Probably, I scrub my disks routinely. There's a couple of cool devices on
the market for encrypting IDE disks. They're basically a PCI IDE controller
card, which implememnts hardware DES to transparently encrypt ( write) and
decrypt ( read) all your disk operations. It even encrypts the boot sector.
Basically, without the password, your disks are fuxed. Of course, it is only
DES. The NSA obviously have doubts about the cryptographic stability of DES,
hence they commisioned a new cipher, but for home use it makes short work of
your hard disks. I've been researching similar devices for a couple of
months now. I've found only two. Both are IDE, no SCSI. This I'll assume is
because no-one has been able to cost-effectively implememnt DES in hardware
with sufficient throuput to cope with SCSI data transfer rates. However,
they out-speed IDE disks, and so you should not notice them in operation.
Links:
So, basically this new tool used by the authorities is just a PC with a load
of peripherals stuffed into a big case, and given a fancy name. I think I
have one of those on my desk! ;-)
~deicide.
Links won't save you now, racist pig.
Lest anyone forget - Sycho is a flaming racist who hates African American
people and probably other races too.
It's been demonstrated that Sycho is a flaming racist. He thinks
African-Americans should be bought and sold like cattle. He thinks African
Americans will never be his equal (like we could stoop so low). Read his
views of race in America - how he thinks African Americans should be used as
"alligator bait". If you disagree with him, please reply to this thread.
<3ca86dae...@www.farts.com>
"Translation: He's a pole smoking piece of shit that has to use a
dictionary to understand what those big words are. Besides that, he
HAS to use big words to make up for those "short cummings". But I hear
even the nigger can take Viagra. How's it feel to have a tiny pee pee?
Do you use tweezers or have you had one of your pubic hairs piss on
you and you thought that it was an "orgasm"."
---
<3ca76ca6...@www.farts.com>
"BTW, What happened to your "job"? Getting ready to go cash that
welfare check? I think the banks are closed for the day. That's ok
tho. I think the Seven Eleven is still open and I bet they have that
40 ounce of Cobra just nice and cold waiting for your nigger lips to
suck on 'em.. Kinda like the way you slurp me. Feels good to have real
meat in your mouth huh?"
---
<3ca66ba3...@www.farts.com>
" Matter O fact, to use an old quote, "Bring your
nigger. We've got the rope." - http://www.whitesonly.net "
---
<3ca5699e...@www.farts.com>
>> Hell, niggers rob, steal,
>> murder, cheat, lie, steal, deal drugs a hell of a lot more than white
>> people do.
>Many African-Americans have to resort to crime because of 400 years of
>slavery and oppression by you white boys.
Is that the best excuse you can come up with? Did I not see one of
your ancestors on a box of Cream Of Wheat and on a bottle of Aunt
Jemima?
>> When a white comedian says anything derogatory about niggers, you
>> scream "RASICST!!".
>
>The white man has no room to be making jokes about African-Americans. Your
>ancestors weren't bought and sold like cattle.
That's because we're all that and then some. We knew how to run a
business.
>> Yet when a nigger comedian says anything about
>> whites, you think it's a big fucking joke.
>
>White people are funny. Look in the mirror. When I finally meet up with
>you, the first thing I'm going to do is laugh in your face. Then put my
>Timberlands upside your head.
I'm STILL waiting, boot lip. I just wonder, how where I live at
Affirmative Action sinks in. Trust me nigger, you'll loose ever time.
>> I bet if a white man were
>> to come up with a cable TV show called W.E.T (White Entertainment
>> Television) you niggers will start screaming "BIGOTRY!!".
>
>Damn right.
I guess that explains why I see your "people" on the episode of Cops
every night, huh? Your "people" are used to being confined. It's
blatantly obvious.
>> Yet you
>> niggers are allowed to have a cable TV station called B.E.T (Black
>> Entertainment Television) WTF is that all about?
>
>BET doesn't exclude white people from watching.
Neither would WET.
>> Yet day, after tired
>> assed day I hear niggers talking "Racial Equality." Fuck that!
>Why are you so scared?
I'm not. Only because a nigger would never be my "equal".
>> Niggers
>> need to go back to Africa.
>
>You crackers can go back to Europe too.
We were here first, Toby.
