Ask Cryptome's John Young Whatever You'd Like 152
John Young of Cryptome, though trained as an architect, has garnered recognition in another field entirely. Since 1996, he's been publishing timely, trenchant news online as the mind behind crypto jya.com and Cryptome. ("Our goal is to be the most disreputable publisher on the Net, just
after the world's governments and other highly reputable bullshitters." ) This has put him on the forefront of various online liberty issues, from the MPAA's DeCSS crackdown on DeCSS (he fought the lawyers -- and won), to Carnivore, to Dmitry Sklyarov's continuing imprisonment, and now the several fronts along which electronic communications are threatened by current and upcoming legislation. He recently posted this to the front page: "Cryptome and a host of other crypto resources are likely to be shutdown if the war panic continues. What methods could be used to assure continued access to crypto for homeland and self-defense by citizens of all nations against communication transgressors?" Now's your chance to ask him about the fight for online freedom. Please pose just one question per post; we'll send 10-15 of the highest moderated ones on to John for his answers.
Turnaround on backdoors? (Score:4, Interesting)
Is this 'backing down' accurate? What do you think caused the change of heart? And what is your opinion of backdoors in general? Do you think they would work as lawmakers intend them to?
Re:Turnaround on backdoors? (Score:2)
Taking it easy (Score:1)
Re:Taking it easy (Score:1)
John
Re:Taking it easy (Score:1)
So, uh.. take it easy
Encryption (Score:4, Interesting)
Re:Encryption (Score:2)
Re:Encryption (Score:3, Interesting)
Err no, not even close. While there is a large class of NP complete problems which can be transformed into each other in polynomial time this is not the case for all NP complete problems.
Futhermore a compromise of a security algorithm is a much weaker condition than solving an NP complete problem for the general case. There are many NP complete problems that have subsets that can be solved in polynomial time. The superincreasing knapsack problem for example.
An attack that compromised only 5% of RSA keys would be very serious - a factoring algorithm that depended on smooth numbers or the like but it would not be a solution for all NP complete problems.
In fact the DSA algorithm can be shown to be slightly more secure than RSA in that it only depends on the discrete log problem for security while RSA depends on discrete log and factoring. This is not a particularly big problem however since most atacks on factoring also tend to be convertable to discrete log.
Re:Encryption (Score:2)
Re:Encryption (Score:1)
All this comes from my old Algorithms instructor, who also happens to be the A in RSA.
Re:Encryption (Score:2)
Yes, that is by definition, it is NP complete if you can convert it into a member of the set 'NP Complete'.
But that is not the point I was trying to make, there are lots of NP complete problems that are no use as cryptographic systems because there are heuristics that find an acceptable solution in polynomial time.
For example the travelling salesman problem is NP complete if the problem is finding the absolute best path, but you can get pretty good paths from Map quest.
The use of NP complete problems such as the knapsack were tried extensively in the early days of Public Key, they were all broken, many of them by Len.
Re:Encryption (Score:2)
Or is this some new definition of "prime"?
Re:Encryption (Score:1)
Re:Encryption (Score:2)
Re:Encryption (Score:1)
John
Encrypting email (Score:5, Interesting)
Currently the vast majority of email travels unencrypted through the Internet, ripe for eavesdropping by Carnivore/DCS1000/Echelon/etc. This is a bit of a "last mile" problem, as I can't reasonably expect my grandmother on AOL to be able to read my PGP-encrypted messages to her unless encryption is made into a standard part of the infrastructure. Otherwise 99% of the users won't bother and that's the situation we have now.
What do you see as being the catalyst that forces the majority of software and service providers to make encrypted email standard equipment? Will it be public outrage over eavesdropping, bribery of ISPs and Microsoft by Verisign or Thawte, or something else altogether? And do you forsee more success for a decentralized standard, like OpenPGP, or for a centralized standard like S/MIME?
