92 23:02:09 PDT) - [BBS E-mail policy](/years/1992/10/bc5b354247141e46df2c768591ee1dffd7fbc017a03b959da779cf82e2521133) - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
+ 1992-10-23 (Fri, 23 Oct 92 14:42:19 PDT) - BBS E-mail policy Now see if this number is in one of the following ranges: - _tribble@xanadu.com (E. Dean Tribble)_
|
||||
+ 1992-10-24 (Fri, 23 Oct 92 23:20:44 PDT) - [entropy measures](/years/1992/10/3c38d48ebe6788447fca198f92d44a9ffa68121b79032804da9a7944dc97d602) - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
+ 1992-10-26 (Sun, 25 Oct 92 21:41:19 PPE) - [Re: entropy measures](/years/1992/10/b71072e5de22f0ee2513a7bc057b82b39ad7284a70bf4913906340f5c39b27b3) - _Eric Hollander \<hh@soda.berkeley.edu\>_
|
||||
|
||||
@@ -0,0 +1,54 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-20 - Home security...
|
||||
|
||||
## Header Data
|
||||
|
||||
From: mark@coombs.anu.edu.au (Mark)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 2be473d52a0362296b2fa5db0c5b7368828c3e322b7e2ac29c00d371d3c17539<br>
|
||||
Message ID: \<9210200918.AA18129@coombs.anu.edu.au\><br>
|
||||
Reply To: \<199210200855.AA27037@well.sf.ca.us\><br>
|
||||
UTC Datetime: 1992-10-20 09:19:05 UTC<br>
|
||||
Raw Date: Tue, 20 Oct 92 02:19:05 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: mark@coombs.anu.edu.au (Mark)
|
||||
Date: Tue, 20 Oct 92 02:19:05 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Home security...
|
||||
In-Reply-To: <199210200855.AA27037@well.sf.ca.us>
|
||||
Message-ID: <9210200918.AA18129@coombs.anu.edu.au>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
>This general area is part of a larger topic called TEMPEST. Anyone else
|
||||
>interested in pursuing this angle...?
|
||||
|
||||
What's the best sources for faraday cages and TEMPEST etc? And does anyone
|
||||
out there implement anything of this type of security at home to protect
|
||||
against monitoring? The cost of such an exercise would be rather prohibitive
|
||||
to say the least.
|
||||
|
||||
Just curious..
|
||||
Mark
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-20 (Tue, 20 Oct 92 01:56:22 PDT) - [Re: one time pads.](/years/1992/10/f521aad835f2995f4c759db006e61372149cd4cb840a397f387ad8a0a9dca1cb) - _George A. Gleason \<gg@well.sf.ca.us\>_
|
||||
+ 1992-10-20 (Tue, 20 Oct 92 02:19:05 PDT) - Home security... - _mark@coombs.anu.edu.au (Mark)_
|
||||
|
||||
@@ -0,0 +1,62 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-25 - re: multiple message destinations
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 2d63e88350175c0c0fbf601fc8fa86677404a48be269affc97ed929f354f72e5<br>
|
||||
Message ID: \<3266.2AEAF026@fidogate.FIDONET.ORG\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-25 19:08:31 UTC<br>
|
||||
Raw Date: Sun, 25 Oct 92 12:08:31 PPE<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)
|
||||
Date: Sun, 25 Oct 92 12:08:31 PPE
|
||||
To: cypherpunks@toad.com
|
||||
Subject: re: multiple message destinations
|
||||
Message-ID: <3266.2AEAF026@fidogate.FIDONET.ORG>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
|
||||
U> 1) [...] Or send it yourself.
|
||||
|
||||
As a paranoid person myself (I use the two phrases "sufficiently
|
||||
paranoid" (me, and most of us in here are sufficiently paranoid -- to
|
||||
at least consider the issues) and "insufficiently paranoid" -- people
|
||||
who conduct business over cordless or cellular voice, etc -- these
|
||||
paren'd subtexts are getting out of hand -- as a paranoid person
|
||||
myself I would only trust sending them myself.
|
||||
|
||||
It's really a "code" issue -- given a list of addressees, will the
|
||||
miserable program you're using do the work for you.
|
||||
|
||||
|
||||
--- ReadMail
|
||||
* Origin: World Power Systems / FidoNews / San Francisco CA (1:125/111)
|
||||
--
|
||||
Tom Jennings - via FidoNet node 1:125/555
|
||||
UUCP: ...!uunet!hoptoad!kumr!fidogate!111!Tom.Jennings
|
||||
INTERNET: Tom.Jennings@f111.n125.z1.FIDONET.ORG
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-25 (Sun, 25 Oct 92 12:08:31 PPE) - re: multiple message destinations - _Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)_
|
||||
|
||||
@@ -0,0 +1,62 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-07 - re: introducers
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 2d70f4bb92f4ef328aae493b3882459b8bb67b24261f1bb28f4a91e316c8e243<br>
|
||||
Message ID: \<2715.2AD37337@fidogate.FIDONET.ORG\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-07 23:46:07 UTC<br>
|
||||
Raw Date: Wed, 7 Oct 92 16:46:07 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)
|
||||
Date: Wed, 7 Oct 92 16:46:07 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: re: introducers
|
||||
Message-ID: <2715.2AD37337@fidogate.FIDONET.ORG>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
U> Detection of tampering is plenty good enough, I think, for
|
||||
U> a _network_ policy of key distribution. For most people,
|
||||
U> it will work fine.
|
||||
|
||||
I guess I had to come at this from the backside. You are right.
|
||||
Accepting keys over the network will provide reasonably well-sealed
|
||||
envelopes. It won't provide notarized, hand-delivered security, but
|
||||
that's not what's needed *usually*.
|
||||
|
||||
U> For personal use, for people I know, I'm going to rely on
|
||||
U> personally
|
||||
U> exchanged keys.
|
||||
|
||||
Exactly.
|
||||
|
||||
* Origin: World Power Systems / FidoNews (1:125/111)
|
||||
--
|
||||
Tom Jennings - via FidoNet node 1:125/555
|
||||
UUCP: ...!uunet!hoptoad!kumr!fidogate!111!Tom.Jennings
|
||||
INTERNET: Tom.Jennings@f111.n125.z1.FIDONET.ORG
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-07 (Wed, 7 Oct 92 16:46:07 PDT) - re: introducers - _Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)_
|
||||
|
||||
@@ -0,0 +1,74 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-14 - Game items...
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Hal \<74076.1041@CompuServe.COM\><br>
|
||||
To: CYPHERPUNKS \<CYPHERPUNKS@TOAD.COM\><br>
|
||||
Message Hash: 2f6d5e1afd06d6ab7efd62ee0ef4f4e446d648d9648b1a1bcdca947107a33d2f<br>
|
||||
Message ID: \<921014151922_74076.1041_DHJ62-1@CompuServe.COM\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-14 15:27:57 UTC<br>
|
||||
Raw Date: Wed, 14 Oct 92 08:27:57 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Hal <74076.1041@CompuServe.COM>
|
||||
Date: Wed, 14 Oct 92 08:27:57 PDT
|
||||
To: CYPHERPUNKS <CYPHERPUNKS@TOAD.COM>
|
||||
Subject: Game items...
|
||||
Message-ID: <921014151922_74076.1041_DHJ62-1@CompuServe.COM>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
I'm trying to think in terms of things which were illegal but
|
||||
which have good moral connotations today.
|
||||
|
||||
Crosses and other Christian symbols were supposedly outlawed
|
||||
during the Roman empire (leading to the adoption of the fish
|
||||
as a symbol of Christianity). Posing as early Christians smuggling
|
||||
crosses ought to make the right-wingers happy!
|
||||
|
||||
Abolitionists had to smuggle runaway slaves out of the South
|
||||
on the so-called "underground railroad". Perhaps cryptography
|
||||
would have helped them coordinate their efforts.
|
||||
|
||||
Much of the support in the U.S. for freedom and privacy comes from
|
||||
our revolutionary heritage. I'm embarrassed at how little I can
|
||||
recall of what things were restricted in those pre-revolutionary
|
||||
days. I recall the Stamp Act and a few other laws, and I imagine
|
||||
that seditious materials were restricted. Perhaps the game players
|
||||
could be early revolutionaries trading items forbidden under British
|
||||
rule.
|
||||
|
||||
Hal Finney - 74076.1041@Compuserve.Com
|
||||
|
||||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
mQCNAiqsNkwAAAEEAMKWM52m5EWi0ocK4u1cC2PPyHT6tavk9PC3TB5XBYDegf3d
|
||||
sldRpnjJj1r+aO08FFO+QLEI9wtBqvf1PPP5iLX7sD2uIVlJH14MPtyVtjm9ZKb8
|
||||
JMtCW74045BgtHBC9yQ3V7vXNV5jM6dE2ocnH4AI/pBFrGLJPKgTA69YIUw3AAUR
|
||||
tCZIYWwgRmlubmV5IDw3NDA3Ni4xMDQxQGNvbXB1c2VydmUuY29tPokAlQIFECqu
|
||||
M1Tidd4O/2f3CwEByrUD/3uoV2y+Fuicrrd2oDawgOw9Ejcx6E+Ty9PVPqKvflLs
|
||||
0zYyGfeFVSgBbTSDP3X91N3F68nydl9J9VA6QRCGelHM1cZRukCJ0AYbKYfpwUN0
|
||||
xjEGHsDrd2gT5iWlB3vBZvi+6Ybs4rSq+gyZzVm1/+oRrMen32fz2r0CLgUtHok2
|
||||
=fF6Z
|
||||
-----END PGP PUBLIC KEY BLOCK-----
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-14 (Wed, 14 Oct 92 08:27:57 PDT) - Game items... - _Hal \<74076.1041@CompuServe.COM\>_
|
||||
|
||||
@@ -0,0 +1,104 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-21 - Keystone
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Eric Hughes \<hughes@soda.berkeley.edu\><br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 2ff29505951a381077a03c5daef44ec830ba5b90cf48eb6abe31bc094aeaee28<br>
|
||||
Message ID: \<9210211643.AA11195@soda.berkeley.edu\><br>
|
||||
Reply To: \<9210201753.AA009kv@fnordbox.UUCP\><br>
|
||||
UTC Datetime: 1992-10-21 16:43:25 UTC<br>
|
||||
Raw Date: Wed, 21 Oct 92 09:43:25 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Eric Hughes <hughes@soda.berkeley.edu>
|
||||
Date: Wed, 21 Oct 92 09:43:25 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Keystone
|
||||
In-Reply-To: <9210201753.AA009kv@fnordbox.UUCP>
|
||||
Message-ID: <9210211643.AA11195@soda.berkeley.edu>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
Eric:
|
||||
>:I would be hesitant to implement a system that _only_ required a user
|
||||
>:to generate a key pair.
|
||||
|
||||
Loyd:
|
||||
>I take the opposite view -- I dare *not* supply such a system.
|
||||
[...]
|
||||
>But many users do not have the interest/time/ability to set up PGP on their
|
||||
>home system. For them, I want to provide the best possible privacy given the
|
||||
>ease with which anyone who can find their local LMOS can tap (voice or data)
|
||||
>a line...
|
||||
|
||||
Where is the key pair generated? It must be on the BBS since your
|
||||
user may not have PGP running. The private key isn't private! The
|
||||
work to do public key encryption in the first place is hardly valuable
|
||||
if the owner of the private key doesn't hold it.
|
||||
|
||||
If you just want inter-BBS privacy, why not set up each BBS with a PGP
|
||||
key pair, and use that for transfering messages? There's not much
|
||||
difference in security. A monitoring sysop would be able to read all
|
||||
the traffic originating on that board in either system. The
|
||||
difference is that such a monitoring sysop would not be able to read
|
||||
replies. Why? Because the private keys are kept on the originating
|
||||
board.
|
||||
|
||||
But it sounds as though you're trying to prevent against external
|
||||
monitoring and that you trust your sysops. In this case there is no
|
||||
advantage to issuing keys to individuals; it's just not worth the
|
||||
effort.
|
||||
|
||||
Loyd:
|
||||
>I don't have my user's terminal program -- I *do* have the bbs software.
|
||||
|
||||
This is the unfortunate fact of the situation, I acknowledge. But do
|
||||
you know what terminal programs are in the most common use? I suspect
|
||||
most of this stuff could be done with script programming in the
|
||||
various terminal packages.
|
||||
|
||||
Do you know, in aggregate, how many users of each terminal program you
|
||||
have? You can poll your users to find out. You'll need this data to
|
||||
allocate your effort.
|
||||
|
||||
And you've got lots of people willing to help, even if they can't
|
||||
because they are working on other projects. Everyone on this list,
|
||||
for example. Let me repeat, for those of you who did not previously
|
||||
know you were willing to help. Everyone on this list should be
|
||||
willing to help Loyd write scripts for his users to use PGP.
|
||||
|
||||
Cypherpunks write code.
|
||||
|
||||
This will mean someone who knows Procomm, Crosstalk, Qmodem, Telix,
|
||||
etc. for the PC, someone who knows the various Mac, Amiga, Atari, and
|
||||
other machines. This will mean someone to write nice pretty visual
|
||||
interfaces for PGP to put all the PGP options on menus where they are
|
||||
all visible. This will mean people to think about BBS/terminal
|
||||
protocols. This will mean lots of individual contributions, no single
|
||||
of which need be large, but whose sum will be.
|
||||
|
||||
Eric
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-20 (Tue, 20 Oct 92 14:43:30 PDT) - [Re: Keystone](/years/1992/10/503c3b8d260c9d277fec543d1511e53afe6d139974194bbc24df6f7f32462d72) - _fnordbox!loydb@cs.utexas.edu (Loyd Blankenship)_
|
||||
+ 1992-10-21 (Wed, 21 Oct 92 09:43:25 PDT) - Keystone - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
|
||||
@@ -0,0 +1,72 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-31 - re: Why I Don't Use PGP...
