log☇︎
789100+ entries in 0.57s
herbijudlestoids: mircea_popescu well when i say you its the "example" you, not the actual mirpop you
BingoBoingo: herbijudlestoids: Black bag / Rubber Hose cryptoanalysis is more expensive than people imagine.
mircea_popescu: herbijudlestoids so fyck you then, why am i talking to you ?
herbijudlestoids: mircea_popescu lets just say if certain people found out it was me who sent you the message, they could turn up at my doorstep and coerce more messages from me
BingoBoingo: Encryption is the boring part of GPG
BingoBoingo: herbijudlestoids: I have to say I underestimated you when you first arrived, but you are still only halfway to Bitcoin
mircea_popescu: they're not overhead, they're undefoot.
mircea_popescu: jurov not in the same sense, is it ? nat is unnecessary overhead in the sense shoes are unnecessary overhead.
jurov: that's unnecessary ovehead, too
jurov: heh. last time you were completely fine with needing a middleman because both computers connected to "internet" are behind NAT
herbijudlestoids: mircea_popescu i want to send you a message. but i dont want anyone to know it was me that sent you the message
mircea_popescu: i'm saying that it is a design with massive overhead for dubious reasons.
herbijudlestoids: so youre saying? idiots will use i2p for uses other than its original use?
mircea_popescu: and if you think the point of http was webstores...
mircea_popescu: the whole point of the bitcoin code was to prototype an idea, not to be used for srs.
mircea_popescu: you do not understand the nature of idiocy.
herbijudlestoids: the whole point is to use it for traffic that you dont want associated with your IP
herbijudlestoids: why would you use it for all internet traffic
mircea_popescu: hey dub, what if all internet traffic henceforth needed 4 tunnels built up per connection ?
mircea_popescu: just gpg the package and send it over. i definitely like fabian's cjdns much more
mircea_popescu: see, this is why i say it fails : the overhead imposed by all the sha(sha(sha(sha bs to keep metadata secret from downstream hops
mircea_popescu: the overhead on this thing seems nutty.
mircea_popescu: In I2P, tunnels are unidirectional. Each party builds two tunnels, one for outbound and one for inbound traffic. Therefore, four tunnels are required for a single round-trip message and reply.
herbijudlestoids: im used to the type i guess lol, spent some time with owsley in his old age, very codger
mircea_popescu: yeah, i'm just codgery and will find random things to bitch about
herbijudlestoids: which i think it does...
herbijudlestoids: ignore the nomenclature, i just pasted the link to see if it met your requirements of passing traffic based on keys
mircea_popescu: since i do more business than gossip... i'm not so impressed with onion and garlic and so on.
mircea_popescu: now, the security provided by ;;ident is necessary for business. the security provided by otr is necessary for gossip
herbijudlestoids: some things i work on, require very very high opsec
herbijudlestoids: i got no issues with GPG, but most of the conversations where i care about the security of it, i dont want it tied to my identity if at all possible
herbijudlestoids: i dunno who that is
herbijudlestoids: who is this "me" who promised "you" a thing
herbijudlestoids: err no, because youre talking about tying my identity to a key
mircea_popescu: cause if you didn't i'd guess it's possible the forging aditional messages may mean something even for your threat model :)
mircea_popescu: did you just tell me you're promising to pay 10 btc for a stuffed dollie five minutes ago ?
herbijudlestoids: but theyre not "secure"?
mircea_popescu: certainly they're encrypted.
herbijudlestoids: being able to forge additional messages post conversation really means nothing to my threat model
herbijudlestoids: i find it confusing because you seem to imply the messages are not encrypted
mircea_popescu: i'm by no means saying otr is bad or anything. i use it extensively for that matter
herbijudlestoids: lucky i use tails
mircea_popescu: "Anyone can forge messages after a conversation to make them look like they came from you. However, during a conversation, your correspondent is assured the messages he sees are authentic and unmodified."
herbijudlestoids: are you referring to perfect forward secrecy?
mircea_popescu: it doesn't make the gpg guarantee that old conversations can never be read by third parties.
mircea_popescu: herbijudlestoids otr makes exactly two guarantees : that only your intended recipient can read your next line, and that should someone obtain the plaintext of your communications they can't prove that it is in fact yours rather than theirs.
herbijudlestoids: second time youve mentioned it
herbijudlestoids: mircea_popescu: why do you seem to think OTR does not encrypt the conversations?
FabianB_: herbijudlestoids: coz you want the anonymity i guess
mircea_popescu: i think you're confused as to what otr actually does.
herbijudlestoids: OTR keeps the actual messages secure
mircea_popescu: let them associte it, what of.
