[146325] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

[Cryptography] dead man switch [was: Re: Snowden "fabricated

daemon@ATHENA.MIT.EDU (StealthMonger)
Sun Jul 7 12:44:07 2013

X-Original-To: cryptography@metzdowd.com
From: StealthMonger <StealthMonger@nym.mixmin.net>
To: cryptography@metzdowd.com
In-Reply-To: <CAFH29tpVD-2Z2wuUKw+v1MtAui3x4NHEJMT1s72n+FFq5KpxHw@mail.gmail.com>
	(Richard Salz's message of "Thu, 4 Jul 2013 15:44:17 -0400")
Date: Fri,  5 Jul 2013 17:07:26 +0100 (BST)
Cc: Richard Salz <rich.salz@gmail.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

--===============2248479681407668133==
Content-Type: multipart/signed; boundary="=-=-=";
	micalg=pgp-sha1; protocol="application/pgp-signature"

--=-=-=
Content-Transfer-Encoding: quoted-printable

Richard Salz <rich.salz@gmail.com> writes:

>> How could it be arranged that "if anything happens at all to Edward
>> Snowden, he told me he has arranged for them to get access to the full
>> archives"?

> A lawyer or other (paid) confidant was given instructions that would
> disclose the key.  "Do this if something happens to me."

An adversary can verify an open source robot, but not such instructions.

NSA cannot verify a claim that such instructions have been given (unless
they know the lawyer's identity, but in that case they can "interfere").
(On the other hand, NSA cannot afford to assume that such a claim is a
bluff, and that's the strength of this idea.)

The intended interpretation of the "open source" clause in the original
problem statement is that anyone could inspect the workings of the robot
and verify that it does indeed "harbor a secret" and that if the signed
messages stop coming it will indeed release that secret.

(For example, in one implementation -- NOT CRYPTOGRAPHICALLY STRONG -- a
secret file's access permissions can only be granted by the robot.)


=2D-=20


 -- StealthMonger <StealthMonger@nym.mixmin.net>
    Long, random latency is part of the price of Internet anonymity.

   anonget: Is this anonymous browsing, or what?
   http://groups.google.ws/group/alt.privacy.anon-server/msg/073f34abb668df=
33?dmode=3Dsource&output=3Dgplain

   stealthmail: Hide whether you're doing email, or when, or with whom.
   mailto:stealthsuite@nym.mixmin.net?subject=3Dsend%20index.html


Key: mailto:stealthsuite@nym.mixmin.net?subject=3Dsend%20stealthmonger-key


--=-=-=
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAlHWr2cACgkQDkU5rhlDCl4sbwCeNfzIzAStEpyLgEhpMJj9nrR/
dCIAnjajf4mX8iWOyJfKvhAkyKytEL04
=llp4
-----END PGP SIGNATURE-----
--=-=-=--


--===============2248479681407668133==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============2248479681407668133==--


home help back first fref pref prev next nref lref last post