<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
   <channel>
      <title>Making Light :: Keep It Secret, Keep It Safe :: comments</title>
      <link>https://nielsenhayden.com/makinglight/archives/010554.html#comments </link>
      <description>Language, fraud, folly, truth, history, and knitting. Et cetera.</description>
      <language>en</language>
      <lastBuildDate>Tue, 09 Sep 2008 02:31:41 -0500</lastBuildDate>
      <generator>http://www.sixapart.com/movabletype/?v=4.34-en</generator>
      
      <item>
      <title>Keep It Secret, Keep It Safe</title>
      <description>Let us talk, dearly beloved, about a reasonable pencil-and-paper crypto system, for those times when you don't want to use...</description>
      <content:encoded>Let us talk, dearly beloved, about a reasonable pencil-and-paper crypto system, for those times when you don't want to use...</content:encoded>
      <link>https://nielsenhayden.com/makinglight/archives/010554.html</link>
      </item>

      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #1 from Linkmeister</title>
         <description>comment from Linkmeister on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Also ensure that your correspondent knows which edition of the book you used to encrypt the message, particularly if it's something as common as an almanac.  I'm sure I've seen that twist used in some novel or another, followed by great whoops of laughter as the detective realizes the error. </p>]]>
	 &lt;p&gt;Posted September  9, 2008  2:31 AM by Linkmeister&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292528</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292528</guid>
         <pubDate>Tue, 09 Sep 2008 02:31:41 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #2 from Doug Burbidge</title>
         <description>comment from Doug Burbidge on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>The suggested algorithm is, I think, subject to differential cryptanalysis.  That is, if two different messages are encrypted using the same key, it's much easier to crack than brute force would suggest.</p>

<p>Another weakness is that the keystream suggested is not evenly distributed: in a list of numbers like this, numbers are more likely to start with small digits.</p>

<p><em>Crptonomicon</em> references a crypto scheme which uses a deck of cards (or, really, two matched decks of cards: one for encrypt, one for decrypt).  The algorithm is in the back of the book, and on <a href="http://en.wikipedia.org/wiki/Solitaire_(cipher)" rel="nofollow">Wikipedia</a>.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  2:45 AM by Doug Burbidge&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292530</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292530</guid>
         <pubDate>Tue, 09 Sep 2008 02:45:13 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #3 from Dave Bell</title>
         <description>comment from Dave Bell on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Sherlock Holmes, I think. It's a book code, he discounts Bradshaw on grounds of limited vocabulary, tries Whitaker's Almanac, and then realises he has the latest edition, only just published...</p>

<p>[Googles...]</p>

<p>It's the opening of <i>The Valley of Fear</i>.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  2:56 AM by Dave Bell&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292531</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292531</guid>
         <pubDate>Tue, 09 Sep 2008 02:56:23 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #4 from Devin</title>
         <description>comment from Devin on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>It's cryptanalysis that you use for reading other folks' mail (assuming you're not a gentleman or an old-timey secretary of state, that is).  Rubberhose cryptography would be like beating someone up and using the number of times you hit them before they lost consciousness as the seed to your pseudo-random number generator.</p>

<p>And in response to the present and likely future comments on how this isn't really mathematically much better than ROT13...  Honestly if you're using anything better than a Caesar cipher, your crypto is fairly likely to be the strongest link in the chain*.  Think hard about whether your end is safe from black bag work, traffic analysis, etc, and whether your correspondents are scrupulous and trustworthy before you work any harder than something like this or a tableaux cipher, if it really has to be pen and paper.  If you're corresponding in email anyhow, you might as well use GPG etc, but make sure you don't save the plaintext, you scrub everything, etc etc.</p>

<p>*Certain channels can expect technologically sophisticated attackers, but few of us ever need to think about how to secure those channels.  The stuff we need to think about, usually the attacker will have more human savvy than tech savvy, and so checkbook, black bag, traffic analysis, and subornment are more likely modes of attack.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  4:28 AM by Devin&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292534</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292534</guid>
         <pubDate>Tue, 09 Sep 2008 04:28:06 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #5 from -dsr-</title>
         <description>comment from -dsr- on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>If your threat model allows you to do all these manipulations and send a note to your ally which will be received even though it is intercepted... I don't know what your threat model is.</p>

<p>Let me suggest something much simpler and harder: two code words which you arrange with your ally. One word means "I'm in trouble"; the other word means "Don't trust anything from me until you see me in person." The words should be common enough that you can work them into a phone conversation or an email, but not so common that you will use them by accident. An uncommon synonym for a common thing is plausible.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  6:04 AM by -dsr-&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292538</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292538</guid>
         <pubDate>Tue, 09 Sep 2008 06:04:24 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #6 from Zeborah</title>
         <description>comment from Zeborah on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>I have a fondness for a variation on the Vigenere cipher whereby a+a=b (meaning I can do it in my head so don't need a square) and the key is a) at least as long as the plaintext and b) not English.  This can be trivially combined with the general theory of book cipherage in any number of ways I leave as an exercise to the reader.</p>

<p>Phone books, TV guides, and newspapers (depending how often one wants to change the source of the key) are handy and unremarkable sources of pseudo-random letters and numbers.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  6:09 AM by Zeborah&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292539</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292539</guid>
         <pubDate>Tue, 09 Sep 2008 06:09:34 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #7 from David Goldfarb</title>
         <description>comment from David Goldfarb on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>I just read Dave Duncan's <em>The Alchemist's Code</em> and he describes a ROT-polyalphabetic that seemed pretty good.  Probably not proof against the NSA, but then not a lot is.</p>

<p>Basically you pick a key word or phrase, and write out rotated alphabets where A goes to each successive letter in the key.  So for example if the key were MAKING LIGHT you'd have</p>

<p>MNOPQRSTUVWXYZABCDEFGHIJKL<br />
ABCDEFGHIJKLMNOPQRSTUVWXYZ<br />
KLMNOPQRSTUVWXYZABCDEFGHIJ<br />
IJKLMNOPQRSTUVWXYZABCDEFGH</p>

<p>...and so on.  Then to encipher, you go through your successive alphabets one by one.  So the word FOOL, say, here would go to ROYT.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  6:18 AM by David Goldfarb&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292540</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292540</guid>
         <pubDate>Tue, 09 Sep 2008 06:18:54 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #8 from Zeborah</title>
         <description>comment from Zeborah on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>David@7 - I think that's a Vigenere cipher sideways.  The problem is that with a short key like "Making Light" you run out of alphabets and have to start again at the top, and repetition is a Bad Thing.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  6:25 AM by Zeborah&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292541</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292541</guid>
         <pubDate>Tue, 09 Sep 2008 06:25:56 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #9 from Peter Erwin</title>
         <description>comment from Peter Erwin on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>David Goldfarb @ 7:<br />
That's basically a <a href="" rel="nofollow">Vigenère cipher</a>, which was pretty much state-of-the-art from the 16th Century until the 19th Century, when it was broken. (By, among others, Charles Babbage.)  These days, there are <a href="" rel="nofollow">online applets</a> that can help you break messages enciphered this way.</p>

<p><br />
Whoops -- I see that Zeborah (#8) just pointed that out.  I'll add that the advantage of what James described is that they key -- the sequence of letters or numbers you use to generate the substitution -- is intended to be long enough that it doesn't repeat before the message ends.  If the sequence of numbers is genuinely random as well (unlike, say, a passage of text in a particular language), then you have a proper one-time pad, which <i>is</i> unbreakable.  Unless you re-use it for later messages...</p>

<p>A slightly better approach might be for you and your friend to use some regularly updated, public source of pseudo-random numbers.  E.g., the last digit of each price or trading-volume amount, taken from the most recent close-of-market summary in a particular newspaper or other widely available listing.  Now you've got a (nearly) inexhaustible source of numbers. (Of course, this only works if no one knows that's where you're getting the random numbers from.  But the same is true with using numbers from an almanac.)</p>]]>
	 &lt;p&gt;Posted September  9, 2008  7:02 AM by Peter Erwin&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292542</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292542</guid>
         <pubDate>Tue, 09 Sep 2008 07:02:53 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #10 from Dave Bell</title>
         <description>comment from Dave Bell on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>The basic advantage of the method Jim describes is that it is a reasonably efficient method of converting alphabetic characters to numbers. And you can rearrange the numbering to use different digits for the horizontal rows.</p>

<p>But that would be a false complication, because the security is in the arithmetic, derived from the keytext. Even with a poor key source, such as described, it's difficult. It's going to need professional cryptanalysis.</p>

<p>And if you keep your messages short, it can be practically unbreakable.</p>

<p>You can combine the idea of a "don't trust me" code with any means of sending a message. You might pad out the beginning and end of the message with a couple of random words--it helps avoid easy-to-spot patterns--and that's where your warning code will go.</p>

<p>And if you're using a book of statistical information, agree to drop the first couple of digits of each number.</p>

<p></p>

<p></p>

<p><br />
</p>]]>
	 &lt;p&gt;Posted September  9, 2008  7:15 AM by Dave Bell&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292543</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292543</guid>
         <pubDate>Tue, 09 Sep 2008 07:15:37 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #11 from John Stanning</title>
         <description>comment from John Stanning on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>The drawback of using cryptography is that it reveals to the opposition that you have something to conceal. If they already know you're on the other side, that doesn't matter of course; if they don't, and you want to prevent or delay them finding out, then you use steganography, "the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message" (<a href="http://en.wikipedia.org/wiki/Steganography" rel="nofollow">Wikipedia article</a>). With a numerical code, you might format it so as to look like accounts or budget or some such, assuming that you and your pal have cover that would fit, and you'd pad the significant numbers with non-significant numbers.</p>

