Rocksolid Light

OCTADE

mail  files  register  groups  login

Message-ID:  


USENET / sci.crypt / FOSS and backdoors in the US


1
FOSS and backdoors in the US

<v0aguk$27o8c$1@dont-email.me>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=247&group=sci.crypt#247

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: mm+usenet-es@dorfdsl.de (Marco Moock)
Newsgroups: sci.crypt
Subject: FOSS and backdoors in the US
Date: Wed, 24 Apr 2024 10:47:13 +0200
Organization: A noiseless patient Spider
Lines: 17
Message-ID: <v0aguk$27o8c$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 24 Apr 2024 10:47:17 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="572ff0bceb74d1d9536848dc079b01e1";
logging-data="2351372"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19C94yrwbIPi0/iaF+utjlX"
Cancel-Lock: sha1:jOt1LOARnaDy8c+h0fNGFXvubWc=
 by: Marco Moock - Wed, 24 Apr 2024 08:47 UTC

Hello!

Various governments around the world - including the US and EU - want
to have backdoors in encryption technology.

Is there anything known how FOSS developers will deal with that?

Especially if they are enforced to implement backdoors.

--
kind regards
Marco

Spam und Werbung bitte an
1713948269ichwillgesperrtwerden@nirvana.admins.ws

Re: FOSS and backdoors in the US

<v0bmt0$2gfl0$1@dont-email.me>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=248&group=sci.crypt#248

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Wed, 24 Apr 2024 12:34:56 -0700
Organization: A noiseless patient Spider
Lines: 13
Message-ID: <v0bmt0$2gfl0$1@dont-email.me>
References: <v0aguk$27o8c$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 24 Apr 2024 21:34:56 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="a0846936641d3d7e0dac65c7fc9003df";
logging-data="2637472"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18NNp6c1cxLPRMMyo3HM2eaZBYBCdqmqMc="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:LbbZqTOsdNmvdw2Wf9ZSxK2Z5zM=
Content-Language: en-US
In-Reply-To: <v0aguk$27o8c$1@dont-email.me>
 by: Chris M. Thomasson - Wed, 24 Apr 2024 19:34 UTC

On 4/24/2024 1:47 AM, Marco Moock wrote:
> Hello!
>
> Various governments around the world - including the US and EU - want
> to have backdoors in encryption technology.
>
> Is there anything known how FOSS developers will deal with that?
>
> Especially if they are enforced to implement backdoors.
>
>

Is there a backdoor to HMAC?

Re: FOSS and backdoors in the US

<v0boae$2gr87$1@dont-email.me>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=249&group=sci.crypt#249

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Wed, 24 Apr 2024 12:59:10 -0700
Organization: A noiseless patient Spider
Lines: 16
Message-ID: <v0boae$2gr87$1@dont-email.me>
References: <v0aguk$27o8c$1@dont-email.me> <v0bmt0$2gfl0$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 24 Apr 2024 21:59:10 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="a0846936641d3d7e0dac65c7fc9003df";
logging-data="2649351"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18wSw83Ri4DL7HxrghBBeZvPF9VstzcdA8="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:GHHTiS/OkXVrmX/8VWS8e3iiyIY=
Content-Language: en-US
In-Reply-To: <v0bmt0$2gfl0$1@dont-email.me>
 by: Chris M. Thomasson - Wed, 24 Apr 2024 19:59 UTC

On 4/24/2024 12:34 PM, Chris M. Thomasson wrote:
> On 4/24/2024 1:47 AM, Marco Moock wrote:
>> Hello!
>>
>> Various governments around the world - including the US and EU - want
>> to have backdoors in encryption technology.
>>
>> Is there anything known how FOSS developers will deal with that?
>>
>> Especially if they are enforced to implement backdoors.
>>
>>
>
> Is there a backdoor to HMAC?

Dr. Spoooooooofs a Lot?

Re: FOSS and backdoors in the US

<v0idv5$2cfp9$1@i2pn2.org>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=255&group=sci.crypt#255

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Sat, 27 Apr 2024 10:45:24 +0200
Organization: i2pn2 (i2pn.org)
Message-ID: <v0idv5$2cfp9$1@i2pn2.org>
References: <v0aguk$27o8c$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Sat, 27 Apr 2024 08:45:25 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="2506537"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
X-Spam-Checker-Version: SpamAssassin 4.0.0
Finger: tilde.club/~pollux/
 by: Stefan Claas - Sat, 27 Apr 2024 08:45 UTC

Marco Moock wrote:

> Hello!
>
> Various governments around the world - including the US and EU - want
> to have backdoors in encryption technology.
>
> Is there anything known how FOSS developers will deal with that?
>
> Especially if they are enforced to implement backdoors.
>
>

If I would be forced, which I doubt, I would comment the code
with something like this:

// backdoor begins here

backdoor code

// backdoor ends here

and put in the README how to exchange that code with proper one.

HTH

--
Regards
Stefan

Re: FOSS and backdoors in the US

<v0l3ih$2fjdh$1@i2pn2.org>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=259&group=sci.crypt#259

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Sun, 28 Apr 2024 11:06:24 +0200
Organization: i2pn2 (i2pn.org)
Message-ID: <v0l3ih$2fjdh$1@i2pn2.org>
References: <v0aguk$27o8c$1@dont-email.me>
<v0idv5$2cfp9$1@i2pn2.org>
<v0kjnk$s6vp$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Sun, 28 Apr 2024 09:06:26 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="2608561"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
Finger: tilde.club/~pollux/
X-Spam-Checker-Version: SpamAssassin 4.0.0
 by: Stefan Claas - Sun, 28 Apr 2024 09:06 UTC

Rich wrote:

> Stefan Claas <pollux@tilde.club> wrote:

> > If I would be forced, which I doubt, I would comment the code with
> > something like this:
> >
> > // backdoor begins here
> >
> > backdoor code
> >
> > // backdoor ends here
> >
> > and put in the README how to exchange that code with proper one.
>
> Likely would not work well. Such forcing would likely also be
> accompanied by a gag order preventing you from admitting the backdoor
> even exists and so such comments and readme text would be a likely gag
> order violation that would land you in jail.

Well, I gues this may only apply to big FOSS projects, where they can
force teams, or an individual team member, but not the millions of FOSS
programmers out there.

Another option for folks, living in West-Eurasia, might be to handle
over the correct code to people in BRICS countries and publish it there.

