[cryptome] Re: [cryptography] What Is Good Encryption Software?

  • From: Shaun O'Connor <capricorn8159@xxxxxxxxx>
  • To: cryptome@xxxxxxxxxxxxx
  • Date: Fri, 28 Nov 2014 22:07:03 +0000

Hi Douggie

the way things are going at present, absolutely nothing surprises me any
more.... as for any interesting reads... still ploughing through
Bamfords books ( current reading pretext for war).

Things are getting quite, erm interesting here in the uk, a piece of
legislation is being rushed through our parliament, but heres the
interesting bit although it is being rushed through it is not classified
as urgent. also comments have been made to the effect that, for a draft
bill. parts appear to be very well developed. even more intriguing is
that this piece of proposed legislation dealing with widening powers
perportedly in the name of counterterrorisim. appears to be supported by
"stakeholders" a rather odd anomaly for a government bill supposedly
drafted in conjunction with or on the advice of the UK security
services. I think I have the pdf's somewhere both of the proposed bill,
the explanatory notes and a draft committee meeting discussing the bill.



On 28/11/2014 21:21, doug wrote:
> Hi Shaun,
> Do you remember that US program encouraged by DARPA...TIA or Total
> Information Awareness?  I thought that they had got rid of it, but I
> see that it is back again in a different form, but with a vengeance.
> There is another cypher system where two or more identical books are
> used which are only known to the users as this information is
> exchanged previously using some other secure method, such as WOMB. 
> Once this information is set up, then the users can communicate by
> using sentences or words from the book, i.e. (page) 6...(line) 10...
> (sentence) (word) 5 etc.  Pretty foolproof but clumsy and requires
> recipients and senders to have a special relationship, like knowing
> and trusting one another.   Once book is compromised the cryptography
> fails.  If transmitted over the internet, suffers same problem as any
> other encryption sent over the internet.  Ball squeezing, same
> problem. Mind you, using  such a system might actually be more secure
> than any of those what we have at the moment...:-).   I can see us
> having to educate internet users into Book Literacy.    Read any good
> books lately...:-).
> Dougie.
> P.S.One Time Pad:  Make sure that the password isn't longer than the
> message.    It might be "perfect" cryptography, but it is subject to
> the same "metadata" problems...Is there an electronic version of a one
> time pad?  If so, subject to operation security just the same as pgp etc.
> P.P.S. I seem to remember that our current most favourite political
> asylumee, at present resident at the Ecaudorian Embassy in London, and
> living in the vain hope that the European Arrest Warrant might be
> overturned, invented a cryptographic system which he called "rubber
> hose", which apparently, like Truecrypt can hide itself within itself,
> so allowing plausible deniability... provided that another form of
> rubber hose aint used on the spherical objects...
> On 28/11/14 20:44, Shaun O'Connor wrote:
>> On 28/11/2014 20:08,...but don't use it for long narrative and member...
>> 1) don't use an electronic random number generator( much less an
>> on-line one) dice are good.
>> 2) ensure that, to the best of your ability , you are not being
>> observed in the creation of said otp.
>> 3) write on a single sheet resting on a hard surface( you don't want
>> to leave tell-tale indentations lying about.
>> 4) DO NOT use the same cypher key twice!!!( or should tat by
>> number/letter sequence?)
>> for OTP to work effectivel there must be a high degree of trust
>> between the parties involved. if you leave your pad so someone else
>> can find it your fucked.
>>  jd.cypherpunks@xxxxxxxxx wrote:
>>> Looking for 
>>> Perfect Cryptography: The One-Time Pad
>>> http://www.cs.utsa.edu/~wagner/laws/pad.html
>>> <http://www.cs.utsa.edu/%7Ewagner/laws/pad.html>
>>> Simple and Secure.
>>> Have Fun!
>>> --Michael
>> -- 
>> https://www.eff.org/deeplinks/2014/11/when-time-comes-we-need-be-ready-fight-tpps-secret-anti-user-agenda


Other related posts: