Google Groups no longer supports new Usenet posts or subscriptions. Historical content remains viewable.
Dismiss

New "tool" used by LEA against "Cyber Crime".

0 views
Skip to first unread message

deicide

unread,
Mar 23, 2002, 4:01:55 PM3/23/02
to
"Sycho" <b...@weadababyeetsaboy.com> wrote
> You think they're referring to PGP or BCWipe? ;o)

Probably, I scrub my disks routinely. There's a couple of cool devices on
the market for encrypting IDE disks. They're basically a PCI IDE controller
card, which implememnts hardware DES to transparently encrypt ( write) and
decrypt ( read) all your disk operations. It even encrypts the boot sector.
Basically, without the password, your disks are fuxed. Of course, it is only
DES. The NSA obviously have doubts about the cryptographic stability of DES,
hence they commisioned a new cipher, but for home use it makes short work of
your hard disks. I've been researching similar devices for a couple of
months now. I've found only two. Both are IDE, no SCSI. This I'll assume is
because no-one has been able to cost-effectively implememnt DES in hardware
with sufficient throuput to cope with SCSI data transfer rates. However,
they out-speed IDE disks, and so you should not notice them in operation.

Links:

http://www.gtgi.com/

http://www.enovatek.com.tw

So, basically this new tool used by the authorities is just a PC with a load
of peripherals stuffed into a big case, and given a fancy name. I think I
have one of those on my desk! ;-)

~deicide.


3rd World LaughingStock (Sycho is an idiot!)

unread,
Mar 23, 2002, 4:39:19 PM3/23/02
to

"Sycho" <b...@weadababyeetsaboy.com> wrote in message
news:3c9de7b2...@www.farts.com...
> This article was taken from "This Week in the South Side" dated for
> the week of March 25, 2002. No link available for article.
>

Links won't save you now, racist pig.

Lest anyone forget - Sycho is a flaming racist who hates African American
people and probably other races too.

It's been demonstrated that Sycho is a flaming racist. He thinks
African-Americans should be bought and sold like cattle. He thinks African
Americans will never be his equal (like we could stoop so low). Read his
views of race in America - how he thinks African Americans should be used as
"alligator bait". If you disagree with him, please reply to this thread.


<3ca86dae...@www.farts.com>
"Translation: He's a pole smoking piece of shit that has to use a
dictionary to understand what those big words are. Besides that, he
HAS to use big words to make up for those "short cummings". But I hear
even the nigger can take Viagra. How's it feel to have a tiny pee pee?
Do you use tweezers or have you had one of your pubic hairs piss on
you and you thought that it was an "orgasm"."
---
<3ca76ca6...@www.farts.com>
"BTW, What happened to your "job"? Getting ready to go cash that
welfare check? I think the banks are closed for the day. That's ok
tho. I think the Seven Eleven is still open and I bet they have that
40 ounce of Cobra just nice and cold waiting for your nigger lips to
suck on 'em.. Kinda like the way you slurp me. Feels good to have real
meat in your mouth huh?"
---
<3ca66ba3...@www.farts.com>
" Matter O fact, to use an old quote, "Bring your
nigger. We've got the rope." - http://www.whitesonly.net "
---
<3ca5699e...@www.farts.com>
>> Hell, niggers rob, steal,
>> murder, cheat, lie, steal, deal drugs a hell of a lot more than white
>> people do.
>Many African-Americans have to resort to crime because of 400 years of
>slavery and oppression by you white boys.
Is that the best excuse you can come up with? Did I not see one of
your ancestors on a box of Cream Of Wheat and on a bottle of Aunt
Jemima?
>> When a white comedian says anything derogatory about niggers, you
>> scream "RASICST!!".
>
>The white man has no room to be making jokes about African-Americans. Your
>ancestors weren't bought and sold like cattle.
That's because we're all that and then some. We knew how to run a
business.
>> Yet when a nigger comedian says anything about
>> whites, you think it's a big fucking joke.
>
>White people are funny. Look in the mirror. When I finally meet up with
>you, the first thing I'm going to do is laugh in your face. Then put my
>Timberlands upside your head.
I'm STILL waiting, boot lip. I just wonder, how where I live at
Affirmative Action sinks in. Trust me nigger, you'll loose ever time.
>> I bet if a white man were
>> to come up with a cable TV show called W.E.T (White Entertainment
>> Television) you niggers will start screaming "BIGOTRY!!".
>
>Damn right.
I guess that explains why I see your "people" on the episode of Cops
every night, huh? Your "people" are used to being confined. It's
blatantly obvious.
>> Yet you
>> niggers are allowed to have a cable TV station called B.E.T (Black
>> Entertainment Television) WTF is that all about?
>
>BET doesn't exclude white people from watching.
Neither would WET.
>> Yet day, after tired
>> assed day I hear niggers talking "Racial Equality." Fuck that!
>Why are you so scared?
I'm not. Only because a nigger would never be my "equal".