We should also not forget that Democrats (back then Senator Biden),
in the U.S., started the Crypto War ...

--
Regards
Stefan

Re: FOSS and backdoors in the US

<v0mc1l$18cqm$1@dont-email.me>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=266&group=sci.crypt#266

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Sun, 28 Apr 2024 13:37:09 -0700
Organization: A noiseless patient Spider
Lines: 38
Message-ID: <v0mc1l$18cqm$1@dont-email.me>
References: <v0aguk$27o8c$1@dont-email.me> <v0idv5$2cfp9$1@i2pn2.org>
<v0kjnk$s6vp$1@dont-email.me> <v0l3ih$2fjdh$1@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sun, 28 Apr 2024 22:37:09 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="a848dd800b8c48fe2ab64d595b3de6d7";
logging-data="1323862"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19RYnQOlklIVk0eg1pteUnq+mW2fep4r+A="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:51u11jj05w+l5IJId4pEMdCpNuk=
In-Reply-To: <v0l3ih$2fjdh$1@i2pn2.org>
Content-Language: en-US
 by: Chris M. Thomasson - Sun, 28 Apr 2024 20:37 UTC

On 4/28/2024 2:06 AM, Stefan Claas wrote:
> Rich wrote:
>
>> Stefan Claas <pollux@tilde.club> wrote:
>
>>> If I would be forced, which I doubt, I would comment the code with
>>> something like this:
>>>
>>> // backdoor begins here
>>>
>>> backdoor code
>>>
>>> // backdoor ends here
>>>
>>> and put in the README how to exchange that code with proper one.
>>
>> Likely would not work well. Such forcing would likely also be
>> accompanied by a gag order preventing you from admitting the backdoor
>> even exists and so such comments and readme text would be a likely gag
>> order violation that would land you in jail.
>
> Well, I gues this may only apply to big FOSS projects, where they can
> force teams, or an individual team member, but not the millions of FOSS
> programmers out there.
>
> Another option for folks, living in West-Eurasia, might be to handle
> over the correct code to people in BRICS countries and publish it there.
>
> We should also not forget that Democrats (back then Senator Biden),
> in the U.S., started the Crypto War ...
>

Think if an algorithm A that is published for anyone to implement. Not
raw code, but the algorithm itself. A standard, like HMAC or something.
There "might" be a backdoor in the algorithm itself, however its very,
VERY, very... hard to find. This is why I asked about HMAC having a
backdoor by default. Something that dr. spoofs a lot can take advantage
of. Rich said probably not, wrt the algorithm itself...

Re: FOSS and backdoors in the US

<v0ombk$2juq5$2@i2pn2.org>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=268&group=sci.crypt#268

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Mon, 29 Apr 2024 19:45:22 +0200
Organization: i2pn2 (i2pn.org)
Message-ID: <v0ombk$2juq5$2@i2pn2.org>
References: <v0aguk$27o8c$1@dont-email.me>
<v0idv5$2cfp9$1@i2pn2.org>
<v0kjnk$s6vp$1@dont-email.me>
<v0l3ih$2fjdh$1@i2pn2.org>
<v0mc1l$18cqm$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Mon, 29 Apr 2024 17:45:24 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="2751301"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
X-Spam-Checker-Version: SpamAssassin 4.0.0
Finger: tilde.club/~pollux/
 by: Stefan Claas - Mon, 29 Apr 2024 17:45 UTC

Chris M. Thomasson wrote:

> On 4/28/2024 2:06 AM, Stefan Claas wrote:
> > Rich wrote:
> >
> >> Stefan Claas <pollux@tilde.club> wrote:
> >
> >>> If I would be forced, which I doubt, I would comment the code with
> >>> something like this:
> >>>
> >>> // backdoor begins here
> >>>
> >>> backdoor code
> >>>
> >>> // backdoor ends here
> >>>
> >>> and put in the README how to exchange that code with proper one.
> >>
> >> Likely would not work well. Such forcing would likely also be
> >> accompanied by a gag order preventing you from admitting the backdoor
> >> even exists and so such comments and readme text would be a likely gag
> >> order violation that would land you in jail.
> >
> > Well, I gues this may only apply to big FOSS projects, where they can
> > force teams, or an individual team member, but not the millions of FOSS
> > programmers out there.
> >
> > Another option for folks, living in West-Eurasia, might be to handle
> > over the correct code to people in BRICS countries and publish it there.
> >
> > We should also not forget that Democrats (back then Senator Biden),
> > in the U.S., started the Crypto War ...
> >
>
> Think if an algorithm A that is published for anyone to implement. Not
> raw code, but the algorithm itself. A standard, like HMAC or something.
> There "might" be a backdoor in the algorithm itself, however its very,
> VERY, very... hard to find. This is why I asked about HMAC having a
> backdoor by default. Something that dr. spoofs a lot can take advantage
> of. Rich said probably not, wrt the algorithm itself...

But would a published algorithm not been more peer reviewed than later
a lot of code implementations, from various people?

--
Regards
Stefan

Re: FOSS and backdoors in the US

<v0ovva$1uq4v$1@dont-email.me>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=269&group=sci.crypt#269

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Mon, 29 Apr 2024 13:29:30 -0700
Organization: A noiseless patient Spider
Lines: 50
Message-ID: <v0ovva$1uq4v$1@dont-email.me>
References: <v0aguk$27o8c$1@dont-email.me> <v0idv5$2cfp9$1@i2pn2.org>
<v0kjnk$s6vp$1@dont-email.me> <v0l3ih$2fjdh$1@i2pn2.org>
<v0mc1l$18cqm$1@dont-email.me> <v0ombk$2juq5$2@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Mon, 29 Apr 2024 22:29:30 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="68a1f8b2290ba520f984bb7e7fb4eebe";
logging-data="2058399"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18+Vq9GjBBcBce9oh1DJeKvIlGXS1iJ5y8="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:UMTz31K4berVPn41xLf0NLP89YE=
Content-Language: en-US
In-Reply-To: <v0ombk$2juq5$2@i2pn2.org>
 by: Chris M. Thomasson - Mon, 29 Apr 2024 20:29 UTC