<p>A nice example of steganography is given in Dorothy L. Sayers' novel <em>The Nine Tailors</em> (worth reading for other reasons). You can find the coded text by Googling for the opening words "I thought to see the fairies in the fields", but for the solution you may have to read the book. (I'd love to know how long it took Sayers to compose the text.) It has some nice twists: the decoding 'key' is a method of English change-ringing, which an opposition without knowledge of this rather arcane subject might miss (also, you don't have to memorise the key, only the method that generates it); and the result of decoding is itself cryptic, requiring further understanding to reveal the actual message.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  7:16 AM by John Stanning&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292544</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292544</guid>
         <pubDate>Tue, 09 Sep 2008 07:16:50 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #12 from heresiarch</title>
         <description>comment from heresiarch on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>It's funny; I just finished rereading <i>Cryptonomicon</i> yesterday. Hmm--I've been inspired to go back and actually learn Solitaire.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  7:33 AM by heresiarch&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292545</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292545</guid>
         <pubDate>Tue, 09 Sep 2008 07:33:29 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #13 from Neil Willcox</title>
         <description>comment from Neil Willcox on  9.Sep.08</description>
         <content:encoded><![CDATA[<p><i>You might pad out the beginning and end of the message with a couple of random words--it helps avoid easy-to-spot patterns--and that's where your warning code will go.</i></p>

<p>I think there's a bit in a John LeCarre novel when a directive comes down to stop calling all their operations Operation $Whatever but just $Whatever.<br />
</p>]]>
	 &lt;p&gt;Posted September  9, 2008  7:36 AM by Neil Willcox&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292546</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292546</guid>
         <pubDate>Tue, 09 Sep 2008 07:36:10 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #14 from BSD</title>
         <description>comment from BSD on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Unless you're engaged in ongoing espionage, how is this easier than planning to be terse and generating sufficient one-time pads?</p>]]>
	 &lt;p&gt;Posted September  9, 2008  7:51 AM by BSD&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292549</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292549</guid>
         <pubDate>Tue, 09 Sep 2008 07:51:41 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #15 from Graydon</title>
         <description>comment from Graydon on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>The presence of a one-time pad is difficult to conceal and a functional admission of guilt.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  8:02 AM by Graydon&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292551</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292551</guid>
         <pubDate>Tue, 09 Sep 2008 08:02:02 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #16 from Carrie S.</title>
         <description>comment from Carrie S. on  9.Sep.08</description>
         <content:encoded><![CDATA[<p><em>The drawback of using cryptography is that it reveals to the opposition that you have something to conceal...use steganography, "the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message" </em></p>

<p>I came up with a rather nice method of steganography that has the added advantage of being encodable in any format that will allow you to transmit ones and zeros.  Fits on a 3x5 card, too.</p>

<p>Of course I'm not going to post it here. :)</p>

<p><em>The presence of a one-time pad is difficult to conceal and a functional admission of guilt.</em></p>

<p>I remember seeing an Edwardian-era spy drama on A&E once, in which the main character begins to suspect that the lady to whom he's been attracted is in fact the enemy agent he was sent to discover.  So he searches her room and finds a bunch of papers covered in incomprehensible strings of letters and numbers, and, sick at heart, turns her in.  I don't remember if he killed her himself or if other agents of his employer did so after she was in custody.  Her code-sheets get taken back to headquarters to be deciphered, but the codebreakers are utterly stumped until a secretary gets a look at them and wonders why everyone's making such a big fuss over a bunch of knitting patterns...</p>

<p>Which of course raises the possibility of a code based on knitting/crochet/cross-stitch patterns.  You could even have different keys based on, say, the first letter of the second word of the pattern's "name": if it's called "Chinese Lantern", use Transcription 4, but if it's called "Chinese Dragon", use Transcription 17, etc.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  9:04 AM by Carrie S.&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292554</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292554</guid>
         <pubDate>Tue, 09 Sep 2008 09:04:39 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #17 from ajay</title>
         <description>comment from ajay on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>15: there's also the bulk issue. For OTP encryption, you need to use one sheet per message. If you're sending a lot of messages, that's a lot of pads to handle, keep safe, not lose, not accidentally damage or destroy, keep away from damp and mice (yes, it happens!) etc, at both ends of the link - and/or a lot of risky meetings with your handler to get new ones. </p>

<p>All you need for the system above is the source of pseudo random numbers, which is innocuous and easily replaceable, and your two five-digit keys, which you can memorise.</p>

<p><i>You can combine the idea of a "don't trust me" code with any means of sending a message. You might pad out the beginning and end of the message with a couple of random words--it helps avoid easy-to-spot patterns--and that's where your warning code will go.</i></p>

<p>Simply leave it out if you are transmitting under duress. And pray that your handlers are better at their jobs than the SOE handlers for the Dutch agents caught and forced to transmit by the Gestapo during Operation NORTH POLE; at least one captured agent, sending from Gestapo HQ, was horrified to receive a stern reminder from Broadway - "next time, do not forget to include your security check!"</p>]]>
	 &lt;p&gt;Posted September  9, 2008  9:10 AM by ajay&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292555</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292555</guid>
         <pubDate>Tue, 09 Sep 2008 09:10:29 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #18 from ajay</title>
         <description>comment from ajay on  9.Sep.08</description>
         <content:encoded><![CDATA[<p><i>Which of course raises the possibility of a code based on knitting/crochet/cross-stitch patterns. </i></p>

<p>Neal Stephenson, "The Confusion" - gros-point embroidery. </p>]]>
	 &lt;p&gt;Posted September  9, 2008  9:12 AM by ajay&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292556</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292556</guid>
         <pubDate>Tue, 09 Sep 2008 09:12:01 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #19 from James D. Macdonald</title>
         <description>comment from James D. Macdonald on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>#2 <i>That is, if two different messages are encrypted using the same key, it's much easier to crack than brute force would suggest.</i></p>

<p>That's why you do your best to never use the same key twice.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  9:22 AM by James D. Macdonald&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292557</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292557</guid>
         <pubDate>Tue, 09 Sep 2008 09:22:45 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #20 from ajay</title>
         <description>comment from ajay on  9.Sep.08</description>
         <content:encoded><![CDATA[<p><i>Another weakness is that the keystream suggested is not evenly distributed: in a list of numbers like this, numbers are more likely to start with small digits.</i></p>

<p>Ha! Benford's Rule! Good catch. I think you could get round it, though, by omitting the first digit of every value in the list. Mathematicians - would that work? </p>]]>
	 &lt;p&gt;Posted September  9, 2008  9:28 AM by ajay&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292559</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292559</guid>
         <pubDate>Tue, 09 Sep 2008 09:28:11 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #21 from C.E. Petit</title>
         <description>comment from C.E. Petit on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Many of Jim's imprecations on how to maintain security pale in comparison to the most important one:</p>

<p>Don't give a cryptanalyst a known plaintext by either:</p>

<p>* Extensively quoting something in current events that is also widely quoted in news sources, such as the text of the State of the Union (anything of more than around 900 characters will create enough text to analyze rather thoroughly using 1970s computing equipment and software). This kind of attack is behind how CSS was broken so quickly.</p>

<p>* Avoid unique terms wherever possible, and in particular avoid overrepetition of proper names that will be directly linked to either the sender or receiver. One of the best examples of this is Yardley's decryption of Japanese codes during the World War Interregnum by assuming that they would include extensive repetition of "Irish independence"... in a language that Yardley did not speak.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  9:30 AM by C.E. Petit&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292560</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292560</guid>
         <pubDate>Tue, 09 Sep 2008 09:30:58 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #22 from John Mark Ockerbloom</title>
         <description>comment from John Mark Ockerbloom on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>I suspect that a message of sufficient length that's been checkerboard-ciphered can be recognized as such with a computer, due to the high frequencies of 1's and 2's, and the frequency of repeats of the 1 and 2-digit patterns.  Moreover, if I've gotten the message decoded as far as the checkerboard cipher, it's essentially a newspaper cryptogram, which is easy for computers (or humans) to solve if the message is of sufficient length.</p>

<p>So if I were the eavesdropper, knew that my targets were using this type of scheme, and had access to a computer and some clerical staff, I'd probably want to have some files preloaded with the tables from common reference works, like the World Almanac.  (And if my agents noticed some uncommon reference works in my target's houses, I might also get someone to copy from them, particularly if two targets had the same uncommon reference work.)</p>

<p>Then, if I intercepted a message, I could try running it against *all* the starting rows in my repertoire, and see which ones result in something looking like a checkerboard cipher.  If I'm lucky, there are only a few that do; and I can then try seeing if any of them can be solved as a cryptogram.</p>

<p>If one can, I not only have the message, but I know what book they're using, where the two "control strings" are being put, and since I know the starting row, I also know what 5-digit keys they're using for this message.  All of these<br />
extra bits of information can make it a lot easier to decode the next intercepted message.</p>

