[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: ABA Conference on Law Enfrocement and Intelligence - Debrief
Black Unicorn <[email protected]> writes:
> The American Bar Association Standing Committee on Law and
> National Security - Law Enforcement and Intelligence Conference -
> Debrief
>
> [...]
>
> Michael A. Vatis
> Associate Deputy Attorney General
> Office of the Deputy Attorney General
> U.S. Department of Justice
>
> Vatis is a young shining star in Justice, a Gorelick protege and
> likely to be the most dangerous individual to cypherpunks in the
> coming years if he stays with justice. Vatis understands remailers,
> encryption, PGP, even mentioned "mixmaster" and so forth
> specificlly. He is sly, knows just when to shut up and is probably
> the front man on the DoJ attempt to attack remailers and anonymous
> communications in general. He is a real problem for cypherpunks and
> the party is clearly over.
If the DoJ and company are going to be trying to break remailers, I
think it's time someone brushed up the mixmaster alpha code with
forward secrecy to release quality.
Let them at least fight the "real thing".
The current version of mixmaster, which all the mixmasters are using
is 2.0.3. Lance Cottrell has an alpha version which has direct IP
transport, and DH forward secrecy. This alpha version I understand
needs debugging, and fixing up. If you are in the US, you may find it
starting from:
http://www.obscura.com/crypto.html
My suggestion would be for someone who has access to the alpha version
with forward secrecy, to spend some time getting it to release
quality, and put in the credits thanks to Michael Vatis for
"motivation" :-)
[If anyone knows of a place where the alpha version of the aforementioned
software has found it's way overseas, please forward the URL]
(Needless to say forward secrecy is a big advantage, you can't record
all IP packets out of the remailers, and then use threats (rubber hose
cryptanalsis/threat of expensive litigation) to extract the remailer
keys to decrypt after the fact, and trace messages down the chain.)
Adam
--
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`