On Wed, Mar 30, 2011 at 01:29:02PM +0200, Pierre-Emmanuel André wrote:
> On Wed, Mar 30, 2011 at 11:42:23AM +0200, viq wrote:
> > On Tue, Mar 29, 2011 at 06:14:21AM -0600, Pierre-Emmanuel Andre wrote:
> > > CVSROOT:  /cvs
> > > Module name:      ports
> > > Changes by:       p...@cvs.openbsd.org    2011/03/29 06:14:21
> > > 
> > > Log message:
> > >     Import libperseus.
> > >     
> > >     PERSEUS library is an open source technology whose aim is to secure 
> > > any
> > >     kind of communication streams against illegitimate or abusive
> > >     eavesdropping except for Nation State Security offices, provided that 
> > > a
> > >     suitable, huge computing power is used (from tens of hours with a
> > >     supercomputer).
> > >     
> > >     ok jasper@
> > 
> > "PERSEUS library is an open source technology whose aim is to secure
> > any kind of communication streams against illegitimate or abusive
> > eavesdropping except for Nation State Security offices, provided that a
> > suitable, huge computing power is used (from tens of hours with a
> > supercomputer). PERSEUS enables to provide at the same time users' needs
> > for privacy and confidentiality while preserving the ability of security
> > agencies (police, defense, national security...) to eavesdrop
> > communications of really bad actors (terrorists, child pornographs...)."
> > 
> > Huh? While preserving the ability of security agencies to eavesdrio
> > communications? Any information how that is actually done?
> > 
> > Also, anything that uses/plans to use this?
> 
> 
> The purpose of perseus is not to "crypt" data but rather to "hide" them 
> by adding noise (like this they doesn't look like encrypted).
> And indeed, you can "break" perseus but for this you will need to have 
> a huge computing power (typically a supercomputer).
> 

With the performance of CUDA cards in crypto breaking the term
huge computing power is no longer something that special. So honestly I
would not consider a library claiming stuff like:
"PERSEUS enables to provide at the same time users' needs for 
privacy and confidentiality while preserving the ability of 
security agencies to eavesdrop communications of really bad 
actors"
to be more secure then telnet itself.

Especially I LOL when I read this:
"To protect communications from "non democratic" states
towards democratic states (e.g; journalists)."

I wonder how the source code manages to let the "good" guys in but keep
the "bad" guys out.

-- 
:wq Claudio

Reply via email to