Berkeley CSUA MOTD:Entry 15065
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/04/03 [General] UID:1000 Activity:popular
4/3     

1998/12/4-6 [Computer/SW/Security] UID:15065 Activity:high
12/3    The Wassenaar agreement has been signed; approximately speaking, it
        is a treaty which will require other countries to impose US-style
        export controls on cryptography.  http://www.wassenaar.org
        \_ Damn Republicans.  They had to start this whole anti-
           cryptography crap.  I can't believe Clinton actually
           supports them too.
                \_ Going back to the clipper chip this was always a big
                   Clinton issue.
        \_ It's so ironic that the US is the only democratic government
           in the world that is so paranoid about public use of public
           key cryptography.
           \_ It's for your protection.
              \_ If owning a public key is criminal, only criminals will own
                 a public key.
              \_ Outlaw public key crytography.  Great, now no one can
                 use pgp and ssh and people who do 'require' ssh and ssl
                 (like sysadmins) can't use them anymore.  And yes there
                 are a lot of non-government systems that do require
                 encryption.  Speaking of protection, do you think if
                 you outlaw pub key crytography that criminals or
                 terrorists won't try to get there hands on it.  Now
                 you've just outlawed legitimate use of the technology
                 and let criminals use it.  Read up on it more and
                 you'll see why outlawing it is such a bad idea.
                 /ftp/pub/cypherpunks
                 \_ I think you are responding to a joke.
                    \_ Yes, it was a joke.  Too bad some people just don't
                       get it.  Lighten up folks.
                       \_ ah yes, that was just so hillarious i forgot to
                          laugh.
                        \_ No, you're just a friggin' idiot with no sense
                           of humor and lacking the slightest shred of what
                           might pass for intelligence at the dismal pit
                           Berkeley has become at the undergraduate level.
                           \_ tom, is that you again?  What did I tell
                              about judging other people's sense of humor
        \_ If I was a criminal and I really wanted strong encryption why
           couldn't I just code up the RSA public key cryptography algorithm?
           Granted it might take a little while but my point is that anyone
           who wants strong cryptography can write it themselves.
           Do the anti-crypto people have an argument against this?
           \_ It's not as easy as it seems to code these algorithms.  There's
                 on cryptography.  Nevertheless, he studied in enough
              all kinds of attacks that don't necessarily involve breaking
              the underlying math.  It's definitely possible, but I think
              that it's only feasable for criminals who can hire people with
              the appropriate fu.    - mikeym
              \_ Actually, it is as easy as it seems.  The original creator
                 of PGP was Phil Zimmerman who himself was not an expert
                 on cryptography.  Nevertheless, he studied it in enough
                 and consulted enough people about any loopholes in his
                 program that he finally came up with a product that is
                 now widely used.  All from a joe schmo who graduated
                 from U.Florida with a B.S. in computer science.
                 \_ I don't think that PGP has the NSA quaking in its boots.
              \_ But the threat of public key cryptography comes not from
                 individual terrorists (I don't think Timothy McVeigh
                 used pgp) but from other countries and their military,
                 which are competent enough to implement a robust
                 cryptographic system if they wanted to without the help
                              can keep recompiling and changing the key size
                 of anyone in the US.  Which is why banning public key
                 cryptography is pointless.
                 \_ Yes, this is true, but my point was that it requires
                    more than the common criminal can do.  Not just "anyone"
                    can do it.  I would even guess that many governments would
                    have trouble outsmarting the NSA.  - mikeym
                    \_ The "common" criminal is a purse snatcher or car
                       jacker.  It's likely the only computer they ever owned
                       was the one stolen from your apartment.
                        \_ Read what I was replying to: "anyone who wants
                           strong cryptography can write it themselves."  This
                           is FALSE.  It requires a lot of knowledge and
                           intelligence.  That was my WHOLE point.  - mikeym
                           \_ You didn't have a point.
                           \_ Any moron can download and compile the
                              int'l version of PGP. And of course they
                              can keep recompiling and increasing the key size
                              (for use amongst themselves) forever.
                                \_ PGP is the height of security?
                                   \_ It's "pretty good", no more, no less.
              \_ So it is not a technical problem but a money one? -jon
2025/04/03 [General] UID:1000 Activity:popular
4/3     

You may also be interested in these entries...
