Rocksolid Light

News from da outaworlds

mail  files  register  groups  login

Message-ID:  

BOFH excuse #2: solar flares


sci / sci.crypt / Re: FOSS and backdoors in the US

SubjectAuthor
* FOSS and backdoors in the USMarco Moock
+* Re: FOSS and backdoors in the USChris M. Thomasson
|+- Re: FOSS and backdoors in the USChris M. Thomasson
|`- Re: FOSS and backdoors in the USRich
+* Re: FOSS and backdoors in the USStefan Claas
|`* Re: FOSS and backdoors in the USRich
| `* Re: FOSS and backdoors in the USStefan Claas
|  +* Re: FOSS and backdoors in the USRich
|  |`- Re: FOSS and backdoors in the USPhil Carmody
|  `* Re: FOSS and backdoors in the USChris M. Thomasson
|   `* Re: FOSS and backdoors in the USStefan Claas
|    `* Re: FOSS and backdoors in the USChris M. Thomasson
|     +- Re: FOSS and backdoors in the USChris M. Thomasson
|     `- Re: FOSS and backdoors in the USRich
`* Re: FOSS and backdoors in the USEdward Teach
 `* Re: FOSS and backdoors in the USMarco Moock
  `* Re: FOSS and backdoors in the USChris M. Thomasson
   +* Re: FOSS and backdoors in the USStefan Claas
   |`- Re: FOSS and backdoors in the USChris M. Thomasson
   `* Re: FOSS and backdoors in the USRich
    +* Re: FOSS and backdoors in the USChris M. Thomasson
    |`* Re: FOSS and backdoors in the USStefan Claas
    | `- Re: FOSS and backdoors in the USPeter Fairbrother
    +* Re: FOSS and backdoors in the USCri-Cri
    |`- Re: FOSS and backdoors in the USIan
    `* Re: FOSS and backdoors in the USChris M. Thomasson
     +* Re: FOSS and backdoors in the USRich
     |`* Re: FOSS and backdoors in the USChris M. Thomasson
     | `* Re: FOSS and backdoors in the USRich
     |  `* Re: FOSS and backdoors in the USChris M. Thomasson
     |   `- Re: FOSS and backdoors in the USChris M. Thomasson
     +* Re: FOSS and backdoors in the USEdward Teach
     |+- Re: FOSS and backdoors in the USChris M. Thomasson
     |`- Re: FOSS and backdoors in the USPeter Fairbrother
     `* Re: FOSS and backdoors in the USEdward Teach
      +- Re: FOSS and backdoors in the USChris M. Thomasson
      `- Re: FOSS and backdoors in the USPeter Fairbrother

Pages:12
Subject: Re: FOSS and backdoors in the US
From: Chris M. Thomasson
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Fri, 10 May 2024 20:21 UTC
References: 1 2 3 4 5
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Fri, 10 May 2024 13:21:15 -0700
Organization: A noiseless patient Spider
Lines: 52
Message-ID: <v1lvjr$1i0qk$1@dont-email.me>
References: <v0aguk$27o8c$1@dont-email.me> <20240507182057.2cb21b12@fedora>
<v1hjbm$1nrp$2@solani.org> <v1hkoo$f7le$2@dont-email.me>
<v1jht5$tdsr$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 10 May 2024 22:21:16 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="3e6f94937188224b64c8403807237f01";
logging-data="1639252"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19aZSkQPlmnbZ1Q57qUukOdDlkwE+u5WRY="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:9fLrOQ/XGinr6z+PJkiFbZgYN9U=
Content-Language: en-US
In-Reply-To: <v1jht5$tdsr$1@dont-email.me>
View all headers