-CT
I don't do anything illegal (Score:3, Interesting)
Re:I don't do anything illegal (Score:1)
You know there are so many books full of so many laws in this ridiculous judicial system that you could fill a substantial sized house with them?
The point being, you may THINK that you don't do anything illegal, but none of us know all the laws that are on the books, so you never really KNOW. And, of course, ignorance of the law is no excuse...
Let me give you some words to look up:
-Freedom
-Privacy
-Liberty
-Sovereignty
-Constitution
And you probably represent the majority of americans... *sigh*
may our chains rest lightly upon us
Re:I don't do anything illegal (Score:3, Insightful)
That's because you happen to agree with the government's book definition of "illegal"... you're assuming that there are no corrupt politicians or vague laws waiting to be twisted against the common man (like Dmitry). Thomas Jefferson recognized the fallibility of government - if politicians were perfect, we wouldn't have referendum, jury nullification, judicial review, vetos, appointments, recall, and legislative override.
Re:I don't do anything illegal (Score:1)
How about going to a church? If you are a Muslim in Afghanistan, conversion to Christianity is a capital offense. That means the government will kill you.
You are not afraid of your government, but what about the rest of us?
-AD
Government and Privacy (Score:5, Interesting)
Re:Government and Privacy (Score:1)
John
Hi John (Score:4, Interesting)
MD5 Question (Score:2, Informative)
My question has to do with both privacy and encryption. Recently, some web sites have taken to hiding the IP addresses of their visitors using MD5 before storing these IP addresses in a database. This feature exists in order to keep the IP addresses of visitors secure from data mining. Do you believe that using the MD5 signature of an IP address rather than the actual IP address provides real privacy to users? Would an attack to MD5 all known IP addresses be trivial, or extremely difficult?
Thanks for your time.
Re:MD5 Question (Score:1)
Re:MD5 Question (Score:2)
There are at most 2^32 possible IPv4 addresses (fewer once all the "special" ranges like 127/8 and multicast are taken out). MD5 produces a 128-bit (16-byte) hash, and an IP address can be stored in 4 bytes.
You could construct a lookup table with 20 columns (16 bytes for the hash, and 4 for the IP address that produced it) and 2^32 rows. That's about 85GB - a consumer-level hard drive, these days.
Generating the table wouldn't take much time (I'd guess a few hours) and would only need to be done once. So I'd rate this as an "easy" dictionary attack.
Now if a random salt value was hashed along with each possible IP address, you'd have to re-generate the entire 85GB table for each salt value. So this would make the attack more difficult, but it would still be possible to recover several IP addresses per day on a regular PC.
Re:MD5 Question (Score:2)
PS: I hate the 20 second thing. This will be my third attempt to ask a simple question. I only include this miniture rant so as to not resort to simply staring at the monitor like a dullard whilst indulging an ineffectual attempt to block spammers.
Mirroring, now and in the future (Score:5, Insightful)
1. What can normal people do to help out with mirroring important information (e.g., crypto information, documentation on civil liberties threats, reverse engineering and Fair Use securing tools, etc.)? How can we stay out of trouble with the law while we're helping out?
2. Have you ever considered providing a mirroring clearing house? That is, devoting a section of cryptome to listing, in an up-to-date manner, resources which need mirroring in various parts of the world?
Thanks!
Certified email? (Score:4, Interesting)
Optimistic or pessimistic overall? (Score:4, Interesting)
Overall, are you optimistic or pessimistic that we will eventually (call it 5-20 years) have a society that you would find reasonably acceptable? Or do you think we're destined for one form or another of effective totalitarianism?
Re:Optimistic or pessimistic overall? (Score:1)
Make sure you laugh at ridiculous seriousness, but duck the angry swings this will cause.
For me babbling at the righteous preachers works. YMMV.
John
Re:Optimistic or pessimistic overall? (Score:2)
Boy, I wish it were that easy. However, in the real world, the bad guys can win, even when the good guys fight back.
