---------- Treść przekazywanej wiadomości ----------
Temat: [liberationtech] Nsa-observer: organising nsa leaks by attack vector
Data: wtorek, 24 czerwca 2014, 06:15:36
Od: Todd Weiler
A brilliant site was quietly launched a while back:
https://www.nsa-observer.net/
It classifies the recent NSA revelations by Programs, Attack Vectors,
and Compartments, even providing the database in JSON format. The
dataset could feed some interesting research.
Cordially,
Todd
--
Liberationtech is public & archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe,
change to digest, or change password by emailing moderator at
companys(a)stanford.edu.
-----------------------------------------
--
Pozdr
rysiek
Taka praca. Działający link:
http://www.emsec.rub.de/media/crypto/veroeffentlichungen/2014/02/20/BeckerC…
---------- Treść przekazywanej wiadomości ----------
Temat: Stealthy Dopant-Level Hardware Trojans
Data: piątek, 13 września 2013, 11:49:24
Od: Eugen Leitl
Do: cypherpunks(a)al-qaeda.net
http://people.umass.edu/gbecker/BeckerChes13.pdf
Stealthy Dopant-Level Hardware Trojans ?
Georg T. Becker1
, Francesco Regazzoni2
, Christof Paar1,3 , and Wayne P. Burleson1
1University of Massachusetts Amherst, USA
2TU Delft, The Netherlands and ALaRI - University of Lugano, Switzerland
3Horst ortz Institut for IT-Security, Ruhr-Universiat Bochum, Germany
Abstract.
In recent years, hardware Trojans have drawn the attention of governments and
industry as well as the scientific community. One of the main concerns is
that integrated circuits, e.g., for military or critical infrastructure
applications, could be maliciously manipulated during the manufacturing
process, which often takes place abroad. However, since there have been no
reported hardware Trojans in practice yet, little is known about how such a
Trojan would look like, and how dicult it would be in practice to implement
one.
In this paper we propose an extremely stealthy approach for implementing
hardware Trojans below the gate level, and we evaluate their impact on the
security of the target device. Instead of adding additional circuitry to the
target design, we insert our hardware Trojans by changing the dopant polarity
of existing transistors. Since the modified circuit appears legitimate on all
wiring layers (including all metal and polysilicon), our family of Trojans is
resistant to most detection techniques, including fine-grain optical
inspection and checking against "golden chips". We demonstrate the
ectiveness of our approach by inserting Trojans into two designs | a digital
post-processing derived from Intel's cryptographically secure RNG design used
in the Ivy Bridge processors and a side-channel resistant SBox implementation
and by exploring their detectability and their ects on security.
Keywords: Hardware Trojans, malicious hardware, layout modifications, Trojan
side-channel
-----------------------------------------
--
Pozdr
rysiek
Co na to bitcoinowcy?
---------- Forwarded message ----------
From: Sampo Syreeni
Date: Tue, Jun 17, 2014 at 8:59 PM
Subject: [Cryptography] bitcoins over the air
In case people are interested in a project of a friend of mine, Joel
Lehtonen (aka Zouppen) is on a fast track to implementing Bitcoin
transaction and blockchain broadcast over the airwaves. Everything is
half done, so he might need some help; at the same time that half-done
then also includes half the funding, half the code, and half the
negotiation with the Finnish monopoly DVB-T provider, Digita, to
actually broadcast the stuff to a couple of million strong. Even if
it's just a test, it's already well on its way to happening in a month
or so; so it will.
If people are willing to chip in, especially with funding, deeper code
knowhow, radio-fu, and the rest of the useful ones, do contact him, or
me (aka decoy), on FB/G+/IRCNet/freenode, or better yet join
#bitcoinradio on the latter.
In particular we don't have any idea of how to push transactions back
towards the network over any sort of cheap-to-free, preferably
universal radio path. If you do, even in a quilted fashion, we'd
really like to know. And since the only ones who're really allowed to
experiment on them waves today are hams, those of you who possess that
qualification, your input is in the direst of needs.
Finally, I hope this isn't too much off topic; it *is* about spreading
a cryptocurrency and finding its optimal OTA protocols, after all. Not
perhaps the most usual stuff on-list nowadays...but certainly the kind
of across-the-board architectural stuff the list started out with, in
the crypto days of yonder. I hope it fits.
--
Sampo Syreeni, aka decoy - decoy(a)iki.fi, http://decoy.iki.fi/front
+358-40-3255353, 025E D175 ABE5 027C 9494 EEB0 E090 8BA9 0509 85C2
_______________________________________________
The cryptography mailing list
cryptography(a)metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
-----------------------------------------
--
Pozdr
rysiek
Taka sytuacja.