On 5/9/2024 3:15 PM, Rich wrote:
> Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
>> On 5/8/2024 9:27 PM, Marco Moock wrote:
>>> Am 07.05.2024 18:20 Uhr schrieb Edward Teach:
>>>
>>>> Backdoors.
>>>>
>>>> When people use PRIVATE ENCRYPTION BEFORE any messaging enters a
>>>> public channel.......
>>>>
>>>> ......backdoors are the least of their worries!
>>>
>>> Isn't enough. There is a time when that message is unencrypted (e.g.
>>> when entering it to the crypto application). The operating system can
>>> then read the cleartext. If the backdoor is in the OS, X11 etc., it
>>> still works here.
>>>
>>
>> Go to a 100% "clean room", cloaked, cannot receive and/or send anything...
>>
>> Encrypt a message on a clean thumb drive.
>
> Where did you obtain the thumb drive?
>
> Did you build it, from the ground up, or did you bring it into the
> clean-room after purchase from a vendor?
>
> If you purchased from a vendor, then how do you know said vendor did
> not include a hardware backdoor on that thumb drive?
>
>> Take out the clean disk with a
>> single file on it. Destroy the computer...
>
> How did the computer get into the clean room? How are you sure that no
> hardware on the computer has a backdoor, or that no software running on
> the computer has a backdoor?

The computer would have to be clean. However, once its in the room, it
cannot communicate with the outside world, and gets utterly destroyed
after the encryption process. Turned into ashes.

Humm... Damn.

>
>> Exit the clean room. This disk contains an encrypted file.
>>
>> Is it safe?
>
> The answer depends upon whether the thumbdrive and/or the computer used
> in the clean room contained a hardware or software back door.

Subject: Re: FOSS and backdoors in the US
From: Rich
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Fri, 10 May 2024 21:20 UTC
References: 1 2 3 4 5 6
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Fri, 10 May 2024 21:20:32 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 68
Message-ID: <v1m330$1ioge$1@dont-email.me>
References: <v0aguk$27o8c$1@dont-email.me> <20240507182057.2cb21b12@fedora> <v1hjbm$1nrp$2@solani.org> <v1hkoo$f7le$2@dont-email.me> <v1jht5$tdsr$1@dont-email.me> <v1lvjr$1i0qk$1@dont-email.me>
Injection-Date: Fri, 10 May 2024 23:20:32 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="058408ebda5736ecc61c2141491bec17";
logging-data="1663502"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+zqRMipmll3I0gWyXp2c+g"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:MfP+YwJO7sJBxz+7/20e21PtxlU=
View all headers

Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
> On 5/9/2024 3:15 PM, Rich wrote:
>> Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
>>> On 5/8/2024 9:27 PM, Marco Moock wrote:
>>>> Am 07.05.2024 18:20 Uhr schrieb Edward Teach:
>>>>
>>>>> Backdoors.
>>>>>
>>>>> When people use PRIVATE ENCRYPTION BEFORE any messaging enters a
>>>>> public channel.......
>>>>>
>>>>> ......backdoors are the least of their worries!
>>>>
>>>> Isn't enough. There is a time when that message is unencrypted (e.g.
>>>> when entering it to the crypto application). The operating system can
>>>> then read the cleartext. If the backdoor is in the OS, X11 etc., it
>>>> still works here.
>>>>
>>>
>>> Go to a 100% "clean room", cloaked, cannot receive and/or send anything...
>>>
>>> Encrypt a message on a clean thumb drive.
>>
>> Where did you obtain the thumb drive?
>>
>> Did you build it, from the ground up, or did you bring it into the
>> clean-room after purchase from a vendor?
>>
>> If you purchased from a vendor, then how do you know said vendor did
>> not include a hardware backdoor on that thumb drive?
>>
>>> Take out the clean disk with a
>>> single file on it. Destroy the computer...
>>
>> How did the computer get into the clean room? How are you sure that no
>> hardware on the computer has a backdoor, or that no software running on
>> the computer has a backdoor?
>
> The computer would have to be clean.

Did you manufacture the computer yourself? Or did you buy it from Acme
corp?

If you bought it from Acme Corp, how do you know that Acme Corp did not
install a hardware backdoor in the computer?

Did you install the OS yourself, or let Acme install it?

If you let Acme install the OS, how do you know that Acme did not
install a hidden software backdoor?

If you installed the OS yourself, where did you get the files?

Did you create them all yourself, or use a distribution collection?

If you used a distribution collection, how do you know that your
distribution did not install a software backdoor in the OS during the
install process?

> However, once its in the room, it
> cannot communicate with the outside world, and gets utterly destroyed
> after the encryption process. Turned into ashes.

That just means that it is no longer avaiable for inspection. But that
fact is of no help in determining if there was a backdoor somewhere
/during/ the encryption process.

> Humm... Damn.

Subject: Re: FOSS and backdoors in the US
From: Chris M. Thomasson
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Fri, 10 May 2024 22:36 UTC
References: 1 2 3 4 5 6 7
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Fri, 10 May 2024 15:36:42 -0700
Organization: A noiseless patient Spider
Lines: 89
Message-ID: <v1m7hq$1jnh2$2@dont-email.me>
References: <v0aguk$27o8c$1@dont-email.me> <20240507182057.2cb21b12@fedora>
<v1hjbm$1nrp$2@solani.org> <v1hkoo$f7le$2@dont-email.me>
<v1jht5$tdsr$1@dont-email.me> <v1lvjr$1i0qk$1@dont-email.me>
<v1m330$1ioge$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sat, 11 May 2024 00:36:43 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="72fee4d4a05aaa2dfcb40e9bf04b0631";
logging-data="1695266"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18MChY4sApzMaf09cjN5Z30+Unl0LFFn9Y="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:aM/8rHga/vDkiOhPTuCSnCp9cDs=
In-Reply-To: <v1m330$1ioge$1@dont-email.me>
Content-Language: en-US
View all headers

On 5/10/2024 2:20 PM, Rich wrote:
> Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
>> On 5/9/2024 3:15 PM, Rich wrote:
>>> Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
>>>> On 5/8/2024 9:27 PM, Marco Moock wrote:
>>>>> Am 07.05.2024 18:20 Uhr schrieb Edward Teach:
>>>>>
>>>>>> Backdoors.
>>>>>>
>>>>>> When people use PRIVATE ENCRYPTION BEFORE any messaging enters a
>>>>>> public channel.......
>>>>>>
>>>>>> ......backdoors are the least of their worries!
>>>>>
>>>>> Isn't enough. There is a time when that message is unencrypted (e.g.
>>>>> when entering it to the crypto application). The operating system can
>>>>> then read the cleartext. If the backdoor is in the OS, X11 etc., it
>>>>> still works here.
>>>>>
>>>>
>>>> Go to a 100% "clean room", cloaked, cannot receive and/or send anything...
>>>>
>>>> Encrypt a message on a clean thumb drive.
>>>
>>> Where did you obtain the thumb drive?
>>>
>>> Did you build it, from the ground up, or did you bring it into the
>>> clean-room after purchase from a vendor?
>>>
>>> If you purchased from a vendor, then how do you know said vendor did
>>> not include a hardware backdoor on that thumb drive?
>>>
>>>> Take out the clean disk with a
>>>> single file on it. Destroy the computer...
>>>
>>> How did the computer get into the clean room? How are you sure that no
>>> hardware on the computer has a backdoor, or that no software running on
>>> the computer has a backdoor?
>>
>> The computer would have to be clean.
>
> Did you manufacture the computer yourself? Or did you buy it from Acme
> corp?

Hopefully it would be manufactured by myself. Say, it's actually clean.
No problems wrt adulteration.

> If you bought it from Acme Corp, how do you know that Acme Corp did not
> install a hardware backdoor in the computer?
>
> Did you install the OS yourself, or let Acme install it?

Hopefully a minimalist OS that "everybody" deemed to be clean. Okay to use.

> If you let Acme install the OS, how do you know that Acme did not
> install a hidden software backdoor?
>
> If you installed the OS yourself, where did you get the files?
>
> Did you create them all yourself, or use a distribution collection?
>
> If you used a distribution collection, how do you know that your
> distribution did not install a software backdoor in the OS during the
> install process?
>
>> However, once its in the room, it
>> cannot communicate with the outside world, and gets utterly destroyed
>> after the encryption process. Turned into ashes.
>
> That just means that it is no longer avaiable for inspection.

Hopefully it passed all inspection _before_ this total destruction event
can occur.

> But that
> fact is of no help in determining if there was a backdoor somewhere
> /during/ the encryption process.

So, is there a way to use a clean room, a clean computer and a clean
medium to store the encrypted file? Assuming clean means clean... ;^o

>
>> Humm... Damn.

Damn again!

Subject: Re: FOSS and backdoors in the US
From: Rich
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Sat, 11 May 2024 04:49 UTC
References: 1 2 3 4 5 6 7 8
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Sat, 11 May 2024 04:49:04 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 24
Message-ID: <v1mtc0$1rosf$1@dont-email.me>
References: <v0aguk$27o8c$1@dont-email.me> <20240507182057.2cb21b12@fedora> <v1hjbm$1nrp$2@solani.org> <v1hkoo$f7le$2@dont-email.me> <v1jht5$tdsr$1@dont-email.me> <v1lvjr$1i0qk$1@dont-email.me> <v1m330$1ioge$1@dont-email.me> <v1m7hq$1jnh2$2@dont-email.me>
Injection-Date: Sat, 11 May 2024 06:49:04 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="dd0c93c083c0871bb62818cef9796988";
logging-data="1958799"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX194VPrFY/6ioIszyg+Ed3fL"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:hbFFTt7Vz7jezEAAfEaHkxby1AE=
View all headers

Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
>
> So, is there a way to use a clean room, a clean computer and a clean
> medium to store the encrypted file? Assuming clean means clean... ;^o

If you assume that "clean means clean" as to the computer hardware then
you don't necessarily need a "clean room" [1]. You just need the
hardware and software you are using at the time to be clean (as in free
of backdoors).

If they are free of backdoors at the time you are using them then your
actions on them disappear into history unrecorded (beyond whatever
outputs you intentionally made a record of).

[1] If you are being surveiled sufficient that some agency is
monitoring the RF emissions from your computer, at the same time you
encrypt whatever it is you are encrypting, with sufficient detail to
know what you are up to, then you likely have much bigger problems well
beyond whether Acme Corp installed a backdoor into your computer.

Plus keep in mind that "clean room" usually refers to particulate
contaminants, the phrase you likely are looking for is "Faraday cage".

Subject: Re: FOSS and backdoors in the US
From: Chris M. Thomasson
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Sat, 11 May 2024 06:38 UTC
References: 1 2 3 4 5 6 7 8 9
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Fri, 10 May 2024 23:38:21 -0700
Organization: A noiseless patient Spider
Lines: 27
Message-ID: <v1n3ou$1t2tk$1@dont-email.me>
References: <v0aguk$27o8c$1@dont-email.me> <20240507182057.2cb21b12@fedora>
<v1hjbm$1nrp$2@solani.org> <v1hkoo$f7le$2@dont-email.me>
<v1jht5$tdsr$1@dont-email.me> <v1lvjr$1i0qk$1@dont-email.me>
<v1m330$1ioge$1@dont-email.me> <v1m7hq$1jnh2$2@dont-email.me>
<v1mtc0$1rosf$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sat, 11 May 2024 08:38:22 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="72fee4d4a05aaa2dfcb40e9bf04b0631";
logging-data="2001844"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX184KYSAKGT6VTs9Xl/buNbbUFWUAUcs6LQ="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:uB78tuIUN87og/d3fvRNHd5Ifj0=
In-Reply-To: <v1mtc0$1rosf$1@dont-email.me>
Content-Language: en-US
View all headers

On 5/10/2024 9:49 PM, Rich wrote:
> Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
>>
>> So, is there a way to use a clean room, a clean computer and a clean
>> medium to store the encrypted file? Assuming clean means clean... ;^o
>
> If you assume that "clean means clean" as to the computer hardware then
> you don't necessarily need a "clean room" [1]. You just need the
> hardware and software you are using at the time to be clean (as in free
> of backdoors).
>
> If they are free of backdoors at the time you are using them then your
> actions on them disappear into history unrecorded (beyond whatever
> outputs you intentionally made a record of).
>
>
>
> [1] If you are being surveiled sufficient that some agency is
> monitoring the RF emissions from your computer, at the same time you
> encrypt whatever it is you are encrypting, with sufficient detail to
> know what you are up to, then you likely have much bigger problems well
> beyond whether Acme Corp installed a backdoor into your computer.
>
> Plus keep in mind that "clean room" usually refers to particulate
> contaminants, the phrase you likely are looking for is "Faraday cage".

Right. I would hope a skiff would be okay...?

