On Wed, Mar 30, 2011 at 02:21:18PM +0200, Claudio Jeker wrote:
> On Wed, Mar 30, 2011 at 01:29:02PM +0200, Pierre-Emmanuel André wrote:
> > On Wed, Mar 30, 2011 at 11:42:23AM +0200, viq wrote:
> > > On Tue, Mar 29, 2011 at 06:14:21AM -0600, Pierre-Emmanuel Andre wrote:
> > > > CVSROOT:        /cvs
> > > > Module name:    ports
> > > > Changes by:     p...@cvs.openbsd.org    2011/03/29 06:14:21
> > > > 
> > > > Log message:
> > > >     Import libperseus.
> > > >     
> > > >     PERSEUS library is an open source technology whose aim is to secure 
> > > > any
> > > >     kind of communication streams against illegitimate or abusive
> > > >     eavesdropping except for Nation State Security offices, provided 
> > > > that a
> > > >     suitable, huge computing power is used (from tens of hours with a
> > > >     supercomputer).
> > > >     
> > > >     ok jasper@
> > > 
> > > "PERSEUS library is an open source technology whose aim is to secure
> > > any kind of communication streams against illegitimate or abusive
> > > eavesdropping except for Nation State Security offices, provided that a
> > > suitable, huge computing power is used (from tens of hours with a
> > > supercomputer). PERSEUS enables to provide at the same time users' needs
> > > for privacy and confidentiality while preserving the ability of security
> > > agencies (police, defense, national security...) to eavesdrop
> > > communications of really bad actors (terrorists, child pornographs...)."
> > > 
> > > Huh? While preserving the ability of security agencies to eavesdrio
> > > communications? Any information how that is actually done?
> > > 
> > > Also, anything that uses/plans to use this?
> > 
> > 
> > The purpose of perseus is not to "crypt" data but rather to "hide" them 
> > by adding noise (like this they doesn't look like encrypted).
> > And indeed, you can "break" perseus but for this you will need to have 
> > a huge computing power (typically a supercomputer).
> > 
> 
> With the performance of CUDA cards in crypto breaking the term
> huge computing power is no longer something that special. So honestly I
> would not consider a library claiming stuff like:
> "PERSEUS enables to provide at the same time users' needs for 
> privacy and confidentiality while preserving the ability of 
> security agencies to eavesdrop communications of really bad 
> actors"
> to be more secure then telnet itself.

Indeed, using CUDA cards for crypto is interesting. Dunno if the authors 
tried this ways to break perseus.
According to this site (http://www.esiea-recherche.eu/data/iawacs11_cfp.txt ), 
there will be a challenge to break libperseus (award 3000 euros).
It will be interesting to see the results.
 
> Especially I LOL when I read this:
> "To protect communications from "non democratic" states
> towards democratic states (e.g; journalists)."
> 
> I wonder how the source code manages to let the "good" guys in but keep
> the "bad" guys out.
> 

Right, sorting "good" and "bad" guys will be difficult :)


-- 
Pierre-Emmanuel André <pea at raveland.org>
GPG key: 0x7AE329DC

Reply via email to