<p>There's obviously a lot of prep work involved here, but once the files are prepared, a computer could potentially grind through the problem in seconds, without needing keys, and unlike rubber-hose or checkbook cryptanalysis, neither the sender nor the recipient would get an obvious indication that their code had been cracked.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  9:31 AM by John Mark Ockerbloom&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292561</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292561</guid>
         <pubDate>Tue, 09 Sep 2008 09:31:29 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #23 from Kevin J. Maroney</title>
         <description>comment from Kevin J. Maroney on  9.Sep.08</description>
         <content:encoded><![CDATA[<p><i>The presence of a one-time pad is difficult to conceal and a functional admission of guilt.</i></p>

<p>One of the brilliant bits of Bruce Schneier's Solitaire Cipher (referenced above--it's the cipher in <i>Cryptonomicon</i>) is that the decryption pad is a deck of cards. <i>Everyone</i> has a deck of cards. You can key the deck to a Bridge column in a newspaper that both the sender and receiver reliably get, or (these days) to a Bridge website. </p>

<p>I've long thought that Usenet, esp. the binaries newsgroups, would be a great source of random data for one-time pads <i>and</i> a great hiding place for steganographic messages. </p>]]>
	 &lt;p&gt;Posted September  9, 2008  9:33 AM by Kevin J. Maroney&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292562</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292562</guid>
         <pubDate>Tue, 09 Sep 2008 09:33:50 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #24 from Scott Taylor</title>
         <description>comment from Scott Taylor on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>-dsr - <br />
<em>If your threat model allows you to do all these manipulations and send a note to your ally which will be received even though it is intercepted... I don't know what your threat model is.</em></p>

<p>Any delivery system is susceptible to man-in-the-middle attacks. E-mail and snail mail* messages can be intercepted, copied, and allowed to continue (to prevent either end of the communication link from sending up the red flag via alternate methods), and then analyzed (via brute-force if necessary) at leisure. </p>

<p><em>Let me suggest something much simpler and harder: two code words which you arrange with your ally. One word means "I'm in trouble"; the other word means "Don't trust anything from me until you see me in person." The words should be common enough that you can work them into a phone conversation or an email, but not so common that you will use them by accident. An uncommon synonym for a common thing is plausible.</em></p>

<p>This kind of scheme is useful, and can be implemented in addition to other methods.</p>

<p>One useful tool for something like this is to incorporate a "Start word" - a word that allows you to use those other flag words in conversation - <em>as long as they are not used after that word</em>.</p>

<p>For example, let's take the following set - <br />
"Absolutely" - START WORD. <br />
"Supper" - In trouble. Send Lawyers, Guns, and Money.<br />
"Dinner" - In trouble. Attempt No Rescue. Abandon.<br />
"Bibliophile" - Person mentioned in this sentence is a traitor!<br />
"Automobile" - Trust no communication from my cell until I speak with you directly.</p>

<p>Then the communication - </p>

<blockquote>Sure, Abi, that's great. Look, we should get together sometime soon. Say, Dinner next week? I'll see if Daniel wants to come along - he's been dying to meet you - says he's a real bibliophile, and wants to talk to you about book-binding.</blockquote>

<p>is totally innocuous, but</p>

<blockquote>Absolutely, Abi, that's great. Look, we should get together sometime soon. Say, Dinner next week? I'll see if Daniel wants to come along - he's been dying to meet you - says he's a real bibliophile, and wants to talk to you about book-binding.</blockquote>

<p>means that I'm compromised (and likely my cell is as well), the situation is precarious enough that I don't want even an attempt to rescue (time for a Burn Notice), and that I know my turncoat is Daniel - who should either be encysted, or killed.</p>

<p>*It should be assumed, at all times, that any and all broadcast based data transmission methods are compromised - this includes not just radio and cell phones, but also bluetooth (infra-red might be okay), and electronic devices in general (unless TEMPEST rated, or operated inside a Faraday cage). There are just too many snooping devices out there, and too many ways to capture signal.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  9:34 AM by Scott Taylor&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292563</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292563</guid>
         <pubDate>Tue, 09 Sep 2008 09:34:04 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #25 from Carrie S.</title>
         <description>comment from Carrie S. on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>#24: Was it Campion who had an elaborate system along those lines?  Like, there were certain phrases which meant, "Whatever time I say in this sentence, meet me three hours later" and so forth?  I could swear it was, but my google-fu fails me.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  9:38 AM by Carrie S.&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292564</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292564</guid>
         <pubDate>Tue, 09 Sep 2008 09:38:55 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #26 from ajay</title>
         <description>comment from ajay on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>23: using a daily bridge column falls foul of the same brute force approach that 22 mentions, as Schneier points out; there are ways to set up a Solitaire pack using a passphrase, though.</p>

<p>Another useful source of pseudo random numbers would be the day's closing stock prices as printed in the Financial Times. </p>

<p>Or a Numbers Station! All you have to include in your key is which frequency to listen on and when to start listening. And those are probably much more robustly pseudo random than stock prices or almanac data. </p>]]>
	 &lt;p&gt;Posted September  9, 2008  9:52 AM by ajay&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292565</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292565</guid>
         <pubDate>Tue, 09 Sep 2008 09:52:58 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #27 from Scott Taylor</title>
         <description>comment from Scott Taylor on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Carrie S - <br />
<em>#24: Was it Campion who had an elaborate system along those lines? Like, there were certain phrases which meant, "Whatever time I say in this sentence, meet me three hours later" and so forth? I could swear it was, but my google-fu fails me.</em></p>

<p>It may have been. This type of scheme has been used in fiction quite a lot, AIR (Didn't they have a similar schema in The Moon is a Harsh Mistress?)</p>

<p>Such systems have to be kept pretty small - the whole "seven +/- two" deal, and should, of course, never be written down in "exploded" format - but this is true with all codes.</p>

<p>Code systems, other than very small ones like this, have mostly been supplanted by ciphers like the one James describes above, one-time pads, and computer-aided cryptography like PGP, because if you capture the codebook, you've cracked the whole system, while a cipher *should* (theoretically) be resistant to analysis unless samples of the plaintext are available, *even* if you know the encryption schema, as long as you don't have the keys used to encrypt and decrypt. </p>

<p>(Theoretically because not all encryption schemas are created equal, and some are more susceptible to brute-force analysis than others). </p>]]>
	 &lt;p&gt;Posted September  9, 2008  9:59 AM by Scott Taylor&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292566</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292566</guid>
         <pubDate>Tue, 09 Sep 2008 09:59:23 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #28 from albatross</title>
         <description>comment from albatross on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Devin #4:</p>

<p>WEP is one very nice, public example of incompetently done crypto that is the weak point of real-world communications.  I think the crappy cellphone encryption and truly embarrassing cordless phone "encryption" (aka frequency hopping with a short pseudorandom spreading sequence, for the best ones, as far as I can tell) are other examples of the crypto being the weak point.  Similarly, NSA apparently imposed a 56-bit key on DES (IBM wanted a 128-bit key; left to their own devices, I think they'd have produced a cipher that was weaker with respect to academic attacks, but which would also have been secure in practice even today), and required dumbing down commercial crypto products for export to 40 bits for many years.  Those both indicate places where the crypto is liable to be the weak link, because the cryptanalysis can be done efficiently and automated.  (In particular, keysearch attacks as on DES and those 40-bit ciphers are very susceptible to doing a godawful precomputation, storing a lot of intermediate information, and then pretty quickly being able to break a given instance of the cipher.)  </p>

<p>More to the point, you need to think about what resources your attacker has.  If he's installed malware on your computer, all ciphers done on that computer are trivially breakable to him[1].  If not, you will do much better with a computer-mediated cipher than you can with any paper-and-pencil cipher, not least because even using some random shared information as a one-time pad and just doing mod 26 addition on it is a massive pain, and so you'll be tempted not to encrypt everything.  (And you don't want to encrypt known stuff under a weak paper-and-pencil cipher!)</p>

<p>The flaw with Jim's comment here about cryptography buying you time is that once someone has spent the time to work out an effective break against the paper-and-pencil cipher you're using, they can code up their break or the tools needed for their break.  Developing the attack requires a moderately bright person, but using the tools to break future things usually doesn't.  (Sometimes, Bruce Schneier calls this phenomenon a "class break"--once the thing is attacked once, the attack spreads throughout the whole world very quickly.)  </p>

<p>If you decide to use paper and pencil ciphers and books for running key material, you really, really want a book that's not online anywhere.  That's kind-of hard to guarantee, but maybe you can manage it.  But if there's any way you can get a trusted computer, you're going to to much better.  You can leverage the trusted computer to do some really cool things.  For example, there are visual one-time-pads and visual secret sharing schemes that are amazingly cool, and that can be used to communicate with computerless agents in the field using magazine or newspaper photos, faxes, etc., of completely innocuous things.  See <a href="http://en.wikipedia.org/wiki/Visual_cryptography" rel="nofollow">this Wikipedia article</a> for more information.  </p>

<p>I think paper-and-pencil schemes are really hard to use to secure communications, though one-time-pads will work if you can avoid <a href="http://en.wikipedia.org/wiki/Venona" rel="nofollow">messing up handling your key material</a>.  (Note that a one-time pad is unconditionally secure, and a two-time pad is unconditionally insecure.)  It's probably a lot easier to use paper and pencil to authenticate a message, and that's often just as important.  </p>

<p>[1] Modulo the assumption he can get information back out, or knows your crypto scheme well enough to target the malware at it specifically.</p>]]>
	 &lt;p&gt;Posted September  9, 2008 10:19 AM by albatross&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292572</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292572</guid>
         <pubDate>Tue, 09 Sep 2008 10:19:05 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #29 from JJ Fozz</title>
         <description>comment from JJ Fozz on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Ah, the Jesuits - one of the few things I am thankful for when it comes to being raised Catholic - along with never being touched by Father McFeelmeup in my "swimsuit area."</p>]]>
	 &lt;p&gt;Posted September  9, 2008 10:26 AM by JJ Fozz&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292573</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292573</guid>
         <pubDate>Tue, 09 Sep 2008 10:26:02 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #30 from James D. Macdonald</title>
         <description>comment from James D. Macdonald on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Scott's #24 is why the Bug Every Phone Call project that the Republicans have launched to Keep Us Safe From Terrorists is useless against actual terrorists.</p>

<p>Terrorists' phone calls would most likely sound like, "Hey, Fred, are you coming to the party on Saturday?  Maude is making potato salad!"</p>

<p>Where the Bug Every Phone program would be actually useful would be in making sure Halliburton is never underbid again, and in finding out what the Democratic National Committee  is planning in the way of ad buys over the next couple of weeks.<br />
</p>]]>
	 &lt;p&gt;Posted September  9, 2008 10:35 AM by James D. Macdonald&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292574</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292574</guid>
         <pubDate>Tue, 09 Sep 2008 10:35:28 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #31 from albatross</title>
         <description>comment from albatross on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Scott #27:</p>

<p>I think the (rather old) state of the art is that you destroy (burn) the one-time pads as you use them, and that (modulo screwups) nobody on Earth but your sender and recipient have the one-time pads.  An interesting question to ask is how you would know if your one time pads (or computer) had been tampered with--the police sometimes get warrants to silently come in and install keyloggers on computers, and criminals or spies obviously won't care a bit about warrants.  </p>

<p>One known weakness for PGP and similar systems is the use of passwords to derive symmetric keys; for PGP, if I capture a copy of your keyring, plus guess your password, I have your private key.  (And for encryption, as with encrypted disks and such, I just have to guess your password.)  The countermeasures to this in practice involve making the mapping from a password to a key unique to an instance (so you have to guess the passwords for every distinct encrypted file, not once for all of them) and more expensive (by making you do a million iterations of some computation before you get the key out).  But that's not a great solution, because doubling the amount of work the attacker does also doubles the amount of work the legitimate user does!  To make dictionary attacks really hard, I probably want to set an iteration count so it takes me several seconds after I type the password in until the key is derived.  </p>

<p>The underlying problem here is that people aren't very good at making up or remembering good passwords, especially if you know any of their other passwords, as a lot of people use a pattern: ("Xxxamazon123", "Xxxmyspace123", "Xxxgmail123", etc.)  A lot of practical cryptanalysis of this kind is done by the police at various levels, and the FBI apparently has a large set of computers on which they do massive password searches (aka dictionary attacks).  There are some private companies in this business, as well.  </p>

<p>Graydon #15:</p>

<p>In any environment in which the presence of one-time-pads is incriminating, so is the presence of ciphertext coming from you, or worksheets on which you were computing your encryption (which are necessary for anyone not named Gauss or Libby for a lot of paper-and-pencil schemes).  </p>]]>
	 &lt;p&gt;Posted September  9, 2008 10:36 AM by albatross&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292575</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292575</guid>
         <pubDate>Tue, 09 Sep 2008 10:36:53 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #32 from Bruce Schneier</title>
         <description>comment from Bruce Schneier on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Information on my <i>Cryptonomicon</i> cipher, Solitaire, <a href="http://www.schneier.com/solitaire.html" rel="nofollow">here</a>.</p>]]>
	 &lt;p&gt;Posted September  9, 2008 10:45 AM by Bruce Schneier&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292576</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292576</guid>
         <pubDate>Tue, 09 Sep 2008 10:45:33 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #33 from Liza</title>
         <description>comment from Liza on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Re steganography more than cryptography:  Charlotte MacLeod had a book in which a character is continually embroidering French knots on a set of curtains.  After her death it's discovered (by accident) that knots' patterns make words in Braille--she was writing her diary.</p>]]>
	 &lt;p&gt;Posted September  9, 2008 11:02 AM by Liza&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292579</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292579</guid>
         <pubDate>Tue, 09 Sep 2008 11:02:19 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #34 from Carrie S.</title>
         <description>comment from Carrie S. on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>#33: That was <em>Gur Snzvyl Inhyg</em>, was it not?  Been a while since I've read that series.</p>]]>
	 &lt;p&gt;Posted September  9, 2008 11:09 AM by Carrie S.&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292580</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292580</guid>
         <pubDate>Tue, 09 Sep 2008 11:09:38 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #35 from Brooks Moses</title>
         <description>comment from Brooks Moses on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>It is entertaining to consider that my small collection of old, out-of-date books of engineering and mathematics tables might actually have a practical use.  (There was a time when I was considering getting a copy of every single edition of the CRC Math Handbook, and though I soon decided that I had better uses for my bookshelf space, I still have a fair number of them.)  Though if a correspondent of mine had a similar collection, I suppose it might produce a bit of suspicion.  Perhaps better to skip them entirely, and use something like the printed copy of the source code to TeX, which isn't tables but is still surprisingly number-heavy.</p>

<p>On second thought, though, those numbers are very heavily skewed towards 1.  A minor version of that skew is also present in the World Book's numbers, though, given any reasonable distribution, and this statistical skew can IIRC be useful in cracking the cipher.  Perhaps it would be useful to, instead of copying out all of the numbers on the page, only use the ones that are second (third?) or later digits of numbers counting from the left, which will eliminate a lot of the bias.</p>

<p>Or one could use letters and convert them to numbers, thereby avoiding the need for obvious reference books.  A high-school friend of mine could convert letters to numbers in the a=1, b=2, etc., sequence with sufficient ease to be fluent in reading and writing that way.</p>]]>
	 &lt;p&gt;Posted September  9, 2008 11:14 AM by Brooks Moses&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292581</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292581</guid>
         <pubDate>Tue, 09 Sep 2008 11:14:26 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #36 from P J Evans</title>
         <description>comment from P J Evans on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>#31<br />
Why I use passwords that are random strings.</p>]]>
	 &lt;p&gt;Posted September  9, 2008 11:14 AM by P J Evans&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292582</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292582</guid>
         <pubDate>Tue, 09 Sep 2008 11:14:43 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #37 from Graydon</title>
         <description>comment from Graydon on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Albatross --</p>

<p>Sure, but ciphertext is potentially deniable, and potentially concealable in transmission. For a paper-and-pencil cipher, you really need a woodstove, because that's where all your worksheets go as soon as you have completed the ciphertext.</p>

<p>One time pads, by their nature, have to be stored.</p>

<p>Note that pretty much everywhere, encrypted anything is considered an admission of guilt in practise, no matter what the law says.</p>]]>
	 &lt;p&gt;Posted September  9, 2008 11:15 AM by Graydon&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292583</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292583</guid>
         <pubDate>Tue, 09 Sep 2008 11:15:10 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #38 from P J Evans</title>
         <description>comment from P J Evans on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Random numbers: Project Gutenberg has text files with pi and e to a million digits. This gives you a nice selection of numbers for practical use (like random-number-generated cable patterns). Merge the files in interesting ways and confuse the bad guys further!</p>]]>
	 &lt;p&gt;Posted September  9, 2008 11:19 AM by P J Evans&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292584</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292584</guid>
         <pubDate>Tue, 09 Sep 2008 11:19:19 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #39 from Scott Taylor</title>
         <description>comment from Scott Taylor on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Albatross @ 31-<br />
<em>I think the (rather old) state of the art is that you destroy (burn) the one-time pads as you use them, and that (modulo screwups) nobody on Earth but your sender and recipient have the one-time pads. An interesting question to ask is how you would know if your one time pads (or computer) had been tampered with--the police sometimes get warrants to silently come in and install keyloggers on computers, and criminals or spies obviously won't care a bit about warrants. </em></p>

<p>This is true for one-time pads, where each sheet is destroyed after use - but was <b>not</b> true for old-school codebooks, which were used for a period of time, then destroyed when replaced (on a regular schedule, normally). (OTPs were not developed until the 20th century).</p>

<p>This made these books highly valued, of course (and hard to distribute securely, and annoying in general - one reason why ciphers and OTPs are preferred today). </p>

<p>"Idiot" code systems are secure against casual or limited surveillance, but are susceptible to continued analysis - eventually the code breaks (if every time there's an attack on Lincolnshire, your messages contain reference to the North Field, eventually someone will figure out that North Field = Lincolnshire). </p>]]>
	 &lt;p&gt;Posted September  9, 2008 11:29 AM by Scott Taylor&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292586</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292586</guid>
         <pubDate>Tue, 09 Sep 2008 11:29:36 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #40 from Carrie S.</title>
         <description>comment from Carrie S. on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>I am now thinking about a way to convert Solitare to use with a Tarot deck.  Use the Magician and the High Priestess (or the Emperor and Empress, or the Fool and the World, or whatever) as jokers, but the problem is what to do with the other majors and the pages.  You could just take them out when performing the encryption, or have them count as 0, or perhaps they'd be counted when performing the count cut but if you land on one go to the next "real" card*.  Would that help or hurt the security?</p>

<p>* If you're going for "count as 0", then when you hit, say, the Star and your plaintext letter is A, you just write down 1.  If they take up space but you skip them, then if you'd land on the Star and the next card is 5 Pentacle (==5 Diamond), your encrypted value would be 19 because the Star punts to the next "real" card.</p>]]>
	 &lt;p&gt;Posted September  9, 2008 11:30 AM by Carrie S.&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292588</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292588</guid>
         <pubDate>Tue, 09 Sep 2008 11:30:58 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #41 from Alex</title>
         <description>comment from Alex on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Making Light comments threads. As long as you exclude the statistically implausible use of "fluorosphere" and "squamous".</p>]]>
	 &lt;p&gt;Posted September  9, 2008 11:31 AM by Alex&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292589</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292589</guid>
         <pubDate>Tue, 09 Sep 2008 11:31:26 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #42 from John Mark Ockerbloom</title>
         <description>comment from John Mark Ockerbloom on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Jim@24:  I'd thought that a lot of the impetus of the Bug Every Phone projects (or, more precisely, Bug Every Switch) was traffic analysis: collecting who called whom, and when, and mining that data to decide whom to monitor more closely.  For that dragnet purpose, it doesn't matter what's said on the call, or whether encryption is used on the call.  You just need to know where each call originates, and where it terminates.</p>

<p>I think that's part of why the administration is so reluctant to have these programs subject to Fourth Amendment scrutiny.  If you already have legitimate evidence that certain people might be up to something, you can get a warrant to tap their phones specifically.  But it'd be much harder to get a judge under this country's constitution to sign off on monitoring *everyone's* calling patterns; hence the attempts to keep the judiciary out of the loop.</p>

<p></p>

<p><br />
</p>]]>
	 &lt;p&gt;Posted September  9, 2008 11:33 AM by John Mark Ockerbloom&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292590</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292590</guid>
         <pubDate>Tue, 09 Sep 2008 11:33:40 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #43 from Jules</title>
         <description>comment from Jules on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Why I love Making Light: where else would you find a random and arbitrary cryptography thread which has Bruce Schneier drop in to comment, and nobody seems to notice? :)</p>]]>
	 &lt;p&gt;Posted September  9, 2008 11:45 AM by Jules&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292595</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292595</guid>
         <pubDate>Tue, 09 Sep 2008 11:45:14 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #44 from John Stanning</title>
         <description>comment from John Stanning on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Jules - we saw, and bowed silently to the Master.</p>]]>
	 &lt;p&gt;Posted September  9, 2008 12:09 PM by John Stanning&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292599</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292599</guid>
         <pubDate>Tue, 09 Sep 2008 12:09:29 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #45 from Terry Karney</title>
         <description>comment from Terry Karney on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>For those who want a very pleasant read on the subject.... <i>The Code Book</i> by Simon Singh does a very good job of the history, and up to the publication date (1999) state of the art.</p>

<p>It even has a contest (still active).</p>]]>
	 &lt;p&gt;Posted September  9, 2008 12:16 PM by Terry Karney&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292600</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292600</guid>
         <pubDate>Tue, 09 Sep 2008 12:16:57 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #46 from Seth</title>
         <description>comment from Seth on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>albatross #28: A two-time pad is not necessarily insecure.</p>

<p>C.H. Bennett, G. Brassard and S. Breidbart, "Quantum Cryptography II: How to reuse a one-time pad safely even if P=NP"</p>]]>
	 &lt;p&gt;Posted September  9, 2008 12:27 PM by Seth&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292601</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292601</guid>
         <pubDate>Tue, 09 Sep 2008 12:27:41 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #47 from Nenya</title>
         <description>comment from Nenya on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Jules #43: Like John M. Ford, Bruce Schneier was known to me for ages as a ML commentator before I learned anything about his field of expertise. </p>]]>
	 &lt;p&gt;Posted September  9, 2008 12:37 PM by Nenya&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292603</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292603</guid>
         <pubDate>Tue, 09 Sep 2008 12:37:14 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #48 from Scott Taylor</title>
         <description>comment from Scott Taylor on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Jules @ 43 - <br />
<em>Why I love Making Light: where else would you find a random and arbitrary cryptography thread which has Bruce Schneier drop in to comment, and nobody seems to notice? :)</em></p>

<p>I may be a bit jaded - I knew (if somewhat peripherally) Mr. Schneier many years ago, when he was a member of URSGA... </p>

<p>(oh, btw, Bruce - Dan Quackenbush says <b>Quack!</b> - or maybe just Hi!)</p>]]>
	 &lt;p&gt;Posted September  9, 2008 12:44 PM by Scott Taylor&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292605</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292605</guid>
         <pubDate>Tue, 09 Sep 2008 12:44:05 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #49 from JJ Fozz</title>
         <description>comment from JJ Fozz on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Cryptonomicon by Neal Stephenson, is fiction based on some fact, and is an excellent, if arduous, read.</p>]]>
	 &lt;p&gt;Posted September  9, 2008 12:45 PM by JJ Fozz&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292607</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292607</guid>
         <pubDate>Tue, 09 Sep 2008 12:45:23 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #50 from Devin</title>
         <description>comment from Devin on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>@Ajay #17:</p>

<p>I think you've pointed out the reason NOT to use the duress signal you suggest:  It's much more common to forget to include your security word than it is to actually be captured, even for real spies.</p>

<p>Having a real duress signal makes it easy for your handlers to avoid the mistake you cite.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  1:03 PM by Devin&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292608</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292608</guid>
         <pubDate>Tue, 09 Sep 2008 13:03:53 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #51 from ajay</title>
         <description>comment from ajay on  9.Sep.08</description>
         <content:encoded><![CDATA[<p><i>where else would you find a random and arbitrary cryptography thread</i></p>

<p>Excuse me. ML crypto threads are merely pseudo-random.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  1:03 PM by ajay&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292609</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292609</guid>
         <pubDate>Tue, 09 Sep 2008 13:03:55 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #52 from Jules</title>
         <description>comment from Jules on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>My favourite manual cryptosystem:</p>

<p>First use any appropriate polygraphic substitution (e.g. <a href="http://en.wikipedia.org/wiki/Playfair_cipher" rel="nofollow">Playfair</a>).  This gives a set of letter pairs that can be reasonably easily analysed and turned back into their source message.  So we need to break those pairs.  For this, we need a grid in which some of the squares are empty and some are filled (e.g. a crossword grid[1]).  Write the letters in horizontally.  Fill with random letters.  Read out vertically.</p>

<p>If you're feeling particularly energetic, repeat.</p>

<p>Decryption is the performed in the reverse order.</p>

<p>For best security, avoid long messages.</p>

<p>[1] You don't actually want to use a crossword grid, particularly not a published one. They're too regular and could be brute forced.  One possibility is to take a crossword grid and alter it to make it less regular, e.g. by blacking out the spaces for a pre-selected set of questions.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  1:04 PM by Jules&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292610</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292610</guid>
         <pubDate>Tue, 09 Sep 2008 13:04:45 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #53 from Raphael</title>
         <description>comment from Raphael on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>James Macdonald @30:<br />
<em>Where the Bug Every Phone program would be actually useful would be in making sure Halliburton is never underbid again, and in finding out what the Democratic National Committee is planning in the way of ad buys over the next couple of weeks.</em></p>

<p>Another possible use of that programm is to use the fact that terrorist phonecalls would most likely look the way you described to have officials explain at length why this or that case of Fred chatting with Maud about potatoe salad is really code for some evil terrorist plot, if, for this specific Fred and this specific Maud, that interpretation is politically desired. </p>]]>
	 &lt;p&gt;Posted September  9, 2008  1:05 PM by Raphael&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292611</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292611</guid>
         <pubDate>Tue, 09 Sep 2008 13:05:41 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #54 from Beable</title>
         <description>comment from Beable on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Terry #45: Indeed an excellent book, but it looks <a href="http://www.simonsingh.net/Cipher_Challenge.html" rel="nofollow">here</a> like the contest has long-since been solved.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  1:21 PM by Beable&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292613</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292613</guid>
         <pubDate>Tue, 09 Sep 2008 13:21:57 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #55 from Earl Cooley III</title>
         <description>comment from Earl Cooley III on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Detected use of strong crypto can rationalize "probable cause" (or at the very least, "reasonable suspicion"). The problem becomes how to have secure communications that makes traffic analysis more difficult.</p>

<p>I suppose one could have a face-to-face conversation while stark raving naked in a portable Schrödinger's catbox (kitty litter optional), but the use of such extraordinary methods to communicate could justify escalatingly intense levels of pervasive surveillance. You can't win.</p>

<p>By the way, Google indexes Making Light comments, citizen. Have a nice day!</p>]]>
	 &lt;p&gt;Posted September  9, 2008  1:31 PM by Earl Cooley III&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292615</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292615</guid>
         <pubDate>Tue, 09 Sep 2008 13:31:52 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #56 from Terry Karney</title>
         <description>comment from Terry Karney on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Beable:  Ah well.  I wasn't going to try to solve it, so I didn't really pursue the rate of solution.</p>

