l0pht Advisories
   

Advisories
  Latest
  1997
  1996

Products
  software
   L0phtCrack
   SLINT
   BCS Archives

  service
   Consulting
   Product Certification

Lab
  L0phtCrack
  Palm Pilot
  POCSAG
  MDT
  Wireless

Archives
  Black Crawling
    Systems
  Whacked Mac
  Cult of the
   Dead Cow
  Cybertek
  Tezcat
  Pictures
  IIRG

Lounge
  Home Boyz
   & Girlz
  The L0pht BBS
  Cons
  L0pht Eye

Contact
  General Contact
  Press Contact
  Business Contact
  Send Us News
  Webmaster
  Snail Mail

Search


L0pht, the L0pht logo, its likeness, and these pages Copyright © 1998 LHI Technologies, LLC All Rights Reserved. Read the legal stuff.

 

   


  L0pht Speaks Out... The SoapbOx 
06.24.1998
The l0pht flexes its muscle in the politics of the net, privacy, and cryptography. Check here for our take on popular and at many times, much too unpopular trends in the political thinking shaping the digital and corporeal realms.

Much legislation governing privacy, the use of strong crytography, censorship, and intellectual property doesn't even get passing notice in the mainstream media. Due to l0pht's high visibility, we hope to bring many of these very important issues into the limelight. Balance must be restored to counter the shift toward electronic totalitarianism. 

Send inquiries, responses and issues not covered here to soapbox@l0pht.com


 
 
  Strong Cryptography vs. Key Escrow Systems 
06.22.1998
The cypherpunks have been combating this issue for almost the past decade. Law enforcement are the main propoent of key escrow systems and commonly argue that key escrow is necessary in order to keep communication channels open to undetectable surveillence. Strong crypto makes "armchair" surveillence very difficult. You must now position oneself between speaker and encryption device to intercept communications before they become encrypted. They also like to make the argument that key escrow technology is accepted by many corporations. This is a half-truth. They are interested in key escrow technology for STORED ELECTRONIC DATA. This is to prevent key loss to vast amounts of archived data typically stored in offsite vaults. They want a way to recover a lost key held in a "trusted" location. They are not proponents of key escrow communications systems as law enforcement agencies would like you to believe. 

Fortunately Federal law enforcement agencies have the man power and resources to overcome these obstacles and conduct research into other intelligence gathering methodologies such as tempest equipment, infiltrators, and video and audio surveillance. Techniques which intercept the communications before it is transformed by machine or electronic device into an unintelligable form. 

It doesn't take a genius to realize that banning strong crypto will mean that only the small-time criminals will be speaking in the clear or utilize the state sanctioned crypto and the higher-end terrorist groups and organized crime families will employ the "banned" encryption technology. Meanwhile, the common US citizen is stuck with a proven weaker cryptographic system where the government, a body of human beings susceptable to corruption, hold the key to unlock all "private communications". 

Export restrictions on cryptographic software is another issue that is closely releated to this issue. The NSA, CIA, and other Intelligence gathering agencies do not want strong crypto to leave the country. So, only government approved algorithms are allowed for export. Of course these algorithms are weak and because they are approved by our government for export, many foreign companies refuse to use them for fear of snooping by our intelligence agencies. Our cryptographic market atrophies overseas, and eventually may be seen as criminal activity if developing systems without key escrow capabilities.

Meanwhile, the rest of the world's crypto marches on. 

To find out more on the Strong Crypto struggle: 
The Risks Of Key Recovery, Key Escrow, And Trusted Third-Party Encryption
IPC - These folks are on the side of responsible crypto laws
S.2067 E-PRIVACY ACT - This is before the Senate. 


 



 
 
 
 
 

  New WIPO treaty threatens the legality of legitimate hacking 
06.22.1998
The World Intellectual Property Organization treaty has already passed the US Senate and is close to passing in the House. The treaty would make it illegal, with extremely stiff penalties, to break security schemes without the permission of the company that makes the product. 

Programs like l0phtcrack would be made illegal. People could not publish vulnerabilities in products and encryption schemes. We would go back to the days of security vulnerabilities only circulating in the underground as lists like Bugtraq are made illegal.

This is plain and simple security through obscurity. Intellectual property owners are using the legal system to protect their products instead of the tried and true method of open systems and public review. 

How will we know if anything is secure if all the "white papers" and reports on a system's security are paid for by the manufacturers only? Unbiased, "Consumer Reports-like" groups will be outlawed. 

L0pht is vehemently opposed to this proposed treaty. It has serious freedom of speech implications. It also gives companies a license to produce shoddy, inadequate systems without fear of exposure. 

Read more about this treaty:
Treaty could stymie ethical security tests, PC Week
Visit EFF and find out how you can fight this.
Detailed info on the treaty with commentary.