>> The only black in my family tree is the one hanging
>> out in the front yard where he belongs.
>
>So, someone, somewhere in your family tree has African-American genes?
Why,
>that would make you some % black!
Only in the fact that my ancestors taught you sons of bitches how to
WORK for a living. Something your ancestors were never able to
accomplish. That's why down in the deep south, your "kind" are used as
alligator bait.
---
<3ca15406...@www.farts.com>
No, I was right the first time. Don't correct me, nigger.
---
<3c9f518f...@www.farts.com>
On Thu, 21 Mar 2002 16:10:05 -0500, "3rd World LaughingStock \(Sycho
is a racist\)" <sy...@toothlessretard.antisocial.com> wrote:
>"Sycho" <forkn...@dinnertime.com> wrote in message
>news:3c9c46e2...@www.farts.com...
>
>(most of this wasn't worth reading so I cut it)
>
>> >Sycho, could do it.
>> I can do anything. I outted YOUR pugly ass, didn't I?
>
>Yeah. Right. You outed me as BNB. Everybody had a good laugh.
>
>> >> Carrier side is definately degree and
>> >> what you've done, but enterprise is all weenie and certs speak
>> >> volumes.
>> >
>> >Which is why most of them are fat, lispy, punks. They get a hardon
when
>> >talking about Active Directory or IOS upgrades or "priviledge exec
mode".
>> ><guffaw>
>> You copied that because it's the only WHITE word you didn't understand
>> because it wasn't in the EBONICS dictionary, boy.
>
>I don't speak "Ebonics". I speak English. Look it up.
>
>> >> That's why I never work in enterprise. I can't stand it.
>> >
>> >Kudos. I don't either.
>> "Kudos"? That's not in Ebonics/Coontakentay, Toby.
>
>You not understanding what "kudos" means isn't my problem. But your
^^^^^^^^^^^^ <--- Can't form a sentence correctly nigger?
>> You know what I think is right? Well, even if you didn't, I'm about to
>> tell your SORRY BLACK ass anyway because it's something you should
>> know...
>> God is white..
>
>Liar.
>
>> If he weren't, he would have said, "I iz wut I
>> iz." And Abraham Lincoln was heard to have quoted the following when
>> he woke up after being drunk.. "I FREED THE WHAT?????!!!"
>
>Why do you hate black people so much? What have we ever done to you? I
was
Why don't I. I mean com on. Niggers thing they have free fucking run
of the country. Every time a white man does something, anything, it's
labeled as being "racist". When a nigger does anything, (as if they
ever could) no one says shit about it. Hell, niggers rob, steal,
murder, cheat, lie, steal, deal drugs a hell of a lot more than white
people do. Sure there are a few whites that fuck up, but there are
also a few black people that honestly try to work hard to get ahead.
When a white comedian says anything derogatory about niggers, you
scream "RASICST!!". Yet when a nigger comedian says anything about
whites, you think it's a big fucking joke. I bet if a white man were
to come up with a cable TV show called W.E.T (White Entertainment
Television) you niggers will start screaming "BIGOTRY!!". Yet you
niggers are allowed to have a cable TV station called B.E.T (Black
Entertainment Television) WTF is that all about? Yet day, after tired
assed day I hear niggers talking "Racial Equality." Fuck that! Niggers
need to go back to Africa. I don't see niggers going after the fuckin
towel heads. Maybe that's because niggers become Muslims? Fuck you and
your niggers too. The only black in my family tree is the one hanging
out in the front yard where he belongs.
>joking about you getting beat downs from black men. Did that REALLY
happen?
>Did a black man steal your first wife? You lost a promotion to a black
man?
>What's the deal? Why all the hatred and jokes?
See above, nigger.
---
<3c9e4f19...@www.farts.com>
>As for my job, I'm at work now. And you're still at home .... watching TV
Yeah, you're at work. What, the zoo let you go to lunch already?
>Which office does your wife work at
>again? Time Warner has a few offices in the area.
Sorry, but my wife hates niggers too. :o) But if you wanna see a real
man, look at my pic and I'll fax you a picture of my MEAT. Not an
entree, but the main course.