<p>Earl: A fact for which I am grateful, as there have been things I wanted to copy from here, and the traffic is high enough that even recalling what thread it was in gets pretty hard.</p>

<p>There are other ways of being secure; and the net has made it a lot easier to be steganographic, as well as for simple coms (plaintext ) which are much harder to spot.  </p>

<p>Dead-drops, and other such tradecraft are still really useful.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  1:42 PM by Terry Karney&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292618</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292618</guid>
         <pubDate>Tue, 09 Sep 2008 13:42:02 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #57 from albatross</title>
         <description>comment from albatross on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Bruce #32: </p>

<p>Hi, Bruce!  </p>

<p>Do you know what the best current result on Solitaire is?  The best one I'm aware of is <a href="http://www.ciphergoth.org/crypto/solitaire/" rel="nofollow">Paul Crowley's</a>, but I haven't followed it  too closely.  </p>

<p>Graydon #37:</p>

<p>This is the reasoning behind (IMO very important) attempts to get crypto turned on by default as widely as possible.  Ideally, it would be very unusual for a VoIP call to go out in the clear, cordless phone to base station encryption would be ubiquitous and strong, every hard drive would be encrypted, all e-mails would be encrypted, etc.  </p>]]>
	 &lt;p&gt;Posted September  9, 2008  1:56 PM by albatross&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292621</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292621</guid>
         <pubDate>Tue, 09 Sep 2008 13:56:46 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #58 from albatross</title>
         <description>comment from albatross on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Devin #4:</p>

<p>"Rubber hose cryptanalysis" just means beating (or intimidating) you until you hand over your key.  It's a way to entirely do an end-run around the crypto being used.  </p>]]>
	 &lt;p&gt;Posted September  9, 2008  2:04 PM by albatross&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292622</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292622</guid>
         <pubDate>Tue, 09 Sep 2008 14:04:51 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #59 from James D. Macdonald</title>
         <description>comment from James D. Macdonald on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>#5: <i>If your threat model allows you to do all these manipulations and send a note to your ally which will be received even though it is intercepted... I don't know what your threat model is.</i></p>

<p>Shortwave Morse is the classic.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  2:15 PM by James D. Macdonald&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292625</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292625</guid>
         <pubDate>Tue, 09 Sep 2008 14:15:10 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #60 from James D. Macdonald</title>
         <description>comment from James D. Macdonald on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>#58: <i>"Rubber hose cryptanalysis" just means beating (or intimidating) you until you hand over your key.</i></p>

<p>Or the plaintext.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  2:16 PM by James D. Macdonald&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292626</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292626</guid>
         <pubDate>Tue, 09 Sep 2008 14:16:39 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #61 from albatross</title>
         <description>comment from albatross on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Jim:</p>

<p>If I have access to the data from which the running key is drawn (say, I know the almanac), then this is pretty trivially breakable with a computer, or more tediously breakable with paper and pencil.  Just slide along through the set of possible starting points of the running key against your ciphertext, and look for decryptions that match the expected character frequencies.  (If you're doing it by hand, this will take awhile....)</p>

<p>If the running key is unknown but biased in a known way (I love the idea of using Benford's law here; you could also use common rounding rules.), then it will be breakable or not based on how close to uniform and independent the running key is.  But note that XORing (or adding mod 26) long English texts together doesn't obscure them--it's generally possible to extract both texts back out.  So the running key needs to, in some sense, be more random than normal text.  (This also implies something about the idea of doing the Vignerre thing with a long running key from a book.)  I don't recall how long the texts need to be to make this work.  <br />
</p>]]>
	 &lt;p&gt;Posted September  9, 2008  2:23 PM by albatross&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292627</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292627</guid>
         <pubDate>Tue, 09 Sep 2008 14:23:12 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #62 from Carrie S.</title>
         <description>comment from Carrie S. on  9.Sep.08</description>
         <content:encoded><![CDATA[<p><em>So the running key needs to, in some sense, be more random than normal text. </em></p>

<p>You could use the first letter of each line, starting on a given page and line.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  2:25 PM by Carrie S.&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292628</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292628</guid>
         <pubDate>Tue, 09 Sep 2008 14:25:09 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #63 from Graydon</title>
         <description>comment from Graydon on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Albatross --</p>

<p>The problem with that is that you'd be required to make public -- as in, public utility, rather than "for profit corporation" -- pretty much all of the network backbone, and then fight a really tough, long term fight to keep someone from installing a back door.</p>

<p>The reason for not encrypting email or hard drives is that these are seen as critical systems, and adding cryptography tends to sharply increase the failure rate; it'd have to be added in hardware somewhere, and that presents a severe design challenge and another severe security challenge with respect to the back doors.</p>

<p>This is more or less impossible in the US given the current legal constructions of liability, too; corporates make the excellent argument that if they're liable for what you say with their email account, their agents must be able to read your email.</p>

<p>(I am, by the way, all for public-utility-izing the entire comms infrastructure.)</p>]]>
	 &lt;p&gt;Posted September  9, 2008  2:28 PM by Graydon&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292629</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292629</guid>
         <pubDate>Tue, 09 Sep 2008 14:28:26 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #64 from Graydon</title>
         <description>comment from Graydon on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Carrie --</p>

<p>Nothing that makes sense is meaningfully random.</p>

<p>I suggest rolling dice.</p>

<p>If you need something that can be referenced by multiple parties, I'd suggest astronomical data; least significant digits of spectral results or something like that.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  2:30 PM by Graydon&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292630</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292630</guid>
         <pubDate>Tue, 09 Sep 2008 14:30:55 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #65 from Mycroft W</title>
         <description>comment from Mycroft W on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>1) So, what is the legal-beatstick equivalent to "rubber-hose cryptography" called?  Cue the recent case where the courts are ruling that in some cases, you are required to turn over the passphrase to any encrypted information on evidence legally acquired/confiscated.</p>

<p>2) If you are using the "have lots of books of tables" method - for "protect me from my so-called friends or boss" level of security (or "doesn't matter tomorrow" security, which is more common) - READ THEM ALL REGULARLY, carelessly by preference.  It doesn't matter how many books you have with lotsa-numbers, if only one is worn or stained, with the spine broken to make it easier to sit on a table, and it opens to a particular page, and the rest are pristine...</p>]]>
	 &lt;p&gt;Posted September  9, 2008  2:34 PM by Mycroft W&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292631</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292631</guid>
         <pubDate>Tue, 09 Sep 2008 14:34:55 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #66 from Mycroft W</title>
         <description>comment from Mycroft W on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Oh, and a shoutout from the old PBM days: use the last digit of the closing stock price for "yesterday" for an agreed set of well-traded companies as the seed/scramble.  Who would suspect a guy in a suit and tie (or in geek chic, for that matter) reading the financials?</p>]]>
	 &lt;p&gt;Posted September  9, 2008  2:38 PM by Mycroft W&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292632</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292632</guid>
         <pubDate>Tue, 09 Sep 2008 14:38:25 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #67 from Clifton Royston</title>
         <description>comment from Clifton Royston on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Mycroft @ 66: Quiller, more or less. (Actually, I think in <i>The Quiller Memorandum</i> case the British government was manipulating the closing price of some small stock to transmit codewords.)</p>]]>
	 &lt;p&gt;Posted September  9, 2008  2:45 PM by Clifton Royston&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292633</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292633</guid>
         <pubDate>Tue, 09 Sep 2008 14:45:45 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #68 from albatross</title>
         <description>comment from albatross on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Graydon #63:  </p>

<p>For some stuff, getting widespread encryption is hard, because you have to get everyone doing it at the same time.  Getting decent encryption in cellphones requires getting the cellphone infrastructure switched over to decent encryption, though a cellphone manufacturer could set things up so that calls from, say, Nokia to Nokia phones did an additional key agreement and encrypted their data end to end.  (But cellphone providers and manufacturers are easy to subject to government presure not to strengthen their encryption.)  Getting widespread e-mail encryption in use is a pain, because you can't encrypt to me until you're sure I know how to decrypt it.  But people could do it, and mostly don't.  (But maybe more police state measures all over the place will have an impact on this.)  </p>

<p>Other stuff doesn't require any negotiation, or only requires very limited negotiation.  Encrypting your own hard drive or files is relatively easy to do, and a bunch of companies (and the feds, too) are establishing policies requiring laptop hard drive encryption, because it's very common for laptops to be lost or stolen.  Windows and MacOS have built-in support for this, and there are nice programs that will do it for you, too.  Cordless phones (which I think courts have held have no reasonable expectation of privacy) could be made secure pretty trivially by moving them to WPA2 and having the phones and base stations establish shared keys when they are put on the handset to recharge; that would get rid of a huge privacy leak that's waiting for people to exploit it.  </p>

<p>Ideally, every website would support https (TLS, encryption for TCP) requests for everything.  That would require no great negotiation with anyone, and it would make a whole bunch of data flowing over the internet simply go opaque.  As it is, a lot of sites don't support it even when it's crazy not to.  Earthlink's webmail doesn't support https for anything but the login screen.  </p>