Sources? (Score:4, Interesting)
Question: (Score:4, Interesting)
Supporters of this program claim that such a program will allow day-to-day communications among law-abiding citizens to remain private, whilst still allowing the FBI and CIA to monitor the communications of suspected terrorists(with a warrant, of course).
The liberal media opposition to this initiative is claiming that by installing government accessible backdoors into encryption tools, we are giving up our right to privacy in favor of increased public safety. For the purposes of this post, I'm going to ignore the fact that nowhere in our Constitution or Bill of Rights, are we guaranteed anonimity or absolute privacy. It seems to me that if we cannot trust our policing agencies to be responsible with the power they have been given, the problem is not with the cryptography, but the government itself, and this problem needs to be addressed as such.
My question to you is: What is Cryptome's, and your personal, stance on government accessible backdoors installed in cryptography. Would the benefit to law enforcement, and the increased homeland security outweigh the possible implications to the loss of privacy. Do you think open-sourcing popular cryptographic tools would help alleviate people's fears about the integrity of their data security?
Re:Question: (Score:4, Insightful)
A backdoor which does not require anyone outside the agency to assist, or even know about, the tap makes the warrant requirement unenforceable, of course.
The liberal media opposition to this initiative
What color is the sky in your world? If anything, the opposition to increased government snooping is from the conservative and libertarian factions of US politics.
For the purposes of this post, I'm going to ignore the fact that nowhere in our Constitution or Bill of Rights, are we guaranteed anonimity or absolute privacy.
That's good, because the Constitution specifically requires [cornell.edu] that position.
It seems to me that if we cannot trust our policing agencies to be responsible with the power they have been given, the problem is not with the cryptography, but the government itself, and this problem needs to be addressed as such.
The obvious first step in addressing the problem of government abuse is to avoid aggrivating the situation by giving the abusers additional powers.
Re:Question: (Score:1)
Green Party polticians, who voted against the moves, and Communists, who abstained, condemned the measures as an attack on civil liberties.
"The Greens are worried that the law is useless, ineffective and an attack on individual liberties," said Green Party lawmaker Noel Mamere, the movement's candidate for presidential elections in 2002....
I know it's easy and (at least on Slashdot) fashionable to target liberals as being against free speech. And some liberals are.
But there are certainly short-sighted or ignorant conservatives and libertarians who support legislation that would hurt personal freedom.
Remember, nobody ever complained about the ACLU being too conservative, but they've protected our civil liberties more effectively than any other group in the past 100 years.
There are libertarians and conservative that I disagree with ideologically, but I respect their dedication to personal freedoms.
Re:Question: (Score:1)
Re:Question: (Score:1)
John
Is Coding Free Speech? (Score:5, Interesting)
Appealing to the masses (Score:3, Interesting)
Passport and Windows XP Privacy concerns (Score:5, Interesting)
What do you think of XP, particularly with regard to Passport and privacy concerns?
Thanks,
Al.
Re:Passport and Windows XP Privacy concerns (Score:1)
Re:Passport and Windows XP Privacy concerns (Score:1)
Al.
Re:Passport and Windows XP Privacy concerns (Score:1)
John
general encryption and anonymity (Score:5, Interesting)
Fear and Personal Saftey... (Score:5, Interesting)
Do you ever fear for your own or your family's saftey because of this. Have you ever been threatened? By whom, government agents or private individuals?
If you don't fear for your saftey, what factors about what you do make you feel 'immune' from being 'removed' clandestinely?
Re:Fear and Personal Saftey... (Score:3, Funny)
(-:
Mirroring, now and in the future (Score:3, Redundant)
A few questions (Score:5, Interesting)
Do you think that all the muck flinging by both governments and corporations is going to lead to somone developing a virtual, anonymous, secure network running over the Net that will be untouchable by governments (i.e. legally secure from attack by dint of listening to the Harvard Law types and using their knowledge combined with technological solutions)?