Subject: Re: FOSS and backdoors in the US
From: Chris M. Thomasson
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Sat, 11 May 2024 06:39 UTC
References: 1 2 3 4 5 6 7 8 9 10
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Fri, 10 May 2024 23:39:45 -0700
Organization: A noiseless patient Spider
Lines: 17
Message-ID: <v1n3rh$1t2tk$2@dont-email.me>
References: <v0aguk$27o8c$1@dont-email.me> <20240507182057.2cb21b12@fedora>
<v1hjbm$1nrp$2@solani.org> <v1hkoo$f7le$2@dont-email.me>
<v1jht5$tdsr$1@dont-email.me> <v1lvjr$1i0qk$1@dont-email.me>
<v1m330$1ioge$1@dont-email.me> <v1m7hq$1jnh2$2@dont-email.me>
<v1mtc0$1rosf$1@dont-email.me> <v1n3ou$1t2tk$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sat, 11 May 2024 08:39:46 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="72fee4d4a05aaa2dfcb40e9bf04b0631";
logging-data="2001844"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19UI6PI2yEmE2BCZi/k4rQzokjaxrhLmAU="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:yFWlrvCU/Zecy40/0BEKWi9x0Bo=
Content-Language: en-US
In-Reply-To: <v1n3ou$1t2tk$1@dont-email.me>
View all headers

On 5/10/2024 11:38 PM, Chris M. Thomasson wrote:
> On 5/10/2024 9:49 PM, Rich wrote:
>> Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
[...]
>> [1] If you are being surveiled sufficient that some agency is
>> monitoring the RF emissions from your computer, at the same time you
>> encrypt whatever it is you are encrypting, with sufficient detail to
>> know what you are up to, then you likely have much bigger problems well
>> beyond whether Acme Corp installed a backdoor into your computer.
>>
>> Plus keep in mind that "clean room" usually refers to particulate
>> contaminants, the phrase you likely are looking for is "Faraday cage".
>
> Right. I would hope a skiff would be okay...?

Damn it! SCIF shit... ;^o

Subject: Re: FOSS and backdoors in the US
From: Edward Teach
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Wed, 5 Jun 2024 19:02 UTC
References: 1 2 3 4 5 6
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: hackbeard@linuxmail.org (Edward Teach)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Wed, 5 Jun 2024 20:02:21 +0100
Organization: A noiseless patient Spider
Lines: 62
Message-ID: <20240605200221.1dab014b@fedora>
References: <v0aguk$27o8c$1@dont-email.me>
<20240507182057.2cb21b12@fedora>
<v1hjbm$1nrp$2@solani.org>
<v1hkoo$f7le$2@dont-email.me>
<v1jht5$tdsr$1@dont-email.me>
<v1lvjr$1i0qk$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 05 Jun 2024 21:02:22 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="e8cfd831b1d10f01dc491ec28e80ffef";
logging-data="1150667"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18bk+EBi82HaWL4CiXE5jvVz2PIHmu3i0Y="
Cancel-Lock: sha1:nivB4lQC43jE86P+B0RjTK2SHEg=
X-Newsreader: Claws Mail 4.2.0 (GTK 3.24.42; x86_64-redhat-linux-gnu)
View all headers

On Fri, 10 May 2024 13:21:15 -0700
"Chris M. Thomasson" <chris.m.thomasson.1@gmail.com> wrote:

> On 5/9/2024 3:15 PM, Rich wrote:
> > Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
> >> On 5/8/2024 9:27 PM, Marco Moock wrote:
> >>> Am 07.05.2024 18:20 Uhr schrieb Edward Teach:
> >>>
> >>>> Backdoors.
> >>>>
> >>>> When people use PRIVATE ENCRYPTION BEFORE any messaging enters a
> >>>> public channel.......
> >>>>
> >>>> ......backdoors are the least of their worries!
> >>>
> >>> Isn't enough. There is a time when that message is unencrypted
> >>> (e.g. when entering it to the crypto application). The operating
> >>> system can then read the cleartext. If the backdoor is in the OS,
> >>> X11 etc., it still works here.
> >>>
> >>
> >> Go to a 100% "clean room", cloaked, cannot receive and/or send
> >> anything...
> >>
> >> Encrypt a message on a clean thumb drive.
> >
> > Where did you obtain the thumb drive?
> >
> > Did you build it, from the ground up, or did you bring it into the
> > clean-room after purchase from a vendor?
> >
> > If you purchased from a vendor, then how do you know said vendor did
> > not include a hardware backdoor on that thumb drive?
> >
> >> Take out the clean disk with a
> >> single file on it. Destroy the computer...
> >
> > How did the computer get into the clean room? How are you sure
> > that no hardware on the computer has a backdoor, or that no
> > software running on the computer has a backdoor?
>
> The computer would have to be clean. However, once its in the room,
> it cannot communicate with the outside world, and gets utterly
> destroyed after the encryption process. Turned into ashes.
>
> Humm... Damn.
>
>
> >
> >> Exit the clean room. This disk contains an encrypted file.
> >>
> >> Is it safe?
> >
> > The answer depends upon whether the thumbdrive and/or the computer
> > used in the clean room contained a hardware or software back door.
>

