the-assault-we-face-is-driven

Originally published in; Frankfurter Allgemeine; Feuilleton
05.03.2016,
 von SHOSHANA ZUBOFF

Governmental control is nothing compared to what Google is up to. The company is creating a wholly new genus of capitalism, a systemic coherent new logic of accumulation we should call surveillance capitalism. Is there nothing we can do?surveillance capitalism

Google surpassed Apple as the world’s most highly valued company in January for the first time since 2010.  (Back then each company was worth less than 200 billion. Now each is valued at well over 500 billion.)  WhileGoogle’s new lead lasted only a few days, the company’s success has implications for everyone who lives within the reach of the Internet. Why? Because Google is ground zero for a wholly new subspecies of capitalism in which profits derive from the unilateral surveillance and modification of human behavior.  This is a new surveillance capitalism that is unimaginable outside the inscrutable high velocity circuits of Google’s digital universe, whose signature feature is the Internet and its successors.  While the world is riveted by the showdown between Apple and the FBI, the real truth is that the surveillance capabilities being developed by surveillance capitalists are the envy of every state security agency.  What are the secrets of this new capitalism, how do they produce such staggering wealth, and how can we protect ourselves from its invasive power?

Read full story…

Shoshana Zuboff is the Charles Edward Wilson Professor, Emerita, Harvard Business School. This essay was written for a 2016 address at Green Templeton College, Oxford. Her forthcoming book is Master or Slave: The Fight for the Soul of Our Information Civilization, to be published by Eichborn in Germany and Public Affairs in the U.S.

A short note by way of raising discussion on some ‘key’differences between the involution logic of the Alex DeCastro work presented here and the PRG, temporal error feed-forward of my algorithm.

Alex’s work, consisting of an one-way (permutation) involution over GF2, is presumably best suited to construction of asymmetric, public key encryption schemes. I note that he has published a version of the protocol here, with application to private information retrieval.
I’m not sure if his method can be extended to private key exchange, excuse my ignorance?
As far as I can make out, this would involve a lot of polling back-and-forth between Bob & Alice. There is a name for this class of public key extension? I came across it recently and can’t remember the reference. My understanding is that all asymmetric key protocols are susceptible to man-in-middle attacks anyhow & so, extended polling may not be an issue within this framework?

I.M.H.O, the greatest potential for my algorithm, other than it’s yet to be formally qualified security strength,  lies with construction of symmetric, synchronous, user-sided, key exchange & certification protocols. (Apple take note!) More about that perhaps at a later date…

Phill. S

Tangled up in Blue

February 14, 2016

spunwebOut of frustration at my limitations & lack of progress I’ve posted a second, premature draft.
I fear it’s just getting worse? Unfinished, unsure of the validity of definitions, way out of my depth. It’s a mess but my lack of skill knows little shame so here ’tis anyhow, a work in progress… comment welcome.

Real Permutations yield Sticky Predicates with Input Obfuscation & Poly Pre-Image Span

“A novel cryptographic primitive (ATYP) is presented in form of a symmetric stream cipher derived from an iterated, fractal, trapdoor permutation with polynomial pre-image span (PPS) and input obfuscation (iO). The described fractal transform outputs a Real numbered hash function which maintains an enfolding, parameterized, information conserving Boolean identity. Binary modulation of the hash identity is mediated via forward-feed of an inverse-error dependent, deterministic variable. The forward-feed operating as an avalanche secure pseudo-random generator (PRG), consequent to the inverse function’s ternary, step-wise, floating point error and the concurrent, ternary-permissive, binary integration of plain-text. Taken together, the enfolding hash identity and its associated trapdoor allow an invertible bijection. Somewhat counter-intuitively, the hash function’s pre image correlation is shown to enhance key strength in the setting of PPS.”


So now I’m going back again
I got to get her somehow
All the people we used to know
They’re an illusion to me now
Some are mathematicians
Some are carpenter’s wives
Don’t know how it all got started
I don’t what they do with their lives
But me, I’m still on the road
Heading for another joint
We always did feel the same
We just saw it from a different point of view
Tangled up in blue

Bob Dylan

A Tangled Web

February 6, 2016

Charlottes-Webb-TerrificA nice pigeon-pair of posts from George Danezis, Reader in Security and Privacy Engineering (A.P) at University College, London. Well worth reading in tandem. The first being a bit of a ‘you are here’, overview of the state-of-art in cryptography and the security assumptions thereof.

https://conspicuouschatter.wordpress.com/2016/02/03/the-social-construction-of-trust-in-cryptographic-systems/

The second post looks into the implications behind a recently published Snowden-GCHQ document from 2011 which goes to the nitty-gritty of the (then) data-mining capabilities of GCHQ. Danezis hints at the likelihood national agencies now posses the ability to trace ‘Tor’ type anonymizing sources. Of interest from my viewpoint, it also provides a rare glimpse into the vertical integration extant between academia & national security. Something worth keeping in mind when there’s a crescendo of governmental voices clamouring for default crypto-backdoors. 😉

https://conspicuouschatter.wordpress.com/2016/02/03/a-technical-reading-of-the-himr-data-mining-research-problem-book/

 

barberpole
As promised back in July, Alexandre De Castro’s exploration of involutionary logic negation as applied to Russell’s paradox, has been published as a letter-to-editor in the Journal of the Association for Information Science and Technology; Vol 66, Issue 10.
http://onlinelibrary.wiley.com/mentalmodelsmayfail

DWave_128chip-640x442

D-Wave Systems chip with purported quantum properties.

From arstechnica;
“The National Security Agency is advising US agencies and businesses to prepare for a time in the not-too-distant future when the cryptography protecting virtually all e-mail, medical and financial records, and online transactions is rendered obsolete by quantum computing.

Quantum computers have capabilities that can lay to ruin all of the public-key cryptographic systems currently in use. These capabilities, which aren’t known to be present in the classical computers of today, include the ability to almost instantly find the prime factors of extremely large numbers, using a method called Shor’s algorithm. Quantum computing is also believed to be capable of tackling other mathematical problems classical computers can’t solve quickly, including computing discrete logarithm mod primes and discrete logs over elliptic curves.

The difficulty of factoring and computing discrete log primes and elliptic curve discrete logs play an essential role in cryptographers’ confidence in RSA, elliptic curve cryptography, and other public-key crypto systems. When implemented correctly, most scientists and cryptographers believe that the crypto can’t be defeated with today’s computers before the end of the universe.”

http://arstechnica.com/security/2015/08/nsa-preps-quantum-resistant-algorithms-to-head-off-crypto-apocolypse/

from projectbullrun.org;

Abstract. Dual EC is an algorithm to compute pseudorandom numbers starting from some random input. Dual EC was standardized by NIST, ANSI, and ISO among other algorithms to generate pseudorandom numbers. For a long time this algorithm was considered suspicious – the entity designing the algorithm could have easily chosen the parameters in such a way that it can predict all outputs – and on top of that it is much slower than the alternatives and the numbers it provides are more biased, i.e., not random.

The Snowden revelations, and in particular reports on Project Bullrun and the SIGINT Enabling Project, have indicated that Dual EC was part of a systematic effort by NSA to subvert standards.

This paper traces the history of Dual EC including some suspicious changes to the standard, explains how the back door works in real-life applications, and explores the standardization and patent ecosystem in which the standardized back door stayed under the radar.” IMG_0071-0

https://projectbullrun.org/dual-ec/documents/dual-ec-20150731.pdf

image; © Rachael Parsons. The BackDoor Gallery @ Room 60 QLD