<p>My take on this is that the main problem is that adding casual, automatic encryption impacts performance, complicates design (because key management is usually a big pain to get right), and has very little obvious benefit, at least until it's being done everywhere.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  2:53 PM by albatross&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292636</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292636</guid>
         <pubDate>Tue, 09 Sep 2008 14:53:37 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #69 from Earl Cooley III</title>
         <description>comment from Earl Cooley III on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>I wonder if there is some interesting way to leverage Bible Code pseudomath instead of using almanacs.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  3:15 PM by Earl Cooley III&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292638</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292638</guid>
         <pubDate>Tue, 09 Sep 2008 15:15:27 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #70 from Clifton Royston</title>
         <description>comment from Clifton Royston on  9.Sep.08</description>
         <content:encoded><![CDATA[<p><i>Ideally, every website would support https (TLS, encryption for TCP) requests for everything. That would require no great negotiation with anyone, and it would make a whole bunch of data flowing over the internet simply go opaque. As it is, a lot of sites don't support it even when it's crazy not to.</i></p>

<p>I haven't been running any kind of high-volume webserver recently, but as I recall, if you don't have cryptographic hardware installed in the server - and 99% of webservers don't - using SSL takes a non-trivial chunk of the CPU per session.  That means fewer connections you can support on a given machine, which for very busy sites means either adding more servers - maybe two or three times as many - or else adding funky add-on cards to them.  The latter is also a big pain for ISPs or hosting companies which want to deal with lots of precisely identical hardware.  Given Gmail's scale, I suspect it took a pretty substantial investment for them to announce the checkbox feature where everyone can easily turn on and require https.</p>

<p>I'm not saying it's bad - on the contrary, SSL is Good! - but there's a cost there which is hidden from the end-user's perspective.  That's one reason we don't see it everywhere all the time.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  3:36 PM by Clifton Royston&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292641</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292641</guid>
         <pubDate>Tue, 09 Sep 2008 15:36:58 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #71 from Lila</title>
         <description>comment from Lila on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>It would probably be possible for me and some of my acquaintances to carry on a converation consisting entirely of allusions to shared experiences, obscure bad movies, and fanfic.</p>

<p>There was an episode of ST:TNG that included a similar idea ("Darmok and Jalad at Tanagra").  See also classic Chinese poetry.</p>

<p>(Come to think of it, bad fanfiction would be a great place to hide all kinds of things. The Sturgeon's Law Cipher!)</p>]]>
	 &lt;p&gt;Posted September  9, 2008  3:46 PM by Lila&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292644</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292644</guid>
         <pubDate>Tue, 09 Sep 2008 15:46:18 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #72 from James D. Macdonald</title>
         <description>comment from James D. Macdonald on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>For all we know half the stories at Fanfiction.net read (if you know how to read them), "Shipment of weapons-grade plutonium to leave Minsk at 0300, track 5.  Only two guards."</p>]]>
	 &lt;p&gt;Posted September  9, 2008  4:07 PM by James D. Macdonald&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292646</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292646</guid>
         <pubDate>Tue, 09 Sep 2008 16:07:21 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #73 from Madeline F</title>
         <description>comment from Madeline F on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>If someone's out there looking for books of tables, I suggest the stuff from <a href="http://www.makershed.com/SearchResults.asp?Cat=61" rel="nofollow">MAKE magazine</a>.  I picked up Handyman In-Your-Pocket at the last MakerFaire, and was somewhat saddened to figure out that it was mostly stuff like "what angle roof needs what strength and spacing of beams in what climate".  So far only useful to me as a paperweight.  But now I'm mollified, because it is pocket-sized, and relatively cheap, and packed to the gills with tables of numbers; and it isn't completely useless, so many of the people I'd want to talk to have an excuse for having it around.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  4:26 PM by Madeline F&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292648</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292648</guid>
         <pubDate>Tue, 09 Sep 2008 16:26:07 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #74 from Seth</title>
         <description>comment from Seth on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>A few years ago, somebody had a filter that turned plaintext into typical-looking spam.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  4:26 PM by Seth&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292649</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292649</guid>
         <pubDate>Tue, 09 Sep 2008 16:26:33 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #75 from Beable</title>
         <description>comment from Beable on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Lila #71: A friend of mind has a theory about this in the far future of the Babylon-5 'verse. He figures that the Vorlons honestly thought they were being transparent and clear when they were talking to the humans  ...</p>

<p>One million years from now when humans are the new Vorlons:</p>

<p>Human (in an encounter suit): Ok, so, here's what you need to know. There will be a big battle. You will need to pick sides. We're the good guys, so we'll tell you everything you want to know. Go on, ask me anything.</p>

<p>New younger race: Darmok and Jalad at Tinagra?</p>]]>
	 &lt;p&gt;Posted September  9, 2008  4:30 PM by Beable&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292650</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292650</guid>
         <pubDate>Tue, 09 Sep 2008 16:30:57 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #76 from Mycroft W</title>
         <description>comment from Mycroft W on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>#67 Clifton:  Exactly the opposite, in fact, for exactly that reason - low-volume-traded stocks are susceptible to manipulation (not likely in the PBM case, but in traditional encryption, there's more money involved, so you can afford to do that) and also have a non-negligible chance of No Trading on that account today, meaning the probability of the last digit (well, all of them, really) being the same as yesterday (or last week, for that matter) is much higher than the one-in-ten it would ideally be.</p>

<p>But that's one more book to find for the pile, so thank you.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  5:01 PM by Mycroft W&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292654</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292654</guid>
         <pubDate>Tue, 09 Sep 2008 17:01:49 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #77 from Eric K</title>
         <description>comment from Eric K on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>As noted by several people upthread, this is trivially crackable by anybody who has your book of numbers and a computer. In this case, "trivially crackable" means "well under a second."</p>

<p>Assume there are 500 pages in your book, and each page contains 100 lines of numbers. That's 50,000 possible keys to try.</p>

<p>For each key, decode 10 letters of the ciphertext. Compare those 10 letters to a table of English letter frequencies. Do you get "zqadtv.mlp"? It's not English text. Try the next line. At a billion instructions per second, this won't take long. English text is incredibly distinctive, so your computer will have no problem recognizing it.</p>

<p>If you're impatient, <i>sort</i> the lines of numbers, and store them in a <a href="http://en.wikipedia.org/wiki/Trie" rel="nofollow">trie</a>. Decode the first character of the ciphertext using the digits from 1 to 10. Pick whichever digit decodes the first letter to "E", and walk down that branch of the trie recursively. If that results in nonsense, try the other branches in order of letter frequency: "EATOIN SHRDLU".</p>

<p>With a reasonably large database, you will be able to decrypt the message as fast as you can type it into your computer.</p>

<p>What if you don't have an electronic copy of the table of numbers? First, see if you can find out what book is in use. (This is left as an exercise for the reader.) If that fails, just pick the 200 best-selling books of numbers, and run them through an OCR system like that of Google books. You'll have a ton of OCR errors, but that's OK--you can adapt the algorithm to work with error-filled tables; it will just take longer to run.</p>

<p>If you want a reasonably strong pencil-and-paper cipher, follow Bruce Schneier's Solitaire link upthread.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  6:37 PM by Eric K&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292659</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292659</guid>
         <pubDate>Tue, 09 Sep 2008 18:37:47 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #78 from Jules</title>
         <description>comment from Jules on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Clifton @70:</p>

<p><i>I haven't been running any kind of high-volume webserver recently, but as I recall, if you don't have cryptographic hardware installed in the server - and 99% of webservers don't - using SSL takes a non-trivial chunk of the CPU per session. </i></p>

<p>It's not so much of a problem these days.  Sure, it would add overhead, but most web server applications are IO bound, so doing something that uses CPU wouldn't be too much of an issue.</p>

<p>No, the *really big* problem is that SSL only allows you to have one domain per IP address, whereas 99.something% of web sites share their IP address with one or (more usually) 50 others.</p>

<p>We have a real shortage of IP addresses, and if every web site suddenly decided to do SSL, we'd run out pretty quickly.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  6:55 PM by Jules&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292662</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292662</guid>
         <pubDate>Tue, 09 Sep 2008 18:55:21 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #79 from Kevin Riggle</title>
         <description>comment from Kevin Riggle on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Jules @78: Well, you /can/ run more than one site off the same IP, but whichever ones aren't in the certificate will make Firefox put up a BIG ANNOYING WARNING MESSAGE that takes 3+ clicks to work around.  (Not that I'm annoyed or anything.)</p>

<p>It seems to me that the best solution to this is to extend SSL to let you list multiple sites in the  certificate, but I haven't looked into it closely.</p>

<p>(Given that I'm trying to run four-ish Web apps off a sad little hosted VM with 128MB of RAM that's running near capacity, I won't be enabling SSL on all my sites any time soon, because the overhead would kill it; there's only one that really needs it.  I do send grumpy e-mails to web sites I run across which really should use SSL and don't, like the VoIP provider I was looking at a few days ago, and I encourage others to do the same. :-)</p>]]>
	 &lt;p&gt;Posted September  9, 2008  7:38 PM by Kevin Riggle&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292663</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292663</guid>
         <pubDate>Tue, 09 Sep 2008 19:38:04 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #80 from Randolph</title>
         <description>comment from Randolph on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Jules, #78: obviously we must all convert to IPv6.  See?  The Chinese are really just doing us a favor.</p>