Sorry I started this thread......in my world "private encryption" only
needs to be private for twenty-four hours.....maybe less!!!

After that.......it doesn't matter who knows.................

Subject: Re: FOSS and backdoors in the US
From: Peter Fairbrother
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Wed, 5 Jun 2024 21:01 UTC
References: 1 2 3 4 5 6 7
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: peter@tsto.co.uk (Peter Fairbrother)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Wed, 5 Jun 2024 22:01:22 +0100
Organization: A noiseless patient Spider
Lines: 66
Message-ID: <v3qjn3$14dl8$1@dont-email.me>
References: <v0aguk$27o8c$1@dont-email.me> <20240507182057.2cb21b12@fedora>
<v1hjbm$1nrp$2@solani.org> <v1hkoo$f7le$2@dont-email.me>
<v1jht5$tdsr$1@dont-email.me> <v1lvjr$1i0qk$1@dont-email.me>
<20240605200221.1dab014b@fedora>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 05 Jun 2024 23:01:23 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="35edb9a4464abcd3a888868be74e3a78";
logging-data="1193640"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18iFwvCM34eJQpgDjubbKxbOvdUWnJy/qI="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:W3pdk7E51H1KVlYUgllbSR9NLdQ=
In-Reply-To: <20240605200221.1dab014b@fedora>
Content-Language: en-GB
View all headers

On 05/06/2024 20:02, Edward Teach wrote:
> On Fri, 10 May 2024 13:21:15 -0700
> "Chris M. Thomasson" <chris.m.thomasson.1@gmail.com> wrote:
>
>> On 5/9/2024 3:15 PM, Rich wrote:
>>> Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
>>>> On 5/8/2024 9:27 PM, Marco Moock wrote:
>>>>> Am 07.05.2024 18:20 Uhr schrieb Edward Teach:
>>>>>
>>>>>> Backdoors.
>>>>>>
>>>>>> When people use PRIVATE ENCRYPTION BEFORE any messaging enters a
>>>>>> public channel.......
>>>>>>
>>>>>> ......backdoors are the least of their worries!
>>>>>
>>>>> Isn't enough. There is a time when that message is unencrypted
>>>>> (e.g. when entering it to the crypto application). The operating
>>>>> system can then read the cleartext. If the backdoor is in the OS,
>>>>> X11 etc., it still works here.
>>>>>
>>>>
>>>> Go to a 100% "clean room", cloaked, cannot receive and/or send
>>>> anything...

The magic word is "air-gapped".

Plus "Faraday caged". Though a faraday cage can transmit magnetic
fields, so "magnetically shielded". And the power supply can transmit
info, so "internally powered". And to stop remote
over-the-shoulder-surfing, "opaque". "Soundproof", of course. Und so weiter.

>>>> Encrypt a message on a clean thumb drive.

A writable CD is better, less places to put a hardware back door. A
blowtorch works well for later secure deletion of the CD. For those who
might object to the fumes, you could print out the ciphertext as a
series of QR type codes on paper, then burn them.

However even then a backdoor might reveal the key in the ciphertext in
eg padding, nonces, through limiting possible key selections etc. etc;
perhaps in encrypted form so only the unintended recipient can read it,
and to make it look random as good ciphertext should look and thus
harder to detect.

That might sound complicated but if you know which encryption algorithms
are to be used and have hardware or software access to the computer
before the encryption is done it is fairly straightforward to implement.

>
> Sorry I started this thread......in my world "private encryption" only
> needs to be private for twenty-four hours.....maybe less!!!
>
> After that.......it doesn't matter who knows.................