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 30f312069f952f339e3cbab3214d8960f76615d1d3a492b081fc86cbba3080d9<br>
|
||||
Message ID: \<3400.2AF2EC7B@fidogate.FIDONET.ORG\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-31 20:31:32 UTC<br>
|
||||
Raw Date: Sat, 31 Oct 92 13:31:32 PPE<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)
|
||||
Date: Sat, 31 Oct 92 13:31:32 PPE
|
||||
To: cypherpunks@toad.com
|
||||
Subject: re: Why I Don't Use PGP...
|
||||
Message-ID: <3400.2AF2EC7B@fidogate.FIDONET.ORG>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
|
||||
U> From: 74076.1041@CompuServe.COM (Hal)
|
||||
|
||||
U> The best way to integrate PGP into other software is a
|
||||
U> tough
|
||||
U> question. There are so many different ways in which
|
||||
U> people read and send mail.
|
||||
|
||||
U> don't know which programs can do this. A lot of Unix
|
||||
U> programs can, like VI and EMACS, but I don't know about
|
||||
U> PC's or other home machines. PGP has a filter mode which
|
||||
|
||||
|
||||
Not to brag, but my offline-reader (DOS version of a 'read news'
|
||||
program), as well as at least one other I know of, does a pretty good
|
||||
job of this. It handles the decrypted plaintext reasonably securely
|
||||
too. It does the decryption locally. (You have to manage your own
|
||||
keyrings externally, though of course keys embedded in messages are
|
||||
handled OK.)
|
||||
|
||||
Solutions are out there.
|
||||
|
||||
|
||||
--- ReadMail
|
||||
* Origin: tomj@fidosw.fidonet.org / World Power Systems (1:125/111)
|
||||
--
|
||||
Tom Jennings - via FidoNet node 1:125/555
|
||||
UUCP: ...!uunet!hoptoad!kumr!fidogate!111!Tom.Jennings
|
||||
INTERNET: Tom.Jennings@f111.n125.z1.FIDONET.ORG
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-31 (Sat, 31 Oct 92 13:31:32 PPE) - re: Why I Don't Use PGP... - _Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)_
|
||||
+ 1992-10-31 (Sat, 31 Oct 92 13:45:38 PPE) - [re: Why I Don't Use PGP...](/years/1992/10/f487615e36c2f4deaf5a01fa4e159c3bf63ecc93a3423ead808d29f2a0350da3) - _tcmay@netcom.com (Timothy C. May)_
|
||||
|
||||
@@ -0,0 +1,53 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-10 - re: Better directions to the meeting on Saturday at noon
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 310aa141e3533fdd3670d2879114cb218dcb9d99e646a6311ff8bbfa97206b48<br>
|
||||
Message ID: \<2889.2AD73B41@fidogate.FIDONET.ORG\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-10 20:15:11 UTC<br>
|
||||
Raw Date: Sat, 10 Oct 92 13:15:11 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)
|
||||
Date: Sat, 10 Oct 92 13:15:11 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: re: Better directions to the meeting on Saturday at noon
|
||||
Message-ID: <2889.2AD73B41@fidogate.FIDONET.ORG>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
Things are not good here. I have to stay and deal with my best friend
|
||||
Deke who seems to be going nuts. (It's not a new story, but it heated
|
||||
up last night.) Now, at 1pm, I've gotta stay here another hour or so,
|
||||
and be back by 630, so I guess I'm gonna have to miss another. I'll
|
||||
see you all elsewhen (to borrow a Hugh-ism).
|
||||
|
||||
* Origin: World Power Systems / FidoNews / San Francisco CA (1:125/111)
|
||||
--
|
||||
Tom Jennings - via FidoNet node 1:125/555
|
||||
UUCP: ...!uunet!hoptoad!kumr!fidogate!111!Tom.Jennings
|
||||
INTERNET: Tom.Jennings@f111.n125.z1.FIDONET.ORG
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-10 (Sat, 10 Oct 92 13:15:11 PDT) - re: Better directions to the meeting on Saturday at noon - _Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)_
|
||||
|
||||
@@ -0,0 +1,52 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-26 - Re: Registering Keys with Big Brother
|
||||
|
||||
## Header Data
|
||||
|
||||
From: efrem@spitha.informix.com (Efrem Lipkin)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 3128a7c4ccd184baf0476e40998c112d09c1af9fe04ab6f4bd40b1b8d7a5207a<br>
|
||||
Message ID: \<9210261016.AA15135@spitha.informix.com\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-26 10:52:20 UTC<br>
|
||||
Raw Date: Mon, 26 Oct 92 03:52:20 PPE<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: efrem@spitha.informix.com (Efrem Lipkin)
|
||||
Date: Mon, 26 Oct 92 03:52:20 PPE
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Re: Registering Keys with Big Brother
|
||||
Message-ID: <9210261016.AA15135@spitha.informix.com>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
It seems that registration would defeat the advantage
|
||||
of a public key system, but it would not prevent private
|
||||
encrypted messages from being hidden from casual traffic
|
||||
analysis or even notice by public key wrapping.
|
||||
|
||||
This would make registration rather useless against a
|
||||
conspiracy and thus hard to justify in the face of commercial
|
||||
and constitutional opposition.
|
||||
|
||||
--efrem
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-26 (Mon, 26 Oct 92 03:52:20 PPE) - Re: Registering Keys with Big Brother - _efrem@spitha.informix.com (Efrem Lipkin)_
|
||||
+ 1992-10-26 (Mon, 26 Oct 92 09:40:33 PPE) - [Registering Keys with Big Brother](/years/1992/10/c42d2d0187951763f35a791c544b34c096c6e0d58664eb4dc74d2729d6257648) - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
|
||||
@@ -0,0 +1,55 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-20 - Re: More private PGP...?
|
||||
|
||||
## Header Data
|
||||
|
||||
From: George A. Gleason \<gg@well.sf.ca.us\><br>
|
||||
To: nobody@soda.berkeley.edu<br>
|
||||
Message Hash: 325a35fb9d7b76f703a824d2a599c2fc66875ad4fc6d75213b20337b577a174e<br>
|
||||
Message ID: \<199210200915.AA27714@well.sf.ca.us\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-20 09:16:09 UTC<br>
|
||||
Raw Date: Tue, 20 Oct 92 02:16:09 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: George A. Gleason <gg@well.sf.ca.us>
|
||||
Date: Tue, 20 Oct 92 02:16:09 PDT
|
||||
To: nobody@soda.berkeley.edu
|
||||
Subject: Re: More private PGP...?
|
||||
Message-ID: <199210200915.AA27714@well.sf.ca.us>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Hal, I think those would be vry useful. Now of course, we don't want to
|
||||
advocate that radio users in the United States do anything like sending
|
||||
ciphertext over the airwaves, but we might want to develop something that we
|
||||
can ship to the Gusanos who want to take Cuba back for the Mafia, or maybe
|
||||
in a better vein, something that the Tien-an-men kids can use when
|
||||
overthrowing the Commies in China.
|
||||
|
||||
Good ideas about message headers. Since the source code for PGP is widely
|
||||
available, it would seem a straightforward matter to alter the program to
|
||||
include the new features.
|
||||
|
||||
What I'd really like also is a Mac version....
|
||||
|
||||
-gg
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-20 (Tue, 20 Oct 92 02:16:09 PDT) - Re: More private PGP...? - _George A. Gleason \<gg@well.sf.ca.us\>_
|
||||
|
||||
@@ -0,0 +1,50 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-25 - pgp key distribution
|
||||
|
||||
## Header Data
|
||||
|
||||
From: shawnb \<shawnb@ecst.csuchico.edu\><br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 34602500d479303d1a7a304cabde762a9624b8b46feca41333e5d7a3bc26d4f9<br>
|
||||
Message ID: \<9210250333.AA11925@toad.com\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-25 03:33:12 UTC<br>
|
||||
Raw Date: Sat, 24 Oct 92 20:33:12 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: shawnb <shawnb@ecst.csuchico.edu>
|
||||
Date: Sat, 24 Oct 92 20:33:12 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: pgp key distribution
|
||||
Message-ID: <9210250333.AA11925@toad.com>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
I'm pretty new to this mailing list, so something along these lines may
|
||||
have already been proposed, but I was considering the possibility of
|
||||
putting together a list of pgp public keys for distribution through this
|
||||
list. My own collection of keys is pretty small, and I would pernally
|
||||
like to expand this, but I think this would provide a great service to the
|
||||
group as well. Let me know what you all think.
|
||||
|
||||
Shawn
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-25 (Sat, 24 Oct 92 20:33:12 PDT) - pgp key distribution - _shawnb \<shawnb@ecst.csuchico.edu\>_
|
||||
+ 1992-10-25 (Sat, 24 Oct 92 20:54:34 PDT) - [Re: pgp key distribution](/years/1992/10/8848ce1351a4a5cbb0fed3d61c2af59d18118d66c467fc4a93e9b9b4c9f36503) - _Peter Shipley \<shipley@tfs.COM\>_
|
||||
|
||||
@@ -0,0 +1,58 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-11 - [gg@well.sf.ca.us: Re: +-=*^]
|
||||
|
||||
## Header Data
|
||||
|
||||
From: d9mj@crux2.cit.cornell.edu<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 35579c9de2cb0cbf5765897a6665b3bccfcfd2b6b524607768adfb798bcdd72a<br>
|
||||
Message ID: \<9210110102.AA21921@crux1.cit.cornell.edu\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-11 00:55:26 UTC<br>
|
||||
Raw Date: Sat, 10 Oct 92 17:55:26 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: d9mj@crux2.cit.cornell.edu
|
||||
Date: Sat, 10 Oct 92 17:55:26 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: [gg@well.sf.ca.us: Re: +-=*^]
|
||||
Message-ID: <9210110102.AA21921@crux1.cit.cornell.edu>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
Look at what my mailer did to your header. Is this a result of your
|
||||
perl script or my screwed router?
|
||||
|
||||
Date: Sat, 10 Oct 1992 05:06:40 -0400
|
||||
Illegal-Object: Syntax error in From: address found on router.mail.cornell.edu:
|
||||
From: George A.Gleason <gg@well.sf.ca.us>
|
||||
^ ^-illegal period in phrase
|
||||
\-phrases containing '.' must be quoted
|
||||
X-Ph: V3.12@router.mail.cornell.edu
|
||||
>From: <gg@well.sf.ca.us>
|
||||
To: Secret_Squirrel@treehouse.com, shipley@tfs.COM
|
||||
Subject: Re: +-=*^
|
||||
Cc: cypherpunks@toad.com
|
||||
|
||||
[message deleted]
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-11 (Sat, 10 Oct 92 17:55:26 PDT) - [gg@well.sf.ca.us: Re: +-=*^] - _d9mj@crux2.cit.cornell.edu_
|
||||
+ 1992-10-11 (Sun, 11 Oct 92 11:52:09 PDT) - [[gg@well.sf.ca.us: Re: +-=*^]](/years/1992/10/7fbcfff145a8eea8bdd67a992755fc3e470eb037dc849602e09bc070154828ff) - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
|
||||
@@ -0,0 +1,59 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-26 - entropy
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Eric Hughes \<hughes@soda.berkeley.edu\><br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 372c96cffd382696c685f18f23b0868ec033ccb4cd1e33b39fcededb8cc5f91d<br>
|
||||
Message ID: \<9210261653.AA13072@soda.berkeley.edu\><br>
|
||||
Reply To: \<921024155350_74076.1041_DHJ67-1@CompuServe.COM\><br>
|
||||
UTC Datetime: 1992-10-26 16:53:38 UTC<br>
|
||||
Raw Date: Mon, 26 Oct 92 09:53:38 PPE<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Eric Hughes <hughes@soda.berkeley.edu>
|
||||
Date: Mon, 26 Oct 92 09:53:38 PPE
|
||||
To: cypherpunks@toad.com
|
||||
Subject: entropy
|
||||
In-Reply-To: <921024155350_74076.1041_DHJ67-1@CompuServe.COM>
|
||||
Message-ID: <9210261653.AA13072@soda.berkeley.edu>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Hal:
|
||||
>Ascii encoding used by PGP reduces this to 6 bits per character
|
||||
>(e.g. a character set with 64 printable characters) neglecting
|
||||
>line separators and message beginnings and endings. So there
|
||||
>should be a little less than 6 bits per character for encrypted,
|
||||
>Ascii-encoded messages.
|
||||
|
||||
Hal is, of course, right. I was getting myself confused between
|
||||
entropy lost in the encoding and the entropy of the encoding. The
|
||||
channel uses up two bits of entropy per character in the encoding.
|
||||
What's left is six bits.
|
||||
|
||||
As punishment for getting this so egregiously wrong, I'm going to post
|
||||
some C code for measuring entropy so that you all can play with it.
|
||||
|
||||
Eric
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-24 (Sat, 24 Oct 92 09:02:41 PDT) - [Multiple messages + entropy](/years/1992/10/0eec0ebc8ca754a17d7524fa51a07b6557113dffeb3bd13e9f3da940001c47f9) - _Hal \<74076.1041@CompuServe.COM\>_
|
||||
+ 1992-10-26 (Mon, 26 Oct 92 09:53:38 PPE) - entropy - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
|
||||
@@ -0,0 +1,194 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-14 - Some (Pseudo)Random Thoughts
|
||||
|
||||
## Header Data
|
||||
|
||||
From: tcmay@netcom.com (Timothy C. May)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 3843b9127a4b6cfaa8d420adae4a43519a8821bfa7898172b6f162b3bdaca046<br>
|
||||
Message ID: \<9210141805.AA04539@netcom2.netcom.com\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-14 18:06:29 UTC<br>
|
||||
Raw Date: Wed, 14 Oct 92 11:06:29 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: tcmay@netcom.com (Timothy C. May)
|
||||
Date: Wed, 14 Oct 92 11:06:29 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Some (Pseudo)Random Thoughts
|
||||
Message-ID: <9210141805.AA04539@netcom2.netcom.com>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Some thoughts on the recent meetings and what we're doing:
|
||||
|
||||
|
||||
1. The importance of trading physical goods in the Crypto Anarchy
|
||||
Game.
|
||||
|
||||
This, in my view, has been given undue and misleading importance.
|
||||
Physical goods are inherently easy to trace through remailers (via
|
||||
sniffers, radioactive tracers, weight of packages, and many other
|
||||
physical cues), are hard to store physically (imagine getting 100
|
||||
parcels for later remailing), and, most importantly, have none of the
|
||||
"envelope within envelope within...." protection accorded to the bits
|
||||
of a cryptographic remailing, or DC-Net, system! The elegance of
|
||||
cryptographic protocols is lost with physical goods.
|
||||
|
||||
Furthermore, physical delivery of any good, whether drugs, stolen
|
||||
missile components, antiquities and art items, whatever, is
|
||||
fundamentally a hard problem to solve...smugglers and thieves have
|
||||
been dealing this since the beginning of time. Stings can be easily
|
||||
arranged, delivery is not anonymous (one merely watches who takes
|
||||
delivery, or who opens a train station locker, etc....this is all SOP
|
||||
for narcs and counterespionage types), and a raid on a remailing
|
||||
entity will result in confiscation of the physical goods and (likely)
|
||||
prosecution of those caught holding the stuff. (Raiding a bit
|
||||
remailing entity produces only random-appearing bits...granted, the
|
||||
authorities may well outlaw bit remailing, or use the RICO and
|
||||
conspiracy/sedition laws to prosecute, but that's another topic.)
|
||||
|
||||
Our recent emphasis on physical goods, and all the ideas pouring in on
|
||||
what other kinds of "contraband" besides drugs can be used, is
|
||||
misleading. None of the richness of the cryptographic world is
|
||||
faithfully preserved. I urge we get back to our roots and deal only
|
||||
with things that can be expressed purely in bit form.
|
||||
|
||||
2. The "colonization of cyberspace" does not mean there is no
|
||||
interaction with the physical world, of course. But that interaction
|
||||
can be mediated with money made by converting information or digital
|
||||
money into physical money. Several methods for this conversion path
|
||||
can be considered:
|
||||
|
||||
-Alice sells information in the cyberspace domain for the equivalent
|
||||
of, say, $30,000. She converts this to "real" dollars by using an
|
||||
escrow entity which hold both sides of the transaction until it's
|
||||
completed. They then mail the information to the purchaser and send an
|
||||
ordinary check "for services rendered" to Alice for $30K. She reports
|
||||
it on her taxes, probably as a "consulting fee" (for which essentially
|
||||
no government supervision currently exists, nor is likely to....), and
|
||||
the conversion has taken place. (Note: there are still elements of
|
||||
trust involved, notably involving the escrow agent, but trust works
|
||||
pretty well for many things, especially when reputations are at
|
||||
stake. Understanding how real businesses depend on reputations is a
|
||||
missing part of modern cryptology analyses of transactions...the
|
||||
protocol analyzers and number theorists almost never take into account
|
||||
how reputations work in the real world, But I digress.)
|
||||
|
||||
-Alice and Bob trade information such that Bob gets the information
|
||||
worth about $30K, as above, and Alice gets another piece of
|
||||
information she can use in the "real world" that is worth about $30K.
|
||||
This might be stock tips, or, better, information she can turn around
|
||||
and sell in the "open market" of a service like AMIX! There are lots
|
||||
of wrinkles, inefficiencies, etc., to be worked out.
|
||||
|
||||
-And then there is digital money. You all know about this, or should.
|
||||
David Chaum, DigiCash, blinded notes, credentials, etc. The handout
|
||||
for the first meeting had a glossary of terms. (IMHO, we should be
|
||||
spending more of our time at our meeting discussing this, and less in
|
||||
playing more interations of the Game.)
|
||||
|
||||
The fascinating novel "Snow Crash," by Neil Stephenson, makes a
|
||||
mistake in having Hiro Protagonist a very wealthy man in the Metaverse
|
||||
(Stephenson's term for the virtual reality cyberspace) but a very poor
|
||||
man in the Real World. Information _is_ money. Information is liquid,
|
||||
flows across borders, and is generally convertible into real money.
|
||||
(One simple conversion strategy, alluded to above, is for Alice to
|
||||
sell her information for, say, $500K, and then to receive a
|
||||
"consulting contract," perhaps called a "retainer," of $50K a year for
|
||||
the next 20 years. Her retainer is fully legal, is perhaps handled
|
||||
through cut-outs who specialize in this kind of thing, and is a
|
||||
low-risk way to "launder" money from cyberspace into the real world. I
|
||||
have a lot more to say on these schemes, perhaps later.)
