| Author |
Message |
Grav@work Guest
Offline
|
Posted: Wed Jan 19, 2005 2:34 am Post maybe stupid Post subject: The master race? |
 |
|
|
|
German court rules email blocking 'illegal'
By Jan Libbenga
Published Tuesday 18th January 2005 12:27 GMT
Selectively filtering out emails of a specific sender may constitute an offence, the Higher Regional Court (OLG) in Karlsruhe ruled on Monday.
Two years ago a university in Baden-Württemberg blocked the email of a former employee who left after a quarrel with his peers, but continued to stay in touch with scientists and friends.
His former peers decided to filter out every message in which his name was mentioned without informing the ex-employee or his friends.
The Higher Regional Court now has ruled that blocking email by content is unlawful as it is considered confidential in German law. Blocking is only allowed when, say, a viral attack is imminent.
The implications of the ruling aren't yet fully clear. Whether the Higher Regional Court has unintentionally legalised spam (which frequently is filtered by content) remains to be seen. ®
//theregister.com
And they wonder why hitler failed... |
|
| Back to top |
|
 |
SuSE Me measures good

Joined: Dec 02 2002 Posts: 2307 Offline
|
Posted: Wed Jan 19, 2005 3:27 pm Post maybe stupid Post subject: |
 |
|
|
|
seems reasonable to me
I mean it's just like stealing people's snail mail - you could do serious damage |
|
| Back to top |
|
 |
CypherJF I gargle nitroglycerin

Gender: Joined: Aug 14 2003 Posts: 2582 Location: USA Offline
|
Posted: Wed Jan 19, 2005 3:33 pm Post maybe stupid Post subject: |
 |
|
|
|
the FBI here just gave up on carnivor e-mail "tapping" software; interesting though. _________________ Performance is often the art of cheating carefully. - James Gosling |
|
| Back to top |
|
 |
Dr Brain Flip-flopping like a wind surfer

Age:39 Gender: Joined: Dec 01 2002 Posts: 3502 Location: Hyperspace Offline
|
Posted: Wed Jan 19, 2005 5:00 pm Post maybe stupid Post subject: |
 |
|
|
|
If I read correctly, that only affects centralized filtering of multiple users. And only in Germany, at that.
The FBI may no longer read your email (if cypher's comment is correct), but the NSA probably still does. _________________ Hyperspace Owner
Smong> so long as 99% deaths feel lame it will always be hyperspace to me |
|
| Back to top |
|
 |
Gravitron VIE Vet

Age:43 Gender: Joined: Aug 02 2002 Posts: 993 Location: Israel Offline
|
Posted: Wed Jan 19, 2005 5:04 pm Post maybe stupid Post subject: |
 |
|
|
|
| PGP^2 |
|
| Back to top |
|
 |
Dr Brain Flip-flopping like a wind surfer

Age:39 Gender: Joined: Dec 01 2002 Posts: 3502 Location: Hyperspace Offline
|
Posted: Wed Jan 19, 2005 5:07 pm Post maybe stupid Post subject: |
 |
|
|
|
Oh, get real.
Do you really think that there is any publicly avalible crypto system that hasn't been broken? |
|
| Back to top |
|
 |
Mr Ekted Movie Geek

Gender: Joined: Feb 09 2004 Posts: 1379 Offline
|
Posted: Wed Jan 19, 2005 5:29 pm Post maybe stupid Post subject: |
 |
|
|
|
Public key cryptography (RSA, PGP, etc) has not been broken. It can however be brute-forced given enough computing power--something that I'm sure the NSA is very good at. _________________ 4,691 irradiated haggis! |
|
| Back to top |
|
 |
Dr Brain Flip-flopping like a wind surfer

Age:39 Gender: Joined: Dec 01 2002 Posts: 3502 Location: Hyperspace Offline
|
Posted: Wed Jan 19, 2005 6:05 pm Post maybe stupid Post subject: |
 |
|
|
|
Yes, brute force is always an option.
Do you think they would announce it if they broke it, though? How can you say for sure that it hasn't been cracked? |
|
| Back to top |
|
 |
CypherJF I gargle nitroglycerin

Gender: Joined: Aug 14 2003 Posts: 2582 Location: USA Offline
|
Posted: Wed Jan 19, 2005 6:45 pm Post maybe stupid Post subject: |
 |
|
|
|
Is it not law that you must report any encryption routine you "make" to the federal law enforcement agencies for that reason, where the NSA doesn't have to break it, they have it on file? I'm pretty sure there is such a thing like that on the books somewhere.
Anywho... |
|
| Back to top |
|
 |
Blindmonkey21 Server Help Squatter