On 4/29/2024 10:45 AM, Stefan Claas wrote:
> Chris M. Thomasson wrote:
>
>> On 4/28/2024 2:06 AM, Stefan Claas wrote:
>>> Rich wrote:
>>>
>>>> Stefan Claas <pollux@tilde.club> wrote:
>>>
>>>>> If I would be forced, which I doubt, I would comment the code with
>>>>> something like this:
>>>>>
>>>>> // backdoor begins here
>>>>>
>>>>> backdoor code
>>>>>
>>>>> // backdoor ends here
>>>>>
>>>>> and put in the README how to exchange that code with proper one.
>>>>
>>>> Likely would not work well. Such forcing would likely also be
>>>> accompanied by a gag order preventing you from admitting the backdoor
>>>> even exists and so such comments and readme text would be a likely gag
>>>> order violation that would land you in jail.
>>>
>>> Well, I gues this may only apply to big FOSS projects, where they can
>>> force teams, or an individual team member, but not the millions of FOSS
>>> programmers out there.
>>>
>>> Another option for folks, living in West-Eurasia, might be to handle
>>> over the correct code to people in BRICS countries and publish it there.
>>>
>>> We should also not forget that Democrats (back then Senator Biden),
>>> in the U.S., started the Crypto War ...
>>>
>>
>> Think if an algorithm A that is published for anyone to implement. Not
>> raw code, but the algorithm itself. A standard, like HMAC or something.
>> There "might" be a backdoor in the algorithm itself, however its very,
>> VERY, very... hard to find. This is why I asked about HMAC having a
>> backdoor by default. Something that dr. spoofs a lot can take advantage
>> of. Rich said probably not, wrt the algorithm itself...
>
> But would a published algorithm not been more peer reviewed than later
> a lot of code implementations, from various people?
>

I hope so! I ask this question about HMAC because my experimental
encryption uses it.

http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=409075759deda6c624863f74354fbf7e2acc9a01e6e9cc37c544a4c45a306137211c8f704c1b9a367dae45792768e627e4d19b3ac6a1a6116bc7a72efc6c37e05e55cce00350a31b0f1347bd1342534ba75c9b2bd7

Re: FOSS and backdoors in the US

<v0p02b$1uq4v$2@dont-email.me>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=270&group=sci.crypt#270

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Mon, 29 Apr 2024 13:31:07 -0700
Organization: A noiseless patient Spider
Lines: 15
Message-ID: <v0p02b$1uq4v$2@dont-email.me>
References: <v0aguk$27o8c$1@dont-email.me> <v0idv5$2cfp9$1@i2pn2.org>
<v0kjnk$s6vp$1@dont-email.me> <v0l3ih$2fjdh$1@i2pn2.org>
<v0mc1l$18cqm$1@dont-email.me> <v0ombk$2juq5$2@i2pn2.org>
<v0ovva$1uq4v$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Mon, 29 Apr 2024 22:31:07 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="68a1f8b2290ba520f984bb7e7fb4eebe";
logging-data="2058399"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19M/1Du5NBp6uAd+K8DnJp2W1SXqQ+WnUY="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:jJMhcT96MK2mYyZceN8OWKERqxk=
Content-Language: en-US
In-Reply-To: <v0ovva$1uq4v$1@dont-email.me>
 by: Chris M. Thomasson - Mon, 29 Apr 2024 20:31 UTC

On 4/29/2024 1:29 PM, Chris M. Thomasson wrote:
> On 4/29/2024 10:45 AM, Stefan Claas wrote:
[...]
> I hope so! I ask this question about HMAC because my experimental
> encryption uses it.
>
> http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=409075759deda6c624863f74354fbf7e2acc9a01e6e9cc37c544a4c45a306137211c8f704c1b9a367dae45792768e627e4d19b3ac6a1a6116bc7a72efc6c37e05e55cce00350a31b0f1347bd1342534ba75c9b2bd7

I updated my site to use HTTPS. So, I need to alter my link code to
include https://*

sorry about that shit!

;^o

Re: FOSS and backdoors in the US

<20240507182057.2cb21b12@fedora>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=284&group=sci.crypt#284

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: hackbeard@linuxmail.org (Edward Teach)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Tue, 7 May 2024 18:20:57 +0100
Organization: A noiseless patient Spider
Lines: 7
Message-ID: <20240507182057.2cb21b12@fedora>
References: <v0aguk$27o8c$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 07 May 2024 19:20:57 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="ba0bcad71c49e36fa0dc4ba232942d7b";
logging-data="3552934"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18j4XZgk7PiwhAUvn8ScdgGoH0XspPvrEU="
Cancel-Lock: sha1:ZI1WKtBQj+CcQiu22DoArC+pTK8=
X-Newsreader: Claws Mail 4.2.0 (GTK 3.24.41; x86_64-redhat-linux-gnu)
 by: Edward Teach - Tue, 7 May 2024 17:20 UTC

Backdoors.

When people use PRIVATE ENCRYPTION BEFORE any messaging enters a public
channel.......

.......backdoors are the least of their worries!

Re: FOSS and backdoors in the US

<v1hjbm$1nrp$2@solani.org>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=286&group=sci.crypt#286

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!reader5.news.weretis.net!news.solani.org!.POSTED!not-for-mail
From: mm+solani@dorfdsl.de (Marco Moock)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Thu, 9 May 2024 06:27:34 +0200
Message-ID: <v1hjbm$1nrp$2@solani.org>
References: <v0aguk$27o8c$1@dont-email.me>
<20240507182057.2cb21b12@fedora>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 9 May 2024 04:27:34 -0000 (UTC)
Injection-Info: solani.org;
logging-data="57209"; mail-complaints-to="abuse@news.solani.org"
Cancel-Lock: sha1:1qwBawkZQvvFUMKh0wfLS9rodGE=
X-User-ID: eJwFwQkBwDAIA0BNPMlADk2Lfwm7Q9CoLwkmFsvhDnDjjWsE6XSiXP7s3Pa2ro00hNs06gcu5RED
X-Newsreader: Claws Mail 4.2.0 (GTK 3.24.41; x86_64-pc-linux-gnu)
 by: Marco Moock - Thu, 9 May 2024 04:27 UTC

Am 07.05.2024 18:20 Uhr schrieb Edward Teach:

> Backdoors.
>
> When people use PRIVATE ENCRYPTION BEFORE any messaging enters a
> public channel.......
>
> ......backdoors are the least of their worries!

Isn't enough. There is a time when that message is unencrypted (e.g.
when entering it to the crypto application). The operating system can
then read the cleartext. If the backdoor is in the OS, X11 etc., it
still works here.