Do you expect show trials by governments to show that the laws they areintroducing now (RIPA in the UK, USA-Patriot in the US etc) are effective, and how long do you think before there will be miscarragies of justice based on political expedeincy?
Public CA (Score:5, Interesting)
Thanks for your efforts. My question was discussed recently on a thread regarding the decision by Thawte to discontinue selling CodeSigning certificates to individuals.
What are the biggest obstacles to a public CA which is supported and funded by, say, the FSF? Is such a thing possible for the Free software community? I guess insurance and certification would be the biggest stumbling blocks. Are there other dimensions to such an undertaking which have not been considered?
If you have nothing to hide... (Score:3, Interesting)
Also, since most e-commerce is conducted on so called "secure" connections, how would the installation of government backdoors effect e-commerce. If a government back door was hacked and my credit information stolen and exploited, who would the blame fall on? The credit card company, the business I ordered from, or the government agency who installed a faulty back door?
How will world government deal with an AI economy? (Score:3, Interesting)
Extremely serious efforts are underway to create artificially intelligent minds, such as at http://sourceforge.net/projects/mind [sourceforge.net] -- just one of 365 open-source projects in artificial intelligence (AI). Do you expect that the World Trade Organization (WTO) or other allances -- either governmental or corporate -- will attempt to control the emergence of AI technology and of an AI-based cybernetic economy?
As an architect, do you have any interest in the architecture of the mind?
Is there any likelihood that AI research will be outlawed or otherwise subjected to illiberal control?
Re:How will world government deal with an AI econo (Score:1)
Passport. (Score:4, Interesting)
Soko
"from the MPAA's DeCSS crackdown on DeCSS" (Score:1)
- A.P.
Personal Background (Score:5, Interesting)
I know, it's more than one question, but they're all in the same direction. I'm curious about the guy.
Re:Personal Background (Score:1)
Re:Personal Background (Score:1)
John
Re:Personal Background (Score:1)
Thanks for everything.
The Panopticon (Score:5, Interesting)
My question is: how aggressive can you/should you be in trying to detail the actions of the (insert three letter acronyms and governments here) pushing panopticonism as the solution to society's problems?
You are clearly willing to put yourself in legal peril, but surely there is a point of diminishing returns. How do you balance things, and have you withheld, or would you ever withhold, information that you would like to publish? (...and yes there are two question marks, but they are pretty related)
And thanks!!
Absolute Right to Privacy (Score:1, Interesting)
Freenet (Score:1)
John Young and _The_Barnhouse_Effect_ (Score:4, Interesting)
Report on the Barnhouse Effect [http]. Your reporting keeps the entire world somewhat more honest; and I can't think that it's possible that governments are more careful knowing that someone is watching.
The end of the story, is, of course, of the passing of the torch to Barnhouse's apprentice. I am worried that there's nobody with the combination of integrity, fearlessness, and intelligence to carry on with your work, when your time to perform it is over. Do you worry about that, and are there people to carry the load?
thad
What countries are still free? (Score:4, Interesting)
So, my question is: If the United States becomes a hostile place for freedom (DMCA, SSSCA, extreme anti-terrorism laws, etc.) where are some good places to flee to?
I write and use free software, and I expect I'll be leaving the US within a couple of years. (I've got a great job, otherwise I'd be leaving already). I don't mind learning a different language... Do you know of any comparative study of different countries of the world, considering at least:
- free speech
- free software
- software patents
- Privacy
- public awareness of the above issues (Most important, perhaps!)
- A just and fair, uncorrupted legal system
- Reasonable balance of taxation, government spending on useful things like education, health care, etc.
- High standard of living
Where would you go?
Re:What countries are still free? (Score:1)
Re:What countries are still free? (Score:1)
God help us all if anything like this ever happens.
