Thursday, September 22, 2016

From: goncalo.costa at kpnqwest.pt (Goncalo Costa)
Subject: JAP back doored

>
> Don't be a smart ass.
>

Well, good morning to you too !

> Your arguments have nothing to do with the argument at hand which is quite
> simple: Governments should have no right to force developers to trojanize
> their applications and keep silent about it.
>

Governments have a lot of powers they should not have but German government
had nothing to do with this.

I hope you can tell the difference between a government eavesdropping on
someone and a judge/court order to eavesdrop on a suspect to gather evidence
against him.

> There have been some notes come out of this:

1> Germany has now removed this legal action, which is great

I think you should stop for a minute and try to learn the difference between
Germany (country), the German state, the German government and the German
judicial system.

"Germany" did nothing.

If you want to talk about the German government you could talk about
http://www.gnupg.org/aegypten

> 2> They intended to only watch traffic to a single German server

It seems you did not follow some posts on this list. I believe someone from
Germany explained the why and how of this JAP backdoor, and mentioned that.

3> The developers may not
> have been so forced into doing this, as much as willing -- I rather doubt
> this, especially since the order was rescinded, but their culpability does
> factor into this

So you mean these guys offering a free public anonymizing service are to
blame for complying with a court order ? I'm sure you would rather go to
jail. Where's the free public anonymizing service you're providing to the
Internet ? I'd like to use it. I'm sure I can trust you to keep my id safe.

4> I, personally, admit I would not care if they did this
> for a very serious reason such as for pedophiles or terrorists... I think a
> lot of people outraged would have to agree with this... However, I am sure
> a lot would not
>

(I believe the same person also wrote) it was a pedophilia case.

> As for the US government, this is utterly unimportant. I was playing around
> even to begin to mess with that. Yes, I am unaware of the US actively
> trojanizing applications by forcing the developers to do this.

Lotus Notes NSA backdoor ?
We're not talking about a court order here.
And Notes was not free software - its customers paid for it.
Nor it was open source software as is the case with JAP.

> So are you.
> This is illegal. You wouldn't like it if it was the US doing this. So, what
> are your real motives here?
>

Besides money that is ? :-)

Your emails seemed more focused on the German government than anything else.
German government had nothing to do with this. This was a judge/court order.

My motives were plain and simple:

- you seem to believe that your government and its agencies always play by
  the book - I was trying to show you that they don't

- you should not bash (especially the way you did) the German government when
  your own government has a much worse track record on eavesdropping on
  everyone else around the world

- you should not blindly trust your government nor its agencies as you seem
  to. They have abused their powers in the past. They are abusing their
  powers in the present. They will abuse their powers in the future.

Governments are made of people like you and me (worse in fact ;-).

Complaining of these decisions (which are mandated by a judge or court) is
really useless and a paradox. In my opinion either:

case 1. you don't trust the state/authorities/whatever and you cannot trust
        anything and you cannot expect anonymous services to work as
        advertised (this is the case in dictatorships/authoritarian regimes)

case 2. you are a hardcore privacy advocate and accept no eavesdropping on
        anyone no matter what - not even eavesdropping on the suspect of
        kidnapping your child

case 3. you (almost) trust the state/authorities/whatever and recognize/accept
        the need to do certain things, as eavesdropping, that need to be done
        in "some situations but not all" to "some people but not all"

As you said:

> 4> I, personally, admit I would not care if they did this for a very
> serious reason such as for pedophiles or terrorists...

So you are clearly in case 3. 

(probably the same goes for everyone else who complained about this)

But if you trust the system then you must also trust that this is done only
when "it has to be done", and there's no use in complaining there, is there ?

In this case you were clearly not trusting the German state and were bashing
it as if it was a "case 1" (dictatorship or authoritarian regime).

Will there be _abuses_ by the authorities and the people behind them ?
Sure, but we'll complain about _that_ with reason on our side then.

>
> >
> > The world is made of people and people are the same
> > everywhere. Time and place don't seem to make a great
> > difference. Being naive and keeping your eyes shut doesn't
> > help either.
>
> I love being called na?ve by teenagers that have never even seen a dead
> body.
>

As I said before, from your posts to this list regarding this thread you seem
to have a blind faith in your government and its agencies. I would call that
being naive. 

Thanks for the tip: I've modified my mail headers not to leak my age again !

And please explain that "dead body" part again.

>
> You think for some reason that I am opposed to intelligence actions by the
> US? I am not even opposed to Germany if they did this because it was
> against terrorists or pedophiles.
>

Well. As I explained before, if you accept this for some reasons then you
must trust "them" to know when to do it.

> You are the one quite na?ve if you believe your nation can exist free
> without an intelligence agency.
>

I don't remember having written this in my post. Did I ?