>> Niggers
>> need to go back to Africa.
>
>You crackers can go back to Europe too.
We were here first, Toby.

>> The only black in my family tree is the one hanging
>> out in the front yard where he belongs.
>
>So, someone, somewhere in your family tree has African-American genes?
Why,
>that would make you some % black!
Only in the fact that my ancestors taught you sons of bitches how to
WORK for a living. Something your ancestors were never able to
accomplish. That's why down in the deep south, your "kind" are used as
alligator bait.
---
<3ca15406...@www.farts.com>
No, I was right the first time. Don't correct me, nigger.
---
<3c9f518f...@www.farts.com>
On Thu, 21 Mar 2002 16:10:05 -0500, "3rd World LaughingStock \(Sycho
is a racist\)" <sy...@toothlessretard.antisocial.com> wrote:

>"Sycho" <forkn...@dinnertime.com> wrote in message
>news:3c9c46e2...@www.farts.com...
>
>(most of this wasn't worth reading so I cut it)
>
>> >Sycho, could do it.
>> I can do anything. I outted YOUR pugly ass, didn't I?
>
>Yeah. Right. You outed me as BNB. Everybody had a good laugh.
>
>> >> Carrier side is definately degree and
>> >> what you've done, but enterprise is all weenie and certs speak
>> >> volumes.
>> >
>> >Which is why most of them are fat, lispy, punks. They get a hardon
when
>> >talking about Active Directory or IOS upgrades or "priviledge exec
mode".
>> ><guffaw>
>> You copied that because it's the only WHITE word you didn't understand
>> because it wasn't in the EBONICS dictionary, boy.
>
>I don't speak "Ebonics". I speak English. Look it up.
>
>> >> That's why I never work in enterprise. I can't stand it.
>> >
>> >Kudos. I don't either.
>> "Kudos"? That's not in Ebonics/Coontakentay, Toby.
>
>You not understanding what "kudos" means isn't my problem. But your
^^^^^^^^^^^^ <--- Can't form a sentence correctly nigger?

>> You know what I think is right? Well, even if you didn't, I'm about to
>> tell your SORRY BLACK ass anyway because it's something you should
>> know...
>> God is white..
>
>Liar.
>
>> If he weren't, he would have said, "I iz wut I
>> iz." And Abraham Lincoln was heard to have quoted the following when
>> he woke up after being drunk.. "I FREED THE WHAT?????!!!"
>
>Why do you hate black people so much? What have we ever done to you? I
was
Why don't I. I mean com on. Niggers thing they have free fucking run
of the country. Every time a white man does something, anything, it's
labeled as being "racist". When a nigger does anything, (as if they
ever could) no one says shit about it. Hell, niggers rob, steal,
murder, cheat, lie, steal, deal drugs a hell of a lot more than white
people do. Sure there are a few whites that fuck up, but there are
also a few black people that honestly try to work hard to get ahead.
When a white comedian says anything derogatory about niggers, you
scream "RASICST!!". Yet when a nigger comedian says anything about
whites, you think it's a big fucking joke. I bet if a white man were
to come up with a cable TV show called W.E.T (White Entertainment
Television) you niggers will start screaming "BIGOTRY!!". Yet you
niggers are allowed to have a cable TV station called B.E.T (Black
Entertainment Television) WTF is that all about? Yet day, after tired
assed day I hear niggers talking "Racial Equality." Fuck that! Niggers
need to go back to Africa. I don't see niggers going after the fuckin
towel heads. Maybe that's because niggers become Muslims? Fuck you and
your niggers too. The only black in my family tree is the one hanging
out in the front yard where he belongs.

>joking about you getting beat downs from black men. Did that REALLY
happen?
>Did a black man steal your first wife? You lost a promotion to a black
man?
>What's the deal? Why all the hatred and jokes?
See above, nigger.
---
<3c9e4f19...@www.farts.com>
>As for my job, I'm at work now. And you're still at home .... watching TV
Yeah, you're at work. What, the zoo let you go to lunch already?

>Which office does your wife work at
>again? Time Warner has a few offices in the area.
Sorry, but my wife hates niggers too. :o) But if you wanna see a real
man, look at my pic and I'll fax you a picture of my MEAT. Not an
entree, but the main course.