2010/3/9-30 [Computer/HW/CPU, Computer/SW] UID:53748 Activity:nil
3/9     http://www.engadget.com/2010/03/09/1024-bit-rsa-encryption-cracked-by-carefully-starving-cpu-of-ele
        I failed to see why you must starve the CPU of electricity. Why
        can't you just simulate that in software?
        \_ And if you can simulate that in software, why not just single-
           stepping the simulated CPU and get the key out?
	...
2009/12/29-2010/1/19 [Computer/SW/Security] UID:53607 Activity:nil
12/29   Sounds like the GSM encryption key has been recovered via a
        brute force attack:
        http://www.nytimes.com/2009/12/29/technology/29hack.html
	...
2008/8/5-10 [Computer/HW/Laptop] UID:50783 Activity:nil
8/5     Laptop with names of 33K people in the 'Clear' program stolen.  Data
        was (of course) unencrypted.
        http://www.schneier.com/blog/archives/2008/08/laptop_with_tru.html
        \_ http://news.yahoo.com/s/nm/20080805/bs_nm/tjx_theft_charges_dc
           When are people going to learn to encrypt sensitive data?
           \_ When encryption becomes transparent enough that noone has
	...
2008/6/25-7/14 [Computer/SW/Security] UID:50380 Activity:nil
6/25    some XCF or CSUA person had a web page about a project they were
        working on where I set up a machine, and you set up a machine
        somewhere, and they both passively back each other, i believe with
        an encryption key so i can't read your backups.  when your disk
        catches on fire, i just give you a copy of your data.  anyone remember
        the name of this?
	...
2008/6/9-12 [Computer/SW/Languages/C_Cplusplus, Computer/SW/Security] UID:50194 Activity:nil
6/8     CSUA code guru please help. I need to see my random number
        generator with a good seed (I just need random 18 bit
        identifiers). The usual time(NULL) is OK, except my program
        might be invoked faster than once a second, and seeding using
        time() produced the same result. I tried clock() but it seems
        to return 0. My program needs to be run in Linux/DOS (Watcom
	...
2008/4/21-5/2 [Computer/SW/Security] UID:49787 Activity:nil
4/21    Yahoo Instant Messenger is not encrypted. Are there chat programs
        that are a bit more secure than YIM?
        \_ what OS are you using?
        \_ What are your goals? Corporate security, or preventing your wife
           from eavesdropping on you? If you're using IM for internal company
           communication, you shouldn't be using anything where you don't
	...
2008/2/21-25 [Computer/HW/Memory, Computer/SW/Security] UID:49208 Activity:nil
2/21    Cold Boot Attacks Against Disk Encryption:
        http://www.schneier.com/blog/archives/2008/02/cold_boot_attac.html
        http://citp.princeton.edu/memory
	...
2006/10/27-30 [Computer/SW/Security] UID:45013 Activity:low
10/27   Anybody tried the "PDF decryptor" or "PDF password delete" type of
        software?  I have a PDF form file that won't let me save.  I'm
        considering getting one of those type of software to unlock the
        file.  I really don't want to pay to try it out though.  Are there
        free open source PDF unlock programs?  Thanks.
        \_ I've used Elcomsoft's (of "Free Dmitry Sklyarov!" fame) PDF
	...
2006/8/22-23 [Computer/SW/Security] UID:44096 Activity:high
8/22    In Windoze XP, how can I make my service start automatically when it
        boots up in Safe Mode?  I searched MSDN site and didn't see anything.
        Thanks.
        \_ I don't know how to do that in Windoze XP but it isn't that hard in
           Windows XP.
           \_ And that would be how?  Thx.
	...
2006/8/12-14 [Computer/SW/Security] UID:43984 Activity:nil
8/12    Anybody know of a good backup solution for PGP encrypted disks?
        The way I've been backing up is to make copies of the .pgd file
        with dates in the filename.  This method is not very scalable as my
        .pgd files are becoming gigabytes in size.  Anybody know
        of an integrated solution to backups and encrypted folders/disks?
        OS X Leopard "time machine" backup feature looks interesting.  But
	...
Cache (56 bytes)
www.wassenaar.org
To Enter The Wassenaar Arrangement, select the 35 Globe.