|
||||
|
||||
3. Are we emphasizing "The Game" too much?
|
||||
|
||||
If the goal is to produce a paper-based game, similar to "Monopoly" or
|
||||
fantasy role-playing games, then I suppose more practice is needed.
|
||||
But I'm not sure how worthwhile it is to try to design such a game.
|
||||
(Those who wish to should do so, then commercialize it, and become the
|
||||
Avalon Hill of crypto games!)
|
||||
|
||||
If the goal is educational, for newly interested folks, then I also
|
||||
question how much more effort should be put into it. The ideas of
|
||||
anonymous remailers, of digital money, etc., are, I think, gotten
|
||||
across in the first 60 minutes of the game, especially if some of the
|
||||
formalism is first explained (as it was at the first game, where
|
||||
digital mixes, tamper-resistand modules for implementing mixes, the
|
||||
"Dining Cryptographers Protocol," and digital money had all been
|
||||
freshly covered, so participants were putting the theory to test).
|
||||
|
||||
|
||||
I found the first game was instructive, the second much less so (and
|
||||
_not_ because of the focus on drug selling...that was a relatively
|
||||
minor issue). My impression is that many of the newcomers--and they
|
||||
should jump in here with their own reactions (too bad we don't have
|
||||
hypertext links!)--didn't really know how remailing mixes work, how
|
||||
digital psueodnyms can protect privacy in transactions, and how the
|
||||
"Game" was intended to exercise these concepts.
|
||||
|
||||
4. We need to talk about the charter or purpose of the "Cypherpunks"
|
||||
or "Cryptology Amateurs for Social Irresponsibility" (CASI--Eric
|
||||
Hughes's term) group.
|
||||
|
||||
-Is it mostly educational?
|
||||
-Is it a lobbying group, as are EFF, CPSR, and the like?
|
||||
-Is it to produce remailers, digital money, and other programming?
|
||||
-Is it subversive?
|
||||
|
||||
Now clearly we can't say it's subversive (any bets on who's gatewaying
|
||||
these messages to Other Listeners?). But we also don't want to skew
|
||||
things toward "YALG" (Yet Another Lobbying Group), nor do we want to
|
||||
be a spoon-feeding educational group for people with a casual (and
|
||||
transient) interest in crypto stuff.
|
||||
|
||||
5. There have have been several messages so far about worries about
|
||||
the legal implications of these topics, about how some
|
||||
corporate-affiliated subscribers will desubscribe "real fast" if
|
||||
certain discussion trends continue, and so on. Now we can't please
|
||||
everybody, but maybe we ought to talk about this sensitive issue soon,
|
||||
and _in person_.
|
||||
|
||||
Since it relates to our charter, Point 4 above, I recommend we do this
|
||||
at our next meeting. I'd favor that over another iteration of the
|
||||
Game.
|
||||
|
||||
In conclusion, we are in at the beginning of Something Big. While I'm
|
||||
somewhat skeptical about the claims for things like nanotech, I see
|
||||
this whole cyberspace/cryptology/digital money/transnationalism ball of
|
||||
wax being _much_ easier to implement. Networks are multiplying beyond
|
||||
any hope of government control, bandwidths are skyrocketing, CPUs are
|
||||
putting awesome power on our desktops, PGP is generating incredible
|
||||
interest, and social trends are making the time right for crypto
|
||||
anarchy.
|
||||
|
||||
I look forward to hearing your views.
|
||||
|
||||
|
||||
--
|
||||
..........................................................................
|
||||
Timothy C. May | Crypto Anarchy: encryption, digital money,
|
||||
tcmay@netcom.com | anonymous networks, digital pseudonyms, zero
|
||||
408-688-5409 | knowledge, reputations, information markets,
|
||||
W.A.S.T.E.: Aptos, CA | black markets, collapse of governments.
|
||||
Higher Power: 2^756839 | PGP 2.0 and MailSafe keys by arrangement.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-14 (Wed, 14 Oct 92 11:06:29 PDT) - Some (Pseudo)Random Thoughts - _tcmay@netcom.com (Timothy C. May)_
|
||||
|
||||
@@ -0,0 +1,150 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-26 - (fwd) A Trial Balloon to Ban Encryption?
|
||||
|
||||
## Header Data
|
||||
|
||||
From: tcmay@netcom.com (Timothy C. May)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 38fbbe375ba50d24f74e7a2036b91a85401f68ccf280d843e3d6930e6634d353<br>
|
||||
Message ID: \<9210261819.AA07688@netcom2.netcom.com\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-26 18:22:35 UTC<br>
|
||||
Raw Date: Mon, 26 Oct 92 11:22:35 PPE<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: tcmay@netcom.com (Timothy C. May)
|
||||
Date: Mon, 26 Oct 92 11:22:35 PPE
|
||||
To: cypherpunks@toad.com
|
||||
Subject: (fwd) A Trial Balloon to Ban Encryption?
|
||||
Message-ID: <9210261819.AA07688@netcom2.netcom.com>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Fellow Cypherpunks,
|
||||
|
||||
I have rewritten my posting on Denning's proposal and posted it to
|
||||
sci.crypt, for wider discussion. I'm surprised the sci.crypt folks had
|
||||
not already the significance. You might want to consider debating the
|
||||
issue there, rather than on this list, as your words will then be
|
||||
heard by more folks and could mobilize an effort against proposal like
|
||||
this one of Denning's.
|
||||
|
||||
Cryptically your,
|
||||
|
||||
--Tim
|
||||
|
||||
Newsgroups: sci.crypt
|
||||
Path: netcom.com!tcmay
|
||||
From: tcmay@netcom.com (Timothy C. May)
|
||||
Subject: A Trial Balloon to Ban Encryption?
|
||||
Message-ID: <1992Oct26.180813.7002@netcom.com>
|
||||
Organization: Netcom - Online Communication Services (408 241-9760 guest)
|
||||
X-Newsreader: Tin 1.1 PL5
|
||||
Date: Mon, 26 Oct 1992 18:08:13 GMT
|
||||
|
||||
|
||||
Is there a trial balloon being floated to effectively ban encryption?
|
||||
|
||||
Noted and influential influential crypto advisor Dorothy Denning has
|
||||
apparently floated the idea of _public key registration_ in a paper or
|
||||
talk at the 15th Computer Security Conference in Baltimore, held
|
||||
recently. Discussion of this is in comp.risks ("RISKS"), so far, but
|
||||
certainly belongs in this group.
|
||||
|
||||
I posted a summary of this position to a private mailing list devoted
|
||||
to crypto issues and got a huge response of concerned folks. I don't
|
||||
understand why this is not a hot topic on sci.crypt, so I'll post
|
||||
something right now.
|
||||
|
||||
Here's my understanding of her proposal:
|
||||
|
||||
* Anyone using public key cryptography would be required to register
|
||||
the private key with the appropriate authorities, for example, the
|
||||
Justice Department.
|
||||
|
||||
* To head off the obvious concerns about the government routinely
|
||||
reading e-mail, financial dealings, etc., this registered key would be
|
||||
stored at an independent agency after first being encrypted with the
|
||||
_public key_ of Justice. (That is, the independent key storage agency
|
||||
would have an unusable key, so _they_ couldn't use it themselves.)
|
||||
|
||||
* To obtain a usable form of the private key, Justice would have to
|
||||
get a valid court order, go to the independent storage agency, present
|
||||
the order, pick up the key, open it with their own _private key_, and
|
||||
proceed to open mail, read communications, etc.
|
||||
|
||||
This is ostensibly the procedure now used for wiretaps.
|
||||
|
||||
But the effect on encryption would be chilling:
|
||||
|
||||
-would greatly complicate the rapid changing of keys
|
||||
|
||||
-would probably be a way to get "unlicensed" crypto programs off the
|
||||
market (e.g., don't think about using PGP 2.0, as the key registration
|
||||
authorities would either insist on another algorithm, or would send
|
||||
the "registration application" to, for example, RSA Data Security for
|
||||
legal action)
|
||||
|
||||
-would undoubtedly require a "fee" (like a driver's license)
|
||||
|
||||
-would interfere with the use of digital pseudonyms, anonymous nets (a
|
||||
la Chaum's "DC Net" proposal, which some of us are exploring now), and
|
||||
digital money
|
||||
|
||||
-would establish the precedent that private communications are not
|
||||
legal, that copies of all private communications must be placed in
|
||||
escrow with the government
|
||||
|
||||
Registering keys is no different than, for example, requiring a permit
|
||||
for every public utterance or for registering typewriters, modems,
|
||||
computers, fax machines, and copiers. Or banning the use of sealed
|
||||
envelopes for mail. In Phil Zimmerman's great words, it would be like
|
||||
requiring all mail to be sent on postcards.
|
||||
|
||||
My suspicion, which Prof. Denning will presumably comment on if she's
|
||||
reading this, is that the government folks have come to understand the
|
||||
profound implications of modern crypto and are looking for approaches
|
||||
to head off the coming sea changes. Granted, there are serious
|
||||
national security threats in using modern crypto methods, but there
|
||||
are in any of the new technologies, such as those listed above.
|
||||
Besides, does anyone think all keys will be registered? Hiding bits is
|
||||
a relatively easy thing to do.
|
||||
|
||||
This key registration proposal is more odious than the "backdoors in
|
||||
telecom equipment" proposal discussed here recently.
|
||||
|
||||
Can we remain silent as our liberties are taken away?
|
||||
|
||||
I think it was John Gilmore who said: "If encryption is outlawed, only
|
||||
outlaws will have encryption."
|
||||
|
||||
|
||||
--
|
||||
..........................................................................
|
||||
Timothy C. May | Crypto Anarchy: encryption, digital money,
|
||||
tcmay@netcom.com | anonymous networks, digital pseudonyms, zero
|
||||
408-688-5409 | knowledge, reputations, information markets,
|
||||
W.A.S.T.E.: Aptos, CA | black markets, collapse of governments.
|
||||
Higher Power: 2^756839 | PGP 2.0 and MailSafe keys by arrangement.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-26 (Mon, 26 Oct 92 11:22:35 PPE) - (fwd) A Trial Balloon to Ban Encryption? - _tcmay@netcom.com (Timothy C. May)_
|
||||
+ 1992-10-27 (Tue, 27 Oct 92 02:08:56 PPE) - [Re: A Trial Balloon to Ban Encryption?](/years/1992/10/26b81383c805929e3c002c3f7836848983275fee0cf94a079d7717bfd346d887) - _gnu_
|
||||
|
||||
@@ -0,0 +1,74 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-09 - re: +-=*^
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 39a4d88ae35f5601244d259d0f691e6b2c8ec39aab73c9c220c99654fea8fa60<br>
|
||||
Message ID: \<2747.2AD5CD4D@fidogate.FIDONET.ORG\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-09 18:13:54 UTC<br>
|
||||
Raw Date: Fri, 9 Oct 92 11:13:54 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)
|
||||
Date: Fri, 9 Oct 92 11:13:54 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: re: +-=*^
|
||||
Message-ID: <2747.2AD5CD4D@fidogate.FIDONET.ORG>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
U> re: problem with key distribution; right, OK, I hadn't
|
||||
U> thought that there might be a security problem with
|
||||
U> casually giving someone your key without them being able
|
||||
U> to authenticate that it came from you. Good point.
|
||||
|
||||
But as Eric pointed out, and I realized later, the underlying social
|
||||
structure will allow detection of bum keys (presuming the scammed
|
||||
person or someone s/he knows notices, etc, and so on, a wholew world
|
||||
resides here...)
|
||||
|
||||
U> Here's my public key. If you feel it is not secure
|
||||
U> enough, we can always use the cone of silence:
|
||||
U>
|
||||
U> -----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
U> Version: 2.0
|
||||
U>
|
||||
U>
|
||||
U> 23l1t34u
|
||||
U> -----END PGP PUBLIC KEY BLOCK-----
|
||||
|
||||
Now I feel very unsecure, because the above is all I got. It ain't no
|
||||
public key...
|
||||
|
||||
|
||||
PS: Too much anonymity? I have to reply in hte mailing list to this
|
||||
person cuz it's a faked From... (trust me)
|
||||
|
||||
* Origin: World Power Systems / FidoNews / San Francisco CA (1:125/111)
|
||||
--
|
||||
Tom Jennings - via FidoNet node 1:125/555
|
||||
UUCP: ...!uunet!hoptoad!kumr!fidogate!111!Tom.Jennings
|
||||
INTERNET: Tom.Jennings@f111.n125.z1.FIDONET.ORG
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-09 (Fri, 9 Oct 92 11:13:54 PDT) - re: +-=*^ - _Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)_
|
||||
|
||||
@@ -0,0 +1,66 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-24 - entropy measures
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Eric Hughes \<hughes@soda.berkeley.edu\><br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 3c38d48ebe6788447fca198f92d44a9ffa68121b79032804da9a7944dc97d602<br>
|
||||
Message ID: \<9210240620.AA08036@soda.berkeley.edu\><br>
|
||||
Reply To: \<9210231641.AA11868@xanadu.xanadu.com\><br>
|
||||
UTC Datetime: 1992-10-24 06:20:44 UTC<br>
|
||||
Raw Date: Fri, 23 Oct 92 23:20:44 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Eric Hughes <hughes@soda.berkeley.edu>
|
||||
Date: Fri, 23 Oct 92 23:20:44 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: entropy measures
|
||||
In-Reply-To: <9210231641.AA11868@xanadu.xanadu.com>
|
||||
Message-ID: <9210240620.AA08036@soda.berkeley.edu>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Dean:
|
||||
>Where does uuencoded [compressed] binary lie? I would suspect it lies
|
||||
>right around where encrypted text is.
|
||||
|
||||
Right.
|
||||
|
||||
>Presumably straight encrypted
|
||||
>text is statistically random [7..8], but that when you encrypt to
|
||||
>just the ascii subset is when you lose the entropy.
|
||||
|
||||
Exactly.
|
||||
|
||||
uuencoding will have a slightly lower single-character entropy than
|
||||
the ASCII armor PGP uses because just about every line begins with the
|
||||
letter 'M'. This will skew the distribution slightly. But a better
|
||||
way of distinguishing uuencoding and ascii armor is to see that in
|
||||
falls in the same entropy class, and then just looking at the
|
||||
alphabetic subsets used.
|
||||
|
||||
Eric
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-22 (Thu, 22 Oct 92 09:25:56 PDT) - [BBS E-mail policy](/years/1992/10/8a24672636a42d5225524b26c5cc78e1b0ba1b62a4c1e1fe1825463951a6b9e0) - _omega@spica.bu.edu (The Omega)_
|
||||
+ 1992-10-23 (Thu, 22 Oct 92 23:02:09 PDT) - [BBS E-mail policy](/years/1992/10/bc5b354247141e46df2c768591ee1dffd7fbc017a03b959da779cf82e2521133) - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
+ 1992-10-23 (Fri, 23 Oct 92 14:42:19 PDT) - [BBS E-mail policy Now see if this number is in one of the following ranges:](/years/1992/10/298d86c630be7b06958a77a0e2a93e61224cded16c21ee64acb6bc0f39e9ecfd) - _tribble@xanadu.com (E. Dean Tribble)_
|
||||
+ 1992-10-24 (Fri, 23 Oct 92 23:20:44 PDT) - entropy measures - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
+ 1992-10-26 (Sun, 25 Oct 92 21:41:19 PPE) - [Re: entropy measures](/years/1992/10/b71072e5de22f0ee2513a7bc057b82b39ad7284a70bf4913906340f5c39b27b3) - _Eric Hollander \<hh@soda.berkeley.edu\>_
|
||||
|
||||
@@ -0,0 +1,110 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-17 - Keystone
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Eric Hughes \<hughes@soda.berkeley.edu\><br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 3e1735e0a8e172c942c2f35d934ddf647ef5c97007e6978b2e39a8506dc6808b<br>
|
||||
Message ID: \<9210172209.AA29900@soda.berkeley.edu\><br>
|
||||
Reply To: \<9210170556.AA009js@fnordbox.UUCP\><br>
|
||||
UTC Datetime: 1992-10-17 22:10:14 UTC<br>
|
||||
Raw Date: Sat, 17 Oct 92 15:10:14 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Eric Hughes <hughes@soda.berkeley.edu>
|
||||
Date: Sat, 17 Oct 92 15:10:14 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Keystone
|
||||
In-Reply-To: <9210170556.AA009js@fnordbox.UUCP>
|
||||
Message-ID: <9210172209.AA29900@soda.berkeley.edu>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
First, let me congratulate Loyd and the others involved with Keystone
|
||||
for working towards the creation of a local distribution mechanism for
|
||||
keys.