BTW, have a life nigger. You have already proved that you can't kick
my ass. All you can do is talk shit behind a computer. Just like a
nigger. You can't fight a man to man fight. Like all niggers, you need
your "back" to help you. I've grown tired of dealing with a loud
mouthed, obnoxious, "I wanna be a human", nigger such as yourself.
Thank GOD for "Affirmative action" and sickle cell, eh? Now you see
why Abe Lincoln let you go? You can't be educated, taught any
important skills unless you count picking cotton, and you can't be
taught how to interact with people in any society. So go shove your
spear up your black ass and OOGA BOOGA this bitch, and shut up while
you're at it. BTW, and FTR, Tarzan WAS what, you know? Cheetah was his
nigger. Probably one of your ancestors, huh? Porch monkey.
Why don't you like black people?
Lest anyone forget...
STFU already man. I was tryin' to have a converation.
~deicide.
True, true. :-) I'm hoping to get hold of a few to test shortly. :-) IDE /
SCSI may perform similarly on a workstation, but I think SCSI would take the
edge on a large RAID array. :-) I'd like to see the encryption card that
would keep up with a big RAID system, it could pose a few technical
challenges as well. :-)
I started out thinking about developing my own PCI card. I'm not an
electronics genius, but I think I'd get away with it. :-) There are a few
fast encryption processors available, and I was looking at some alternative
algorithms like blowfish using FPGAs. It wouldn't be certified, but I don't
give a fuck 'cos I'm not tryin' to sell it to anyone! ;-)
~deicide.
I haven't used NYEO, but I might grab a copy and see what it does. I
generally find software like that easy to break. It'd great at removing
threats from "casual" interest though. Symatec's WinGuard Impact is a joke.
You just have to kill it's ini file in the Windows directory and it
"repairs" itself with the default password! ;-) Those Wavetrend serial port
RFID tags are a joke as well. They're supposed to lock your workstation when
you go walkabout, but all you have to do is kill a dll which they require
and you'll find the machine will boot cleanly. Anyway, those devices are
intended to support hot-desking, and only prevent "casual" interest. They're
not suppose to stop professionals.
The beautiful thing about a hardware solution like the IDE controller is
that it's OS independent, whereas software solutions all have a favourite
home.
The other main advantage to the hardware solution is that it is much faster!
Try encrypting a whole disk in software! You might get away with it, but
I'll bet you couldn't watch a DVD at the same time! ;-)
~deicide.
The algorithms are secure, theoretically. Cryptographic implementations
offer vulnerabilties. Lots of algorithms are based on variations of DES. DES
( Data Encryption Standard) hails from the 70s, which would partly explain
it's abundance. IBM originally named it LUCIFER, which I think is a much
better name which should have stuck. :-)
Blowfish has the tremendous advantage of being unpatented and license free.
Check out products which use Blowfish here:
http://www.counterpane.com/products.html
Point of interest, Blowfish features in Open BSD.
Even if a browser transaction is encrypted, the data might be stored on a
server in plaintext. This of course makes it vulnerable server-side.
One of the more interesting techniques I'm aware of for breaking an
encrypted transfer is through monitoring the typematic rate used during
authentication. This narrows down the password space which must be searched
in a brute-force attempt, possibly so much so that a brute-force attampt is
considered quite feasable. Of course to counter-act this hack, a client
should not transmit characters as they are entered, but should queue the
text in a constant sized buffer before transmitting the entire encrypted
buffer in one go.
DES and Blowfish both provide strong encryption, sadly they are often
implemented poorly, and there's no telling what your shopping website will
do with your details once they've retrieved them. :-)
~deicide.
Why is it, you think, that export of such strong crypto technologies is no longer
such a deep concern? Could it be perhaps they have shortcuts to the
cryptoanalysis? One may then question why the need for Magic Lantern or Purple
Haze but then remember that Carnivore and Echelon will catch your whole session
bidrectionally anyway off almost any modern ISP, so their other tools are just
timesavers. Last I checked, Distributed.Net was cracking crypto up to 109 bit
eliptic curve using distributed home PC's (following Moore's law), so how much
horsepower do they have? If you were of the more paranoid sort, you might wonder
how much true privacy they will ever let you have...
They're watching... Can't you fell it?!?
