[iwar] [fc:Cypherpunks.aim.to.torpedo.RIP.key.seizure.plan]

From: Fred Cohen (fc@all.net)
Date: 2002-05-31 15:44:44


Return-Path: <sentto-279987-4738-1022884931-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Fri, 31 May 2002 15:47:08 -0700 (PDT)
Received: (qmail 15823 invoked by uid 510); 31 May 2002 22:41:49 -0000
Received: from n16.grp.scd.yahoo.com (66.218.66.71) by all.net with SMTP; 31 May 2002 22:41:49 -0000
X-eGroups-Return: sentto-279987-4738-1022884931-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.66.98] by n16.grp.scd.yahoo.com with NNFMP; 31 May 2002 22:42:11 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_3_2); 31 May 2002 22:42:10 -0000
Received: (qmail 74125 invoked from network); 31 May 2002 22:42:10 -0000
Received: from unknown (66.218.66.216) by m15.grp.scd.yahoo.com with QMQP; 31 May 2002 22:42:10 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.scd.yahoo.com with SMTP; 31 May 2002 22:42:10 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g4VMiiZ25273 for iwar@onelist.com; Fri, 31 May 2002 15:44:44 -0700
Message-Id: <200205312244.g4VMiiZ25273@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Fri, 31 May 2002 15:44:44 -0700 (PDT)
Subject: [iwar] [fc:Cypherpunks.aim.to.torpedo.RIP.key.seizure.plan]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, hits=-0.4 required=5.0 tests=SUPERLONG_LINE,DIFFERENT_REPLY_TO version=2.20
X-Spam-Level: 

Cypherpunks aim to torpedo RIP key seizure plan 
By John Leyden, The Register, 5/29/02
<a href="http://www.theregister.co.uk/content/6/25499.html">http://www.theregister.co.uk/content/6/25499.html> 

Privacy activists plan to undermine forthcoming UK Government
regulations on the surrender of encryption keys through the release of
an open-source cryptography project, called m-o-o-t. 
The Home Office hopes to publish a much delayed draft Code of Practice
for part three of the Regulation of Investigatory Powers (RIP) Act,
which deals with procedures for law enforcer to gain access to
encryption keys or plain-text versions of scrambled messages, next
month. 
This was always the most controversial part of the Act, which the
backers of m-o-o-t hope to defeat along with other similar government
schemes throughout the world. 
They state that their aim is "to defeat RIP Act Part 3 and make it look
silly, and to allow UK citizens to communicate and to store information
without worrying about it." 
"We are doing this so people can be private elsewhere than in our heads.
We object to the idea that people should not be allowed to seek privacy
from governments," the group's mission statement says. 
M-o-o-t seeks to defeat forthcoming RIP Act powers by storing encryption
keys and data overseas, outside government jurisdiction and protected by
steganographic techniques. 
The group plans to ship M-o-o-t on CD. It is an alternative operating
system that doesn't use local storage. That way, the group says, if your
computer is seized by police, there will be nothing for them to find. 
In an interview with New Scientist Peter Fairbrother, a mathematician
and computer enthusiast working on the project, explained that
"communication will only be possible with other M-o-o-t users using keys
that expire after a single use. 'Master' encryption keys will be kept on
the remote servers in a format that makes it impossible to distinguish
them from random data without the correct password." 
The Home Office have said that the project would provide criminals and
terrorists with a means to avoid detection, but Fairbrother said there
are already such tools and told that New Scientist "The benefits far
outweigh the problems." 
The group has posted its work-to-date online for peer review and
discussion.

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Grab your copy of VeriSign's FREE Guide, "Securing Your Web
site for Business," and you'll learn everything you need to know about using 128-bit SSL to encrypt your e-commerce transactions, secure your corporate intranets and authenticate your Web sites. 128-bit SSL is serious security for your online business. Get it now!
http://us.click.yahoo.com/A62TUC/LyKEAA/sXBHAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:32 PDT