Re: FOSS and backdoors in the US

<v1hkoo$f7le$2@dont-email.me>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=287&group=sci.crypt#287

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Wed, 8 May 2024 21:51:35 -0700
Organization: A noiseless patient Spider
Lines: 23
Message-ID: <v1hkoo$f7le$2@dont-email.me>
References: <v0aguk$27o8c$1@dont-email.me> <20240507182057.2cb21b12@fedora>
<v1hjbm$1nrp$2@solani.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 09 May 2024 06:51:36 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="2ab1cbf92348a8ed74075118eecb5845";
logging-data="499374"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/lCi+f9aCYjgVjD+OYVJWNnjYJj3p3WDU="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:cq5/yuy/tzeMmJTqf1gIA/hmNTI=
Content-Language: en-US
In-Reply-To: <v1hjbm$1nrp$2@solani.org>
 by: Chris M. Thomasson - Thu, 9 May 2024 04:51 UTC

On 5/8/2024 9:27 PM, Marco Moock wrote:
> Am 07.05.2024 18:20 Uhr schrieb Edward Teach:
>
>> Backdoors.
>>
>> When people use PRIVATE ENCRYPTION BEFORE any messaging enters a
>> public channel.......
>>
>> ......backdoors are the least of their worries!
>
> Isn't enough. There is a time when that message is unencrypted (e.g.
> when entering it to the crypto application). The operating system can
> then read the cleartext. If the backdoor is in the OS, X11 etc., it
> still works here.
>

Go to a 100% "clean room", cloaked, cannot receive and/or send anything...

Encrypt a message on a clean thumb drive. Take out the clean disk with a
single file on it. Destroy the computer... Exit the clean room. This
disk contains an encrypted file.

Is it safe?

Re: FOSS and backdoors in the US

<v1i596$gs31$1@i2pn2.org>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=288&group=sci.crypt#288

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Thu, 9 May 2024 11:33:25 +0200
Organization: i2pn2 (i2pn.org)
Message-ID: <v1i596$gs31$1@i2pn2.org>
References: <v0aguk$27o8c$1@dont-email.me>
<20240507182057.2cb21b12@fedora>
<v1hjbm$1nrp$2@solani.org>
<v1hkoo$f7le$2@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 9 May 2024 09:33:26 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="553057"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
X-Spam-Checker-Version: SpamAssassin 4.0.0
Finger: tilde.club/~pollux/
 by: Stefan Claas - Thu, 9 May 2024 09:33 UTC

Chris M. Thomasson wrote:

> On 5/8/2024 9:27 PM, Marco Moock wrote:
> > Am 07.05.2024 18:20 Uhr schrieb Edward Teach:
> >
> >> Backdoors.
> >>
> >> When people use PRIVATE ENCRYPTION BEFORE any messaging enters a
> >> public channel.......
> >>
> >> ......backdoors are the least of their worries!
> >
> > Isn't enough. There is a time when that message is unencrypted (e.g.
> > when entering it to the crypto application). The operating system can
> > then read the cleartext. If the backdoor is in the OS, X11 etc., it
> > still works here.
> >
>
> Go to a 100% "clean room", cloaked, cannot receive and/or send anything...
>
> Encrypt a message on a clean thumb drive. Take out the clean disk with a
> single file on it. Destroy the computer... Exit the clean room. This
> disk contains an encrypted file.
>
> Is it safe?

To expensive I would say. Better use secure pencil and paper ciphers.

BTW. You can also purchase Faraday equipment, relatively cheap and use
a second offline mini notebook with it. I purchased such things from
China[1] and the U.S.[2]

[1] <https://www.bing.com/shop?q=emf+rf+shielding+nickel+copper+fabric+from+china&FORM=SHOPPA&originIGUID=56F802844E0A485EBC37D87DA405CAC0>

[2] https://mosequipment.com/
--
Regards
Stefan

Re: FOSS and backdoors in the US

<v1j801$r5kr$1@dont-email.me>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=289&group=sci.crypt#289

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!i2pn.org!usenet.goja.nl.eu.org!3.eu.feeder.erje.net!feeder.erje.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Thu, 9 May 2024 12:25:52 -0700
Organization: A noiseless patient Spider
Lines: 42
Message-ID: <v1j801$r5kr$1@dont-email.me>
References: <v0aguk$27o8c$1@dont-email.me> <20240507182057.2cb21b12@fedora>
<v1hjbm$1nrp$2@solani.org> <v1hkoo$f7le$2@dont-email.me>
<v1i596$gs31$1@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 09 May 2024 21:25:54 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="2ab1cbf92348a8ed74075118eecb5845";
logging-data="890523"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX198Zi09WXFzZyIftG9GYZQUfI2JE0ZWuo0="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:mrI5fH8nSrQkIvpScvDjnsltgi8=
In-Reply-To: <v1i596$gs31$1@i2pn2.org>
Content-Language: en-US
 by: Chris M. Thomasson - Thu, 9 May 2024 19:25 UTC

On 5/9/2024 2:33 AM, Stefan Claas wrote:
> Chris M. Thomasson wrote:
>
>> On 5/8/2024 9:27 PM, Marco Moock wrote:
>>> Am 07.05.2024 18:20 Uhr schrieb Edward Teach:
>>>
>>>> Backdoors.
>>>>
>>>> When people use PRIVATE ENCRYPTION BEFORE any messaging enters a
>>>> public channel.......
>>>>
>>>> ......backdoors are the least of their worries!
>>>
>>> Isn't enough. There is a time when that message is unencrypted (e.g.
>>> when entering it to the crypto application). The operating system can
>>> then read the cleartext. If the backdoor is in the OS, X11 etc., it
>>> still works here.
>>>
>>
>> Go to a 100% "clean room", cloaked, cannot receive and/or send anything...
>>
>> Encrypt a message on a clean thumb drive. Take out the clean disk with a
>> single file on it. Destroy the computer... Exit the clean room. This
>> disk contains an encrypted file.
>>
>> Is it safe?
>
> To expensive I would say. Better use secure pencil and paper ciphers.
>
> BTW. You can also purchase Faraday equipment, relatively cheap and use
> a second offline mini notebook with it. I purchased such things from
> China[1] and the U.S.[2]
>
> [1] <https://www.bing.com/shop?q=emf+rf+shielding+nickel+copper+fabric+from+china&FORM=SHOPPA&originIGUID=56F802844E0A485EBC37D87DA405CAC0>
>
> [2] https://mosequipment.com/