---------- Treść przekazywanej wiadomości ----------
Temat: Geeklist #hack4good 0.6 is coming! Ambassador sign up open!
Data: poniedziałek, 9 czerwca 2014, 10:01:46
Od: Dan Cunningham
Hello Geeklist Ambassadors!
I’m very excited to announce that the next Geeklist #hack4good will take
place worldwide this 12-14 September.
Based on a lot of your feedback, this time - for the first time - we have a
strong theme.
We are uniting worldwide to address one of the greatest challenges facing
humanity today, an issue that affects every single country, one that
underpins many of our other challenges globally, and critically - one that
we must unite together to solve on a global scale.
#hack4good 0.6 is a hack against climate change
Humans are the primary cause of climate change, and right now we are
continuing to increase our fossil fuel emissions (in fact at an increasing
rate). We continue to cut down forests. We continue to build coal power
plants. And we continue to consume more and more resources.
This is leading us directly towards increasingly unthinkable and
unmanageable scenarios - disastrous impacts on human health, livelihoods,
agriculture, ecosystems, population displacement and loss of human and
animal life.
Another future is possible.
We believe technology holds the key to rapid reversal in these trends: to
educating people, to creating political will, to maximising the impact of
existing movements, to stimulating the transition to a low-carbon economy,
to getting organised and to really solving this problem!
Technology also has a huge role to play in adapting to the effects that we
are already seeing worldwide - the heat waves, droughts, wildfires,
flooding, increased extreme weather events which I know many of us have
already been affected by. It’s in our hands to build solutions that create
stronger communities and to help deal with these emergencies as well.
The time to act is now.
September 2014 is a critical time for the climate, with world leaders
gathering in New York at Ban Ki-Moon’s UN Climate Summit. This must set the
world on a path to a strong international agreement and commitment to
decisively move to a low-carbon future.
From over 500 teams that will take part in #hackgood 0.6, we’ll be
showcasing those teams and projects that have the greatest potential for
impact - in New York - putting technology firmly at the forefront of a
united human response to what may be the greatest single challenge of the
21st century.
I hope you and your city can be part of it.
If you haven’t already, sign up by next Friday, 20th June, to organise a
#hack4good against climate change in your city at http://hack4good.io
Thanks!
- Dan
*P.S. Please forward this email on to anyone else you think would be
interested to get involved with organising the event around the world!*
*P.P.S. Email or Skype me if you have any questions (my Skype name is
djcunning)*
--
*Dan Cunningham*
*Head of Geeklist Corps of Developers*
| +44 (0)7964 404 897
| skype: djcunning
| dan(a)geekli.st
| https://geekli.st/dancunningham
-----------------------------------------
--
Pozdr
rysiek
Hej,
Full story below, tl;dr jest następujący:
trwa dochodzenie w sprawie jakichś przekrętów w IRS w Stanach. Na żądanie
Kongresu dotyczące udostępnienia maili z pewnego okresu, po roku ociągania
się, IRS odpowiedziało, że nieszczęśliwie akurat te maile szlag trafił przy
jakimś padzie systemu, taki pech.
Well, kongresmen będący członkiem komisji, która prowadzi to dochodzenie
poprosił właśnie... NSA o pomoc w odzyskaniu przynajmniej metadanych tych
"zaginionych" e-maili. Będzie śmiesznie!
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://news.yahoo.com/lawmakers-fume-over-lost-emails-irs-probe-080830845--…
WASHINGTON (AP) — Congressional investigators are fuming over revelations that
the Internal Revenue Service has lost a trove of emails to and from a central
figure in the agency's tea party controversy.
The IRS said Lois Lerner's computer crashed in 2011, wiping out an untold
number of emails that were being sought by congressional investigators. The
investigators want to see all of Lerner's emails from 2009 to 2013 as part of
their probe into the way agents handled applications for tax-exempt status by
tea party and other conservative groups.
Lerner headed the IRS division that processes applications for tax-exempt
status. The IRS acknowledged last year that agents had improperly scrutinized
applications by some conservative groups.
"Do they really expect the American people to believe that, after having
withheld these emails for a year, they're just now realizing the most critical
time period is missing?" said Rep. Darrell Issa, R-Calif., chairman of the
House Oversight Committee. "If there wasn't nefarious conduct that went much
higher than Lois Lerner in the IRS targeting scandal, why are they playing
these games?"
The Oversight Committee is one of three congressional committees investigating
the IRS over its handling of tea party applications from 2010 to 2012. The
Justice Department and the IRS inspector general are also investigating.