FabianB_: what you're describing sounds like cjdns (encryption of the network, but i think not anonymity)
herbijudlestoids: so i need a mixnet to handle the traffic
herbijudlestoids: but there is certain communications that i simply dont want associated with my actual identity
herbijudlestoids: if i thought i could conduct the communicatoins i needed over OTR using jabber
mircea_popescu: it's just this stupid thing everyone does because everyone's doing.
mircea_popescu: but i tell you... i am mp. i have always been mp. everyone else is fkghsgeiohgiurehg. to what gain and for what benefit ?
mircea_popescu: i have no idea if it does or doesn't and really can't be arsed to find out, cause what do i care.
mircea_popescu: don't use that term lol, it's a direct pastiche from romanian and in english it's a term of art with diff meaning.
mircea_popescu: someone they have in their wot should tell them this is prime rib of stupid. separate these.
herbijudlestoids: do you feel like i2p at least makes a reasonable tool for metadata securitization, to use your term?
mircea_popescu: except the kids doing stuff like onions, garlic and other vegetables.
mircea_popescu: nobody sane is mixing them
herbijudlestoids: well i personally am not mixing them lol
mircea_popescu: moreover, it's like trying to make a chowchow swim.
mircea_popescu: and i think mixing together securitization of data and of metadata is an epic mistake.
herbijudlestoids: so you hold no concern over the security of your metadata?
mircea_popescu: tbh it seems to me all the enthusiasm of the darknet people is woefully misdirected.
herbijudlestoids: well that seems a bit odd
mircea_popescu: i am strictly interested in keeping secret the messages passed back and forth.
mircea_popescu: meh, all this onion/garlic bs.
mircea_popescu: you can't possibly deliver all those about apples, but keep all those about fish
mircea_popescu: all you can do is deliver them or not deliver them
mircea_popescu: well, if i give you a list of gpg messages encrypted to a bunch of my friend's keys
herbijudlestoids: mircea_popescu: yes, just wanting to see if what youre after is matched by https://geti2p.net/en/docs/how/garlic-routing
mircea_popescu: makes all route nodes unable to filter traffic, plain and simple.
mircea_popescu: if you're not X the packet's gibberish
mircea_popescu: some sort of "gpg encrypted to ip"
mircea_popescu: you want an adressing scheme where the reading of packets depends on the destination's identity.
mircea_popescu: nah, you want an adressing scheme where the routing of packets depends on the destination's identity.
herbijudlestoids: the problem with i2p is the problem with all p2p networks
herbijudlestoids: i view it as like...sort of like a 'actually secure replacement for the s/web/internet' ...kind of like a public VPN that anyone can piss in
herbijudlestoids: mircea_popescu: there was a guy very much like satoshi who came up with iip/i2p originally....very smart guy, i remember i used to hang on the #iip chatroom inside iip back when i was a kid
mircea_popescu: not even compatible, mind you. pick port 90 and create a wholly and completely different thing.
mircea_popescu: tho an actually secure replacement for the web would be a decent use of bitcoin resources.
mircea_popescu: so then why bother.
herbijudlestoids: but i found this http://www.ipredia.org/ ...unfortunately also one version behind
herbijudlestoids: because right now the latest tails is one version behind on i2p
herbijudlestoids: so last night i was thinking of forking tails, and ripping out tor and filling it with i2p app goodness
mircea_popescu: total take ? why, like 3500 bucks.
mircea_popescu: asciilifeform http://nj.gov/oag/newsreleases13/pr20131119a.html << there you go, esports botnet.
mircea_popescu: what business sends over its book just because someone wants to see it ?!
mircea_popescu: the only reasonable answer to this sort of crap being "get fucked"
mircea_popescu: dude srsly ? how is the us legal system still a thing ?
mircea_popescu: ssociated with Tidbit, a list of all websites running Tidbit's code and the name of anybody whose computer mined for Bitcoins through the use of Tidbit, although Tidbit's code was not configured to mine for Bitcoins.
mircea_popescu: But in December, the New Jersey Division of Consumer Affairs issued a subpoena to Rubin, requesting he turn over Tidbit's past and current source code, as well as other documents and agreements with any third parties. It also issued 27 interrogatories -- formal written questions -- requesting additional documents and ordering Rubin to turn over information like the names and identities of all Bitcoin wallet addresses a
mircea_popescu: you may now trade.
BingoBoingo: I'm telling you gox could say Gox BTC == 10^8 Gox USD tomorrow, because all is play money
mircea_popescu: they send you a pen, you film yourself fucking the pen and send the thing over