Re:What countries are still free? (Score:2, Interesting)
"This is a devastating statistic for those who believe that America's greater commitment to individualism translates into greater individual freedom. In reality, the social democracies of Northern Europe are the freest societies in the world."
Places America pretty low on the freedom scale
(google: UN freedom index)
Also, a very interesting node on e2:
http://www.everything2.com/index.pl?node_id=385
were Sweden came out top and America didn't even make number 10 lol
Looks like your too late, you better hope someone anthraxes Bush before he does any more damage
Benefits/ Detriments of Real Identity (Score:5, Interesting)
At some point you decided to run cryptome and publish controversial materials under your true identity rather than under a pseudonym.
What benefits and detriments have you found to using your real identity for your efforts instead of a pseudonym?
what will make people care? (Score:5, Interesting)
In your opinion, what will it take - either in terms of EFF-style activism or in terms of 1984-style government repression - to make the average person-on-the-street care about our digital freedoms?
In the current environment it seems that most people have adopted the attitude of Britain's John Major who said - as his Tories wired the UK with videocameras - ``If you have nothing to hide, you have nothing to fear.''
-Renard
"Younglish" - How do you DO it??? (Score:4, Interesting)
Many people will undoubtably ask wide and far-reaching questions about civil-liberties, activism, and running cryptome.org. In contrast, I would like to ask a question perhaps trivial in comparison, but also in the hearts of so very many of your fans.
If this is really ask whatever we'd like ...
How in the world do you generate that unique hash of free-association, bafflegab, verbing, just-this-side-of-understandable wording (not sure which side), "Younglish" writing, for which you are reknowned?
Are consciousness-altering substances ever involved? Where they ever involved? Is it effortless, or do you work at it?
This is nowhere in the same league as DMCA, terrorism, and whatnot.
But believe me, inquiring minds want to know.
Sig: What Happened To The Censorware Project (censorware.org) [sethf.com]
*coughcough* (Score:2)
Re:"Younglish" - How do you DO it??? (Score:1)
John
Re:"Younglish" - How do you DO it??? (Score:1)
How in the world do you generate that unique hash of free-association, bafflegab, verbing,
just-this-side-of-understandable wording (not sure which side),
"Younglish" writing, for which you are reknowned?
And another excellent quality of cpunks that does
indeed impress the world of media boodthirstiness,
is the number of its outstanding writers sent to
jail, some repeatedly, for cutting edge taunts of
illiterate critics, diseased poobahs and for
sure, aesthetic cowards who ever try to pump up
their fiction with idiotic pretense of non- fictional earnestness.
Now I know its a grave offense to those with
gravitas (spit) to ridicule their seriousness of
purpose and pretentious judgmentalism, but they
pose such easy targets, for all purposes I can
see, beg to be made fun of, display abysmal
ignorance of what they write, cite spurious
authorities for it, remind when it was first,
last, and forever written, just cannot forgo wild
swings at fantasms, urge close attention to their
pulp, deliver sweeping statements as if a world
authority, viciously attack untalented writers
like themselves, slather the most shallowly
manipulating praise ever imaginable, and probably
lay awake at night dreaming of triumph, a Nobel
Prize or violent heroic death before dishonor.
This is what I like about cypherpunks and find
repugnant about Cyberia which has produced no
jail time for its members, but more advice on how
to avoid it than is good for humanity. A refuge
for intellectural and corporal cowards, Cyberia,
among many other lists, is, but in time that will
hopefully change, in particular if I can persuade
you and Declan to go over the line all great
writers must do to spend jail-time among the
winners and stop sucking up to losers who will
always remain unimpressed having no judgment worth writing about.
or better yet, wrt Stuart Baker,
When I first got within 20 trace aromas of the
lushness of Baker's double cultivated what-grows-
wild-elsewhere above his peepers, my bubonic
dingleberry squatters jumped cess to copulate in his.