BTW, have a life nigger. You have already proved that you can't kick
my ass. All you can do is talk shit behind a computer. Just like a
nigger. You can't fight a man to man fight. Like all niggers, you need
your "back" to help you. I've grown tired of dealing with a loud
mouthed, obnoxious, "I wanna be a human", nigger such as yourself.
Thank GOD for "Affirmative action" and sickle cell, eh? Now you see
why Abe Lincoln let you go? You can't be educated, taught any
important skills unless you count picking cotton, and you can't be
taught how to interact with people in any society. So go shove your
spear up your black ass and OOGA BOOGA this bitch, and shut up while
you're at it. BTW, and FTR, Tarzan WAS what, you know? Cheetah was his
nigger. Probably one of your ancestors, huh? Porch monkey.

3rd World LaughingStock (Sycho is an idiot!)

unread,
Mar 23, 2002, 4:41:34 PM3/23/02
to

"Sycho" <b...@weadababyeetsaboy.com> wrote in message
news:3c9fef89...@www.farts.com...

> On Sat, 23 Mar 2002 21:01:55 -0000, "deicide"
> <dei...@NOSPAM.sdf.lonestar.org> wrote:
>
> >"Sycho" <b...@weadababyeetsaboy.com> wrote
> >> You think they're referring to PGP or BCWipe? ;o)
> >
> Have you ever used Norton's Your Eyes Only?

Why don't you like black people?

Lest anyone forget...

deicide

unread,
Mar 24, 2002, 1:21:11 PM3/24/02
to
"3rd World LaughingStock (Sycho is an idiot!)" <sy...@antisocial.com> wrote
in message news:u9ptega...@news.supernews.com...

>
> "Sycho" <b...@weadababyeetsaboy.com> wrote in message
> news:3c9fef89...@www.farts.com...
> > On Sat, 23 Mar 2002 21:01:55 -0000, "deicide"
> > <dei...@NOSPAM.sdf.lonestar.org> wrote:
> >
> > >"Sycho" <b...@weadababyeetsaboy.com> wrote
> > >> You think they're referring to PGP or BCWipe? ;o)
> > >
> > Have you ever used Norton's Your Eyes Only?
>
> Why don't you like black people?

STFU already man. I was tryin' to have a converation.

~deicide.


deicide

unread,
Mar 24, 2002, 1:30:41 PM3/24/02
to
"Mach" <ma...@redneck.gacracker.org> wrote in message
news:2002032403132...@gacracker.org...

> deicide <dei...@nospam.sdf.lonestar.org> wrote:
>
> > Probably, I scrub my disks routinely. There's a couple of cool devices
on
> > the market for encrypting IDE disks. They're basically a PCI IDE
controller
> > card, which implememnts hardware DES to transparently encrypt ( write)
and
> > decrypt ( read) all your disk operations. It even encrypts the boot
sector.
> > Basically, without the password, your disks are fuxed. Of course, it is
only
> > DES. The NSA obviously have doubts about the cryptographic stability of
DES,
> > hence they commisioned a new cipher, but for home use it makes short
work of
> > your hard disks. I've been researching similar devices for a couple of
> > months now. I've found only two. Both are IDE, no SCSI. This I'll assume
is
> > because no-one has been able to cost-effectively implememnt DES in
hardware
> > with sufficient throuput to cope with SCSI data transfer rates. However,
> > they out-speed IDE disks, and so you should not notice them in
operation.
>
> It's been my experience that, on a workstation, IDE drives
> perform about the same as SCSI drives. If I remember correctly,
> in order to fully exploit SCSI drives, you need multiple drives
> in a high transaction, server environment. That way, you get
> overlapping bandwidth when the drives simultaneously seek
> different data.

>
> > Links:
> >
> > http://www.gtgi.com/
> >
> > http://www.enovatek.com.tw
> >
> > So, basically this new tool used by the authorities is just a PC with a
load
> > of peripherals stuffed into a big case, and given a fancy name. I think
I
> > have one of those on my desk! ;-)
>
> As an electrical engineer, I *always* enjoy new circuit boards. :)
>
> However, it seems to me that a Pentium 4 processor spends most of
> its cycles idling, waiting for hard drive IO to complete.
>
> Also, multi-processing X86 PCs is still in its infancy. Most
> X86 OSes give it their best shot, but few truly deliver on the
> promise. There's lots of PCI / memory bus issues to sort out.
>
> Of course, all of the above is just anecdotal opinion. You need
> to test throughput with and without the board to obtain actual
> results. ;)

True, true. :-) I'm hoping to get hold of a few to test shortly. :-) IDE /
SCSI may perform similarly on a workstation, but I think SCSI would take the
edge on a large RAID array. :-) I'd like to see the encryption card that
would keep up with a big RAID system, it could pose a few technical
challenges as well. :-)
I started out thinking about developing my own PCI card. I'm not an
electronics genius, but I think I'd get away with it. :-) There are a few
fast encryption processors available, and I was looking at some alternative
algorithms like blowfish using FPGAs. It wouldn't be certified, but I don't
give a fuck 'cos I'm not tryin' to sell it to anyone! ;-)