|
||||
|
||||
Every city in the U.S. needs something like this. If it's not
|
||||
happening in your area, start it. Start by getting PGP and making your
|
||||
own key. Then exchange keys with people you know.
|
||||
|
||||
We have members of the list in many parts of the U.S., Canada, and
|
||||
Europe. There's plenty of work to do. Look around. If no one else
|
||||
is doing this, you should.
|
||||
|
||||
>Ideally, you would be able to send RSA-encrypted email from any bbs
|
||||
>on any of the local nets to any other bbs -- even if all you know is
|
||||
>the destination address. We're going to do this by attempting to make
|
||||
>the bbs PGP-friendly. All the user has to do is generate a key pair.
|
||||
|
||||
There are, roughly speaking, two kinds of privacy; one is provided,
|
||||
and one is defended. Provided privacy is unstable, since the person
|
||||
using the privacy does not create it. Defended privacy is stable,
|
||||
because those who want privacy create it themselves to the level at
|
||||
which they want it. Both systems do provide privacy, no mistake.
|
||||
|
||||
I would be hesitant to implement a system that _only_ required a user
|
||||
to generate a key pair. This, for the users, is too much provided
|
||||
privacy. It will not teach the users how privacy really works, nor
|
||||
will it give them any good idea how their privacy is being maintained.
|
||||
|
||||
Defended privacy does not need to be difficult. I would spend effort,
|
||||
instead of modifying BBS software, to make it easier for users to
|
||||
handle encrypted email with their own terminal programs.
|
||||
|
||||
Now, any privacy is better than none. I don't really know if it is
|
||||
easier to modify your BBS or your modem program. But all other things
|
||||
being equal, make it easier for users to maintain their own privacy.
|
||||
|
||||
>[...] a master keyring that will be regularly distributed via a
|
||||
>trusted system to other nodes in town.
|
||||
|
||||
Again, trusted systems can turn into provided privacy. If there is a
|
||||
distributed solution you can think up, use it.
|
||||
|
||||
>The first [weak link, line security] is almost insurmountable --
|
||||
>unless the user takes the time to d/l a complete copy of PGP and the
|
||||
>Austin Keystone Keyring and encrypt the mail on their home system.
|
||||
|
||||
This should not be such an onerous task. It might be now, but that
|
||||
can change. Finding ways for users to manage keys, to get keys, and
|
||||
to look up keys are all interesting and useful problems to solve.
|
||||
|
||||
Every user should encrypt outgoing mail on the home system before it
|
||||
leaves and decrypt incoming mail on the home system after it arrives.
|
||||
If this is not easy, it should be made easy.
|
||||
|
||||
Not every user need have the complete directory on their own system.
|
||||
They merely need a way to communicate with those that they want to.
|
||||
This probably means a directory service, where people can download
|
||||
keys for the people they want to communicate with. Moving around a
|
||||
complete directory does not scale well.
|
||||
|
||||
As far as BBS support, if I want to respond to someone and I don't
|
||||
have the corresponding key, I should be able to initiate a zmodem
|
||||
transfer of that key relatively easily, for instance without leaving
|
||||
the discussion area to go to a download area.
|
||||
|
||||
Eric
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-17 (Sat, 17 Oct 92 07:16:32 PDT) - [Intro & Keystone](/years/1992/10/bfb3ed37d92a8d3b2b0087d4c8b9ae40db038981b9f15d89ec0bcbd2e2e7ed6d) - _fnordbox!loydb@cs.utexas.edu (Loyd Blankenship)_
|
||||
+ 1992-10-17 (Sat, 17 Oct 92 15:10:14 PDT) - Keystone - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
|
||||
@@ -0,0 +1,79 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-06 - re: Nuts & Acorns
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 3fd0e544238de7181d76d863b77743d4ae1d3dc88e4eaee330999abcb62314cc<br>
|
||||
Message ID: \<2654.2AD20C59@fidogate.FIDONET.ORG\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-06 22:11:44 UTC<br>
|
||||
Raw Date: Tue, 6 Oct 92 15:11:44 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)
|
||||
Date: Tue, 6 Oct 92 15:11:44 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: re: Nuts & Acorns
|
||||
Message-ID: <2654.2AD20C59@fidogate.FIDONET.ORG>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
> To: Tom Jennings
|
||||
|
||||
tj>>
|
||||
I am considering becoming and "introducer" for parts of FidoNet. I
|
||||
can't seem to get past the problems of how to assign reliability to
|
||||
public keys I receive over an unsecured email channel to begin with.
|
||||
No other method is practical.
|
||||
<<
|
||||
|
||||
>>??
|
||||
Huh? I don't understand what you're pointing out. If I send you my
|
||||
public key -- even if I cc: dockmaster -- what does it matter that the
|
||||
NSA knows my public key (unoless they want to send me msgs, too)?
|
||||
<<
|
||||
|
||||
Not my worry. What I meant was, how do I know htat the keyfile I
|
||||
received from "John Smith @ net address" really is his, and not some
|
||||
faker. Short of physically getting key disks from someone face to
|
||||
face (flatly im-possible here), I don't know.
|
||||
|
||||
The assurance of course is the social system: if someone sends me a
|
||||
message and keyfile, "here's my file, my name is Eric Hughes", and I
|
||||
distribute it...
|
||||
|
||||
I can think of no way to prevent this, other than let a social system
|
||||
detect and repair -- "HEY THATS NOT ME!!!" form the 'real' you would
|
||||
raise a flag... and an audit trail at the introducers site
|
||||
(dangerous...!) might help.
|
||||
|
||||
Anyhoo, that's what I meant.
|
||||
--- RM version 0.-1 (watch out)
|
||||
--
|
||||
Tom Jennings - via FidoNet node 1:125/555
|
||||
UUCP: ...!uunet!hoptoad!kumr!fidogate!111!Tom.Jennings
|
||||
INTERNET: Tom.Jennings@f111.n125.z1.FIDONET.ORG
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-06 (Tue, 6 Oct 92 15:11:44 PDT) - re: Nuts & Acorns - _Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)_
|
||||
+ 1992-10-06 (Tue, 6 Oct 92 15:59:23 PDT) - [Nuts & Acorns](/years/1992/10/b106cdc1eb583bff16fa9268f26e98be158ce990a6bbf7894c7c2074f047ea51) - _pmetzger@shearson.com (Perry E. Metzger)_
|
||||
+ 1992-10-07 (Tue, 6 Oct 92 17:44:27 PDT) - [Nuts & Acorns](/years/1992/10/f15e5fceb881331d0abfe3e479ccbe1aaa0955f01737edfcbcb97a68f27288e8) - _tribble@xanadu.com_
|
||||
|
||||
@@ -0,0 +1,60 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-27 - Re: Registering Keys with Big Brother
|
||||
|
||||
## Header Data
|
||||
|
||||
From: gnu@cygnus.com<br>
|
||||
To: Arthur Abraham \<a2@well.sf.ca.us\><br>
|
||||
Message Hash: 40122c10b02d8f98f7843b615af9824d0e08ae642020e324118791616e8d211a<br>
|
||||
Message ID: \<9210270724.AA29964@cygnus.com\><br>
|
||||
Reply To: \<199210270553.AA26809@well.sf.ca.us\><br>
|
||||
UTC Datetime: 1992-10-27 07:24:43 UTC<br>
|
||||
Raw Date: Tue, 27 Oct 92 00:24:43 PPE<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: gnu@cygnus.com
|
||||
Date: Tue, 27 Oct 92 00:24:43 PPE
|
||||
To: Arthur Abraham <a2@well.sf.ca.us>
|
||||
Subject: Re: Registering Keys with Big Brother
|
||||
In-Reply-To: <199210270553.AA26809@well.sf.ca.us>
|
||||
Message-ID: <9210270724.AA29964@cygnus.com>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Arthur Abrahams incisively notes:
|
||||
> Seems to me that there would be a certain amount of trouble with people
|
||||
> registering one private key but communicating with another they had
|
||||
> forgotten to register. Bad situation for my large sibling 'cause he
|
||||
> wouldn't realize this until after the court order etc. A good solution
|
||||
> would be BIG fines for mis-encryption and sampling of messages...
|
||||
|
||||
There is no need for sampling of messages. You don't understand the
|
||||
theory of power. Simply make the penalty for encryption without registry,
|
||||
larger than the penalty for any other crime. Then no crime can be hidden
|
||||
behind it. It's like getting Al Capone for income tax evasion; if you
|
||||
investigate someone and they are enforcing privacy on their communications,
|
||||
you can put them in jail for life for that, and can stop worrying about the
|
||||
original suspected offense.
|
||||
|
||||
John
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-27 (Mon, 26 Oct 92 22:54:33 PPE) - [Re: Registering Keys with Big Brother](/years/1992/10/dcf9d115e0ad4b617fdbf127754c16f4c569db245e2713554ab65a2db0302f9c) - _Arthur Abraham \<a2@well.sf.ca.us\>_
|
||||
+ 1992-10-27 (Tue, 27 Oct 92 00:24:43 PPE) - Re: Registering Keys with Big Brother - _gnu@cygnus.com_
|
||||
|
||||
@@ -0,0 +1,156 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-09 - re: Subscribe
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 428592ad0b9a398c4644a4e59509ecf89710f218eef38258f438441f9b907320<br>
|
||||
Message ID: \<2733.2AD49634@fidogate.FIDONET.ORG\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-09 01:48:59 UTC<br>
|
||||
Raw Date: Thu, 8 Oct 92 18:48:59 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)
|
||||
Date: Thu, 8 Oct 92 18:48:59 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: re: Subscribe
|
||||
Message-ID: <2733.2AD49634@fidogate.FIDONET.ORG>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
My public key.
|
||||
|
||||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
Version: 2.0
|
||||
|
||||
mQBNAirHIV8AAAECAOE6hyvBZUslVOgi12u6d7/6yMIXX4aKIRcfV3wa/ysHl+ul
|
||||
d4agC1YW+YimYeA+/bXOBxH/Y/KRzT/tLvUlcRcABRG0MVRvbSBKZW5uaW5ncyA8
|
||||
dG9takBmaWRvc3cuZmlkb25ldC5vcmcsIDE6MTI1LzExMT4=
|
||||
=dADc
|
||||
-----END PGP PUBLIC KEY BLOCK-----
|
||||
|
||||
|
||||
My public key ring, signed with my secret key:
|
||||
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
Version: 2.0
|
||||
|
||||
owF1l3VU0/v/xzeGtCBwQUJ0ICI5OqUbJEYb1IQx5tgGYwMpBamBpNJggAEoKiAq
|
||||
HVe6Q0pC8tKO0tH8JlcO9/zO+f7zOe/P+4/3eb8fz+erogA2VKcAol9lmDs0ViA/
|
||||
L3mdBQIDmKkA47t9zTtBybMxWgRHMzFr/pgLHXIsVYQW+yWb94wbYdAYS7nw5gXk
|
||||
tzbBbHO1QSuNTpl6zzKU6rVWOs0L/b1mEemAWCrRwlAHAABIDWgwlYrbWbw2XoaW
|
||||
b3zZCgv3S3HuqqopxwsyjKNvnaK98dRo/hV6Ox7arP/466UMMPCHYzTqTKh1rbiS
|
||||
1ZsgvHKm2lZ1yF6go9O90lO5hqdz74QuG6b8CnexkThg53Mdluod7XCds1a/WBp7
|
||||
Xya6xBFoGMOAee6kzK4bNk3aXWtAmQNOsRYCtUpkLQne3nAPD7AeBGznjsTDUHAc
|
||||
WNX3z0oTjofjMEi8H8QVjsZiIC5YCAGlXggERf1GdEb0q7TgCSIoBVHmkotkeXv7
|
||||
wBdZ+vc9HTNJVPM5qilvhegDL2Z7KQqkrg2KqvY62YPiIgH0LUX1U2w40Y0H7dkP
|
||||
6IQU8pEIZ2u+QmBkOsCUSrQCLkWhRAWoFd3nfF4WwjkvsHSRCOBxjHXGkt84zP0z
|
||||
3E4S/fmqExOsl8b8/iwnQ3WehZ0f3oKXv9ico4CslM61J1fdzp1ADzjFXgjUKxHV
|
||||
xsFcwToQsKmLDgyH9wOruilIK0Iw0jLyEH9piBvSFYuB4yFYHOI/j+s1en7yuBYG
|
||||
4KHRaiu3KqlnBPkWqz/et99F20etH4q0Vfhp6qzazcxcSQph6Cvc1aIKK+zVi6vJ
|
||||
mnip4yXJHMydlhEbQtXLPdp99DiKBT69wx5ZoC290jPdNzgivHs0yK4l/nzkfq0f
|
||||
1BLPyS17+2Yo4m6DWNncJsekp2Yy6Lai6an4GOI9Uufyt6oJDn5W9zjaJNvUWFTz
|
||||
5f26W/QMjJy9mbJBqtG1+yCSfOD7gyIFe9ZT2RduNXjs3ezVZTOSihVLHI+9d7ND
|
||||
