Return-Path: <sentto-279987-4738-1022884931-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Fri, 31 May 2002 15:47:08 -0700 (PDT) Received: (qmail 15823 invoked by uid 510); 31 May 2002 22:41:49 -0000 Received: from n16.grp.scd.yahoo.com (66.218.66.71) by all.net with SMTP; 31 May 2002 22:41:49 -0000 X-eGroups-Return: sentto-279987-4738-1022884931-fc=all.net@returns.groups.yahoo.com Received: from [66.218.66.98] by n16.grp.scd.yahoo.com with NNFMP; 31 May 2002 22:42:11 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_3_2); 31 May 2002 22:42:10 -0000 Received: (qmail 74125 invoked from network); 31 May 2002 22:42:10 -0000 Received: from unknown (66.218.66.216) by m15.grp.scd.yahoo.com with QMQP; 31 May 2002 22:42:10 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.scd.yahoo.com with SMTP; 31 May 2002 22:42:10 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g4VMiiZ25273 for iwar@onelist.com; Fri, 31 May 2002 15:44:44 -0700 Message-Id: <200205312244.g4VMiiZ25273@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Fri, 31 May 2002 15:44:44 -0700 (PDT) Subject: [iwar] [fc:Cypherpunks.aim.to.torpedo.RIP.key.seizure.plan] Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, hits=-0.4 required=5.0 tests=SUPERLONG_LINE,DIFFERENT_REPLY_TO version=2.20 X-Spam-Level: Cypherpunks aim to torpedo RIP key seizure plan By John Leyden, The Register, 5/29/02 <a href="http://www.theregister.co.uk/content/6/25499.html">http://www.theregister.co.uk/content/6/25499.html> Privacy activists plan to undermine forthcoming UK Government regulations on the surrender of encryption keys through the release of an open-source cryptography project, called m-o-o-t. The Home Office hopes to publish a much delayed draft Code of Practice for part three of the Regulation of Investigatory Powers (RIP) Act, which deals with procedures for law enforcer to gain access to encryption keys or plain-text versions of scrambled messages, next month. This was always the most controversial part of the Act, which the backers of m-o-o-t hope to defeat along with other similar government schemes throughout the world. They state that their aim is "to defeat RIP Act Part 3 and make it look silly, and to allow UK citizens to communicate and to store information without worrying about it." "We are doing this so people can be private elsewhere than in our heads. We object to the idea that people should not be allowed to seek privacy from governments," the group's mission statement says. M-o-o-t seeks to defeat forthcoming RIP Act powers by storing encryption keys and data overseas, outside government jurisdiction and protected by steganographic techniques. The group plans to ship M-o-o-t on CD. It is an alternative operating system that doesn't use local storage. That way, the group says, if your computer is seized by police, there will be nothing for them to find. In an interview with New Scientist Peter Fairbrother, a mathematician and computer enthusiast working on the project, explained that "communication will only be possible with other M-o-o-t users using keys that expire after a single use. 'Master' encryption keys will be kept on the remote servers in a format that makes it impossible to distinguish them from random data without the correct password." The Home Office have said that the project would provide criminals and terrorists with a means to avoid detection, but Fairbrother said there are already such tools and told that New Scientist "The benefits far outweigh the problems." The group has posted its work-to-date online for peer review and discussion. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Grab your copy of VeriSign's FREE Guide, "Securing Your Web site for Business," and you'll learn everything you need to know about using 128-bit SSL to encrypt your e-commerce transactions, secure your corporate intranets and authenticate your Web sites. 128-bit SSL is serious security for your online business. Get it now! http://us.click.yahoo.com/A62TUC/LyKEAA/sXBHAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:32 PDT