~deicide.


deicide

unread,
Mar 24, 2002, 1:42:44 PM3/24/02
to
"Sycho" <b...@weadababyeetsaboy.com> wrote
> Have you ever used Norton's Your Eyes Only? It has two password
> protection schemes that it installs on your system. The first of
> course being "Boot Lock". Once Boot Lock is installed, you get three
> attempts at accessing the comp with a password before it's locked up.
> The great thing about that is that even with a boot disk, you still
> have to get passed Boot Lock before you can go any further. Once
> you've entered in the password you've chosen, and Windows starts,
> you're again prompted to enter a password.. The same one you provided
> Boot Lock. N.Y.E.O also has file encryption, but I've never tested it
> out before to see how good it was. I don't remember whether or not it
> has any kind of secure file wiping mechanism tho. There's also another
> program available called Boot Locker. It pretty much does the same
> thing except for file encryption. What I wouldn't mind getting a hold
> of is a full copy of Encase and testing it out with PGP wiped files
> just to see if Encase will or can recover them. I would imagine that
> it wouldn't be able to. ;o)

I haven't used NYEO, but I might grab a copy and see what it does. I
generally find software like that easy to break. It'd great at removing
threats from "casual" interest though. Symatec's WinGuard Impact is a joke.
You just have to kill it's ini file in the Windows directory and it
"repairs" itself with the default password! ;-) Those Wavetrend serial port
RFID tags are a joke as well. They're supposed to lock your workstation when
you go walkabout, but all you have to do is kill a dll which they require
and you'll find the machine will boot cleanly. Anyway, those devices are
intended to support hot-desking, and only prevent "casual" interest. They're
not suppose to stop professionals.
The beautiful thing about a hardware solution like the IDE controller is
that it's OS independent, whereas software solutions all have a favourite
home.
The other main advantage to the hardware solution is that it is much faster!
Try encrypting a whole disk in software! You might get away with it, but
I'll bet you couldn't watch a DVD at the same time! ;-)

~deicide.


deicide

unread,
Mar 24, 2002, 2:18:44 PM3/24/02
to
"Sycho" <b...@weadababyeetsaboy.com> wrote
> I've seen blowfish used as an encryption algorithm.. Can't think of
> the program off hand now.. I think it was Top Secret Messenger for
> ICQ. How does it compare with most of the other encryption methods? Is
> it more stable than DES? Or is blowfish pretty much just as secure.
> Most web sites use DES in encryption, like for secure transactions and
> what-not, right? What about, like in the case with what happened to
> E-Bay last year. Don't they use any kind of encryption method? Seems
> kinda odd knowin that they got hacked and whoever got in stole vital
> info from their server. It makes one wonder if any online transactions
> are truly "secure" or not.
> -----------------------------
> I'm not only an anarchist, I'm also politically incorrect too.

The algorithms are secure, theoretically. Cryptographic implementations
offer vulnerabilties. Lots of algorithms are based on variations of DES. DES
( Data Encryption Standard) hails from the 70s, which would partly explain
it's abundance. IBM originally named it LUCIFER, which I think is a much
better name which should have stuck. :-)
Blowfish has the tremendous advantage of being unpatented and license free.
Check out products which use Blowfish here:

http://www.counterpane.com/products.html

Point of interest, Blowfish features in Open BSD.

Even if a browser transaction is encrypted, the data might be stored on a
server in plaintext. This of course makes it vulnerable server-side.
One of the more interesting techniques I'm aware of for breaking an
encrypted transfer is through monitoring the typematic rate used during
authentication. This narrows down the password space which must be searched
in a brute-force attempt, possibly so much so that a brute-force attampt is
considered quite feasable. Of course to counter-act this hack, a client
should not transmit characters as they are entered, but should queue the
text in a constant sized buffer before transmitting the entire encrypted
buffer in one go.
DES and Blowfish both provide strong encryption, sadly they are often
implemented poorly, and there's no telling what your shopping website will
do with your details once they've retrieved them. :-)

~deicide.


Jason

unread,
Mar 24, 2002, 2:37:35 PM3/24/02
to
As far as crypto, ponder this: Most of the encryption schemes we're commonly
using are based on factoring large prime numbers or computing a modulus off a
large seed prime. This all stems from crypto tech from the 70's now used mostly
by RSA algorithms. This includes protocols such as SSL (RC4), IPSEC (DES/3DES but
uses PKI for DH key exchange), PGP, RSA certificates, etc. Who's to say there
isn't a shortcut to factoring large prime numbers? There are also suspected
weaknesses in MD5 hash and CBC used in DES & 3DES. Some of the more paranoid
folks don't trust SHA-1, IDEA, GOST or BLOWFISH / TWOFISH anymore and it's not
just due to the proliferation of key loggers.