QHaXptgqKk1Hudju+5EFKHCs3GG+GPBVCNiCgMRgKGwU5eWlKHCkFChwNP8XHNUT
|
||||
OGZtwD0GI70XrQ9scaP9V1Bhwqki38qz/OueQwMg/PxpyQJVwj+5lLkftublBGrL
|
||||
B8jTaESJNXgtMcdPU13YNCMWddocUuBEAZJ/H909OIxGK1l6X824DgQWeIMO9Ssz
|
||||
B+x+yVuwfiTr1vYvGrVofdLjWYmWHJHJA9pn7yTowWSVW7q7aiIm74w4zOEGdPvq
|
||||
cVlgj/vJXjrL5c/O1PCeU7s1J/B1FdgXdCCfwOv9md592Tk9eVcNkkd+I7/PBR9m
|
||||
nQ27cu7Sd+OQIMIAW4MgZ3HlpOE9Sc1oVMACDJNSCAw/0q1D4uBItw8yzSNTRVVW
|
||||
lyzWIxhXUMMLLEB3wdB8odektdZtldT7KtzskVy2LORr6UK6XdyY6UJrZjXjZjnH
|
||||
tH3hUO2FEV5pwbJgIjzaN2YoyT863BMsmPlB5FbllWdmQcm8HDFUdNl5jz+sqJKt
|
||||
1Z8YM9x8+KLQwdwZWmwqnHhM5Y9uwjruOKQ3HuvpTglZ7X8DV1pFVlFOUlruf6oG
|
||||
OlHtLjfw0PLjZG/BCzK1SI1vhjiPNnTZznJmse6cOACATdLs5ZG468ZB4Js+75TK
|
||||
XrTchGTiYY6XPI1hSssa5705G1GkQ3+iWodLK5fdzFjRp9KLQKBAHOhAnriXXJQy
|
||||
FVIkN43v9napcZDl8y8oXj6IW9mj3mfJnmWEpRo79F+OGzdee62QCqEb7is3LKo5
|
||||
WLxjvWZ0ge5qOAF7jb0iSymCdlguFyhG6nFWJnF2pEz3Y+Yrg/9Cv3vtzvH99kWR
|
||||
LsyZogpGUaXxlehAKV2mZ1E9MpWYSzZ2YW8oqh1fTVHsxFDdAGpAiBqogyeyhm9W
|
||||
newGI52/mRrTCHwwHttXWkTeY+F+5/bMGPDWwVryS/reEoeDFOOFpyy58ULzLP4s
|
||||
aqgLS09Sc+AVfTg9dpsuZkHHAwdnSY2cH60/eCdo32KCmdBXP2x0SqNyBoP4Ncf2
|
||||
y4Q0xi8h9MY5tRRrt00ULeEPH/g9gm8eG6oRnnhkqOokL5Uh1Wx7bbnlgc2R+tux
|
||||
A2MDlQ5Fm9+5C8jNYtSTgRsLL/VmGBwjuvQ1Enerrpfq5IARUjliVfiVImx2z/6D
|
||||
zDqJnzwrUn8F8U7Evghd3rE0RQwtrxdDYu/+uO2J3resQRh64qM3LjcCWXP753Oc
|
||||
xy3+ubuE8D0W7I+h5AyugqEwFzgYfPNfH8kogFURKE/KlqabjAIEQ9n7/+nS4chc
|
||||
/2JuYTzBvC5IDUhq5jHkNs1ZbJ8dDOYWncgvzX2/edjrbUy/sYDAF4qsVCjEx7IW
|
||||
uZ0TNVdX6TCydOeSJeQ2xRv7OFQvZpIj6ek8BPGetr4IuXq6r9PyXMvYxz5EIYc1
|
||||
jR+wxzf621YCnFFXF06nQocYM4WfJT4ZSOUaXco73A7IFYfSWfON24h/OHLAke+b
|
||||
9dJPfG9fADzUbD9dmcokouzeHcA8uiLxmH4f6VbBa3ul+cKGrRT1evFHTvbMT+rD
|
||||
aiUp4irCTSv1xb8mmk/jsuzvWNIl2xqfQx6n8sJa6JGCn5QDV6inTilsxRn/uPcQ
|
||||
LFYM7rPOiN8Y1iaJlSWNJKQMvtbf1x1fHP7UuMY2FJNlzy6VuPD+RgmmQ2HwYRnt
|
||||
1qFY2VC7W14InkaEkSVg8TM7m/irMy8QdnFSbGPqp8O4thAlbGPNz28R8okt2XxV
|
||||
5+832PRLTKrg6NzEDBDLGeC6PwqKaeFuwzFgAwjYBI7B+4OFTfTMrG+Arcz1re20
|
||||
LPUkdPVs9UzMoaaUXZGTrNAkmH9CR8mXCjAAEe8dbGJY5rKaDsgwebcmEXm13yCn
|
||||
9kuW7YKUbZcd5IUmKS/ANjR7dUQsq3bepF3NNfBCxCgHFxHjfy07lJPumA56XfyI
|
||||
TlF08KdZVsBTr0QBnfk6zkDlUM27zx0jpHbFndmIKx+fxbjVMefPaIfS3AYZvawr
|
||||
+xiUKfrQwZ+upF/UZxgU8zJl7N1hqwNHZO66S0Fvrat/EO3CbE5jT8H6JHeK5t68
|
||||
jNWzXzx1uVKK7MgvX6YDhQdYEi0TSNuG7e+nCOPMhwgy4xEdQIk41B3pgfQEW0LA
|
||||
N5BoNByHhv0ud544f01vGAIOcUG4QgguMBwE7kqgJE2qKEDSka+VgCe+FssHbXV+
|
||||
oq66Y0OqrOpFJwewcHtIHeb+lW/jAZZ1fGdVGGILlZR5sXyIETX3j5ogXxp6Fz8A
|
||||
SI7XV88Mbbhi9tXZqMwiSO5UCHcjv555jDIdaYs6dUlgZZ5/IIMgJI0/97M0hTtn
|
||||
kXpHS9L3Llogw0YtIEKCY8yfOFjB0q8E5wpxumF1ktiwlnKbrYCQ2DmBYSBQeZca
|
||||
UIPfzekEvjArlVkXfjPK2/7ImKUJo2v9LkXcqT1jiGSqv/OrsJLQMa87t90DzZE3
|
||||
M83vfGJEjs64+lgozqYaVfz0nz7ZzWQkEzlpLXaGND2HnWicumZHY5JU5VAbnfO5
|
||||
qev6za2e5zK0slMO5qUyFqf7P+7HH8b0VVusZ7cVpN0CUygfCe9Rl34kfOvo63Wp
|
||||
5lzJBvcGtLYoaQvW4br0cmYSH2OUWrKjcfPsT7OMei5L1I2w1UrPDoWA/a3bSCN7
|
||||
ePnk8+Q4JpVnAUFljz4rMAkTeVmrUfRjWue/LQRV7psqI091E1t6t4ggpXKVYDF9
|
||||
6A1G5nBhbAIkRSUyabE7ZzsPfEzlj/CXKe0fBoUFm1C+cG9KSwsGq3r8WWu6+SIh
|
||||
BB8YBONB0Rzwhyx6PeHYPEDg32dBh56kM6ba98TNjJ7SQh4u9rguw/TPbwIOB9+0
|
||||
sc6+lvoSxpbgJ2DEs9GU9vXMd+dc26Ud2SeiDRq3yltFZPYtOCDcDlJBFQ+TJ/Pq
|
||||
eLZpAttoJYgCAAM+K/ox4zNCC2L3OnjoO05/CzAK5jQ3cX6Y5tkW5Vy1Sp+2VBB3
|
||||
TaF80vCHz5djsgEyOUdkB9A6Ff2eHHnfHZLnyAmu6JT64F/0nQ/DtDuuu0+xYq/U
|
||||
+PCThgaejv6T9cuZKWm3uwT9j4ENbDV7lc8SgTx758O396XVF0PFx5I81MJ+8LDE
|
||||
oZvESyeizkS3lWnF9QgHlpWYmr4ynuBWPi8r8tye/iyrFzithC7KlWWH9fXC4/Qg
|
||||
gz9kL0F/TwhgAwL+TywhCHhpTRdvCIyAImCQEJgLBOP/H64v/FJPuL5rBO0xPDP6
|
||||
fMXXP+1KYuEXF2n4XTDI7HK7z3oTYc6pwBY6q/Jlxmv/3mYv+9Y3oroG3mknwbkP
|
||||
wkCMrAiPfaRcnevPt/iy1SsBz/DRiFVr/IOzlUVZNKu80vny+iki46ZndSLsld6N
|
||||
cSUDhc73AUZuleTStbYuJImZnDUt21TZytkyq3fElTJwRKv7HA0cnSDo9pqPwtZo
|
||||
1N1mZVYoiT1UNuWAq++D00jKdZQNiZYZCszzMYmq4pG7Zqxre7H6i+V3bsWJ8bLq
|
||||
YcM9f3aFn3+48BvCcDg/sDbB2x2serTWdIF54z3gEBwSAYN4+PyHySvOgZMozrcH
|
||||
7bHsVfudH8o2bbbsUx7gJ9LAMY9+PH/70SSC0469ZUvjka0Wo8/dphvOC0yuqqkH
|
||||
gxkT9TRFzzkFL35t2yEtzrHlaU7NtTa/KFtGPUSM0ZCHHkBE7hNZcB+ZErsaclbh
|
||||
spFIZE3NFukLtt5QBuXXL5uzmujPVxOapmZvnVXOJmcRfswka/0thQnwAJKwH2ji
|
||||
/i1F4+a1CQ3J89XGD4De/QH1m47wkp/mfmhit05i6JuKBhGUn7+ayqZDN2fDtoEZ
|
||||
lfSuBuNkzegt6ot/mAgYw2EYCQ8swRNsAEN6eFCmsNu//zRd3LE4gjfEDfcfKLme
|
||||
yBMo8zKgXeraS7HL4fLmOjYKBsy43OokkT2N2KSgIAvo6/uBxovmj7UA270X1S4j
|
||||
YVBwPDd7rJ4Wc05p/kjgazcBCIe//Wj8Feq6UfnZJkSLE/OmTfdIVoH0ivZ8mTC+
|
||||
QaHH++KF6q2poNO8jubXP9hngsx00IRfo+oV33rKJ8pVbcKrgqRsjqE08TsdGWVS
|
||||
JVKsDn71kvW8wCCq3Ldmp/nvs04R0fxnL9gF8hyK0aYuvfSNeMZoy7lNfAWbUN//
|
||||
2EnLeuiynnhcaY+gRJZIW2PRYGM4BoPEILzBqngs+vZR7+7t+982SxwsrUKZVSWl
|
||||
paXVTxqu7kmFk8KUWAA6ULvRnFfH4g8W+rxedV/+U4NLstbrbaeKgy3JPZocrviW
|
||||
V2kIhyqaEnKb44yEWetCu8nbsyX2uwkPRpnSnMSU83c+Gy4oNlrwfit2f6MLZakn
|
||||
B+1Y2vMzEbPuJDJR65VVeXHNqOtcH3NsTO3fZyYHbBwYDrro5jH+/ZdeLDMne8NA
|
||||
ykllagu7dTINZB+ADi1HJZW6uqP3emf7FWW73L14X9xhjEXWbvRM9w4OgnSQ5Kz+
|
||||
c9mndfo17s54z6ArCrzc2papTIM+FBfWhSgbPyXq185szIC/P1GuW+2HDvavbGbf
|
||||
+2Q7PnBtRGg41yt+TLVpNRGprWrRZv+zcJQYnpQhH867VgBSXIrJ+C5rZZ3JQrna
|
||||
/wE=
|
||||
=irCz
|
||||
-----END PGP MESSAGE-----
|
||||
|
||||
|
||||
* Origin: World Power Systems / FidoNews (1:125/111)
|
||||
--
|
||||
Tom Jennings - via FidoNet node 1:125/555
|
||||
UUCP: ...!uunet!hoptoad!kumr!fidogate!111!Tom.Jennings
|
||||
INTERNET: Tom.Jennings@f111.n125.z1.FIDONET.ORG
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-09 (Thu, 8 Oct 92 18:48:59 PDT) - re: Subscribe - _Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)_
|
||||
|
||||
@@ -0,0 +1,53 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-13 - Mr. Squirrel
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Eric Hughes \<hughes@soda.berkeley.edu\><br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 4449d8423a3d4ccea75be61a5bd0f1ff0f12e8a37191013726ee2d9bfc0c5fb6<br>
|
||||
Message ID: \<9210131856.AA29470@soda.berkeley.edu\><br>
|
||||
Reply To: \<9210131710.AA20497@bsu-cs.bsu.edu\><br>
|
||||
UTC Datetime: 1992-10-13 18:49:36 UTC<br>
|
||||
Raw Date: Tue, 13 Oct 92 11:49:36 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Eric Hughes <hughes@soda.berkeley.edu>
|
||||
Date: Tue, 13 Oct 92 11:49:36 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Mr. Squirrel
|
||||
In-Reply-To: <9210131710.AA20497@bsu-cs.bsu.edu>
|
||||
Message-ID: <9210131856.AA29470@soda.berkeley.edu>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
A signature on a message is dependent on the contents of the message;
|
||||
it is not a free floating bit of information. You can't copy a
|
||||
signature, therefore, without copying the message or find another
|
||||
message that hashes to the same value. This is the design criterion
|
||||
behind one-way functions--that you can't (feasibly) find a message
|
||||
that hashes to a given value.
|
||||
|
||||
Eric
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-13 (Tue, 13 Oct 92 08:55:18 PDT) - [Re: Mr. Squirrel](/years/1992/10/1be047fb00ed9b8e7e62a36076bd875e747fc5da248ab50cd0ef9aff7be79589) - _Hal \<74076.1041@CompuServe.COM\>_
|
||||
+ 1992-10-13 (Tue, 13 Oct 92 10:04:24 PDT) - [Re: Mr. Squirrel](/years/1992/10/fe748ec0459677318d9e9d5d0611919b35b8f6e096b4d2ede12008c07f006f28) - _nowhere@bsu-cs.bsu.edu (Chael Hall)_
|
||||
+ 1992-10-13 (Tue, 13 Oct 92 11:49:36 PDT) - Mr. Squirrel - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
|
||||
@@ -0,0 +1,66 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-08 - Subscribe
|
||||
|
||||
## Header Data
|
||||
|
||||
From: whitaker@eternity.demon.co.uk (Russell E. Whitaker)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 454afdeccfcfc12faec4a1c95227823ccd2317215802fba5cb077de5bba38b1f<br>
|
||||
Message ID: \<1480@eternity.demon.co.uk\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-08 14:04:56 UTC<br>
|
||||
Raw Date: Thu, 8 Oct 92 07:04:56 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: whitaker@eternity.demon.co.uk (Russell E. Whitaker)
|
||||
Date: Thu, 8 Oct 92 07:04:56 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Subscribe
|
||||
Message-ID: <1480@eternity.demon.co.uk>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
SUBSCRIBE
|
||||
|
||||
To human overseer: Please subscribe me to the cypherpunks list...
|
||||
|
||||
Thanks,
|
||||
|
||||
|
||||
Russell Earl Whitaker whitaker@eternity.demon.co.uk
|
||||
Communications Editor 71750.2413@compuserve.com
|
||||
EXTROPY: The Journal of Transhumanist Thought AMiX: RWHITAKER
|
||||
Board member, Extropy Institute (ExI)
|
||||
[.sig revised 1 October 1992 /// Send mail to eternity node]
|
||||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
Version: 2.0
|
||||
|
||||
mQCNAiqwg10AAAEEAMVNMI766ljeuW01xqXKYYV5lmDPvb+6dCQK3m1iBQdan0no
|
||||
pm35j1DIRp3UJZogAe5eimsQg1TALDhTq310OZs9+L6B/HxeX3+4BadIDad4g+xI
|
||||
lvaFY1Ut/hMdZNkw0tzNZOdUPiO4jYIyirReAUiMCm6jXzkTRITj7/vxxWtPAAUR
|
||||
tDNSdXNzZWxsIEUuIFdoaXRha2VyIDx3aGl0YWtlckBldGVybml0eS5kZW1vbi5j
|
||||
by51az4=
|
||||
=LOCL
|
||||
-----END PGP PUBLIC KEY BLOCK-----
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-08 (Thu, 8 Oct 92 07:04:56 PDT) - Subscribe - _whitaker@eternity.demon.co.uk (Russell E. Whitaker)_
|
||||
+ 1992-10-08 (Thu, 8 Oct 92 08:41:35 PDT) - [Subscribe](/years/1992/10/4dda48fae2f6e862d1a35aa019c82ecee26503b544f80ca323cc75f6238d3c42) - _hughes (Eric Hughes)_
|
||||
+ 1992-10-08 (Thu, 8 Oct 92 08:57:23 PDT) - [Subscriptions, etc.](/years/1992/10/20afd4cea4d9e2d57280c5afce0c3f16abf843ef65658c20b5cd90f7b78a1070) - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
|
||||
@@ -0,0 +1,102 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-10 - Better directions to the meeting on Saturday at noon
|
||||
|
||||
## Header Data
|
||||
|
||||
From: gnu@cygnus.com<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 45cba9314df0b5d366aa10e328f5e1583af274d04a9344baf485eb69ffc88689<br>
|
||||
Message ID: \<9210100950.AA28200@cygnus.com\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-10 09:43:25 UTC<br>
|
||||
Raw Date: Sat, 10 Oct 92 02:43:25 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: gnu@cygnus.com
|
||||
Date: Sat, 10 Oct 92 02:43:25 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Better directions to the meeting on Saturday at noon
|
||||
Message-ID: <9210100950.AA28200@cygnus.com>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Someone asked for better directions, and the original ones were
|
||||
pretty skimpy anyway. Here's a better try.
|
||||
|
||||
Cygnus Support
|
||||
1937 Landings Drive
|
||||
Mt. View, CA 94043
|
||||
|
||||
There's no phone service there yet.
|
||||
|
||||
Take US 101 toward Mt. View. From San Francisco, it's about a
|
||||
40-minute drive. Get off at the Rengstorff Ave/Amphitheatre Parkway
|
||||
exit. If you were heading south on 101, you curve around to the
|
||||
right, cross over the freeway, and get to a stoplight. If you were
|
||||
heading north on 101, you just come right off the exit to the
|
||||
stoplight. The light is the intersection of Amphitheatre and
|
||||
Charleston Rd. Take a right on Charleston; there's a right-turn-only
|
||||
lane.