Sycho wrote:
The 31 hours might be 'cos you have a badly fraged disk or something, and
heh, 30 Gs is fairly big! It's easier if you shedule a freespace wipe
regulalrly, I think it will take less time. :-)
I think I'm gonna stick with researching hardware devices, then my dual-boot
machines will all be happy. :-)
~deicide.
Nah, it's about how much privacy you let them take. :-)
Some fellas on the NET are breaking RC4 cryptoed M$ Office documents. That's
no hass though 'cos they only use a 40bit key, a small network of PCs will
decode they data in 24hrs. That's not to say you'll recover the password
used. You see, the password protecting the document is hashed into a 40 bit
key used for encryption. But hey, will you care what the password is you
have the data? If you're the government or any other shrewd individual then
the answer is "fuck yeah!". This is because you could then add that password
to your little black book and save time later on.
Should I correct you on DES? You seem like a reasonable chap. You see,
Diffie and Hellman only invented the concept of the public-key cipher system
in 1976, after the invention of LUCIPHER/DES. DES, and algorithms like it
symmetric, feistel algorithms), do not rely on large prime numbers. Large
prime numbers do feature heavily on the type of crypto often employed in
emails for example though, so yeah, a factoring shortcut would probably make
you the most "at-risk" individual on the planet. :-)
Anyway, it's goodbye DES and triple DES, and hello AES or Rijndael
(pronounced "rain doll") or whatever the hell you wanna call it. :-)
Pencils ready! Get cracking!! ;-)
~deicide.
Why are you so concerned about wiping your drive? Do you have racist
material on it? PDFs of KKK meeting notes?
Lest anyone forget, Sycho likes to hang black people in his front yard.
Sycho is an admitted flaming racist:
Oh, well...
There's also a suspicion that cipher block chaining (CBC - like DES) algorithms
have a shortcut using some form of pattern analysis. I distrust DES and 3DES
anyway because "they" allow it to be freely exported. I have not dived into AES
yet and know very little about it. I studied some heavy IPSEC for my Cisco
Security Specialization but as you know, the crap they allow in mass-produced
Cisco gear is inferior to the crypto some of you hacker-folk have been cooking
up.
I would like to know what algorithms this community figures are secure and why.
I OPEN THIS UP TO DEBATE FOR ALL YOU SLEEPERS OUT THERE!
...sorry for shouting...
RSA encryption (as used in PGP, SSH, etc...) with shorter key lengths is
now very vulnerable indeed. From a post to bugtraq today by Lucky Green
[sham...@cypherpunks.UNSPAMMABLE]
---snip---
Coincidentally, the day before the panel, Nicko van Someren announced at
the FC02 rump session that his team had built software which can factor
512-bit RSA keys in 6 weeks using only hardware they already had in the
office.
---snip---
That was just due to general improvements in cpu power and software
optimisation. There's also a new kind of specialized hardware factoring
machine just designed by a guy called D. J. Bernstein:-
http://cr.yp.to/papers.html#nfscircuit
which reduces the complexity of factoring numbers by an exponential factor:
the same post suggests:
---snip---
[...] a 1024-bit RSA
factoring device can likely be built using only commercially available
technology for a price range of several hundred million dollars to about
1 billion dollars. Costs may well drop lower if one has the use of a
chip fab. It is a matter of public record that the NSA as well as the
Chinese, Russian, French, and many other intelligence agencies all
operate their own fabs.
---snip---
and
---snip---
Bernstein's machine, once built, will have power requirements in the MW
to operate, but in return will be able to break a 1024-bit RSA or DH key
in seconds to minutes.
---snip---
The upshot of all this is that it's time to start using 2048 bit RSA as an
absolute minimum. Last time I checked the nym remailers didn't accept keys
> 1024 bits, which means that by this standard the remailer network should
be regarded as transparent to the intelligence agencies. I've added apas
because all the remailer FAQs out on the net are pretty old, and it's
possible that some or all of them do accept longer nym keys now - e.g., the
beta server nym.shinn.net says it understands pgp 6.5.x, and presumably
therefore accepts >1024 bit nym keys, but I'm curious if the others (nan,
redneck, and does xgnym still exist?) will choke on big keys or not, since
it's just become a priority....
DaveK
--
moderator of
alt.talk.rec.soc.biz.news.comp.humanities.meow.misc.moderated.meow
Burn your ID card! http://www.optional-identity.org.uk/
Help support the campaign, copy this into your .sig!