Why is it, you think, that export of such strong crypto technologies is no longer
such a deep concern? Could it be perhaps they have shortcuts to the
cryptoanalysis? One may then question why the need for Magic Lantern or Purple
Haze but then remember that Carnivore and Echelon will catch your whole session
bidrectionally anyway off almost any modern ISP, so their other tools are just
timesavers. Last I checked, Distributed.Net was cracking crypto up to 109 bit
eliptic curve using distributed home PC's (following Moore's law), so how much
horsepower do they have? If you were of the more paranoid sort, you might wonder
how much true privacy they will ever let you have...

They're watching... Can't you fell it?!?

Sycho wrote:

deicide

unread,
Mar 24, 2002, 2:38:23 PM3/24/02
to
"Sycho" <b...@weadababyeetsaboy.com> wrote in message
news:3ca724c8...@www.farts.com...

> On Sun, 24 Mar 2002 18:42:44 -0000, "deicide"
> <dei...@NOSPAM.sdf.lonestar.org> wrote:
>
> >"Sycho" <b...@weadababyeetsaboy.com> wrote
> >> Have you ever used Norton's Your Eyes Only? It has two password
> >> protection schemes that it installs on your system. The first of
> >> course being "Boot Lock". Once Boot Lock is installed, you get three
> >> attempts at accessing the comp with a password before it's locked up.
> >> The great thing about that is that even with a boot disk, you still
> >> have to get passed Boot Lock before you can go any further. Once
> >> you've entered in the password you've chosen, and Windows starts,
> >> you're again prompted to enter a password.. The same one you provided
> >> Boot Lock. N.Y.E.O also has file encryption, but I've never tested it
> >> out before to see how good it was. I don't remember whether or not it
> >> has any kind of secure file wiping mechanism tho. There's also another
> >> program available called Boot Locker. It pretty much does the same
> >> thing except for file encryption. What I wouldn't mind getting a hold
> >> of is a full copy of Encase and testing it out with PGP wiped files
> >> just to see if Encase will or can recover them. I would imagine that
> >> it wouldn't be able to. ;o)
> >
> >I haven't used NYEO, but I might grab a copy and see what it does. I
> I think I may still have a copy of it on floppy somewhere. I can't
> remember how big the actual zip file was, but I do remember that I had
> to break the zip down in smaller chunks to fit on a 1.44 MB floppy. If
> I remember correctly, I think I only used two or three disks.

>
> >generally find software like that easy to break. It'd great at removing
> >threats from "casual" interest though. Symatec's WinGuard Impact is a
joke.
> That's kind of what I'm doing now. Testing them all to see how good of
> a job they do at securing the system locally. So far, Boot Locker and
> NYEO were the best. IMO.

>
> >You just have to kill it's ini file in the Windows directory and it
> >"repairs" itself with the default password! ;-) Those Wavetrend serial
port
> LMAO Now that's comical as hell. I bet they hyped it up as the
> "biggest and the best of them all" didn't they?

>
> >RFID tags are a joke as well. They're supposed to lock your workstation
when
> >you go walkabout, but all you have to do is kill a dll which they require
> >and you'll find the machine will boot cleanly. Anyway, those devices are
> >intended to support hot-desking, and only prevent "casual" interest.
They're
> >not suppose to stop professionals.
> >The beautiful thing about a hardware solution like the IDE controller is
> >that it's OS independent, whereas software solutions all have a favourite
> >home.
> >The other main advantage to the hardware solution is that it is much
faster!
> >Try encrypting a whole disk in software! You might get away with it, but
> >I'll bet you couldn't watch a DVD at the same time! ;-)
> HAHAHA Not even with a P4, I'll bet.. Interesting thing is, earlier
> today, I was going to perform a PGP Free Space wipe on my 30 GB HDD.
> With the options I chose, it said that it would have taken.. Now get
> this... 31 hours to complete! WOW! I'd do that if I were going to go
> on vacation or something, but hell, I figured at most I'd be waiting 4
> hours. That I could live with, but 31 hours? No friggin way. If I did
> that, what could I possibly do for that length of time? Watch the
> grass grow around my feet in the back yard? :o)
> --------------
> When a cow laughs hard, does milk squirt out of its nose?

The 31 hours might be 'cos you have a badly fraged disk or something, and
heh, 30 Gs is fairly big! It's easier if you shedule a freespace wipe
regulalrly, I think it will take less time. :-)
I think I'm gonna stick with researching hardware devices, then my dual-boot
machines will all be happy. :-)

~deicide.


deicide

unread,
Mar 24, 2002, 2:59:19 PM3/24/02
to
"Jason" <ja...@sickofspam.com> wrote

> Last I checked, Distributed.Net was cracking crypto up to 109 bit
> eliptic curve using distributed home PC's (following Moore's law), so how
much
> horsepower do they have? If you were of the more paranoid sort, you might
wonder
> how much true privacy they will ever let you have...