You think darkholed bugs, you think impenetrable
hedgerows to camouflage the skidmarks.
Ojing
Convincing the unwashed masses (Score:2, Interesting)
Reality is most people are uneducated (Score:2)
Examples such as the FBI having misgivings about mobile phones and crypto
(GSM includes a simple hash which while easy to break the FBI like their plain scanners)
and US politicos asking for back doors in algorithms
(while I can pick up AES or serpent which both do not have US involvement)
you can get crypto and use it rather simply
how do people think they can make me give it back ?
e.g. in the U.K. they say that you can use strong crypto but when asked by a court you must give over your keys or go to jail for up to 19 years !
What they dont say is that the law has yet to be tested, there is a wealth of past history where people have written in secret diaries and they cant make them decode it and these people are not put away under this scheme.
(so IMHO it will fall on its face and I am not giving over any keys !)
my question is what is the stupidest thing you have ever heard of ?
regards
john jones
USA vs Usama Bin Laden, Part II (Score:2, Interesting)
My question is - do you think that you will be in a position to publish the transcripts for the trial of the Sept.11 events ?
Assuming, of course, that at least some of the perpetrators are brought to trial and that this will probably be well into the future.
The "security" of the State vs. the individual (Score:5, Interesting)
Let me begin by thanking you for your unflinching adherence to the principals of disclosure and freedom of information. I am a great fan of your continuing work. My question follows:
You have in the past, and continue to, post "dangerous" information like names of former intelligence agents, details of government cover-ups, radically contrarian opinions, and open calls for subversive action.
A good example of this is Cryptome's continuing threads on the structural failure of the WTC and potential vulnerabilities of other landmarks. Some would claim that this kind of conversation should take place in closed-door meetings - that open discussion like this could only benefit evil and your support of such discussion is irresponsible.
What are the principals and moral guidelines you use when publishing Cryptome? Are there any lines you would not cross? What are the implications of shifting public opinion (70% favor a national ID card) and mounting US totalitarianism to Cryptome?
Recent Times? (Score:1)
In a talk that you gave to the USENIX Security '01 you had mentioned that you try to publish most anything that is given to you that fits within your guidelines. Basically, have you changed those guidelines at all?
Transition from Architecture to Technology (Score:3, Interesting)
Is it true that... (Score:3, Funny)
Encrypt! Encrypt! OK!
Backups? (Score:4, Interesting)
Here's my Question (Score:1)
Thanks,
Mysticalfruit
freenet and/or freeweb mirror? (Score:1, Interesting)
I've been a long time fan of your site, and I hope it never gets shut down and/or censored. There's not much you can do if you get shut down, but have you considered using freenet and/or freeweb to mirror your content? Once content is on those systems, it won't come down until nobody wants it.
If not, why not? Are there any changes in those systems that would make you reconsider?
Thanks for talking to
Boxing or Judo? (Score:2)
What strategy do you think will be the most effective in preserving privacy rights in the future? To be more precise, should the proponents of electronic freedom fight as strongly as possible against attempts to restrict those freedoms, or do you think it would be more effective to have some flexibility? I have often wondered whether the gun manufacturers and the NRA (for example) might be more effective in preserving gun rights if they took some effective actions on their own to keep guns away from wackos.
In the case of electronic freedoms, I wonder whether fighting will only result in a complete collapse of our rights. It might be better to fight the worst proposals vigorously, and to assist the Feds (in some appropriate way) to catch the bad guys. This latter approach might erode some privacy, but might preserve the body of rights better in the long run.
Motive for banning citizen-level cryptography? (Score:2)
By about 10:15am on Sept 11, someone in DoJ was talking about banning strong cryptography for individuals, or at least only allowing key-escrowed crypto. It's pretty clear to me that factions in the US government (NSA? DoJ? DoD?) don't really like the idea of strong cryptography used on a daily basis on a large part of the Internet, and the events of Sept 11 merely provided an emotionally-charged fog in which to go after demonized targets.