|
||||
|
||||
Follow Charleston for a short distance. You'll pass the
|
||||
Metaphor/Kaleida buildings on the right. At a clump of palm trees and
|
||||
a "Landmark Deli" sign, you can take a right into Landings Drive; this
|
||||
gets you into the complex from the north. Or you can go slightly
|
||||
further along Charleston and take the next right, into a driveway with
|
||||
a big "Landmark" sign in the middle. No matter which way you got into
|
||||
the complex, follow around it until you are on the side that faces the
|
||||
freeway. There's a clock tower that rises out of one of the
|
||||
buildings, to the right (south) of the deli. Enter through the doors
|
||||
immediately under the clock tower. They'll be open between noon and
|
||||
1PM at least. (See below if you're late.)
|
||||
|
||||
Once inside, take the stairs up, immediately to your right. At the top
|
||||
of the stairs, turn right past the treetops, and we'll be in 1937 on
|
||||
your left.
|
||||
|
||||
If you are late and the door under the clock tower is locked, you can
|
||||
go to the deli (which will be around a building and left, as you face
|
||||
the door), cut between the buildings to the right of the deli, and
|
||||
into the back lawns between the complex and the farm behind it. Walk
|
||||
around the buildings until you see a satellite dish in the lawn. Go
|
||||
up the stairs next to the dish, which are the back stairs into the
|
||||
Cygnus office space. We'll prop the door (or you can bang on it if we
|
||||
forget).
|
||||
|
||||
Or, you can find the guard who's wandering around the complex, who
|
||||
knows there's a meeting happening and will let you in. They can be
|
||||
beeped at 965 5250, though you'll have trouble finding a phone.
|
||||
|
||||
Don't forget to eat first, or bring food at noon! I recommend hitting
|
||||
the burrito place on Rengstorff (La Costen~a) at about 11:45. To get
|
||||
there, when you get off 101, take Rengstorff (toward the hills) rather
|
||||
than Amphitheatre (toward the bay). Follow it about ten blocks until
|
||||
the major intersection at Middlefield Road. La Costen~a is the store
|
||||
on your left at the corner. You can turn left into the narrow lane
|
||||
behind the store, which leads to a parking lot, and enter by the front
|
||||
door, which faces the intersection. To get to the meeting from there,
|
||||
just retrace your route on Rengstorff, go straight over the freeway,
|
||||
and turn right at the stoplight onto Charleston; see above.
|
||||
|
||||
See you there!
|
||||
|
||||
John Gilmore
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-10 (Sat, 10 Oct 92 02:43:25 PDT) - Better directions to the meeting on Saturday at noon - _gnu@cygnus.com_
|
||||
|
||||
@@ -0,0 +1,48 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-09 - Re: New feature of the remailer
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Peter Shipley \<shipley@tfs.COM\><br>
|
||||
To: Eric Hughes \<hughes@soda.berkeley.edu\><br>
|
||||
Message Hash: 469abb614c7863da4b08c8492ddedd9268dc6c9ee9e116c72675887290677963<br>
|
||||
Message ID: \<9210090721.AA09749@edev0.TFS\><br>
|
||||
Reply To: \<9210090703.AA26448@soda.berkeley.edu\><br>
|
||||
UTC Datetime: 1992-10-09 07:14:13 UTC<br>
|
||||
Raw Date: Fri, 9 Oct 92 00:14:13 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Peter Shipley <shipley@tfs.COM>
|
||||
Date: Fri, 9 Oct 92 00:14:13 PDT
|
||||
To: Eric Hughes <hughes@soda.berkeley.edu>
|
||||
Subject: Re: New feature of the remailer
|
||||
In-Reply-To: <9210090703.AA26448@soda.berkeley.edu>
|
||||
Message-ID: <9210090721.AA09749@edev0.TFS>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
|
||||
Now what is needed is a user interface/script for submitting mail.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-09 (Thu, 8 Oct 92 23:56:11 PDT) - [New feature of the remailer](/years/1992/10/07ae1782d78a668866ed682f440cba74ebbd27148657ab8bcb66f1a7d5c36516) - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
+ 1992-10-09 (Fri, 9 Oct 92 00:14:13 PDT) - Re: New feature of the remailer - _Peter Shipley \<shipley@tfs.COM\>_
|
||||
|
||||
@@ -0,0 +1,44 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-17 - game items
|
||||
|
||||
## Header Data
|
||||
|
||||
From: wixer!pacoid@cs.utexas.edu (Paco Xander Nathan)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 47f75618579e176e33b68fa8db4a67f40b80a2f50bba439002ae5d2f7151e4ba<br>
|
||||
Message ID: \<9210170316.AA05655@wixer\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-17 05:31:21 UTC<br>
|
||||
Raw Date: Fri, 16 Oct 92 22:31:21 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: wixer!pacoid@cs.utexas.edu (Paco Xander Nathan)
|
||||
Date: Fri, 16 Oct 92 22:31:21 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: game items
|
||||
Message-ID: <9210170316.AA05655@wixer>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
For that matter, vibrators are illegal now for sale in Texas. Most all sex toys have to be renamed as "personal enhancement devices" or sumsuch in retail outlets to avoid seizure.
|
||||
|
||||
Also, drug testing decoy materials - like powdered fake urine - are illegal in TX.
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-17 (Fri, 16 Oct 92 22:31:21 PDT) - game items - _wixer!pacoid@cs.utexas.edu (Paco Xander Nathan)_
|
||||
|
||||
@@ -0,0 +1,114 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-29 - drugs for sale
|
||||
|
||||
## Header Data
|
||||
|
||||
From: tom.jennings@f111.n125.z1.FIDONET.ORG (tom jennings)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 4819c24f105df5961c3b7abe09a69ebbe8477c9adee58cbaa1c345e6f3cd9503<br>
|
||||
Message ID: \<3373.2AF03157@fidogate.FIDONET.ORG\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-29 21:26:42 UTC<br>
|
||||
Raw Date: Thu, 29 Oct 92 14:26:42 PPE<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: tom.jennings@f111.n125.z1.FIDONET.ORG (tom jennings)
|
||||
Date: Thu, 29 Oct 92 14:26:42 PPE
|
||||
To: cypherpunks@toad.com
|
||||
Subject: drugs for sale
|
||||
Message-ID: <3373.2AF03157@fidogate.FIDONET.ORG>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
A cross posting from FidoNet PUBLIC_KEYS. It would be nice if some
|
||||
other cypherpunks could join the PUBLIC_KEYS echo.
|
||||
|
||||
|
||||
|
||||
;Date 29 Oct 92 11:28:07
|
||||
From: Jesse David Hollington@1:125/33
|
||||
To: Arol Ambler@1:125/111
|
||||
Subject: Test
|
||||
>----------------------- Do not change this line -----------------------------<
|
||||
AA> Anyway, anyone who is concerned can always use some method that hides the
|
||||
AA> fact that any secret content is even being communicated. (Variations on
|
||||
AA> read every fifth word to see the real message, or other standard
|
||||
AA> methods).
|
||||
|
||||
It's funny you should bring that up. One of the major proponents of
|
||||
encryption here in Region 12 posted the following in the Regional Sysop Echo
|
||||
some time ago...
|
||||
|
||||
=============================================================================
|
||||
|
||||
Having said that, I also wonder whether this insistence upon having
|
||||
everything in plain text isn't fostered by some sysops as a means of
|
||||
receiving information that they otherwise wouldn't be privy to. If
|
||||
one is truly paranoid ( *not* that I would fall into that category
|
||||
in anyone's wildest dreams...ahem), one should worry about why some
|
||||
netmail is read so assiduosly by passthrough systems in the first place.
|
||||
|
||||
Fortunately, even mail that I send direct to nodes is quoted back and
|
||||
often passes through a whole variety of systems for their inspection and
|
||||
review.
|
||||
|
||||
Since almost all of my netmail is incredibly innocent there might
|
||||
always be the possibility that some of it will come back to hover
|
||||
like a bad dream in some creative complaint. In broader legal terms,
|
||||
every other communication system avoids eavesdropping on mail.
|
||||
|
||||
|
||||
P.S. To understand how powerless you are to prevent encrypted text, read
|
||||
the leftmost letter of each sentence in the last three paragraghs
|
||||
downwards...ahem.
|
||||
|
||||
===========================================================================
|
||||
|
||||
He raises a valid point. Sysops who are so paranoid about encrypted mail
|
||||
being sent through their systems should realize that they are really powerless
|
||||
to prevent it if somebody is determined enough to send a coded message to
|
||||
somebody else.
|
||||
|
||||
I've sought legal opinions in Canadian law (I don't know how it is in the
|
||||
U.S.) and I've discovered that the less I know about mail passing through my
|
||||
system, the safer I am. If I keep every message on my system, and read them
|
||||
all, then I can be held liable if somebody routes something illegal through my
|
||||
system and it slips by me. If I kill all passthrough mail, and read nothing
|
||||
except what is addressed to me, I am operating under common carrier status,
|
||||
and can't be held liable any more than Federal Express or UPS could.
|
||||
|
||||
As a result, it's actually better to *encourage* people to send encrypted
|
||||
mail through your system. The belief that if people are sending encrypted
|
||||
mail they're doing something wrong is a fallacy... then again, I'm preaching
|
||||
to the converted here.
|
||||
|
||||
Cheers,
|
||||
Jesse.
|
||||
|
||||
|
||||
--- Maximus 2.01wb
|
||||
* Origin: On a Clear Disk You Can Seek Forever (1:225/1)
|
||||
--
|
||||
tom jennings - via FidoNet node 1:125/555
|
||||
UUCP: ...!uunet!hoptoad!kumr!fidogate!111!tom.jennings
|
||||
INTERNET: tom.jennings@f111.n125.z1.FIDONET.ORG
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-29 (Thu, 29 Oct 92 14:26:42 PPE) - drugs for sale - _tom.jennings@f111.n125.z1.FIDONET.ORG (tom jennings)_
|
||||
|
||||
@@ -0,0 +1,47 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-02 - Re: Secure IRC
|
||||
|
||||
## Header Data
|
||||
|
||||
From: George A. Gleason \<gg@well.sf.ca.us\><br>
|
||||
To: postmastuh@dawkmastuh.guv<br>
|
||||
Message Hash: 49e2a322f784875ed7aff0927bade4a23461f8d0b4577c3665c1452ebb6a1d7b<br>
|
||||
Message ID: \<199210020800.AA21035@well.sf.ca.us\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-02 07:53:02 UTC<br>
|
||||
Raw Date: Fri, 2 Oct 92 00:53:02 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: George A. Gleason <gg@well.sf.ca.us>
|
||||
Date: Fri, 2 Oct 92 00:53:02 PDT
|
||||
To: postmastuh@dawkmastuh.guv
|
||||
Subject: Re: Secure IRC
|
||||
Message-ID: <199210020800.AA21035@well.sf.ca.us>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Interesting ideas so far... Hey, anyone see the Quantum Crypto article in
|
||||
October Scientific AMerican? Of course the approach isn't practical at this
|
||||
point, and doing it over fiber optics won't be any better since the
|
||||
amplification along the way would raise the quantum process to the classical
|
||||
level and destroy its value... but even so, interesting as theory...
|
||||
-gg
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-02 (Fri, 2 Oct 92 00:53:02 PDT) - Re: Secure IRC - _George A. Gleason \<gg@well.sf.ca.us\>_
|
||||
|
||||
@@ -0,0 +1,67 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-16 - Who uses ethernet (Mr Squirrel?)
|
||||
|
||||
## Header Data
|
||||
|
||||
From: pmetzger@shearson.com (Perry E. Metzger)<br>
|
||||
To: shipley@tfs.com<br>
|
||||
Message Hash: 4ac131a44b9a1890122ffbba123034be4eff191a4476e1986383eedf0ea3c413<br>
|
||||
Message ID: \<9210161803.AA15862@newsu.shearson.com\><br>
|
||||
Reply To: \<9210160112.AA06320@edev0.TFS\><br>
|
||||
UTC Datetime: 1992-10-16 18:34:23 UTC<br>
|
||||
Raw Date: Fri, 16 Oct 92 11:34:23 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: pmetzger@shearson.com (Perry E. Metzger)
|
||||
Date: Fri, 16 Oct 92 11:34:23 PDT
|
||||
To: shipley@tfs.com
|
||||
Subject: Who uses ethernet (Mr Squirrel?)
|
||||
In-Reply-To: <9210160112.AA06320@edev0.TFS>
|
||||
Message-ID: <9210161803.AA15862@newsu.shearson.com>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
>From: Peter Shipley <shipley@tfs.com>
|
||||
|
||||
>>
|
||||
>>Who uses ethernet?! :-)
|
||||
>>
|
||||
|
||||
>I do at home, want to tap it? simple. just crawl under my house and
|
||||
>pug in to any jack, don't owrry about bringing batteies there are plenty
|
||||
>of 120V outlets.
|
||||
|
||||
> -Pete
|
||||
|
||||
>PS: and soon I plan on using ISDN to bridge by home ethernet backbone
|
||||
> onto the internet
|
||||
|
||||
Old hat -- I still remember the days of yore (only about five years
|
||||
ago, but it seems like an eternity) when I worked at bellcore and
|
||||
Phil Karn revealed to me that his home network was on the internet.
|
||||
All I've got from home is a wimpy little UUCP link to this very day.
|
||||
|
||||
Perry
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-14 (Tue, 13 Oct 92 22:45:57 PDT) - [re: Re: Mr. Squirrel](/years/1992/10/7e499c6a0ad8c00016756be087eed59e5468584faa0524d693043c0e0b32bba9) - _Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings)_
|
||||
+ 1992-10-14 (Wed, 14 Oct 92 11:11:49 PDT) - [Re: Mr. Squirrel](/years/1992/10/9894f672507495f4713359bc2ebc73e36ca07ccfd88543541a4e7184b7746c3a) - _Eric Hollander \<hh@soda.berkeley.edu\>_
|
||||
+ 1992-10-16 (Thu, 15 Oct 92 18:13:10 PDT) - [Who uses ethernet (Mr Squirrel?)](/years/1992/10/704ce56d2f4067d0cdc37a26e31ddbefffd3edd65ca38ff8ee81d27247ee473a) - _Peter Shipley \<shipley@tfs.COM\>_
|
||||
+ 1992-10-16 (Fri, 16 Oct 92 11:34:23 PDT) - Who uses ethernet (Mr Squirrel?) - _pmetzger@shearson.com (Perry E. Metzger)_
|
||||
+ 1992-10-16 (Fri, 16 Oct 92 11:47:34 PDT) - [Re: Who uses ethernet (Mr Squirrel?)](/years/1992/10/cddc36f8c672bf9bb89b6149942bfd28939f85f5395dd7bcffef31c0a29e8e96) - _Peter Shipley \<shipley@tfs.COM\>_
|
||||
|
||||
@@ -0,0 +1,65 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-22 - Keystone
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Eric Hughes \<hughes@soda.berkeley.edu\><br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 4b028509a502332d7eb20d667f19c0822f161f636956254fb21a228f7050899b<br>
|
||||
Message ID: \<9210220541.AA13526@soda.berkeley.edu\><br>
|
||||
Reply To: \<9210220333.AA009m7@fnordbox.UUCP\><br>
|
||||
UTC Datetime: 1992-10-22 05:35:21 UTC<br>
|
||||
Raw Date: Wed, 21 Oct 92 22:35:21 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Eric Hughes <hughes@soda.berkeley.edu>
|
||||
Date: Wed, 21 Oct 92 22:35:21 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Keystone
|
||||
In-Reply-To: <9210220333.AA009m7@fnordbox.UUCP>
|
||||
Message-ID: <9210220541.AA13526@soda.berkeley.edu>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
Ah. A small PGP subset. You hadn't mentioned this. When you said
|
||||
you weren't requiring the user to run PGP, I assumed key generation
|
||||
must occur on the board.
|
||||
|
||||
As for your fatal flaw I hadn't spotted, I had spotted it, and the
|
||||
location of the private key was the critical point. If the key is on
|
||||
the BBS, the message goes out in the clear.
