Re: Consensus Actions in Cipherspace?

2001-01-12 Thread dmolnar
> > Well, the totally trivial and stupid thing is for a list reader to > sign a message saying "I think message X is spam" and send it to the list Sorry, I re-read your message and noted the requirement to ahve no central server. How about this: 1) To post a message, sender S takes a 2

Re: Consensus Actions in Cipherspace?

2001-01-12 Thread dmolnar
On Sat, 13 Jan 2001, Ray Dillinger wrote: > list don't think this is spam?" and yes/no buttons. The > subscribers just have another little button on their mail > reader - So it goes Next message, delete, reply, reply all, > spam. Well, the totally trivial and stupid thing is for a list re

Re: Consensus Actions in Cipherspace?

2001-01-12 Thread Ray Dillinger
On Fri, 12 Jan 2001, David Honig wrote: >the server could simply use a voting protocol to get (or timeout) >permission to do proposed actions. We are assuming that the server >is trusted, right? Actually, no. That creates a single priveleged machine, which is also a point of failure, whi

Re: NONSTOP Crypto Query

2001-01-12 Thread Wilfred L. Guerin
-=|[ duuh... ]|=- "NONSTOP" is moreso a protocol and general criteria for operations. It is not soley restricted to physical, TEMPEST, hij/abduct, intel, crypto, or any other specific protection mechanism. NONSTOP is more a general idea and concept, with implications and implementations across a

Re: Consensus Actions in Cipherspace?

2001-01-12 Thread dmolnar
On Fri, 12 Jan 2001, David Honig wrote: > (Thinking out loud) Maybe the actions require access to a distributed > N-of-M database? How do you prevent someone from reusing the > reconstructed database? Or uncooperatives refusing to update their slice > of the DB? One way to address this pr

Re: NONSTOP Crypto Query

2001-01-12 Thread David Honig
At 10:56 PM 1/12/01 -0500, Declan McCullagh wrote: >David's suggestion makes sense to me. But if NONSTOP is a codeword, it >would be classified at least secret, and manufacturers of such >products would be discouraged by their customers at NSA from labeling >their products with such a name. > >-De

Re: NONSTOP Crypto Query

2001-01-12 Thread Declan McCullagh
David's suggestion makes sense to me. But if NONSTOP is a codeword, it would be classified at least secret, and manufacturers of such products would be discouraged by their customers at NSA from labeling their products with such a name. -Declan On Fri, Jan 12, 2001 at 07:47:00PM -0500, David Ho

cypherpunks@minder.net

2001-01-12 Thread mmotyka
Jim, I remember that whole Faraday cage discussion - it was painful. When it comes to E&M you're really off in the tall grass. Mike

Re: Consensus Actions in Cipherspace?

2001-01-12 Thread David Honig
At 06:01 PM 1/12/01 -0500, Ray Dillinger wrote: > >Crucial facts about a protocol that does the right thing would be: > >1) DOES NOT create any single priveleged user or machine. > >2) Resistant to denial-of-service attacks and attempts to > "stack the vote." (Requires user authentication) >

Re: NONSTOP Crypto Query

2001-01-12 Thread David Honig
At 12:32 PM 1/12/01 -0500, Tim May wrote: > >The Tandem Computers "NONSTOP" was a product line in use by various >government agencies for secure (fault-tolerant) computing for a long >time. I'd look there for starters. (I thought this was too speculative, but given Tim's guess..) I have also t

Crypto sci fi: The Talking Kit

2001-01-12 Thread Blank Frank
Mary tried to ignore the sobbing of her sister in the next room. It had been two days since They came to her village and she was still in shock. Two days is the minimum time to wait, Alex had said, before Talking. Alex was the fellow from the Engineers Sans Frontiers who had given her the Kit.

Re: NONSTOP Crypto Query

2001-01-12 Thread Harmon Seaver
John Young wrote: > We've been unable to retrieve more than a few words from > the redacted portions (by use of xerography to reveal text > below the overwrites), and would appreciate any leads on > what NONSTOP means. Joel McNamara has been searching > for NONSTOP info for some time: > I ha

This is going to be a GREAT year for you! Take 5 min.

2001-01-12 Thread Financial Freedom
This is going to be a GREAT year for you! Take 5 min. Please read all of this! EARN $100,000 PER YEAR SENDING E-MAIL!!! *** You can earn $50,000 or more in the next 90 days sending e-mail, seem impossible? Read on for det

This is going to be a GREAT year for you! Take 5 min.

2001-01-12 Thread Financial Freedom
This is going to be a GREAT year for you! Take 5 min. Please read all of this! EARN $100,000 PER YEAR SENDING E-MAIL!!! *** You can earn $50,000 or more in the next 90 days sending e-mail, seem impossible? Read on for det

Unable to pay your supplier?

2001-01-12 Thread htlqztvkbj
ATTENTION BUSINESS OWNER/OPERATOR 15 >From time to time, most companies experience a cash flow problem. These problems >can range from temporary cash crunches with the inability to pay trade creditors and >suppliers within the granted credit terms to more serious problems including >bankrup

Re: Idea for tamper-resistant PC hardware

2001-01-12 Thread mmotyka
I guess if your critical server is simply some sort of service provider and the only data requiring security are the operating keys then your hostile location is OK since rebuilding a system and restoring a few keys ( which can be hidden just about anywhere ) is easily done. Otherwise the loss of

Re: Idea for tamper-resistant PC hardware

2001-01-12 Thread David Honig
At 05:09 AM 1/12/01 -0500, [EMAIL PROTECTED] wrote: >So here's another solution. The hard drive itself is encrypted, and >the encryption/decryption hardware is part of the hard drive chips, >and all are mounted within a tamper-resistant enclosure. Also mounted >in this enclosure is a little batt

SGBvsLei@aol.com

2001-01-12 Thread Blank Frank
At 08:52 PM 1/11/01 -0500, [EMAIL PROTECTED] wrote: >i saw ur name somewhere on a board,... u were talking about NORTON YOUR EYES >ONLY,.. i was wondering if u knew where i could get the US version or if u >could send,... thanx,... Soliciting to steal software? We've contacted the BSA and AOL.

Idea for tamper-resistant PC hardware

2001-01-12 Thread drevil
Here's something I would like to see: a harddrive that is tamper-resistant. The threat model is a server is deployed in an untrusted machineroom, and recovery of plaintext from the system is unacceptable. One obvious attack, involving an encrypted hard drive, is for the attackers to have a "pow