> Regardless, the existence of intelligence agencies is entirely a different
> matter.

Again: I don't remember having written anything about this in my post.

> What errors these agencies may have done in the past - US or German

Errors ? What errors ? Errors are something you do by mistake.
These agencies make no errors (unless when they're caught).

They deliberately abuse their powers when they have to.

> - is entirely irrelevant.
>

To this thread and list: yes.
To know history and to learn from it: no.

> Each matter must be taken at a time.
>
> Apples give no insight into oranges.
>

I always suspected that ! :-)

> > I would also suggest a daily reading at http://cryptome.org/
>
> Yeah, a lot of great American sites like this. In fact, I bet you know a
> lot more about the US intelligence then you do about Portugese.
>

You almost got it right: "Portuguese". Don't hesitate to ask me if you
need help with your English ! :-)

(I do hope you have a sense of humour)

> In fact, I bet you know a
> lot more about the US intelligence then you do about Portugese.
>

Well ! That's easy isn't it ?
There's not much to know about Portuguese intelligence agencies is there ? 

And I'd like to hear your comments on my post to FD included below
(http://lists.netsys.com/pipermail/full-disclosure/2003-August/009108.html)

Best Regards to you too
Goncalo


-------------------------------------------------------

Subject: Java Anonymous Proxy (JAP) backdoored - another interesting story 
Date: Tue, 26 Aug 2003 11:02:32 +0100
From: Goncalo Costa goncalo.costa@...qwest.pt
To: full-disclosure@...ts.netsys.com


For those of you shocked at learning that JAP had been backdoored at
the request/order of a judge/court to investigate a criminal, here is
another interesting story.

Notice the SURFOLA.com disclaimer.

----------  Forwarded Message  ----------
>Date: Sat, 23 Aug 2003 00:00:11 +0200
From: Barry Wels 
>Subject: blackmail / real world stego use
>Sender: owner-cryptography@...zdowd.com
>To: cryptography@...zdowd.com

Wednesday, September 21, 2016

telegram-bot-bootstrap A bootstrap for Telegram bot with directly deployable sample bot and JS-wrapped API methods

A bootstrap for Telegram bot with directly deployable sample bot and JS-wrapped API methods. You can use all methods available in the Telegram API directly, and send any supported media (we serialize the formData for you to send over HTTP).

https://www.npmjs.com/package/telegram-bot-bootstrap 


See the full API documentation of this project.

Do either of
npm install telegram-bot-bootstrap
git clone https://github.com/kengz/telegram-bot-bootstrap.git
Either way you'll get a module with the Telegram bot API wrapped in Node, and a bootstrapped, deploy-ready project.
If you haven't already, get a bot from BotFather and remember your bot token!
  • Wrapped API methods take either a JSON object or multiple parameters.
  • Auto serialization for HTTP formData: send photos/keyboards/media directly.
  • API methods return promises (uses q) for easy chaining and flow control.
  • Complete documentation and examples usages.
  • Bootstrapped and directly deployable bot. 

AFTER THE BOT CONVENIENTLY INSTALLED WE MIGHT NEED THIS:


How to cast object in jBPM web service

  I have been cracking my head on how to do this. I have a web service where I am sending an Integer (ideally I want to send an Object) to the service and expecting an Object in return.
It appears as though the outbound SOAP message is working because in the console of my web service I can see the database query being returned. However, in JBoss BPMS I get the following error message

https://developer.jboss.org/thread/240965 

Saturday, September 17, 2016

Business is booming in warplanes, missiles, and helicopters for Portuguese arms traders like Luis Nogueira. This former in the Portuguese Marines is one of a handful of Lisbon-based arms dealers, many of whom have been in business for decades. At the first scent of war in the Gulf, several of them came scurrying around to the Iraqi Embassy, catalogues in hand, to peddle their wares....
He admits that earlier this year he gave the South Africans a design to convert water cannons for riot control into lethal instruments capable of transmitting high-voltage electric shocks through the jet of water. But that was just a favor for a friend.
Mr. Nogueira's family runs a string of arms-dealing companies from its office in a dingsy Lisbon office block
Informed sources in the arms trade allege that Mr. Nogueira arranged the sale of French antitank missiles and Belgian antiaircraft guns to Iraq last summer.
The arms dealers divert a large slice of Portugal's official exports to clandestine customers as well.
Over the past two years, about $15 million worth of arms and ammunition issued with export licenses for Gabon, Thailand, and Pakistan has vanished after leavint the Lisbon dockside. It was never ordered by these countries nor delivered, but much is thought to end up in South Africa.


http://www.csmonitor.com/1980/1112/111248.html 

the Gideon spies are" Gideon, who was a Judge from 1145 to 1105 B.C., had to remind the people how God wanted them to be ruled when they tried to make HIM king!
22. And the men of Israel said to Gideon, "Rule over us, both you and your son, and your son's son also, for you have delivered us from the hand of Midian." 23. And Gideon said to them, "I will not rule over you, neither shall my son rule over you. The LORD shall rule over you" (Judges 8:22 - 23, Holy Bible in Its Original Order"

Friday, September 16, 2016

2015 New Intelligent key

Magic Key CISA 3 5 3 - Self-impressioning lock pick for CISA

Trapping signals in Docker containers Have you ever stopped a Docker container?