|
||||
|
||||
Look, it boils down to this. If the message traffic to the BBS is to
|
||||
be encrypted, then the user has to generate a key on his own machine
|
||||
and decrypt it on his own machine. There's no way around that.
|
||||
|
||||
But the user interface problem can be solved. Just make a bunch of
|
||||
.com files which do nothing but spawn pgp by invoking the correct
|
||||
arguments. Very simple; a few lines of C is all. Even the PGPPATH
|
||||
can be set before the spawn. It's an easy encapsulation. It will run
|
||||
a bit slower for load time, but not appreciably. And you won't have
|
||||
to recompile PGP from the distributed executables.
|
||||
|
||||
Eric
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-22 (Wed, 21 Oct 92 22:35:21 PDT) - Keystone - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
+ 1992-10-22 (Wed, 21 Oct 92 23:35:44 PDT) - [Re: Keystone](/years/1992/10/fb6cd513252375d40032e5c92dc6f0e2a944525554d20788331d097d9233143d) - _gnu@cygnus.com_
|
||||
+ 1992-10-22 (Thu, 22 Oct 92 10:09:30 PDT) - [Re: Keystone](/years/1992/10/2414b4e9749952e702f40e3ab08b5c8c4f13ba6c41f4fd2ddcc01ba85e3079c8) - _sdw@meaddata.com (Stephen Williams)_
|
||||
|
||||
@@ -0,0 +1,59 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-09 - +-=*^
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Secret_Squirrel@Treehouse.COM<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 4b7db885ad2f8c9b50f47b7e01dff5dcd4bf4f8c93d38b54b2450802d2b96240<br>
|
||||
Message ID: \<9210091712.AA27717@atdt.org\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-09 17:05:09 UTC<br>
|
||||
Raw Date: Fri, 9 Oct 92 10:05:09 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Secret_Squirrel@Treehouse.COM
|
||||
Date: Fri, 9 Oct 92 10:05:09 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: +-=*^
|
||||
Message-ID: <9210091712.AA27717@atdt.org>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
re: Interface for re-mailer; why not hitch it to emacs or something?
|
||||
|
||||
re: problem with key distribution; right, OK, I hadn't thought that
|
||||
there might be a security problem with casually giving someone your
|
||||
key
|
||||
without them being able to authenticate that it came from you. Good
|
||||
point.
|
||||
|
||||
Here's my public key. If you feel it is not secure enough, we can
|
||||
always use the cone of silence:
|
||||
|
||||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
Version: 2.0
|
||||
|
||||
|
||||
23l1t34u
|
||||
-----END PGP PUBLIC KEY BLOCK-----
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-09 (Fri, 9 Oct 92 10:05:09 PDT) - +-=*^ - _Secret_Squirrel@Treehouse.COM_
|
||||
+ 1992-10-09 (Fri, 9 Oct 92 11:16:24 PDT) - [Re: +-=*^](/years/1992/10/aca914116e261da03e08977616fac44612be493b810335fb01c85b9597d7a534) - _Peter Shipley \<shipley@tfs.COM\>_
|
||||
|
||||
@@ -0,0 +1,65 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-13 - Mr. Squirrel? Just who is whom here?
|
||||
|
||||
## Header Data
|
||||
|
||||
From: hugh@domingo.teracons.com (Hugh Daniel)<br>
|
||||
To: CYPHERPUNKS@TOAD.COM<br>
|
||||
Message Hash: 4c67e79a2ec7344d27550db884c628f037f2077d684ba8190ca763a77730d2bc<br>
|
||||
Message ID: \<9210131201.AA12086@domingo.teracons.com\><br>
|
||||
Reply To: \<921010180751_74076.1041_DHJ61-1@CompuServe.COM\><br>
|
||||
UTC Datetime: 1992-10-13 12:02:06 UTC<br>
|
||||
Raw Date: Tue, 13 Oct 92 05:02:06 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: hugh@domingo.teracons.com (Hugh Daniel)
|
||||
Date: Tue, 13 Oct 92 05:02:06 PDT
|
||||
To: CYPHERPUNKS@TOAD.COM
|
||||
Subject: Mr. Squirrel? Just who is whom here?
|
||||
In-Reply-To: <921010180751_74076.1041_DHJ61-1@CompuServe.COM>
|
||||
Message-ID: <9210131201.AA12086@domingo.teracons.com>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Hal is somewhat right, anyone can use 'Secret Squirrel' and anyone
|
||||
can use any public key they want also. So, in a many-to-one scope (as
|
||||
in a maillist) where the sender can not use the one-on-one signed
|
||||
signiture method how do we have proff of who the sender really is?
|
||||
Maybe public forums are just not places where it is easy to verify
|
||||
the identity of a speaker?
|
||||
|
||||
A second thing that Hal's comments bring up is that we were reading
|
||||
the From: headders and ignoreing the keys. In good crypto-mail
|
||||
readers the key ought to be checked against our own data base of
|
||||
others keys and the result added to the hedders as say:
|
||||
KeyCheck: FooBar Bazoid holds this key in XXX database
|
||||
or some such rot. I wonder what is more important, who I claim to be
|
||||
in a random message or what key I include...
|
||||
New keys ought for an ID (or new ID's for the same key) should be
|
||||
added to the data base as well.
|
||||
But all this needs to be done automaticly by the mailers and
|
||||
interfaces, else the system will be mis-used and folks will tire of
|
||||
the extra work that gets them little advantage.
|
||||
|
||||
||ugh Daniel
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-10 (Sat, 10 Oct 92 11:04:58 PDT) - [Mr. Squirrel?](/years/1992/10/a7deae21289e64af8c4c457307bdf1c62cbeb469f75b1613a3ed1a9dfa73b939) - _Hal \<74076.1041@CompuServe.COM\>_
|
||||
+ 1992-10-13 (Tue, 13 Oct 92 05:02:06 PDT) - Mr. Squirrel? Just who is whom here? - _hugh@domingo.teracons.com (Hugh Daniel)_
|
||||
+ 1992-10-13 (Tue, 13 Oct 92 08:58:32 PDT) - [Mr. Squirrel? Just who is whom here?](/years/1992/10/b522b87517a2d84b579f40e313b2fa857de956c060f703f320fd96498bfcfd60) - _pmetzger@shearson.com (Perry E. Metzger)_
|
||||
|
||||
@@ -0,0 +1,173 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-26 - Alpha Particles and One Time Pads
|
||||
|
||||
## Header Data
|
||||
|
||||
From: tcmay@netcom.com (Timothy C. May)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 4ca87779428bbf54ceb61e5789afa6cddb59f6abb001b6b2f5ff15428f981342<br>
|
||||
Message ID: \<9210260530.AA00679@netcom2.netcom.com\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-26 06:32:00 UTC<br>
|
||||
Raw Date: Sun, 25 Oct 92 23:32:00 PPE<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: tcmay@netcom.com (Timothy C. May)
|
||||
Date: Sun, 25 Oct 92 23:32:00 PPE
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Alpha Particles and One Time Pads
|
||||
Message-ID: <9210260530.AA00679@netcom2.netcom.com>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Fellow Cypherpunks,
|
||||
|
||||
Here's a posting I just sent to sci.crypt, dealing with using alpha
|
||||
particle sources as noise sources for generating one-time pads.
|
||||
Ordinarily I wouldn't bother you folks with this, especially since
|
||||
you're all reading sci.crypt (aren't you? Only the FidoNetters have a
|
||||
good excuse not to.).
|
||||
|
||||
But this thread ties together two aspects of my life, cryptography and
|
||||
alpha particle errors in chips.
|
||||
|
||||
--Tim
|
||||
|
||||
Newsgroups: sci.crypt
|
||||
Path: netcom.com!tcmay
|
||||
From: tcmay@netcom.com (Timothy C. May)
|
||||
Subject: Re: Hardware random number generators compatible with PCs?
|
||||
Message-ID: <1992Oct26.051612.29869@netcom.com>
|
||||
Organization: Netcom - Online Communication Services (408 241-9760 guest)
|
||||
X-Newsreader: Tin 1.1 PL5
|
||||
References: <1992Oct25.224554.1853@fasttech.com>
|
||||
Date: Mon, 26 Oct 1992 05:16:12 GMT
|
||||
|
||||
Bohdan Tashchuk (zeke@fasttech.com) wrote:
|
||||
|
||||
: The recent post on building a random number generator using a zener diode got
|
||||
: me to thinking once again about commercial alternatives.
|
||||
:
|
||||
: I haven't seen any commercial alternatives discussed here recently. And since
|
||||
: the market is so specialized, they may well exist but I'm simply not aware of
|
||||
: them.
|
||||
:
|
||||
: The ideal product would have the following features:
|
||||
:
|
||||
: * cost less than $100
|
||||
: * use a radioactive Alpha ray emitter as the source
|
||||
|
||||
It's a small world! In my earlier incarnation as a physicist for
|
||||
Intel, I discovered the alpha particle "soft error" effect in memory
|
||||
chips. By 1976 chips, especially dynamic RAMs, were storing less than
|
||||
half a million electrons as the difference between a "1" and a "0". A
|
||||
several MeV alpha could generate more than a million electron-hole
|
||||
pairs, thus flipping some bits.
|
||||
|
||||
(Obviously the effect of alphas on particle detectors was
|
||||
known, and smoke detectors were in wide use, but nobody prior to 1977
|
||||
knew that memory bits could be flipped by alphas, coming from uranium
|
||||
and thorium in the package materials. It's a long story, so I won't
|
||||
say any more about it here.)
|
||||
|
||||
: * connect to an IBM PC serial or parallel port
|
||||
: * be "dongle" sized, ie be able to plug directly onto the port, and
|
||||
: not have a cable from an external box to the port
|
||||
: * be powered directly from the port
|
||||
: * generate at least 1000 "highly random" bits per second
|
||||
|
||||
This should be feasible by placing a small (sub-microcurie) amount of
|
||||
Americium-241 on a small DRAM chip that is known to be alpha-sensitive
|
||||
(and not all of them are, due to processing tricks). Errors would
|
||||
occur at random intervals, depending on which bits got hit. Getting
|
||||
1000 errors a second would be tough, though, as such high intensities
|
||||
would also tend to eventually destroy the chip (through longterm
|
||||
damage to the silicon, threshold voltage shifts, etc.). If you really
|
||||
want to pursue this seriously, I can help with the calculations, etc.
|
||||
|
||||
: Details:
|
||||
:
|
||||
: Certainly in high volume these things can be made cheaply. Smoke detectors
|
||||
: often sell for under $10, and have a radioactive source, an IC, a case, etc.
|
||||
|
||||
Yes, but smoke detectors use ionization in a chamber (the smoke from a
|
||||
fire makes ionization easier). That is, no real ICs. But ICs, and even
|
||||
RAM chips, are cheap, so your $10 figure is almost certainly in the ballpark.
|
||||
|
||||
A bigger concern is safety, or the _perceived_ safety. Smoke detectors
|
||||
have, I understand, moved away from alpha particle-based detectors to
|
||||
photoelectric detectors (smoke obscures beam of light). Don't
|
||||
underestimate the public's fear of radioactivity, even at low levels.
|
||||
|
||||
: Using a well-designed circuit based on Alpha decay should mean that the
|
||||
: randomness is pretty darn good.
|
||||
|
||||
But not necessarily any better than noise from a Zener. With the
|
||||
higher bit rate from diode noise, more statistical tricks can be done.
|
||||
The relatively low bit rate from alpha decay gives less flexibility.
|
||||
On the other hand, alpha hits are undeniably quite random, with
|
||||
essentially no way to skew the odds (unlike with diode noise).
|
||||
|
||||
: Everyone these days has either a serial or parallel port available, either
|
||||
: directly or thru a switch box.
|
||||
:
|
||||
: The tiny "dongle" size is a convenience. If it is small and powered directly
|
||||
: from the port, there are no cables to get in the way. There is enough power
|
||||
: available from the signal lines on these ports to power simple devices. E.g.
|
||||
: most mice don't require an external power supply.
|
||||
:
|
||||
: For most applications 1000 bits per second should be adequate. For example,
|
||||
: it would be quite adequate for session keys. For generating pseudo
|
||||
: one-time-pads, an overnight run should generate plenty of values. Continuously
|
||||
: generating values for a month would produce about 300 MB, which should be
|
||||
: enough to exchange new CD-ROM key disks once a month.
|
||||
|
||||
One time pads are complicated to use. Only very high security
|
||||
applications that can also afford them use them. For example, some
|
||||
diplomatic traffic. I can't conceive of a case where 300 MB a month
|
||||
could be used.
|
||||
|
||||
And _theft_ (or copying) of the CD-ROM one time pads has got to be a
|
||||
much bigger issue that whether alpha particle noise sources are better
|
||||
than diode noise sources! By about 10 orders of magnitude I would say.
|
||||
|
||||
Black bag jobs on the sites holding the keys will be the likeliest
|
||||
attack, not trying to analyze how random the noise is (even a fairly
|
||||
crummy noise source will not yield enough information to a
|
||||
cryptanalyst trying to break a one-time pad).
|
||||
|
||||
Having said all this, I'm glad you gave some thought to alphas. For a
|
||||
time in the late 1970s this was the chip industry's number one
|
||||
headache...it was definitely the most exciting time of my life.
|
||||
|
||||
--Tim
|
||||
--
|
||||
..........................................................................
|
||||
Timothy C. May | Crypto Anarchy: encryption, digital money,
|
||||
tcmay@netcom.com | anonymous networks, digital pseudonyms, zero
|
||||
408-688-5409 | knowledge, reputations, information markets,
|
||||
W.A.S.T.E.: Aptos, CA | black markets, collapse of governments.
|
||||
Higher Power: 2^756839 | PGP 2.0 and MailSafe keys by arrangement.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-26 (Sun, 25 Oct 92 23:32:00 PPE) - Alpha Particles and One Time Pads - _tcmay@netcom.com (Timothy C. May)_
|
||||
+ 1992-10-26 (Mon, 26 Oct 92 12:47:45 PPE) - [Re: Alpha Particles and One Time Pads](/years/1992/10/bb4a49d7659a5c58389bf70574ecfa3693eb62b1952698da3e844d6829c85135) - _Peter Shipley \<shipley@tfs.COM\>_
|
||||
+ 1992-10-26 (Mon, 26 Oct 92 14:09:43 PPE) - [Alpha Particles and One Time Pads](/years/1992/10/f9cc5c6d8ba5bdb505c75decc71a4fbd1c865e5e4a2322f842ff044c8dde44af) - _pmetzger@shearson.com (Perry E. Metzger)_
|
||||
|
||||
@@ -0,0 +1,61 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-21 - TEMPEST, Eavesdropping
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Eric Hughes \<hughes@soda.berkeley.edu\><br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 4d3c0b68b446f11f664d02d6696ac26026c7e92e0e14c93cbc6235b7eb4495c3<br>
|
||||
Message ID: \<9210211711.AA11833@soda.berkeley.edu\><br>
|
||||
Reply To: \<9210202224.AA28714@netcom2.netcom.com\><br>
|
||||
UTC Datetime: 1992-10-21 17:11:42 UTC<br>
|
||||
Raw Date: Wed, 21 Oct 92 10:11:42 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Eric Hughes <hughes@soda.berkeley.edu>
|
||||
Date: Wed, 21 Oct 92 10:11:42 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: TEMPEST, Eavesdropping
|
||||
In-Reply-To: <9210202224.AA28714@netcom2.netcom.com>
|
||||
Message-ID: <9210211711.AA11833@soda.berkeley.edu>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
>Their chief concern doesn't seem to be folks like us, but rather
|
||||
>concerns about vans parking outside high tech and defense contractors
|
||||
>and slurping up what they can [...]
|
||||
|
||||
When banks start signing with private keys, then we get an even more
|
||||
interesting monitoring problem.
|
||||
|
||||
>And someone asked about building Faraday cages. Don't even try!
|
||||
|
||||
Sometimes it is cheaper to build a whole building to be tempest-spec
|
||||
than to buy all tempest-spec electronics. What I have heard about
|
||||
such stuff is solid copper walls and no windows. No exacly your
|
||||
classical Faraday cage; more like your classical Gaussian surface. :->
|
||||
|
||||
TEMPEST is an acronym. I don't remember for what.