Nah, it's about how much privacy you let them take. :-)
Some fellas on the NET are breaking RC4 cryptoed M$ Office documents. That's
no hass though 'cos they only use a 40bit key, a small network of PCs will
decode they data in 24hrs. That's not to say you'll recover the password
used. You see, the password protecting the document is hashed into a 40 bit
key used for encryption. But hey, will you care what the password is you
have the data? If you're the government or any other shrewd individual then
the answer is "fuck yeah!". This is because you could then add that password
to your little black book and save time later on.
Should I correct you on DES? You seem like a reasonable chap. You see,
Diffie and Hellman only invented the concept of the public-key cipher system
in 1976, after the invention of LUCIPHER/DES. DES, and algorithms like it
symmetric, feistel algorithms), do not rely on large prime numbers. Large
prime numbers do feature heavily on the type of crypto often employed in
emails for example though, so yeah, a factoring shortcut would probably make
you the most "at-risk" individual on the planet. :-)

Anyway, it's goodbye DES and triple DES, and hello AES or Rijndael
(pronounced "rain doll") or whatever the hell you wanna call it. :-)

Pencils ready! Get cracking!! ;-)

~deicide.


Sycho hates Blacks but not Jews

unread,
Mar 24, 2002, 4:39:11 PM3/24/02
to

"Sycho" <b...@weadababyeetsaboy.com> wrote in message
news:3caa393b...@www.farts.com...
> On Sun, 24 Mar 2002 19:38:23 -0000, "deicide"
> Let me correct myself. It wasn't PGP Wipe that I was planning on
> using. It's another utility called BCWipe. The options I selected for
> the free space wipe were as follows:
>
> User defined pass quantity: 10
> Wipe of swap file.
> Wipe empty directories.
>
> Estimation time: 31 hours
> Free Space: 27748 MB

Why are you so concerned about wiping your drive? Do you have racist
material on it? PDFs of KKK meeting notes?

Lest anyone forget, Sycho likes to hang black people in his front yard.

Sycho is an admitted flaming racist:

Sycho hates Blacks but not Jews

unread,
Mar 24, 2002, 5:47:54 PM3/24/02
to

"Sycho" <b...@weadababyeetsaboy.com> wrote in message
news:3c9f4d0c...@www.farts.com...
> <snip>
> Tell ya what, fuckstick. Why don't you electrocute yourself. I won't
> tell anyone if you don't. BTW, fuck you and your email too. Go ahead..
> Keep emailing my antisocial.com account. Like I give a fuck about it
> anyway. You pansy piece of shit.

Oh, well...


Jason

unread,
Mar 25, 2002, 6:50:49 PM3/25/02
to
Well, to start off, Microshaft products are not a good security reference for
anything. The problem I was referring to with IKE/IPSEC is that DH groups 1 & 2
are only wussy 768 & 1024 bit exponent modulus key exchanges based on two often
pseudorandomized seed values (g & p). We ate that stuff for lunch during the
Cold War with lesser sub-BIP supercomputers because there are heuristic methods
of cryptoanalysis that don't need brute key searches. Since DH builds the
symmetric key used for DES, it's the weak link.

There's also a suspicion that cipher block chaining (CBC - like DES) algorithms
have a shortcut using some form of pattern analysis. I distrust DES and 3DES
anyway because "they" allow it to be freely exported. I have not dived into AES
yet and know very little about it. I studied some heavy IPSEC for my Cisco
Security Specialization but as you know, the crap they allow in mass-produced
Cisco gear is inferior to the crypto some of you hacker-folk have been cooking
up.

I would like to know what algorithms this community figures are secure and why.
I OPEN THIS UP TO DEBATE FOR ALL YOU SLEEPERS OUT THERE!

...sorry for shouting...

Dave Korn

unread,
Mar 26, 2002, 6:47:41 AM3/26/02
to
"Jason" <ja...@sickofspam.com> wrote in message
news:3C9E2AFF...@sickofspam.com...
[snip]

> uses PKI for DH key exchange), PGP, RSA certificates, etc. Who's to say
there
> isn't a shortcut to factoring large prime numbers? There are also
suspected
[snip]

> Why is it, you think, that export of such strong crypto technologies is no
longer
> such a deep concern? Could it be perhaps they have shortcuts to the
> cryptoanalysis?
[snip]

RSA encryption (as used in PGP, SSH, etc...) with shorter key lengths is
now very vulnerable indeed. From a post to bugtraq today by Lucky Green
[sham...@cypherpunks.UNSPAMMABLE]

