[cryptography] NSA Attacks on VPN, SSL, TLS, SSH, Tor

John Young jya at pipeline.com
Tue Dec 30 07:17:16 EST 2014


Cryptome does not pretend to provide illusory security, that is security.
It is a vile, rotten, corrupt endeavor, like life. Chuckle.

Visitors, readers, consumers must be skeptical of security, and not rely
upon security promoters, their followers and investors who exploit
dependency by fear uncertainty and doubt.

Skepticism of security claims and methods is one of the purposes of
these lists. Perhaps the main purpose, although it is commonplace for
these lists to be used for soliciting befuddled consumers to hop aboard
the gravy train. Now and then skeptcism of the security arises but is usually
suppressed during times of crisis when incentive is rich to promote poor
products and services. Governments, commerce, orgs, experts cooperate
to foster crises under guise of opposition.

This applies to all forms of security, safety, protection, defense, hygienic
pharma.

Still, Cryptome endorses the continuing struggle to improve citizen
protection, not only as a job, career, industry, but as citizens' obligation
to bear responsibility for the commonweal against its inside and outside
enemies, if you will, common math against the deadly germs.

One way to do that is to not oversell it, tone down the threats, reduce
drumbeating, avoid hyperbole for and against, forego advertising,
gang-bang hectoring, circle jerk conferencing, TEDing, prize bestowing,
to quietly invent, improve, critique, test, apply, re-test often, expect to
be deceived by colleagues witting or unwitting, especially by sales,
politicians, authoritarians -- the persistent germs.




At 02:50 AM 12/30/2014, you wrote:
>john likes to be poetic as a wall - dear john please listen to the 
>smart people and have a small bit of humility - it will make you 
>better at your job and we need EVERYONE to step up and be better at their jobs
>
>On Tue, Dec 30, 2014 at 7:38 AM, grarpamp 
><<mailto:grarpamp at gmail.com>grarpamp at gmail.com> wrote:
>On Mon, Dec 29, 2014 at 8:20 AM, John Young 
><<mailto:jya at pipeline.com>jya at pipeline.com> wrote:
> > Hash this motherfucker, said math to germ.
>
>JYA, you, as the original publisher of various and valued datasets...
>the responsibility to calculate, sign, and publish said hashes rests with
>you alone. Please consult with any trusted parties should you need
>assistance in such matters. A future of archivers, disseminators, and
>analysts will thank you.
>
>
>
>
>--
>Cari Machet
>NYC 646-436-7795
><mailto:carimachet at gmail.com>carimachet at gmail.com
>AIM carismachet
>Syria +963-099 277 3243
>Amman +962 077 636 9407
>Berlin +49 152 11779219
>Reykjavik +354 894 8650
>Twitter: @carimachet 
><<https://twitter.com/carimachet>https://twitter.com/carimachet>
>
>7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187
>
>Ruh-roh, this is now necessary: This email is intended only for the
>addressee(s) and may contain confidential information. If you are not the
>intended recipient, you are hereby notified that any use of this
>information, dissemination, distribution, or copying of this email without
>permission is strictly prohibited.
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.randombit.net/pipermail/cryptography/attachments/20141230/1e567829/attachment-0001.html>


More information about the cryptography mailing list