|
||||
|
||||
Eric
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-21 (Wed, 21 Oct 92 10:11:42 PDT) - TEMPEST, Eavesdropping - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
+ 1992-10-21 (Wed, 21 Oct 92 14:07:37 PDT) - [TEMPEST, Eavesdropping](/years/1992/10/041ccd8442454608e3dec5534526a715161e63caf6d81ac5e2f5ea068bf6c330) - _pmetzger@shearson.com (Perry E. Metzger)_
|
||||
|
||||
@@ -0,0 +1,55 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-08 - Subscribe
|
||||
|
||||
## Header Data
|
||||
|
||||
From: hughes (Eric Hughes)<br>
|
||||
To: whitaker@eternity.demon.co.uk<br>
|
||||
Message Hash: 4dda48fae2f6e862d1a35aa019c82ecee26503b544f80ca323cc75f6238d3c42<br>
|
||||
Message ID: \<9210081541.AA03134@toad.com\><br>
|
||||
Reply To: \<1480@eternity.demon.co.uk\><br>
|
||||
UTC Datetime: 1992-10-08 15:41:35 UTC<br>
|
||||
Raw Date: Thu, 8 Oct 92 08:41:35 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: hughes (Eric Hughes)
|
||||
Date: Thu, 8 Oct 92 08:41:35 PDT
|
||||
To: whitaker@eternity.demon.co.uk
|
||||
Subject: Subscribe
|
||||
In-Reply-To: <1480@eternity.demon.co.uk>
|
||||
Message-ID: <9210081541.AA03134@toad.com>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
You are subscribed.
|
||||
|
||||
Next time, please use the cypherpunks-request@toad.com address for
|
||||
administrative matters. Tell your friends this as well. Your request
|
||||
got sent out to the whole list, not a tragedy, but an annoyance.
|
||||
|
||||
I met Max More at a party about a month ago. I suspect he might be
|
||||
interested in the list. Do you have an e-mail address for him?
|
||||
|
||||
Eric
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-08 (Thu, 8 Oct 92 07:04:56 PDT) - [Subscribe](/years/1992/10/454afdeccfcfc12faec4a1c95227823ccd2317215802fba5cb077de5bba38b1f) - _whitaker@eternity.demon.co.uk (Russell E. Whitaker)_
|
||||
+ 1992-10-08 (Thu, 8 Oct 92 08:41:35 PDT) - Subscribe - _hughes (Eric Hughes)_
|
||||
+ 1992-10-08 (Thu, 8 Oct 92 08:57:23 PDT) - [Subscriptions, etc.](/years/1992/10/20afd4cea4d9e2d57280c5afce0c3f16abf843ef65658c20b5cd90f7b78a1070) - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
|
||||
@@ -0,0 +1,54 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-26 - Re: Registering Keys with Big Brother
|
||||
|
||||
## Header Data
|
||||
|
||||
From: George A. Gleason \<gg@well.sf.ca.us\><br>
|
||||
To: tcmay@netcom.com<br>
|
||||
Message Hash: 4e2d68b1b438d44805f4da04f132ea6afbc6804413a7808e5a4966e63ef11f13<br>
|
||||
Message ID: \<199210260853.AA20086@well.sf.ca.us\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-26 08:54:38 UTC<br>
|
||||
Raw Date: Mon, 26 Oct 92 01:54:38 PPE<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: George A. Gleason <gg@well.sf.ca.us>
|
||||
Date: Mon, 26 Oct 92 01:54:38 PPE
|
||||
To: tcmay@netcom.com
|
||||
Subject: Re: Registering Keys with Big Brother
|
||||
Message-ID: <199210260853.AA20086@well.sf.ca.us>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Tim's summary of Denning raises some interesting points, and no doubt this
|
||||
will end up in the courts in due time. Some angles of attack which might be
|
||||
pursued include 2nd amendment (original grounds: protection against tyrrany)
|
||||
and 1st amendment. Re the latter, a lawyer I spoke with some years ago,
|
||||
proposed the idea that freedom of speech in some cases depends on the
|
||||
ability for the speaker to determine who will and who will not receive what
|
||||
is said.
|
||||
|
||||
Then of course there is always good oldfashioned civil disobedience. If
|
||||
enough people conscientiously violate the regulation, it will become
|
||||
unenforceable and all the more likely to be overturned.
|
||||
-gg
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-26 (Mon, 26 Oct 92 01:54:38 PPE) - Re: Registering Keys with Big Brother - _George A. Gleason \<gg@well.sf.ca.us\>_
|
||||
+ 1992-10-26 (Mon, 26 Oct 92 09:38:01 PPE) - [Registering Keys with Big Brother](/years/1992/10/51213736f60c1e2796c2efeb25d8bc8604e98cac27e3dbb72131f18007d74363) - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
|
||||
@@ -0,0 +1,59 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-21 - Re: Home security...
|
||||
|
||||
## Header Data
|
||||
|
||||
From: George A. Gleason \<gg@well.sf.ca.us\><br>
|
||||
To: mark@coombs.anu.edu.au<br>
|
||||
Message Hash: 4e5fbb8165043de2724fa04e92f0ab99ed97bc40a4bc063185c8a2e6d719999f<br>
|
||||
Message ID: \<199210210815.AA06441@well.sf.ca.us\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-21 08:16:08 UTC<br>
|
||||
Raw Date: Wed, 21 Oct 92 01:16:08 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: George A. Gleason <gg@well.sf.ca.us>
|
||||
Date: Wed, 21 Oct 92 01:16:08 PDT
|
||||
To: mark@coombs.anu.edu.au
|
||||
Subject: Re: Home security...
|
||||
Message-ID: <199210210815.AA06441@well.sf.ca.us>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
Tempest: there are companies which make cages for Macs and PCs, I don't have
|
||||
addresses but they can probably be found with some searching of ads. The
|
||||
main application it would seem, is not the individual home user (unless
|
||||
s/he's a notorious digital dissident) but rather the encrypted BBS,
|
||||
particularly one which decrypts and re-encrypts or retransmits messages.
|
||||
Consider the labor cost of monitoring a computer, and you can see it would
|
||||
be reserved for the ones that are "significant."
|
||||
|
||||
Keeping your computer off the phones and AC while doing crypto processing,
|
||||
can be fairly easy. Unplug the darn modem from the phone socket. (Gee that
|
||||
was simple, wasn't it?) Use a laptop and run it entirely on the batteries
|
||||
while doing crypto processing. You can go buy an old laptop pretty cheaply
|
||||
these days... Or get an uninterruptable power supply for your main
|
||||
computer; cost will vary from $600 to $1500 depending on how much time you
|
||||
need to be running on the large batteries which are converted into AC to run
|
||||
the computer.
|
||||
|
||||
-gg
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-21 (Wed, 21 Oct 92 01:16:08 PDT) - Re: Home security... - _George A. Gleason \<gg@well.sf.ca.us\>_
|
||||
|
||||
@@ -0,0 +1,56 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-10 - a key
|
||||
|
||||
## Header Data
|
||||
|
||||
From: marc@kg6kf.ampr.org (Marc de Groot - KG6KF)<br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 4eeee33db706827275e7187c82882825658b0861bfe99b00cfe2ef651e9e14c1<br>
|
||||
Message ID: \<9210100755.AA05427@kg6kf.ampr.org\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-10 10:07:47 UTC<br>
|
||||
Raw Date: Sat, 10 Oct 92 03:07:47 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: marc@kg6kf.ampr.org (Marc de Groot - KG6KF)
|
||||
Date: Sat, 10 Oct 92 03:07:47 PDT
|
||||
To: cypherpunks@toad.com
|
||||
Subject: a key
|
||||
Message-ID: <9210100755.AA05427@kg6kf.ampr.org>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
A key...
|
||||
|
||||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
Version: 2.0
|
||||
|
||||
mQA9AirWaLMAAAEBgMlJILifxrXH8fkJwJbeSHXAY1Q9/AzPybGVy0Dx/q70Fr3d
|
||||
KhM6XoSEgaw2Ezzn2QAFEbQWTWFyYyBkZSBHcm9vdCAoY2FzdWFsKbQjTWFyYyBk
|
||||
ZSBHcm9vdCA8bWFyY0BrZzZrZi5hbXByLm9yZz4=
|
||||
=LL6T
|
||||
-----END PGP PUBLIC KEY BLOCK-----
|
||||
|
||||
This is a casual key for me. Perhaps a causal key for me too.
|
||||
|
||||
-Marc de Groot <marc@kg6kf.ampr.org>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-10 (Sat, 10 Oct 92 03:07:47 PDT) - a key - _marc@kg6kf.ampr.org (Marc de Groot - KG6KF)_
|
||||
|
||||
@@ -0,0 +1,78 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-20 - Re: Keystone
|
||||
|
||||
## Header Data
|
||||
|
||||
From: fnordbox!loydb@cs.utexas.edu (Loyd Blankenship)<br>
|
||||
To: soda.berkeley.edu!hughes@cs.utexas.edu<br>
|
||||
Message Hash: 503c3b8d260c9d277fec543d1511e53afe6d139974194bbc24df6f7f32462d72<br>
|
||||
Message ID: \<9210201753.AA009kv@fnordbox.UUCP\><br>
|
||||
Reply To: _N/A_<br>
|
||||
UTC Datetime: 1992-10-20 21:43:30 UTC<br>
|
||||
Raw Date: Tue, 20 Oct 92 14:43:30 PDT<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: fnordbox!loydb@cs.utexas.edu (Loyd Blankenship)
|
||||
Date: Tue, 20 Oct 92 14:43:30 PDT
|
||||
To: soda.berkeley.edu!hughes@cs.utexas.edu
|
||||
Subject: Re: Keystone
|
||||
Message-ID: <9210201753.AA009kv@fnordbox.UUCP>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
:I would be hesitant to implement a system that _only_ required a user
|
||||
:to generate a key pair. This, for the users, is too much provided
|
||||
:privacy. It will not teach the users how privacy really works, nor
|
||||
:will it give them any good idea how their privacy is being maintained.
|
||||
|
||||
I take the opposite view -- I dare *not* supply such a system. Any user that
|
||||
is interested enough in 100% privacy will be encouraged -- both from the
|
||||
email prompt and through the message bases/file areas -- to d/l a copy of
|
||||
PGP. I'll probably write a tutorial on using it as well.
|
||||
|
||||
But many users do not have the interest/time/ability to set up PGP on their
|
||||
home system. For them, I want to provide the best possible privacy given the
|
||||
ease with which anyone who can find their local LMOS can tap (voice or data)
|
||||
a line...
|
||||
|
||||
:Defended privacy does not need to be difficult. I would spend effort,
|
||||
:instead of modifying BBS software, to make it easier for users to
|
||||
:handle encrypted email with their own terminal programs.
|
||||
|
||||
I don't have my user's terminal program -- I *do* have the bbs software.
|
||||
|
||||
:Again, trusted systems can turn into provided privacy. If there is a
|
||||
:distributed solution you can think up, use it.
|
||||
|
||||
I don't know any way to maintain an up-to-date, central keyring without
|
||||
someone being in charge of regular updates. I'd make it available via
|
||||
Fido, FTP, BMS and regular d/l.
|
||||
|
||||
Loyd
|
||||
|
||||
***************************************************************************
|
||||
* loydb@fnordbox.UUCP Once you pull the pin, * Loyd Blankenship *
|
||||
* GEnie: SJGAMES Mr. Grenade is no longer * PO Box 18957 *
|
||||
* Compu$erve: [73407,515] your friend! * Austin, TX 78760 *
|
||||
* cs.utexas.edu!dogface!fnordbox!loydb * 512/447-7866 *
|
||||
***************************************************************************
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-20 (Tue, 20 Oct 92 14:43:30 PDT) - Re: Keystone - _fnordbox!loydb@cs.utexas.edu (Loyd Blankenship)_
|
||||
+ 1992-10-21 (Wed, 21 Oct 92 09:43:25 PDT) - [Keystone](/years/1992/10/2ff29505951a381077a03c5daef44ec830ba5b90cf48eb6abe31bc094aeaee28) - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
|
||||
@@ -0,0 +1,84 @@
|
||||
---
|
||||
layout: default
|
||||
---
|
||||
|
||||
# 1992-10-26 - Registering Keys with Big Brother
|
||||
|
||||
## Header Data
|
||||
|
||||
From: Eric Hughes \<hughes@soda.berkeley.edu\><br>
|
||||
To: cypherpunks@toad.com<br>
|
||||
Message Hash: 51213736f60c1e2796c2efeb25d8bc8604e98cac27e3dbb72131f18007d74363<br>
|
||||
Message ID: \<9210261637.AA12485@soda.berkeley.edu\><br>
|
||||
Reply To: \<199210260853.AA20086@well.sf.ca.us\><br>
|
||||
UTC Datetime: 1992-10-26 16:38:01 UTC<br>
|
||||
Raw Date: Mon, 26 Oct 92 09:38:01 PPE<br>
|
||||
|
||||
## Raw message
|
||||
|
||||
```
|
||||
{% raw %}From: Eric Hughes <hughes@soda.berkeley.edu>
|
||||
Date: Mon, 26 Oct 92 09:38:01 PPE
|
||||
To: cypherpunks@toad.com
|
||||
Subject: Registering Keys with Big Brother
|
||||
In-Reply-To: <199210260853.AA20086@well.sf.ca.us>
|
||||
Message-ID: <9210261637.AA12485@soda.berkeley.edu>
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain
|
||||
|
||||
|
||||
|
||||
Re: Some angles of attack
|
||||
|
||||
George:
|
||||
>2nd amendment (original grounds: protection against tyrrany)
|
||||
|
||||
I've thought for a year or so now that if the State Department was
|
||||
going to class cryptography as munitions, then they have _de jure_
|
||||
acknowledged that civilian use of cryptography is protected under the
|
||||
Second Amendment. Cryptography is not a weapon and should not be
|
||||
restricted for public safety reasons.
|
||||
|
||||
>1st amendment. Re the latter, a lawyer I spoke with some years ago,
|
||||
>proposed the idea that freedom of speech in some cases depends on the
|
||||
>ability for the speaker to determine who will and who will not
|
||||
>receive what is said.
|
||||
|
||||
This criterion may be valid, but I don't think it's needed. As I
|
||||
understand it, the restrictions on speech that do exist restrict 1)
|
||||
certain contents, not speech as such, and 2) speech which is public,
|
||||
not private. Encrypted text, by the fact that it is encrypted, is
|
||||
intended to be removed from the public domain. And restricting the
|
||||
transmission of encrypted text based on some assumed content is prior
|
||||
restraint.
|
||||
|
||||
I'm not sure that any of these arguments really touch a key
|
||||
registration proposal, unfortunately. Guns may be sold, but also
|
||||
registered. It is not the speech that is restricted, but the privacy
|
||||
from the Justice Dept. which is restricted.
|
||||
|
||||
What I suspect may be more effective is to argue, based on the Tenth
|
||||
(or Ninth? I get them confused) Amendment, that the Federal Government
|
||||
has not been granted specific power to require the registration of key
|
||||
material under any of its other powers.
|
||||
|
||||
>Then of course there is always good oldfashioned civil disobedience.
|
||||
|
||||
But the percentage of users of cryptography for communications is a
|
||||
small percentage of the total population as of yet.
|
||||
|
||||
Eric
|
||||
|
||||
|
||||
|
||||
|
||||
{% endraw %}
|
||||
```
|
||||
|
||||
## Thread
|
||||
|
||||
+ Return to [October 1992](/years/1992/10)
|
||||
|
||||
+ 1992-10-26 (Mon, 26 Oct 92 01:54:38 PPE) - [Re: Registering Keys with Big Brother](/years/1992/10/4e2d68b1b438d44805f4da04f132ea6afbc6804413a7808e5a4966e63ef11f13) - _George A. Gleason \<gg@well.sf.ca.us\>_
|
||||
+ 1992-10-26 (Mon, 26 Oct 92 09:38:01 PPE) - Registering Keys with Big Brother - _Eric Hughes \<hughes@soda.berkeley.edu\>_
|
||||
|
||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user