There are some interesting meta materials that can be used for a cloak:

https://youtu.be/_JpMJTJXf28

https://fractenna.com

Re: FOSS and backdoors in the US

<v1js2u$vcvr$1@dont-email.me>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=291&group=sci.crypt#291

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Thu, 9 May 2024 18:08:44 -0700
Organization: A noiseless patient Spider
Lines: 47
Message-ID: <v1js2u$vcvr$1@dont-email.me>
References: <v0aguk$27o8c$1@dont-email.me> <20240507182057.2cb21b12@fedora>
<v1hjbm$1nrp$2@solani.org> <v1hkoo$f7le$2@dont-email.me>
<v1jht5$tdsr$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 10 May 2024 03:08:46 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="3e6f94937188224b64c8403807237f01";
logging-data="1029115"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/lRO/DSoYIfSSL6IIVyO3/XnPJs3p3ESo="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:ZrcTZ54hVtd7kRYbc8Ve9J+lqhk=
Content-Language: en-US
In-Reply-To: <v1jht5$tdsr$1@dont-email.me>
 by: Chris M. Thomasson - Fri, 10 May 2024 01:08 UTC

On 5/9/2024 3:15 PM, Rich wrote:
> Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
>> On 5/8/2024 9:27 PM, Marco Moock wrote:
>>> Am 07.05.2024 18:20 Uhr schrieb Edward Teach:
>>>
>>>> Backdoors.
>>>>
>>>> When people use PRIVATE ENCRYPTION BEFORE any messaging enters a
>>>> public channel.......
>>>>
>>>> ......backdoors are the least of their worries!
>>>
>>> Isn't enough. There is a time when that message is unencrypted (e.g.
>>> when entering it to the crypto application). The operating system can
>>> then read the cleartext. If the backdoor is in the OS, X11 etc., it
>>> still works here.
>>>
>>
>> Go to a 100% "clean room", cloaked, cannot receive and/or send anything...
>>
>> Encrypt a message on a clean thumb drive.
>
> Where did you obtain the thumb drive?
>
> Did you build it, from the ground up, or did you bring it into the
> clean-room after purchase from a vendor?
>
> If you purchased from a vendor, then how do you know said vendor did
> not include a hardware backdoor on that thumb drive?
>
>> Take out the clean disk with a
>> single file on it. Destroy the computer...
>
> How did the computer get into the clean room? How are you sure that no
> hardware on the computer has a backdoor, or that no software running on
> the computer has a backdoor?
>
>> Exit the clean room. This disk contains an encrypted file.
>>
>> Is it safe?
>
> The answer depends upon whether the thumbdrive and/or the computer used
> in the clean room contained a hardware or software back door.

Hopefully, the thumbdrive is clean. If there even is such a thing...

;^o

Re: FOSS and backdoors in the US

<v1lehq$upd4$1@paganini.bofh.team>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=292&group=sci.crypt#292

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!rocksolid2!news.nk.ca!nntp.comgw.net!newsfeed.bofh.team!paganini.bofh.team!not-for-mail
From: gay@sfuu.ca (Ian)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Fri, 10 May 2024 08:30:02 -0700
Organization: To protect and to server
Lines: 16
Message-ID: <v1lehq$upd4$1@paganini.bofh.team>
References: <v0aguk$27o8c$1@dont-email.me> <20240507182057.2cb21b12@fedora> <v1hjbm$1nrp$2@solani.org> <v1hkoo$f7le$2@dont-email.me> <v1jht5$tdsr$1@dont-email.me> <jln%N.88094$hSg3.33925@fx14.ams4>
Reply-To: gay@sfuu.ca
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7Bit
Injection-Info: paganini.bofh.team; logging-data="1009060"; posting-host="jxlGnYIPvgH6LSV3h5Orgg.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A";
User-Agent: KNode/0.10.9
X-Notice: Filtered by postfilter v. 0.9.3
 by: Ian - Fri, 10 May 2024 15:30 UTC

Cri-Cri wrote:

> On Thu, 9 May 2024 22:15:01 -0000 (UTC), Rich wrote:
>
>> How did the computer get into the clean room? How are you sure that
>> no hardware on the computer has a backdoor, or that no software
>> running on the computer has a backdoor?
>
> And even more problematic: electrons are constantly recycled, who can
> tell where they've been prior to entering the room?
>
You make sure to power the room with a.c., so no new electrons enter.
But better check on the copper that was used for the initial
construction.
--
*********** To reply by e-mail, make w single in address **************

Re: FOSS and backdoors in the US

<v1lhfa$kt12$1@i2pn2.org>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=293&group=sci.crypt#293

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Fri, 10 May 2024 18:19:52 +0200
Organization: i2pn2 (i2pn.org)
Message-ID: <v1lhfa$kt12$1@i2pn2.org>
References: <v0aguk$27o8c$1@dont-email.me>
<20240507182057.2cb21b12@fedora>
<v1hjbm$1nrp$2@solani.org>
<v1hkoo$f7le$2@dont-email.me>
<v1jht5$tdsr$1@dont-email.me>
<v1js2u$vcvr$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 10 May 2024 16:19:54 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="685090"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
Finger: tilde.club/~pollux/
X-Spam-Checker-Version: SpamAssassin 4.0.0
 by: Stefan Claas - Fri, 10 May 2024 16:19 UTC

Chris M. Thomasson wrote:

> On 5/9/2024 3:15 PM, Rich wrote:

> > The answer depends upon whether the thumbdrive and/or the computer used
> > in the clean room contained a hardware or software back door.
>
> Hopefully, the thumbdrive is clean. If there even is such a thing...

