1997-10-06 - FOCUS [was Re: New PGP “Everything the FBI ever dreamed of”]

Header Data

From: “Attila T. Hun” <attila@hun.org>
To: Tim May <cypherpunks@cyberpass.net>
Message Hash: ac12dcf2831b17d4411a474eafeb52600e7908a13be91797cbbae99db3e92499
Message ID: <971005.203718@hun.org>
Reply To: <v03102800b05d58dd0280@[207.167.93.63]>
UTC Datetime: 1997-10-06 03:11:10 UTC
Raw Date: Mon, 6 Oct 1997 11:11:10 +0800

Raw message

From: "Attila T. Hun" <attila@hun.org>
Date: Mon, 6 Oct 1997 11:11:10 +0800
To: Tim May <cypherpunks@cyberpass.net>
Subject: FOCUS [was Re: New PGP "Everything the FBI ever dreamed of"]
In-Reply-To: <v03102800b05d58dd0280@[207.167.93.63]>
Message-ID: <971005.203718@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

    attila in --with both feet.

    starting with the premise that a corporation has a fundamental 
    legal right to review all work and communications of any employee,
    and "acknowledging" that the employer is virtually required to
    maintain access to documentation to service the regulations of the
    government, the courts, and the LEAs, the issue is simply HOW?

    1.  I personally include my own public key in every encrypted
        message --if I consider the contents important enough to 
        warrant encrypting, not just signing, I consider it important
        enough not to maintain a plaintext copy.

    2.  If I consider the contents more than just important -eg:
        critical, I use one of my unpublished public keys for the
        file copy. this version, including the encryption software
        and key library, are kept on a separate ZIP disk from the
        standard version ZIP disk.

        as a matter of reference, all temporary space is maintained on 
        the ZIP drive.  

    the major insecurity is the swap space which is maintained on a 
    separate partition which is fully purged at boot time --which is not
    often enough.  I have written secure swappers, or maybe I should say
    secure except for the transitory time the information may have been
    swapped out.  this can be made further secure by preventing swap for
    the encryption engine if the system permits it, or even better, use
    semiconductor memory which leaves no magnetic media residuals to be
    analyzed 500 levels down by the Feds.

    From a mechanical standpoint there is no difference when you
    apply the same methods to the corporate environment. Again, the
    issue is HOW it is implemented.

    1.  if a corporate entity uses a single private-public keypair
        for each and every employee, that is their own stupidity as
        this is insecure, both internal and external. Too many hands on
        the private key.

    2.  ideally, each employee should be given a separate corporate
        public key. at the very least the key can represent a department     
        or work group.

    3.  using the scenario in 2, specific projects can use a second
        corporate key which permits group leader management control.

    Therefore:

    Is this GAK?                    unfortunately, yes. 

    By tolerating the use of        unfortunately, yes.
    corporate GAK are we setting 
    ourselves up to accept 
    personal GAK?  

    why?                            individuals will be desensitized 
                                    to defending the absolute
                                    importance of maintaining our                     
                                    Constitutional rights, what few
                                    the Supreme Court has not yet                                
                                    denigrated.

    can we avoid this result?       YES! 

    GAK for businesses is a slam dunk, eg: if business has it, LEA,     
    etc. can get it. desensitization can be minimized by pressuring
    professional associations to keep the issue of _personal_ privacy
    on the hot burner; this is the only issue. 

    our mission must be to keep the fire out front so Americans will 
    not stand for the total loss of privacy, etc. that F[reeh,uck] is
    hawking to our government; F[reeh,uck] sings the siren song of
    anti-terrorism, anti-anarchy, and all that good stuff government
    wants to suppress in violation of the Constitution.

    if the general public is fully aware of the implication, there 
    is a chance to lead the rabble with the the chant:

        hell no, we wont dump our crypto!

    Now that the NYTimes has seen the light and is joining the battle
    against the forces of encryption denial, the mainstream press may 
    make some effort in the cause, but we must keep the pressure on
    high.

    CDT, EPIC, and the rest of them are funded by business, big
    business, all of whom have a vested interest in selling product. 
    they are the employers of the inside-the-beltway whores ...pardon 
    me: lobbycritters; and they will compromise our individual rights in 
    the corporate interests of the almighty dollar; in fact, corporate 
    managers and beancounters will violate the privacy of their
    employees faster than the US spooks, both on and off the job --they 
    have little if any concept of personal Constitutional privacy rights
    
        corporate officers are clueless on personal privacy.

    we face a two edged sword. 

    if we encourage the expanded use of encryption in business, it will
    spread much more readily to the private sector --knowing full well
    the corporate users will be subjected to GAK.  

    If business units are smart, they will implement the multi-target
    encryption and fight like hell against what F[reeh,uck] really
    wants: on-the-fly, real-time trapdoor cleartext --just like clipper. 
    If F[reeh,uck] gets what he wants, why should he ask a court for
    approval to decrypt when he can already glean the information in
    the same way POTS taps are real time.

    if we rant and rave against the multi-public key encryption system, 
    we risk facing the far more Draconian demands of F[reeh,uck].  The
    multi-public key system has been in use since the first time the
    ability to use multi-keys for multi-recipients was included.

    there is nothing we can do in the courts to prevent corporations
    processing encrypted mail through servers for verification, or even
    content scanning.  business has this right --unfortunately, the
    government can compel the business to exercise this "right" and 
    therefore government potentially does have real-time access.

    THE FOCUS:

    All efforts need to be directed to prevent the inclusion of
    master keys in hardware and/or software and the mandating of
    universal usage of the government system.  there is little
    difference in what F[reeh,uck] is proposing and Clipper --and 
    the same arguments can challenge F[reeh,uck] and friends.

    Let's not waste time hashing and rehashing business practices we 
    have long since been forced to accept; and stay away from politics:

        FOCUS on our Constitutional rights.

    death is inevitable --an action we all face; some things are worth
    dying early defending  --my personal privacy rights and the sanctity 
    of my intellectual processes or whatever I wish to cogitate or 
    regurgitate is one of them. For the masses:

        '54-40 OR FIGHT' 

    or any number of us will die martyrs;

    STAND UP AND BE COUNTED; 

    dont be government wimps, snitches, and shills like Hallam-Baker.

        attila on the way out

 ______________________________________________________________________
 "attila" 1024/C20B6905/23 D0 FA 7F 6A 8F 60 66 BC AF AE 56 98 C0 D7 B0 


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQCVAwUBNDhTsb04kQrCC2kFAQGD0wP+JJ6GvszXDmBJcyTaGy9nbXSQb5y0kKUW
NgZZHQDJlsVGdU4zPWl3HX7QClpjCBWEucWHiZa9BlyyMA55ngAYJiLv6+EzGZCi
AuFYjJBbHin8krgauM/iy4Pj1aXZcIMorWEUYJsfRoHEWCtwPikrwCNCBqzj/N+6
3CpuA31WeeQ=
=Cg9I
-----END PGP SIGNATURE-----






Thread