Proud Member of the Exclusive "I have been plonked by Davee because he
thinks I'm interesting" List Member #<insert number here>
Master of Many Meowing Minions
Holder of the exhalted PF Chang's Crab Wonton Award for kook spankage above
and beyond the call of hilarity.
On Tue, 26 Mar 2002, "Dave Korn" <no....@my.mailbox.invalid> wrote:
<snip>
> The upshot of all this is that it's time to start using 2048 bit RSA as an
>absolute minimum. Last time I checked the nym remailers didn't accept keys
>> 1024 bits, which means that by this standard the remailer network should
>be regarded as transparent to the intelligence agencies. I've added apas
>because all the remailer FAQs out on the net are pretty old, and it's
>possible that some or all of them do accept longer nym keys now - e.g., the
>beta server nym.shinn.net says it understands pgp 6.5.x, and presumably
>therefore accepts >1024 bit nym keys, but I'm curious if the others (nan,
>redneck, and does xgnym still exist?) will choke on big keys or not, since
>it's just become a priority....
All of the existing nym servers accept keys up to 2048 bits, and the latest
anonymity FAQ can be found at http://www.eskimo.com/~turing/remailer/FAQ/
Mike shinn's nymserver hasn't worked for me yet, but there has been some
mention of this being made GPG compatible. This would mean it may support
other algorithms than RSA.
Doc.
- --
The bigger the humbug, the better people will like it.
~ Phineas Taylor Barnum. http://vmsbox.cjb.net
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQEVAwUBPJ+r8sriC3SGiziTAQFwMggAmQBv+ronbnPClifJ4qcybX3v5bRWrI5p
fPO/2534w8BkDhbta0HEynQdHwGrO+l45dQzRwf3exfAJYOZHiTheIe5atcSaAuZ
KAfDI/m8H/J8MAVHY3FcopdFoU5PHDRqOJiqcIIAwso7s4kuaN1WSsx92RaQOoTA
QujuR7CL1KEM7QuonucvhWdUmwWCS3JnkeclHWeygONfDkSbqBzzTCorpzW2pt8s
Kh8Bl6YBphtZVqjCqs+tm+OyARTLyH7wdnDi6YdTLjRxEWYKb6eB5lsdGw1LynjK
Z1Rl+4NajeYXtBulht20OZ3Leop2mV5PkusgI0dKMhyht5UzBYiPCw==
=DCig
-----END PGP SIGNATURE-----
In my defence, I'll just mention that I did read the FAQ before posting
here and it doesn't actually have anything to say about nym key length :-)
Anyway, thanks for informing me. I'm glad to hear that 2048 bit keys are
now (have been for a few years?) possible for remailers - and I hope someone
is already looking ahead to when 3072 or 4096 bit nymkeys will be necessary
sometime in the not-as-far-distant-as-all-that future.
> Mike shinn's nymserver hasn't worked for me yet, but there has been some
> mention of this being made GPG compatible. This would mean it may support
> other algorithms than RSA.
Hmm, but are those algorithms also based on factoring prime numbers, or on
taking discrete logs modulo n (which IIRC is equivalent to the same
problem)? Because if so the same key-length warnings apply to them.
Anyway, I think I have to now and start generating some longer keys. And
re-generating my nyms. And testing new reply blocks. <sigh>
:o)
Also, if you're the government (read 'NSA'), you have a quiet little
behind-the-scenes agreement that their software will turn a password into a
40-bit hash, but that the export version will quietly set 10 or so of those
bits to known values, at which point you (being the NSA, and having the
knowledge of those 10 bits) only have to explore a 30-bit keyspace, while
everyone else has 2^10 times as much work to do as you. Or as an
alternative, you get the software to include some or all of the 40-bit hash
along with the document, but encrypted with your public key, so that you can
recover the hash from any document you want to decrypt, but to everyone else
it just looks like some unknown binary data field in the M$ office format.
[10 chosen as value for example only; for precise details, google 'nsa
workfactor lotus'... and then assume that much the same applies to M$
software as to lotus.]
D'ya mean that it's because the remailer s/w shells out to an old command
line version of pgp rather than even using one of the updated 2.6-series
variants that handle bigger keys? Hmm.