Why not use a 3.5 inch disk drive and 3.5 inch disks? Still available
at Amazon and I think the content written on 3.5 inch disk can be easily
examined with a disk editor. And they are loud, so you can hear the read/write
process. :-)

--
Regards
Stefan

Re: FOSS and backdoors in the US

<v1liqe$1f3d9$1@dont-email.me>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=295&group=sci.crypt#295

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: peter@tsto.co.uk (Peter Fairbrother)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Fri, 10 May 2024 17:42:54 +0100
Organization: A noiseless patient Spider
Lines: 19
Message-ID: <v1liqe$1f3d9$1@dont-email.me>
References: <v0aguk$27o8c$1@dont-email.me> <20240507182057.2cb21b12@fedora>
<v1hjbm$1nrp$2@solani.org> <v1hkoo$f7le$2@dont-email.me>
<v1jht5$tdsr$1@dont-email.me> <v1js2u$vcvr$1@dont-email.me>
<v1lhfa$kt12$1@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 10 May 2024 18:42:55 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="5b92961659be51fb265e82927dd6307a";
logging-data="1543593"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/WSTuzkKx39iM6iyVoIMoju7H41wwk9PM="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:g6w0Pge2fcXE4cIglB+/MHPb/EE=
In-Reply-To: <v1lhfa$kt12$1@i2pn2.org>
Content-Language: en-GB
 by: Peter Fairbrother - Fri, 10 May 2024 16:42 UTC

On 10/05/2024 17:19, Stefan Claas wrote:
> Chris M. Thomasson wrote:
>
>> On 5/9/2024 3:15 PM, Rich wrote:
>
>>> The answer depends upon whether the thumbdrive and/or the computer used
>>> in the clean room contained a hardware or software back door.
>>
>> Hopefully, the thumbdrive is clean. If there even is such a thing...
>
> Why not use a 3.5 inch disk drive and 3.5 inch disks? Still available
> at Amazon and I think the content written on 3.5 inch disk can be easily
> examined with a disk editor. And they are loud, so you can hear the read/write
> process. :-)
>

Write-once CDs are also good.

Peter Fairbrother

Re: FOSS and backdoors in the US

<v1lvjr$1i0qk$1@dont-email.me>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=296&group=sci.crypt#296

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!rocksolid2!news.nk.ca!weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Fri, 10 May 2024 13:21:15 -0700
Organization: A noiseless patient Spider
Lines: 52
Message-ID: <v1lvjr$1i0qk$1@dont-email.me>
References: <v0aguk$27o8c$1@dont-email.me> <20240507182057.2cb21b12@fedora>
<v1hjbm$1nrp$2@solani.org> <v1hkoo$f7le$2@dont-email.me>
<v1jht5$tdsr$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 10 May 2024 22:21:16 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="3e6f94937188224b64c8403807237f01";
logging-data="1639252"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19aZSkQPlmnbZ1Q57qUukOdDlkwE+u5WRY="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:9fLrOQ/XGinr6z+PJkiFbZgYN9U=
Content-Language: en-US
In-Reply-To: <v1jht5$tdsr$1@dont-email.me>
 by: Chris M. Thomasson - Fri, 10 May 2024 20:21 UTC

On 5/9/2024 3:15 PM, Rich wrote:
> Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
>> On 5/8/2024 9:27 PM, Marco Moock wrote:
>>> Am 07.05.2024 18:20 Uhr schrieb Edward Teach:
>>>
>>>> Backdoors.
>>>>
>>>> When people use PRIVATE ENCRYPTION BEFORE any messaging enters a
>>>> public channel.......
>>>>
>>>> ......backdoors are the least of their worries!
>>>
>>> Isn't enough. There is a time when that message is unencrypted (e.g.
>>> when entering it to the crypto application). The operating system can
>>> then read the cleartext. If the backdoor is in the OS, X11 etc., it
>>> still works here.
>>>
>>
>> Go to a 100% "clean room", cloaked, cannot receive and/or send anything...
>>
>> Encrypt a message on a clean thumb drive.
>
> Where did you obtain the thumb drive?
>
> Did you build it, from the ground up, or did you bring it into the
> clean-room after purchase from a vendor?
>
> If you purchased from a vendor, then how do you know said vendor did
> not include a hardware backdoor on that thumb drive?
>
>> Take out the clean disk with a
>> single file on it. Destroy the computer...
>
> How did the computer get into the clean room? How are you sure that no
> hardware on the computer has a backdoor, or that no software running on
> the computer has a backdoor?

The computer would have to be clean. However, once its in the room, it
cannot communicate with the outside world, and gets utterly destroyed
after the encryption process. Turned into ashes.

Humm... Damn.

>
>> Exit the clean room. This disk contains an encrypted file.
>>
>> Is it safe?
>
> The answer depends upon whether the thumbdrive and/or the computer used
> in the clean room contained a hardware or software back door.

Re: FOSS and backdoors in the US

<v1n3ou$1t2tk$1@dont-email.me>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=297&group=sci.crypt#297

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Fri, 10 May 2024 23:38:21 -0700
Organization: A noiseless patient Spider
Lines: 27
Message-ID: <v1n3ou$1t2tk$1@dont-email.me>
References: <v0aguk$27o8c$1@dont-email.me> <20240507182057.2cb21b12@fedora>
<v1hjbm$1nrp$2@solani.org> <v1hkoo$f7le$2@dont-email.me>
<v1jht5$tdsr$1@dont-email.me> <v1lvjr$1i0qk$1@dont-email.me>
<v1m330$1ioge$1@dont-email.me> <v1m7hq$1jnh2$2@dont-email.me>
<v1mtc0$1rosf$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sat, 11 May 2024 08:38:22 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="72fee4d4a05aaa2dfcb40e9bf04b0631";
logging-data="2001844"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX184KYSAKGT6VTs9Xl/buNbbUFWUAUcs6LQ="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:uB78tuIUN87og/d3fvRNHd5Ifj0=
In-Reply-To: <v1mtc0$1rosf$1@dont-email.me>
Content-Language: en-US
 by: Chris M. Thomasson - Sat, 11 May 2024 06:38 UTC

On 5/10/2024 9:49 PM, Rich wrote:
> Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
>>
>> So, is there a way to use a clean room, a clean computer and a clean
>> medium to store the encrypted file? Assuming clean means clean... ;^o
>
> If you assume that "clean means clean" as to the computer hardware then
> you don't necessarily need a "clean room" [1]. You just need the
> hardware and software you are using at the time to be clean (as in free
> of backdoors).
>
> If they are free of backdoors at the time you are using them then your
> actions on them disappear into history unrecorded (beyond whatever
> outputs you intentionally made a record of).
>
>
>
> [1] If you are being surveiled sufficient that some agency is
> monitoring the RF emissions from your computer, at the same time you
> encrypt whatever it is you are encrypting, with sufficient detail to
> know what you are up to, then you likely have much bigger problems well
> beyond whether Acme Corp installed a backdoor into your computer.
>
> Plus keep in mind that "clean room" usually refers to particulate
> contaminants, the phrase you likely are looking for is "Faraday cage".

Right. I would hope a skiff would be okay...?