As an example, let’s run the following application (program.js) inside a container and examine signal handlers.
'use strict';
var http = require('http');
var server = http.createServer(function (req, res) {
  res.writeHead(200, {'Content-Type': 'text/plain'});
  res.end('Hello World\n');
}).listen(3000, '0.0.0.0');
console.log('server started');
var signals = {
  'SIGINT': 2,
  'SIGTERM': 15
};
function shutdown(signal, value) {
  server.close(function () {
    console.log('server stopped by ' + signal);
    process.exit(128 + value);
  });
}
Object.keys(signals).forEach(function (signal) {
  process.on(signal, function () {
    shutdown(signal, signals[signal]);
  });
});
Here we create an HTTP-server that listens on port 3000 and setup two signal handlers for SIGINT and SIGTERM. When handled, the following message will be printed to stdout: `server stopped by [SIGNAL]`.

forces to decode the most probable coded sequence that succeeds the verification of the outer code

/*
RFSniffer

Usage: ./RFSniffer []
[] = optional

Hacked from http://code.google.com/p/rc-switch/
by @justy to provide a handy RF code sniffer
*/

#include "../rc-switch/RCSwitch.h"
#include <stdlib.h>
#include <stdio.h>


RCSwitch mySwitch;



int main(int argc, char *argv[]) {

// This pin is not the first pin on the RPi GPIO header!
// Consult https://projects.drogon.net/raspberry-pi/wiringpi/pins/
// for more information.
int PIN = 2;

if(wiringPiSetup() == -1) {
printf("wiringPiSetup failed, exiting...");
return 0;
}

int pulseLength = 0;
if (argv[1] != NULL) pulseLength = atoi(argv[1]);

mySwitch = RCSwitch();
if (pulseLength != 0) mySwitch.setPulseLength(pulseLength);
mySwitch.enableReceive(PIN); // Receiver on interrupt 0 => that is pin #2


while(1) {

if (mySwitch.available()) {

int value = mySwitch.getReceivedValue();

if (value == 0) {
printf("Unknown encoding\n");
} else {

printf("Received %i\n", mySwitch.getReceivedValue() );
}

mySwitch.resetAvailable();   

}


}

exit(0);


}

https://github.com/ninjablocks/433Utils/blob/master/RPi_utils/RFSniffer.cpp 

Tuesday, September 13, 2016

Shor’s Algorithm – Breaking RSA Encryption

"If we determine several random divisors of (p-1)(q-1) by trying different random values of x, then we can multiply those divisors together to obtain (p-1)(q-1) itself. Once we know (p-1)(q-1), we can then determine p and q. - ...."

 http://blogs.ams.org/mathgradblog/2014/04/30/shors-algorithm-breaking-rsa-encryption/#sthash.h9GOM0Sn.dpbs


NEXT QUESTION :


What is the fastest factorization algorithm?

 http://stackoverflow.com/questions/2267146/what-is-the-fastest-factorization-algorithm


NEXT QUESTION: WHAT'S THE HARDWARE?

Revolutionary TempFlat™ MEMS Resonators

https://www.sitime.com/technology/mems-resonators 

 

Monday, September 12, 2016

I have here a software able do decode a quadrature of signals, which is exacly the protocol used by satelite GPS positions information, that is depending always on 4 satelites transmission togehter, to get precise positions, because of the amplification receivers noise. In this software meanning data aquisition processor port decoder command; on this attack I'm pretending to duplicate the signal, and confuse the call, so the satelite will think my signal is the true one.

Quadrature encoding and decoding

The purpose of the QDECODE command is to monitor and decode pulse sequences that arrive on a pair of digital lines on the Data Acquisition Processor digital input port. These particular digital logic signals are produced by a quadrature encoder attached to a device that can rotate forward or backward. The QDECODE command must determine the current angular position by monitoring the digital pulses. You can do this monitoring using special hardware devices, with excellent efficiency at high speeds. When you don't have the high speeds, however, this command might allow you to dispense with that extra hardware. 

http://www.mstarlabs.com/apeng/techniques/qdec.html 

Naval Tactics ( Echo Era Corp)