Congressional investigators have shown that IRS officials in Washington were
closely involved in the handling of tea party applications, many of which
languished for more than a year without action. But so far, they have not
publicly produced evidence that anyone outside the agency directed the
targeting or even knew about it.
If anyone in the Obama administration outside the agency was involved,
investigators were hoping for clues in Lerner's emails.
"The fact that I am just learning about this, over a year into the
investigation, is completely unacceptable and now calls into question the
credibility of the IRS' response to congressional inquiries," said Rep. Dave
Camp, R-Mich., chairman of the House Ways and Means Committee. "There needs to
be an immediate investigation and forensic audit by Department of Justice as
well as the inspector general."
The IRS said technicians went to great lengths trying to recover data from
Lerner's computer in 2011. In emails provided by the IRS, technicians said
they sent the computer to a forensic lab run by the agency's criminal
investigations unit. But to no avail.
The IRS was able to generate 24,000 Lerner emails from the 2009 to 2011
because Lerner had copied in other IRS employees. The agency said it pieced
together the emails from the computers of 82 other IRS employees.
But an untold number are gone. Camp's office said the missing emails are
mainly ones to and from people outside the IRS, "such as the White House,
Treasury, Department of Justice, FEC, or Democrat offices."
Anti-tax advocate Grover Norquist called the episode "the worst attempt to
blame technology in service of a cover-up since the infamous 18-minute gap" in
former President Richard Nixon's Watergate tapes.
The IRS said in a statement that more than 250 IRS employees have been working
to assist congressional investigations, spending nearly $10 million to produce
more than 750,000 documents.
Overall, the IRS said it is producing a total of 67,000 emails to and from
Lerner, covering the period from 2009 to 2013.
"The IRS is committed to working with Congress," the IRS said in a statement.
"The IRS has remained focused on being thorough and responding as quickly as
possible to the wide-ranging requests from Congress while taking steps to
protect underlying taxpayer information."
Sen. Orrin Hatch of Utah, the top Republican on the Senate Finance Committee,
called Friday's disclosure "an outrageous impediment" to the committee's
investigation.
"Even more egregious is the fact we are learning about this a full year after
our initial request to provide the committee with any and all documents
relating to our investigation," Hatch said.
Lerner has emerged as a key figure in the tea party probe. In May 2013, she
was the first IRS official to publicly acknowledge that agents had improperly
scrutinized applications.
About two weeks later, Lerner was subpoenaed to testify at a congressional
hearing. But after making a brief statement in which she said she had done
nothing wrong, Lerner refused to answer questions, invoking her constitutional
right against self-incrimination.
The IRS placed Lerner on administrative leave shortly after the congressional
hearing. She retired last fall.
In May, the House voted to hold Lerner in contempt of Congress. Her case has
been turned over to the U.S. attorney for the District of Columbia.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
GOVERNMENT
The Clever Way GOP Congressman Is Pushing Back After IRS Claims Lois Lerner
Emails Were ‘Erased by a Glitch’
Jun. 13, 2014 5:56pm Jason Howerton
Rep. Steve Stockman (R-Texas) asked the National Security Agency on Friday to
turn over all the metadata it has collected on the email accounts of former
IRS official Lois Lerner from January 2009 to April 2011. Stockman’s clever
move comes hours after the tax agency apparently claimed it had lost Lerner’s
emails from that same time period due to a computer glitch.
“I have asked NSA Director Rogers to send me all metadata his agency has
collected on Lois Lerner’s email accounts for the period which the House
sought records,” Stockmansaid in a press release. “The metadata will establish
who Lerner contacted and when, which helps investigators determine the extent
of illegal activity by the IRS.”
“The claim incriminating communications were erased by a glitch conjures
memories of Rose Mary Woods,” the congressman added. “Barack Obama has
brought us Jimmy Carter’s economy and Richard Nixon’s excuses.”
Congress requested all emails sent from Lerner to and from other IRS employees
from early 2009 to April 2011. After promising to turn them over, the IRS said
Friday it can’t find any of those emails.
Stockman isn’t the only member of Congress who isn’t buying the excuse. Rep.
Darrell Issa (R-Calif.) asked, “If there wasn’t nefarious conduct that went
much higher than Lois Lerner in the IRS targeting scandal, why are they
playing these games?”
TheBlaze has reached out to Frederick R. Chang, a recognized national expert
in cyber security and SMU professor, to see if there are ways the emails
“lost” due to a glitch or crash could be recovered. We will update this story
should he respond.
Read Stockman’s letter to NSA Director Admiral Michael Rodgers below:
June 13, 2014
Admiral Michael S. Rogers
>Director, National Security Agency
>Fort Meade, MD 20755
>Admiral Rogers:
>First, thank you for your 33 years of, and continued service to, our country.