Re: FOSS and backdoors in the US

<v1n3rh$1t2tk$2@dont-email.me>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=298&group=sci.crypt#298

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Fri, 10 May 2024 23:39:45 -0700
Organization: A noiseless patient Spider
Lines: 17
Message-ID: <v1n3rh$1t2tk$2@dont-email.me>
References: <v0aguk$27o8c$1@dont-email.me> <20240507182057.2cb21b12@fedora>
<v1hjbm$1nrp$2@solani.org> <v1hkoo$f7le$2@dont-email.me>
<v1jht5$tdsr$1@dont-email.me> <v1lvjr$1i0qk$1@dont-email.me>
<v1m330$1ioge$1@dont-email.me> <v1m7hq$1jnh2$2@dont-email.me>
<v1mtc0$1rosf$1@dont-email.me> <v1n3ou$1t2tk$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sat, 11 May 2024 08:39:46 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="72fee4d4a05aaa2dfcb40e9bf04b0631";
logging-data="2001844"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19UI6PI2yEmE2BCZi/k4rQzokjaxrhLmAU="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:yFWlrvCU/Zecy40/0BEKWi9x0Bo=
Content-Language: en-US
In-Reply-To: <v1n3ou$1t2tk$1@dont-email.me>
 by: Chris M. Thomasson - Sat, 11 May 2024 06:39 UTC

On 5/10/2024 11:38 PM, Chris M. Thomasson wrote:
> On 5/10/2024 9:49 PM, Rich wrote:
>> Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
[...]
>> [1] If you are being surveiled sufficient that some agency is
>> monitoring the RF emissions from your computer, at the same time you
>> encrypt whatever it is you are encrypting, with sufficient detail to
>> know what you are up to, then you likely have much bigger problems well
>> beyond whether Acme Corp installed a backdoor into your computer.
>>
>> Plus keep in mind that "clean room" usually refers to particulate
>> contaminants, the phrase you likely are looking for is "Faraday cage".
>
> Right. I would hope a skiff would be okay...?

Damn it! SCIF shit... ;^o

Re: FOSS and backdoors in the US

<20240605200221.1dab014b@fedora>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=304&group=sci.crypt#304

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: hackbeard@linuxmail.org (Edward Teach)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Wed, 5 Jun 2024 20:02:21 +0100
Organization: A noiseless patient Spider
Lines: 62
Message-ID: <20240605200221.1dab014b@fedora>
References: <v0aguk$27o8c$1@dont-email.me>
<20240507182057.2cb21b12@fedora>
<v1hjbm$1nrp$2@solani.org>
<v1hkoo$f7le$2@dont-email.me>
<v1jht5$tdsr$1@dont-email.me>
<v1lvjr$1i0qk$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 05 Jun 2024 21:02:22 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="e8cfd831b1d10f01dc491ec28e80ffef";
logging-data="1150667"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18bk+EBi82HaWL4CiXE5jvVz2PIHmu3i0Y="
Cancel-Lock: sha1:nivB4lQC43jE86P+B0RjTK2SHEg=
X-Newsreader: Claws Mail 4.2.0 (GTK 3.24.42; x86_64-redhat-linux-gnu)
 by: Edward Teach - Wed, 5 Jun 2024 19:02 UTC

On Fri, 10 May 2024 13:21:15 -0700
"Chris M. Thomasson" <chris.m.thomasson.1@gmail.com> wrote:

> On 5/9/2024 3:15 PM, Rich wrote:
> > Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
> >> On 5/8/2024 9:27 PM, Marco Moock wrote:
> >>> Am 07.05.2024 18:20 Uhr schrieb Edward Teach:
> >>>
> >>>> Backdoors.
> >>>>
> >>>> When people use PRIVATE ENCRYPTION BEFORE any messaging enters a
> >>>> public channel.......
> >>>>
> >>>> ......backdoors are the least of their worries!
> >>>
> >>> Isn't enough. There is a time when that message is unencrypted
> >>> (e.g. when entering it to the crypto application). The operating
> >>> system can then read the cleartext. If the backdoor is in the OS,
> >>> X11 etc., it still works here.
> >>>
> >>
> >> Go to a 100% "clean room", cloaked, cannot receive and/or send
> >> anything...
> >>
> >> Encrypt a message on a clean thumb drive.
> >
> > Where did you obtain the thumb drive?
> >
> > Did you build it, from the ground up, or did you bring it into the
> > clean-room after purchase from a vendor?
> >
> > If you purchased from a vendor, then how do you know said vendor did
> > not include a hardware backdoor on that thumb drive?
> >
> >> Take out the clean disk with a
> >> single file on it. Destroy the computer...
> >
> > How did the computer get into the clean room? How are you sure
> > that no hardware on the computer has a backdoor, or that no
> > software running on the computer has a backdoor?
>
> The computer would have to be clean. However, once its in the room,
> it cannot communicate with the outside world, and gets utterly
> destroyed after the encryption process. Turned into ashes.
>
> Humm... Damn.
>
>
> >
> >> Exit the clean room. This disk contains an encrypted file.
> >>
> >> Is it safe?
> >
> > The answer depends upon whether the thumbdrive and/or the computer
> > used in the clean room contained a hardware or software back door.
>

Sorry I started this thread......in my world "private encryption" only
needs to be private for twenty-four hours.....maybe less!!!

After that.......it doesn't matter who knows.................

Re: FOSS and backdoors in the US

<v3qjn3$14dl8$1@dont-email.me>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=305&group=sci.crypt#305

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: peter@tsto.co.uk (Peter Fairbrother)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Wed, 5 Jun 2024 22:01:22 +0100
Organization: A noiseless patient Spider
Lines: 66
Message-ID: <v3qjn3$14dl8$1@dont-email.me>
References: <v0aguk$27o8c$1@dont-email.me> <20240507182057.2cb21b12@fedora>
<v1hjbm$1nrp$2@solani.org> <v1hkoo$f7le$2@dont-email.me>
<v1jht5$tdsr$1@dont-email.me> <v1lvjr$1i0qk$1@dont-email.me>
<20240605200221.1dab014b@fedora>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 05 Jun 2024 23:01:23 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="35edb9a4464abcd3a888868be74e3a78";
logging-data="1193640"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18iFwvCM34eJQpgDjubbKxbOvdUWnJy/qI="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:W3pdk7E51H1KVlYUgllbSR9NLdQ=
In-Reply-To: <20240605200221.1dab014b@fedora>
Content-Language: en-GB
 by: Peter Fairbrother - Wed, 5 Jun 2024 21:01 UTC

