[146317] in cryptography@c2.net mail archive
Re: [Cryptography] Snowden "fabricated digital keys" to get access
daemon@ATHENA.MIT.EDU (StealthMonger)
Thu Jul 4 14:33:13 2013
X-Original-To: cryptography@metzdowd.com
From: StealthMonger <StealthMonger@nym.mixmin.net>
To: cryptography@metzdowd.com
In-Reply-To: <201306282300.r5SN06HA028879@new.toad.com> (John Gilmore's
message of "Fri, 28 Jun 2013 16:00:06 -0700")
Date: Sun, 30 Jun 2013 11:12:16 +0100 (BST)
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
--===============2621746416882170066==
Content-Type: multipart/signed; boundary="=-=-=";
micalg=pgp-sha1; protocol="application/pgp-signature"
--=-=-=
Content-Transfer-Encoding: quoted-printable
John Gilmore <gnu@toad.com> writes:
> [John here. Let's try some speculation about what this phrase,
> "fabricating digital keys", might mean.]
> John
John's question is not the only one raised by this episode. Eli Lake:
> Glenn Greenwald, the Guardian journalist who Snowden first contacted
> in February, told The Daily Beast on Tuesday that Snowden "has taken
> extreme precautions to make sure many different people around the
> world have these archives to insure the stories will inevitably be
> published." Greenwald added that the people in possession of these
> files "cannot access them yet because they are highly encrypted and
> they do not have the passwords." But, Greenwald said, "if anything
> happens at all to Edward Snowden, he told me he has arranged for them
> to get access to the full archives."
How could it be arranged that "if anything happens at all to Edward
Snowden, he told me he has arranged for them to get access to the full
archives"?
Some months ago on another mailing list the question was raised whether
there could be a cryptographically strong "dead man switch" wherein as
long as the owner of a certain secret key is alive, his frequent signed
messages to an open-source robot somewhere would prevent that robot from
revealing the information it harbors, but if the messages stop coming
the robot would release the information (presumably further encrypted to
selected recipients). [1]
James A. Donald pointed out that it couldn't be done because one could
simply disconnect the robot from the Internet.
The effect could still be achieved though, by putting the robot in a
place that cannot be disconnected from the Internet, such as a widely
used public web server. But this is not cryptographically strong.
So the question is how did Snowden get the effect of a "dead man switch"
in the present case.
[1] http://lists.randombit.net/pipermail/cryptography/2012-September/thread=
.html
=2D-=20
-- StealthMonger <StealthMonger@nym.mixmin.net>
Long, random latency is part of the price of Internet anonymity.
anonget: Is this anonymous browsing, or what?
http://groups.google.ws/group/alt.privacy.anon-server/msg/073f34abb668df=
33?dmode=3Dsource&output=3Dgplain
stealthmail: Hide whether you're doing email, or when, or with whom.
mailto:stealthsuite@nym.mixmin.net?subject=3Dsend%20index.html
Key: mailto:stealthsuite@nym.mixmin.net?subject=3Dsend%20stealthmonger-key
--=-=-=
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAlHP0doACgkQDkU5rhlDCl4kFgCdEDNo5MasPyrhlKVR93X5KHGd
AuUAn1cSljEDiZr+uQTwfs8I5Bouz+vO
=gBwH
-----END PGP SIGNATURE-----
--=-=-=--
--===============2621746416882170066==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============2621746416882170066==--