For the rest of us mortals (or perhaps more importantly, for our
clients), it can be a matter of life and death, for a lifetime.

100% security is very very very hard, often impossible. Yet security is
still a Boolean (tenth law).

Peter Fairbrother

Subject: Re: FOSS and backdoors in the US
From: Chris M. Thomasson
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Mon, 17 Jun 2024 04:17 UTC
References: 1 2 3 4 5 6 7
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Sun, 16 Jun 2024 21:17:17 -0700
Organization: A noiseless patient Spider
Lines: 66
Message-ID: <v4odcd$fg4j$1@dont-email.me>
References: <v0aguk$27o8c$1@dont-email.me> <20240507182057.2cb21b12@fedora>
<v1hjbm$1nrp$2@solani.org> <v1hkoo$f7le$2@dont-email.me>
<v1jht5$tdsr$1@dont-email.me> <v1lvjr$1i0qk$1@dont-email.me>
<20240605200221.1dab014b@fedora>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Mon, 17 Jun 2024 06:17:18 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="c5aa21a2ffdc11ceb19a167156cbaefd";
logging-data="508051"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18UhSId4eA9fCX/R28Y8epu11MJtbaFH3I="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:t/NbuexInSnAzDgghgizFIJSEPQ=
In-Reply-To: <20240605200221.1dab014b@fedora>
Content-Language: en-US
View all headers

On 6/5/2024 12:02 PM, Edward Teach wrote:
> On Fri, 10 May 2024 13:21:15 -0700
> "Chris M. Thomasson" <chris.m.thomasson.1@gmail.com> wrote:
>
>> On 5/9/2024 3:15 PM, Rich wrote:
>>> Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
>>>> On 5/8/2024 9:27 PM, Marco Moock wrote:
>>>>> Am 07.05.2024 18:20 Uhr schrieb Edward Teach:
>>>>>
>>>>>> Backdoors.
>>>>>>
>>>>>> When people use PRIVATE ENCRYPTION BEFORE any messaging enters a
>>>>>> public channel.......
>>>>>>
>>>>>> ......backdoors are the least of their worries!
>>>>>
>>>>> Isn't enough. There is a time when that message is unencrypted
>>>>> (e.g. when entering it to the crypto application). The operating
>>>>> system can then read the cleartext. If the backdoor is in the OS,
>>>>> X11 etc., it still works here.
>>>>>
>>>>
>>>> Go to a 100% "clean room", cloaked, cannot receive and/or send
>>>> anything...
>>>>
>>>> Encrypt a message on a clean thumb drive.
>>>
>>> Where did you obtain the thumb drive?
>>>
>>> Did you build it, from the ground up, or did you bring it into the
>>> clean-room after purchase from a vendor?
>>>
>>> If you purchased from a vendor, then how do you know said vendor did
>>> not include a hardware backdoor on that thumb drive?
>>>
>>>> Take out the clean disk with a
>>>> single file on it. Destroy the computer...
>>>
>>> How did the computer get into the clean room? How are you sure
>>> that no hardware on the computer has a backdoor, or that no
>>> software running on the computer has a backdoor?
>>
>> The computer would have to be clean. However, once its in the room,
>> it cannot communicate with the outside world, and gets utterly
>> destroyed after the encryption process. Turned into ashes.
>>
>> Humm... Damn.
>>
>>
>>>
>>>> Exit the clean room. This disk contains an encrypted file.
>>>>
>>>> Is it safe?
>>>
>>> The answer depends upon whether the thumbdrive and/or the computer
>>> used in the clean room contained a hardware or software back door.
>>
>
> Sorry I started this thread......in my world "private encryption" only
> needs to be private for twenty-four hours.....maybe less!!!
>
> After that.......it doesn't matter who knows.................
>

http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=7cd81c0eb4f827492e1f5cd2c2b8125a66c42bd7448bc55fb1fd02051f30ca503accfe75a9e5bb0adb8eb90ae15dcc3de421c3fdf43a88853dc04a5c20a8d373327fc04cb8e3b0a8f00dd2bf577e8751eacd4239769f4980eb7b4c17d620b1b3bae1d2d48bad80b1136b47bced287007efa7d19102

Pages:12

rocksolid light 0.9.8
clearnet tor