On 05/06/2024 20:02, Edward Teach wrote:
> On Fri, 10 May 2024 13:21:15 -0700
> "Chris M. Thomasson" <chris.m.thomasson.1@gmail.com> wrote:
>
>> On 5/9/2024 3:15 PM, Rich wrote:
>>> Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
>>>> On 5/8/2024 9:27 PM, Marco Moock wrote:
>>>>> Am 07.05.2024 18:20 Uhr schrieb Edward Teach:
>>>>>
>>>>>> Backdoors.
>>>>>>
>>>>>> When people use PRIVATE ENCRYPTION BEFORE any messaging enters a
>>>>>> public channel.......
>>>>>>
>>>>>> ......backdoors are the least of their worries!
>>>>>
>>>>> Isn't enough. There is a time when that message is unencrypted
>>>>> (e.g. when entering it to the crypto application). The operating
>>>>> system can then read the cleartext. If the backdoor is in the OS,
>>>>> X11 etc., it still works here.
>>>>>
>>>>
>>>> Go to a 100% "clean room", cloaked, cannot receive and/or send
>>>> anything...

The magic word is "air-gapped".

Plus "Faraday caged". Though a faraday cage can transmit magnetic
fields, so "magnetically shielded". And the power supply can transmit
info, so "internally powered". And to stop remote
over-the-shoulder-surfing, "opaque". "Soundproof", of course. Und so weiter.

>>>> Encrypt a message on a clean thumb drive.

A writable CD is better, less places to put a hardware back door. A
blowtorch works well for later secure deletion of the CD. For those who
might object to the fumes, you could print out the ciphertext as a
series of QR type codes on paper, then burn them.

However even then a backdoor might reveal the key in the ciphertext in
eg padding, nonces, through limiting possible key selections etc. etc;
perhaps in encrypted form so only the unintended recipient can read it,
and to make it look random as good ciphertext should look and thus
harder to detect.

That might sound complicated but if you know which encryption algorithms
are to be used and have hardware or software access to the computer
before the encryption is done it is fairly straightforward to implement.

>
> Sorry I started this thread......in my world "private encryption" only
> needs to be private for twenty-four hours.....maybe less!!!
>
> After that.......it doesn't matter who knows.................

For the rest of us mortals (or perhaps more importantly, for our
clients), it can be a matter of life and death, for a lifetime.

100% security is very very very hard, often impossible. Yet security is
still a Boolean (tenth law).

Peter Fairbrother

Re: FOSS and backdoors in the US

<v4odcd$fg4j$1@dont-email.me>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=315&group=sci.crypt#315

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Sun, 16 Jun 2024 21:17:17 -0700
Organization: A noiseless patient Spider
Lines: 66
Message-ID: <v4odcd$fg4j$1@dont-email.me>
References: <v0aguk$27o8c$1@dont-email.me> <20240507182057.2cb21b12@fedora>
<v1hjbm$1nrp$2@solani.org> <v1hkoo$f7le$2@dont-email.me>
<v1jht5$tdsr$1@dont-email.me> <v1lvjr$1i0qk$1@dont-email.me>
<20240605200221.1dab014b@fedora>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Mon, 17 Jun 2024 06:17:18 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="c5aa21a2ffdc11ceb19a167156cbaefd";
logging-data="508051"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18UhSId4eA9fCX/R28Y8epu11MJtbaFH3I="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:t/NbuexInSnAzDgghgizFIJSEPQ=
In-Reply-To: <20240605200221.1dab014b@fedora>
Content-Language: en-US
 by: Chris M. Thomasson - Mon, 17 Jun 2024 04:17 UTC

On 6/5/2024 12:02 PM, Edward Teach wrote:
> On Fri, 10 May 2024 13:21:15 -0700
> "Chris M. Thomasson" <chris.m.thomasson.1@gmail.com> wrote:
>
>> On 5/9/2024 3:15 PM, Rich wrote:
>>> Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
>>>> On 5/8/2024 9:27 PM, Marco Moock wrote:
>>>>> Am 07.05.2024 18:20 Uhr schrieb Edward Teach:
>>>>>
>>>>>> Backdoors.
>>>>>>
>>>>>> When people use PRIVATE ENCRYPTION BEFORE any messaging enters a
>>>>>> public channel.......
>>>>>>
>>>>>> ......backdoors are the least of their worries!
>>>>>
>>>>> Isn't enough. There is a time when that message is unencrypted
>>>>> (e.g. when entering it to the crypto application). The operating
>>>>> system can then read the cleartext. If the backdoor is in the OS,
>>>>> X11 etc., it still works here.
>>>>>
>>>>
>>>> Go to a 100% "clean room", cloaked, cannot receive and/or send
>>>> anything...
>>>>
>>>> Encrypt a message on a clean thumb drive.
>>>
>>> Where did you obtain the thumb drive?
>>>
>>> Did you build it, from the ground up, or did you bring it into the
>>> clean-room after purchase from a vendor?
>>>
>>> If you purchased from a vendor, then how do you know said vendor did
>>> not include a hardware backdoor on that thumb drive?
>>>
>>>> Take out the clean disk with a
>>>> single file on it. Destroy the computer...
>>>
>>> How did the computer get into the clean room? How are you sure
>>> that no hardware on the computer has a backdoor, or that no
>>> software running on the computer has a backdoor?
>>
>> The computer would have to be clean. However, once its in the room,
>> it cannot communicate with the outside world, and gets utterly
>> destroyed after the encryption process. Turned into ashes.
>>
>> Humm... Damn.
>>
>>
>>>
>>>> Exit the clean room. This disk contains an encrypted file.
>>>>
>>>> Is it safe?
>>>
>>> The answer depends upon whether the thumbdrive and/or the computer
>>> used in the clean room contained a hardware or software back door.
>>
>
> Sorry I started this thread......in my world "private encryption" only
> needs to be private for twenty-four hours.....maybe less!!!
>
> After that.......it doesn't matter who knows.................
>

http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=7cd81c0eb4f827492e1f5cd2c2b8125a66c42bd7448bc55fb1fd02051f30ca503accfe75a9e5bb0adb8eb90ae15dcc3de421c3fdf43a88853dc04a5c20a8d373327fc04cb8e3b0a8f00dd2bf577e8751eacd4239769f4980eb7b4c17d620b1b3bae1d2d48bad80b1136b47bced287007efa7d19102


USENET / sci.crypt / FOSS and backdoors in the US

1

rocksolid light 0.9.152
clearnet tor