Age:36 Gender: Joined: Jul 08 2004 Posts: 252 Location: Arizona Offline
|
Posted: Wed Jan 19, 2005 8:06 pm Post maybe stupid Post subject: |
 |
|
|
|
| Mr Ekted wrote: | | Public key cryptography (RSA, PGP, etc) has not been broken. It can however be brute-forced given enough computing power--something that I'm sure the NSA is very good at. |
Hehe Digital Fortress hehe |
|
| Back to top |
|
 |
Mine GO BOOM Hunch Hunch What What

Age:42 Gender: Joined: Aug 01 2002 Posts: 3616 Location: Las Vegas Offline
|
Posted: Wed Jan 19, 2005 10:28 pm Post maybe stupid Post subject: |
 |
|
|
|
| CypherJF wrote: | | Is it not law that you must report any encryption routine you "make" to the federal law enforcement agencies for that reason, where the NSA doesn't have to break it, they have it on file? I'm pretty sure there is such a thing like that on the books somewhere. |
I know about the ban on exporting encryption that uses a 40bit or larger key. If you would use PGP, I'd recommend one of the completely open sourced ones, not the commerical ones. |
|
| Back to top |
|
 |
Bak ?ls -s 0 in

Age:26 Gender: Joined: Jun 11 2004 Posts: 1826 Location: USA Offline
|
Posted: Thu Jan 20, 2005 12:48 am Post maybe stupid Post subject: |
 |
|
|
|
"Cracking" public key cryptography involves being able to factor large numbers(on the order of 2^128 for 128 bit encryption) into their prime factors(which these numbers each only have two of these factors). Factoring is not an easy problem in mathamatics, hence the security of RSA, PGP, and similar systems. If it was broken, it would probably be broken by a mathematician rather than a government agency (unless he or she is working for a government agency).
The ban on non-USA (and possibly their allies) to use encryption that uses a 40 bit or larger key is reassuring that they have not broken public key cryptography (I wonder where the US gets the authority to enforce this sort of law?). If I'm not wrong, I believe it took a distributed network of computers about two years to break 96 (or was it 128?) bit encryption using modern factoring methods, so even if the FBI or NSA has some super computer that was 10000 times faster than a distributed network, increasing the key by 128 bits makes the problem 2^128 times harder. _________________ SubSpace Discretion: A Third Generation SubSpace Client |
|
| Back to top |
|
 |
Dr Brain Flip-flopping like a wind surfer

Age:39 Gender: Joined: Dec 01 2002 Posts: 3502 Location: Hyperspace Offline
|
Posted: Thu Jan 20, 2005 7:25 am Post maybe stupid Post subject: |
 |
|
|
|
| The NSA is the biggest employer of mathematicians in the world. So, obviously, if the NSA broke an encryption, it would have been done by a mathematician. |
|
| Back to top |
|
 |
Gravitron VIE Vet

Age:43 Gender: Joined: Aug 02 2002 Posts: 993 Location: Israel Offline
|
Posted: Thu Jan 20, 2005 10:41 am Post maybe stupid Post subject: |
 |
|
|
|
www.distributed.net
Were good days doing the RC5 project back at INF. |
|
| Back to top |
|
 |
Mr Ekted Movie Geek

Gender: Joined: Feb 09 2004 Posts: 1379 Offline
|
Posted: Thu Jan 20, 2005 11:08 am Post maybe stupid Post subject: |
 |
|
|
|
Yes, the laws for encryption in the US are really retarded. It is illegal for me to download most freely available encryption source code, embed it into my own application, and release it online without notifying--and in most cases getting permission from--the NSA. This applies to private key >= 56 bits or public key (symmetric) >= 128 bits (when last I looked). The laws are very poorly worded, making it difficult to tell if you need to notify or apply, if your software is considered commercial or mass-market, etc. In some cases you must submit your encryption source code to them for approval.
Do they really think this prevents terrorists from using any encryption they want? All it does is hurts innovation and suppresses the 1st Amendment. |
|
| Back to top |
|
 |
CypherJF I gargle nitroglycerin

Gender: Joined: Aug 14 2003 Posts: 2582 Location: USA Offline
|
Posted: Thu Jan 20, 2005 11:49 am Post maybe stupid Post subject: |
 |
|
|
|
| I don't think the original intent of the law was to surpress the rights of the developers, and innovators. Rather, more than likely, enacted to help protect the state by having archival of possible encryption routines at their disposal. Though, I have to admit, more recently legislation has begun to irritating such as new legislation before the california house of legislature providing for 1 year jailtime, and/or 2k$ fine for developing and/or distributing peer-to-peer applications. Don't even get me started on it. |
|
| Back to top |
|
 |
|