>Second, as you probably read, the Internal Revenue Service informed the House
Ways and Means Committee today they claim to “lost” all emails from former
Exempt Organizations division director Lois Lerner for the period between
January 2009 and April 2011.
>According to chairman Camp, “The IRS claims it cannot produce emails written
only to or from Lerner and outside agencies or groups, such as the White
House, Treasury, Department of Justice, FEC, or Democrat offices” due to a
“computer glitch.”
>I am writing to request the Agency produce all metadata it has collected on
all of Ms. Lerner’s email accounts for the period between January 2009 and
April 2011.
>The data may be transmitted to our Communications Director at
Donny(a)mail.house.gov.
>Your prompt cooperation in this matter will be greatly appreciated and will
help establish how IRS and other personnel violated rights protected by the
First Amendment.
>Warmest wishes,
>STEVE STOCKMAN
>Member of Congress
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://www.zerohedge.com/news/2014-06-14/congressman-asks-nsa-restore-two-y…
Congressman Asks NSA To Restore Two Years Of "Lost" Lois Lerner IRS Emails
Submitted by Tyler Durden on 06/14/2014 21:47 -0400
Yesterday, the republican campaign to get to the bottom of IRS' targeting of
conservative groups was dealt an absolutely idiotic blow when the IRS, in all
seriousness, announced that it had lost two years worth of emails to and from
the chief subject of the investigation: former agency official Lois Lerner.
As House Ways and Means Commitee chairman Dave Camp said, "The fact that I am
just learning about this, over a year into the investigation, is completely
unacceptable and now calls into question the credibility of the IRS’s response
to congressional inquiries,” he said in a statement. "There needs to be an
immediate investigation and forensic audit by Department of Justice as well as
the Inspector General."
According to NRO, the agency informed Camp that a computer crash resulted in
the loss of e-mails between January 2009 and April 2011 sent between Lerner
and outside agencies such as the White House and the Department of Justice.
"Those messages are particularly relevant given revelations earlier this week
that the agency in 2010 transmitted a database to the FBI containing
confidential taxpayer information, potentially in violation of federal law."
The IRS said in a separate statement that it has or will produce 24,000 e-
mails from the period between 2009 and 2011 using the files of 82 individuals
with whom Lerner corresponded, and that it has produced nearly all of the
67,000 e-mails sent and received by Lerner during her time at the agency.
Apparently lack of document (and email) retention is a crime for everyone, but
not for the IRS. And furthermore, only when it comes to the IRS, can a single
computer crash destroy the entire email path history, even as it crosses
through countless servers across the world, and ultimately lands in somebody
else's inbox.
It goes without saying that for the IRS to even assume someone would believe
this particular, and quite spectacular, lie is beyond insulting to even the
most gullible idiot among the US population.
So we won't say it.
What, however, was simply a bizarre, if idiotic, lie has just been taken to a
whole new level of ridiculousness, when moments ago, representative Steve
Stockman (R-Texas) announced he would request that the National Security
Agency help in the hunt for missing emails to and from the IRS’s Lois Lerner,
and recover two years worth of "lost" emails. From the Hill:
In a letter to NSA Director Michael Rogers on Friday, Stockman requested that
the NSA turn over information it has about emails between Lerner and outside
groups between January 2009 and April 2011.
>
>Stockman’s request for the NSA’s “metadata” on the emails comes as
congressional Republicans probe whether the IRS mishandled applications for
tax-exempt status from Tea Party and conservative groups.
>
>In a statement, Stockman said the NSA’s information “will establish who
Lerner contacted and when, which helps investigators determine the extent of
illegal activity by the IRS.”
>
>“Your prompt cooperation in this matter will be greatly appreciated and will
help establish how IRS and other personnel violated rights protected by the
First Amendment,” Rogers wrote.
Turns out all those jokes about people calling the NSA and asking for backups
of lost emails and of course files (because remember, courtesy of complicit
megacorporations, the NSA has full backdoor access to everything anyone does)
- they weren't jokes at all.
And now the NSA is caught between a rock and a hard place: because if it
refuses an officialcongressional demand, it shows once again that the spy
agency is entirely separated from any concept of checks and balances and
accountability; if it complies, it confirms that all the NSA is, considering
it can't even tap into a bunch of Al Qaeda phones and figure out what the
jihadists' strategy is in Iraq, is just a massive data repository of all US
electronic information, to be abused at will by corrupt, criminal government
workers, some of whom will likely have to resort to the "dog ate my emails"
excuse in the immediate future.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
--
Pozdr
rysiek