This issue's highlights are from cypherpunks, dcsb, privacy, tbtf.
Last week the report came back that the countries who had signed the
Wassenaar Agreement had agreed to limitations on cryptography. The
reports on details and just what it will mean continue to come in, and
I expect what's available will be superseded by the time you see this.
Public statements on the meeting are at
Bob Hettinga points to Sun's handling of crypto in Java as an excellent
strategy. They only ship strong cryptography within the US. Users outside
of the US are expected to find or produce their own version. They define
the Java Cryptographic Extensions API, which they adhere to, and they
ship building blocks such as big numbers, a key
management framework, and digital signatures everywhere.
[Wassenaar information is still unfolding: Sites giving the text of the
Arrangement and related documents and links are indicated below under
"New Interesting Links on the Web". There was also a global strike
called to protest Wassenaar planned for Monday Dec. 14. Information
about the strike and related commentary is at
Any account's NorthWest airlines frequent flier miles can be used by anyone
else with the phone number of account holder, and catching and punishing
misuse the is the responsibility of the account holder. At least according
to a poster to the Privacy list. I find this amazing, and if I had an
account there, I'd certainly check this claim out.
Markus Kuhn, a Ph.D. student under Ross Anderson, is doing work on
joint administration of distributed archives like Eternity. The goal is
to allow for control of content (for, example, spam management) while
not exposing the managers to punishment by the legal system of national
powers. He states "The distributed administration in my system will be
controlled via a sort of cryptographically enforced digital
constitution (written in a tiny special purpose functional programming
language) that determines administrative rights in a freely
configurable way for a distributed server architecture (allowing
elections, votes, vetoes, impeachment, updates to the constitution,
etc.). This way, no single person will be responsible for the
maintenance of such international software repositories, but a (usually
international) group of democratically controlled volunteers does
this." Posters to cypherpunks suggest the use of e$ instead, either by
the content providers or by the recipients (readers). While money gives
influence to those who have, it also provides a representation of scale
of passion. There was also some concern that the content provider would
really be the one in danger of litigation.
The ZapMe! Corp. provides equipment and Web access to schools in
return for the ability to monitor student browsing habits by
age, sex and zip code, allowing its advertisers to microtarget students
Digicash has filed for bankruptcy protection
A frame security hole
From the Vancouver Sun: "The [Canadian] federal government believes tonnes of
highly-sensitive material, including tax records, unemployment insurance
claims and parole records were sold intact by a Lower Mainland company that
was supposed to shred and recycle the material, The Vancouver Sun has
learned. Federal agencies found more than 110 tonnes of unshredded files in a
Burnaby warehouse last July that were being offered for sale by
So many cypherpunks were using the list as an email address when
registering, someone kindly set up a separate list for that very use.
Someone noticed that Network Associates is still a member of the
Key Recovery Alliance, and there was a flurry of concern about what
that might mean for PGP. As is so often the case, TBTF has the story:
----------------------------------------------------------------------
..Network Associates and the Key Recovery Alliance: nothing new
This widely circulated story is without substance
Wired News originated a story [1] claiming that NAI had quietly
rejoined the KRA, after publicly disavowing it [2] following its
acquisition of PGP last December [3]. Here are the facts: NAI ac-
quired Trusted Information Systems in May 1998. TIS had been a
leader in the Alliance, and its technology was considered to be
among the best solutions in this space. NAI resigned the leader-
ship posts that TIS had held in the Alliance and continued to mon-
itor its work, but stopped attending its meetings. The NAI name
still appears on the KRA Web site [4], as it has since May. There
is no news here. Perhaps Wired was tipped by a disgruntled KRA
member after Network Associates sent a representative to a recent
meeting to suggest that they disband, because Open Source develop-
ment provides greater security and assurance than any approach
based on key recovery. The following statement was sent to me by
Jon Callas, CTO of Total Network Security (formerly PGP Inc.) at
Network Associates.
U.S. GOVERNMENT COMPUTER If not authorized to access this system,
disconnect now. YOU SHOULD HAVE NO EXPECTATION OF PRIVACY By continuing,
you consent to your keystrokes and data content being monitored.
3Com issued a Security Advisory for some of its switches, suggesting
customers change a series of preset passwords, such as, in the
CoreBuilder 7000, username: tech password: tech. Takes me back to the
days in VMS of username: System password: Manager. In addition, the
admin password was also available through a proprietary MIB variable.
Some openings in the area of privacy software: Lorrie Faith Cranor
(lorrie@research.att.com) has an opening for a Java programming contractor
to implement a P3P
John Cutler (jcutler@via.net) is starting a Palo Alto cryptography
study group.
Someone posted Bill Gates' SSN from the Microsoft filing information
at the SEC.
Back in October, the FCC proposed that law enforcement agencies armed
with court-authorized surveillance orders should be able to determine
the location of a mobile telephone caller.
Netscape 4.06's "What's Related" feature will, by default, track
the user's clickpath after its invoked, to provide more data for
the feature
Scotland Yard and a local council are trying out a closed circuit
TV system in London's East End that will raise an alarm when it
spots a face from a database (in this case, of known criminals).
It matches on the position of facial features.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Here is the official statement:
"NAI officially withdrew from the Key Recovery Alliance in late
1997. In May of 1998, NAI acquired Trusted Information Systems,
which had been an active member of the KRA. NAI subsequently
reliquished the leadership role TIS had taken in the
organization. NAI Labs' TIS Advanced Research Division
continues to monitor the KRA's activities from a technical
perspective, but Network Associates in no way advocates
mandatory key recovery."
Jon
-----BEGIN PGP SIGNATURE-----
Version: PGP 6.0
iQA/AwUBNlC9e335wubxKSepEQJI6wCfSExUUVyfhEO3Nd0xOgu+7gF4SYQAnRBN
35N5BTvab2T8v+PEzhlbzv++
=l7xe
-----END PGP SIGNATURE-----
[1] http://www.wired.com/news/print_version/technology/story/16219.html
[2] http://www.wired.com/news/news/technology/story/9010.html
[3] http://tbtf.com/archive/12-08-97.html#s01
[4] http://www.kra.org/roster/roster3.html#netassoc
________________
Someone came across the following warning while visiting the Goddard
Space Flight Center's website at