---snip---
Coincidentally, the day before the panel, Nicko van Someren announced at
the FC02 rump session that his team had built software which can factor
512-bit RSA keys in 6 weeks using only hardware they already had in the
office.
---snip---

That was just due to general improvements in cpu power and software
optimisation. There's also a new kind of specialized hardware factoring
machine just designed by a guy called D. J. Bernstein:-
http://cr.yp.to/papers.html#nfscircuit
which reduces the complexity of factoring numbers by an exponential factor:
the same post suggests:

---snip---
[...] a 1024-bit RSA
factoring device can likely be built using only commercially available
technology for a price range of several hundred million dollars to about
1 billion dollars. Costs may well drop lower if one has the use of a
chip fab. It is a matter of public record that the NSA as well as the
Chinese, Russian, French, and many other intelligence agencies all
operate their own fabs.
---snip---

and

---snip---
Bernstein's machine, once built, will have power requirements in the MW
to operate, but in return will be able to break a 1024-bit RSA or DH key
in seconds to minutes.
---snip---

The upshot of all this is that it's time to start using 2048 bit RSA as an
absolute minimum. Last time I checked the nym remailers didn't accept keys
> 1024 bits, which means that by this standard the remailer network should
be regarded as transparent to the intelligence agencies. I've added apas
because all the remailer FAQs out on the net are pretty old, and it's
possible that some or all of them do accept longer nym keys now - e.g., the
beta server nym.shinn.net says it understands pgp 6.5.x, and presumably
therefore accepts >1024 bit nym keys, but I'm curious if the others (nan,
redneck, and does xgnym still exist?) will choke on big keys or not, since
it's just become a priority....


DaveK
--
moderator of
alt.talk.rec.soc.biz.news.comp.humanities.meow.misc.moderated.meow
Burn your ID card! http://www.optional-identity.org.uk/
Help support the campaign, copy this into your .sig!
Proud Member of the Exclusive "I have been plonked by Davee because he
thinks I'm interesting" List Member #<insert number here>
Master of Many Meowing Minions
Holder of the exhalted PF Chang's Crab Wonton Award for kook spankage above
and beyond the call of hilarity.

Doc.Cypher

unread,
Mar 26, 2002, 8:02:05 AM3/26/02
to mail...@freedom.gmsociety.org
-----BEGIN PGP SIGNED MESSAGE-----

On Tue, 26 Mar 2002, "Dave Korn" <no....@my.mailbox.invalid> wrote:

<snip>

> The upshot of all this is that it's time to start using 2048 bit RSA as an
>absolute minimum. Last time I checked the nym remailers didn't accept keys
>> 1024 bits, which means that by this standard the remailer network should
>be regarded as transparent to the intelligence agencies. I've added apas
>because all the remailer FAQs out on the net are pretty old, and it's
>possible that some or all of them do accept longer nym keys now - e.g., the
>beta server nym.shinn.net says it understands pgp 6.5.x, and presumably
>therefore accepts >1024 bit nym keys, but I'm curious if the others (nan,
>redneck, and does xgnym still exist?) will choke on big keys or not, since
>it's just become a priority....

All of the existing nym servers accept keys up to 2048 bits, and the latest
anonymity FAQ can be found at http://www.eskimo.com/~turing/remailer/FAQ/

Mike shinn's nymserver hasn't worked for me yet, but there has been some
mention of this being made GPG compatible. This would mean it may support
other algorithms than RSA.


Doc.
- --
The bigger the humbug, the better people will like it.
~ Phineas Taylor Barnum. http://vmsbox.cjb.net

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQEVAwUBPJ+r8sriC3SGiziTAQFwMggAmQBv+ronbnPClifJ4qcybX3v5bRWrI5p
fPO/2534w8BkDhbta0HEynQdHwGrO+l45dQzRwf3exfAJYOZHiTheIe5atcSaAuZ
KAfDI/m8H/J8MAVHY3FcopdFoU5PHDRqOJiqcIIAwso7s4kuaN1WSsx92RaQOoTA
QujuR7CL1KEM7QuonucvhWdUmwWCS3JnkeclHWeygONfDkSbqBzzTCorpzW2pt8s
Kh8Bl6YBphtZVqjCqs+tm+OyARTLyH7wdnDi6YdTLjRxEWYKb6eB5lsdGw1LynjK
Z1Rl+4NajeYXtBulht20OZ3Leop2mV5PkusgI0dKMhyht5UzBYiPCw==
=DCig
-----END PGP SIGNATURE-----

Dave Korn

unread,
Mar 26, 2002, 11:14:54 AM3/26/02
to
"Doc.Cypher" <Use-Author-Supplied-Address-Header@[127.1]> wrote in message
news:2002032613020...@gacracker.org...