But why? After about 30 seconds of reflection, it's pretty clear that terrorists/Russian Mafia/Red Chinese Communists/drug smugglers/money launderers/Swiss Bankers wouldn't use key-escrowed or US-government sponsored crypto products in the first place - why should the bad guys trust the US government? The bad guys don't play by the rules in the first place, so "safe" encryption won't apply to them. After 30 more seconds, it becomes apparent that key-escrowed crypto isn't crypto at all - whoever has the keys must use them constantly to determine whether the encrypted data isn't doubly-encrypted: once with a non-approved/non-key-escrowed scheme, the 2nd time with the "official" key-escrowed scheme.
One has to arrive at the conclusion that the only people that key-escrowed, or semi-weakened crypto applies to are regular, law-abiding US citizens and businesses.
Given that conclusion, why has the US government (and UK and French governments, too for that matter) tried so hard and for so long to prohibit law-abiding use of strong crypto? Feel free to speculate, I won't mind.
Information and protests. (Score:2, Interesting)
In recent years we have seen a raft of laws that, under one guise or another, act to limit speech and dissemination of information. Your own experience with DeCSS is a prime example. Since September 11 there has been a renewed push in Governmental circles not only to restrict information by refusing to comply with FOIA requests [aclu.org] but to demand information by increasing surveillance [aclu.org].
As someone who has dealt with this and won, how do you see it progressing? Do you think that this will pass and these laws will be overturned? Or do you see this as only the beginning?
News sources. (Score:1)
What information sources (websites, newspapers, radio stations) do you go to for news and information? Which ones do you trust? And, which ones don't you trust?
A CD/DVD of Cryptome Material! (Score:1)
Trends in legislation (Score:3, Interesting)
Mirror policy question (Score:3, Interesting)
I appreciate your site a lot (not only because you have posted some of my own material on it
Your site hosts obvious controversial papers. Yet you clearly don't want to have your site mirrored. You state so on your website and your robots.txt disallows it. Why don't you want the information on cryptome and jya to be mirrored? I noticed you changed this policy briefly after the sep 11 attacks,and ofcourse immediately grabbed a copy.
But I'd still like to have a synchronised copy. Not even to publish now, but just to have in case cryptome disappears for whatever reasons.
Paul Wouters
Crypto cosmology (Score:1)
whats the relationship between code and karma?
John Q. Public see what benefits? (Score:1)
It's been said "I don't do anything illegal, why do I need it?" and it's also been said "I don't kill people, why do I need a gun?" (valid answer to both is "just because")
I guess the main question in this post is this:
For John Q. Public, what benefit will "impossible/darn-near-impossible to crack" encryption give? In other words: Who are we encrypting against? Who - in your opinion is reading my email and why?
Is there anything you wont touch? (Score:2)
I've gone to cryptome on a regular basis - it's always an interesting read.
However, do you have any internal guidelines or a gut reaction for stuff you wont host?
Andrew
sources (Score:1)
I enjoy reading cryptome, but I was always wondering: Where are your sources from? Why do they seem to know a lot about secret/top secret govt. activity (and why are they willing to risk being shot to give you this info)? Also, has anyone in the security establishemnt or government ever contacted you about your sources? Thanks and keep up the good work!
FBI threats (Score:1)
---
Both agents were very courteous during most of the conversations. Except toward the end of the conversation with Mr. Marzilliano, when I mentioned my intention to publish an account without revealing his and Mr. Castano's names, he warned me there would be "serious trouble" if their names were published, and that he would be speaking with the US Attorney about the matter and call me again
---
Did you find out what was meant by this?
Encryption (Score:1)
Re:DIY hardware crypto (Score:1)
It seems to me that crypto stuff is not necessarily well suited for special hardware, it can all be done just fine in ordinary software.
Re:I can ask ANYTHING I like? (Score:2)