> -----BEGIN PGP SIGNED MESSAGE-----
>
> On Tue, 26 Mar 2002, "Dave Korn" <no....@my.mailbox.invalid> wrote:
>
> <snip>
>
> > The upshot of all this is that it's time to start using 2048 bit RSA as
an
> >absolute minimum. Last time I checked the nym remailers didn't accept
keys
> >> 1024 bits, which means that by this standard the remailer network
should
> >be regarded as transparent to the intelligence agencies. I've added apas
> >because all the remailer FAQs out on the net are pretty old, and it's
> >possible that some or all of them do accept longer nym keys now - e.g.,
the
> >beta server nym.shinn.net says it understands pgp 6.5.x, and presumably
> >therefore accepts >1024 bit nym keys, but I'm curious if the others (nan,
> >redneck, and does xgnym still exist?) will choke on big keys or not,
since
> >it's just become a priority....
>
> All of the existing nym servers accept keys up to 2048 bits, and the
latest
> anonymity FAQ can be found at http://www.eskimo.com/~turing/remailer/FAQ/

In my defence, I'll just mention that I did read the FAQ before posting
here and it doesn't actually have anything to say about nym key length :-)
Anyway, thanks for informing me. I'm glad to hear that 2048 bit keys are
now (have been for a few years?) possible for remailers - and I hope someone
is already looking ahead to when 3072 or 4096 bit nymkeys will be necessary
sometime in the not-as-far-distant-as-all-that future.

> Mike shinn's nymserver hasn't worked for me yet, but there has been some
> mention of this being made GPG compatible. This would mean it may support
> other algorithms than RSA.

Hmm, but are those algorithms also based on factoring prime numbers, or on
taking discrete logs modulo n (which IIRC is equivalent to the same
problem)? Because if so the same key-length warnings apply to them.

Anyway, I think I have to now and start generating some longer keys. And
re-generating my nyms. And testing new reply blocks. <sigh>

Jason

unread,
Mar 26, 2002, 10:08:48 PM3/26/02
to
Just remember that in Johnny Pneumonic, they had to use video images as keys. I
guess in the future text keys just aren't long enough. Don't forget Moore's law
of rising computing power also chops a bit of the effective key strength every
18 months. If privacy all comes down to key length off a reducible algorithm,
we've got some problems. What about a polymorphic algorithm where the component
elements and sequencing are determined by the key? What about 3rd party
involvement like CA's but without a stored private key that can be compromised?

:o)

Dave Korn

unread,
Mar 27, 2002, 5:43:56 AM3/27/02
to
"deicide" <dei...@NOSPAM.sdf.lonestar.org> wrote in message
news:a7lb6n$t91$1...@thorium.cix.co.uk...

> Some fellas on the NET are breaking RC4 cryptoed M$ Office documents.
That's
> no hass though 'cos they only use a 40bit key, a small network of PCs will
> decode they data in 24hrs. That's not to say you'll recover the password
> used. You see, the password protecting the document is hashed into a 40
bit
> key used for encryption. But hey, will you care what the password is you
> have the data? If you're the government or any other shrewd individual
then
> the answer is "fuck yeah!". This is because you could then add that
password
> to your little black book and save time later on.

Also, if you're the government (read 'NSA'), you have a quiet little
behind-the-scenes agreement that their software will turn a password into a
40-bit hash, but that the export version will quietly set 10 or so of those
bits to known values, at which point you (being the NSA, and having the
knowledge of those 10 bits) only have to explore a 30-bit keyspace, while
everyone else has 2^10 times as much work to do as you. Or as an
alternative, you get the software to include some or all of the 40-bit hash
along with the document, but encrypted with your public key, so that you can
recover the hash from any document you want to decrypt, but to everyone else
it just looks like some unknown binary data field in the M$ office format.

[10 chosen as value for example only; for precise details, google 'nsa
workfactor lotus'... and then assume that much the same applies to M$
software as to lotus.]

Dave Korn

unread,
Mar 28, 2002, 1:59:47 PM3/28/02
to
"Generic Poster" <nob...@cotsebay.cotse.net> wrote in message
news:XD8IK7YW37342.5219097222@anonymous.poster...
> On Wed, 27 Mar 2002, Anonymous wrote:
> >You raise an extremely valid point.
> >
> >Is there an inherrent s/w limitation that is preventing remailer ops from
> >allowing >2048 bits (and in many cases 1024 bits) or is it simply a case
of
> >speed of decrypt/encrption?
>
> pgp2.6.x
>

D'ya mean that it's because the remailer s/w shells out to an old command
line version of pgp rather than even using one of the updated 2.6-series
variants that handle bigger keys? Hmm.

0 new messages