<p>I'm sorry, I have yielded to temptation.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  7:39 PM by Randolph&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292664</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292664</guid>
         <pubDate>Tue, 09 Sep 2008 19:39:09 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #81 from Lila</title>
         <description>comment from Lila on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Jim @ #72: and the thought of all those NSA/CIA flunkies being assigned to read *everything* posted on fanfiction.net, hour after hour, day after day, makes me want to bake up a big ol' <a href="http://scalzi.com/whatever/004492.html" rel="nofollow">Schadenfreude Pie</a>.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  7:48 PM by Lila&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292665</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292665</guid>
         <pubDate>Tue, 09 Sep 2008 19:48:50 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #82 from Erik Nelson</title>
         <description>comment from Erik Nelson on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Remember, there must be no starch in the collar!</p>]]>
	 &lt;p&gt;Posted September  9, 2008  8:00 PM by Erik Nelson&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292667</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292667</guid>
         <pubDate>Tue, 09 Sep 2008 20:00:04 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #83 from Devin</title>
         <description>comment from Devin on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>Aside to Albatross @ 58</p>

<p>I know what rubberhose cryptanalysis is.  When I wrote that comment, the OP referenced "rubberhose cryptography."  It appears Jim's fixed that, or perhaps I was hallucinating in the first place (maybe Jim will tell us which?)  Please do re-read my comment in light of that, so that I look like a smartass with a little bit of clever instead of confused and nonsensical.</p>

<p>Also, my original point there was really that using nontrivial pen and paper crypto probably makes your ciphertext a harder point of attack for the sorts of people likely to be trying to attack it than any other link in the chain.  In my life, the sorts of folks I'd be concerned about (if I had concerns, which right now I don't) are like business rivals, potentially local police, the odd reporter, neighborhood kids, personal rivals, that sort of thing.  Some of those people (cops and reporters for sure) are very good at social engineering and may have considerable resources at their command for attacks on human links, but none of them tend to have cryptanalytic resources.</p>

<p>Your advice about class breaks is extremely relevant, however.  This sort of cryptography is very useful when you have a day or even a week of messages to pass, but if it remains in use...  It may take local cops six months to get the FBI to send your stuff to the NSA and have it decrypted, but once they've done that, assume that they can decrypt any further messages as fast as they need to.  Further, cut that lead time in half for any country without the US's peculiar law-enforcement/intelligence rivalry, and reduce further as appropriate to the organization/country.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  8:28 PM by Devin&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292672</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292672</guid>
         <pubDate>Tue, 09 Sep 2008 20:28:07 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #84 from P J Evans</title>
         <description>comment from P J Evans on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>#83<br />
I saw it as 'cryptanalysis'. (I was snickering at the list of methods, something which tends to make it stick in the mind.)</p>]]>
	 &lt;p&gt;Posted September  9, 2008  9:38 PM by P J Evans&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292677</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292677</guid>
         <pubDate>Tue, 09 Sep 2008 21:38:24 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #85 from Terry Karney</title>
         <description>comment from Terry Karney on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>If I were looking for a book to extract numbers from... I'd use an out of date copy of the Machinist's handbook.  The tables are dense, there are sets/directions which avoid the Benford paradox, and it will have a reason to be worn.</p>

<p>It's also not as subject to the sort of brute force described by Eric K., (though most of the values are the same, some of the ordering is different) you can choose a column, instead of a row... or checkerboard the selection criteria (even build a version of the Vingiere cipher to manufacture the key).</p>

<p>And they are both inexpensive, and easy to come by.</p>]]>
	 &lt;p&gt;Posted September  9, 2008  9:59 PM by Terry Karney&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292683</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292683</guid>
         <pubDate>Tue, 09 Sep 2008 21:59:44 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #86 from Sandy B.</title>
         <description>comment from Sandy B. on  9.Sep.08</description>
         <content:encoded><![CDATA[<p>#84 You were snickering... I was creeped out as hell. </p>

<p>I dunno, these days I've gotten sensitive or something. </p>]]>
	 &lt;p&gt;Posted September  9, 2008 11:27 PM by Sandy B.&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292686</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292686</guid>
         <pubDate>Tue, 09 Sep 2008 23:27:53 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #87 from Brooks Moses</title>
         <description>comment from Brooks Moses on 10.Sep.08</description>
         <content:encoded><![CDATA[<p>Devin @83: FWIW, I don't actually directly recall what I saw in the original post, but I remember that your joke made perfect sense to me the first time that I read it.</p>]]>
	 &lt;p&gt;Posted September 10, 2008 12:22 AM by Brooks Moses&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292692</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292692</guid>
         <pubDate>Wed, 10 Sep 2008 00:22:54 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #88 from ajay</title>
         <description>comment from ajay on 10.Sep.08</description>
         <content:encoded><![CDATA[<p>85: but it doesn't pass the test of being an obvious, unsuspicious book to have lying around (for most of us anyway).<br />
Phone book?</p>]]>
	 &lt;p&gt;Posted September 10, 2008  6:23 AM by ajay&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292700</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292700</guid>
         <pubDate>Wed, 10 Sep 2008 06:23:46 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #89 from Scott Taylor</title>
         <description>comment from Scott Taylor on 10.Sep.08</description>
         <content:encoded><![CDATA[<p>ajay@88 - <br />
<em>85: but it doesn't pass the test of being an obvious, unsuspicious book to have lying around (for most of us anyway).<br />
Phone book?</em></p>

<p>hmmm... perhaps not, but it's also not a book that would go amiss on most shelves, especially given the miscellany many of us seem to accumulate  - I've got a copy (22nd edition) that I picked up cheap in a "going out of business, moving someplace warm" bookstore sale recently - it's currently sitting on my shelves next to  Kipling, Paine, the Poetic Eddas, Lies My Teacher Told Me, and some SimCity manuals (otherwise known as Nonfiction: unsorted...). </p>

<p>(and I live in an apartment, so it's not like there's a workshop downstairs for it to go with). </p>

<p>(Note that with traffic analysis, and some B&E work, it might become obvious if everyone you communicated with via e-mail had a copy of the 25th edition of the Machinists Handbook somewhere in their library). </p>]]>
	 &lt;p&gt;Posted September 10, 2008  7:08 AM by Scott Taylor&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292701</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292701</guid>
         <pubDate>Wed, 10 Sep 2008 07:08:25 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #90 from Dr. Tom Bibey</title>
         <description>comment from Dr. Tom Bibey on 10.Sep.08</description>
         <content:encoded><![CDATA[<p>Everyone worries about privacy.  I understand that, but with my blog, I worry 'cause I can't get anyone to find me.</p>

<p>As far as I know I am the only physician bluegrass fiction writer on wordpress.</p>

<p>Maybe I picked the wrong genre.</p>

<p>Dr. Tom Bibey</p>

<p>drtombibey.wordpress.com</p>]]>
	 &lt;p&gt;Posted September 10, 2008  7:09 AM by Dr. Tom Bibey&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292702</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292702</guid>
         <pubDate>Wed, 10 Sep 2008 07:09:25 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #91 from Dave Bell</title>
         <description>comment from Dave Bell on 10.Sep.08</description>
         <content:encoded><![CDATA[<p>The thing is, this system gives decent short term security, expecially if you keep the messages short. The key may be susceptible to a brute-force attack: trying every common book of data tables. If you're attracting the attention of people who can do that, you're going to be in trouble anyway.</p>

<p>If you want to stop teacher or mom reading a diary, it doesn't need to be this complicated. The simple Julius Caesar cipher (ROT-13 is an example) is too simple, but you don't need anything much more complicated. It's the sort of thing you can learn to do in your head as you write, even if you use a keyword to jumble the alphabet.</p>

<p>It stops people just picking up your diary and reading it.</p>

<p>The method described is good enough to protect a message for a few days, even against government-level attack. Especially if the messages are short. But if you're up against a government, there are all sorts of ways they can mess things up for you. Lose the letter in the mail for a few days, and your escape plans are FUBARed.</p>

<p>If you're entangled with heavy-duty Spooksville, you almost need to play by what some have called "Moscow Rules". And anything like that can be a giveaway.</p>

<p>That sort of situation needs somebody on the outside. It is very unusual for a wholly internal resistance to survive against a Police State.</p>]]>
	 &lt;p&gt;Posted September 10, 2008 12:09 PM by Dave Bell&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292727</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292727</guid>
         <pubDate>Wed, 10 Sep 2008 12:09:29 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #92 from sherrold</title>
         <description>comment from sherrold on 10.Sep.08</description>
         <content:encoded><![CDATA[<p>So, MIJI (Meaconing, Intrusion, Jamming, and Interference) is supposed to be used against electronic signals (navigation, comms, etc.), but now I'm trying to figure out plausible miji scenarios against the crypto examples you've all come up with.</p>]]>
	 &lt;p&gt;Posted September 10, 2008 12:56 PM by sherrold&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292741</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292741</guid>
         <pubDate>Wed, 10 Sep 2008 12:56:24 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #93 from Terry Karney</title>
         <description>comment from Terry Karney on 10.Sep.08</description>
         <content:encoded><![CDATA[<p>ajay:  What Scott said.  I used to be a machinist, so my having a couple of different editions is sort of normal.</p>

<p>But it's a way cool book for other things, and anyone who has a shelf of useful information ought to get one.  Unless one is doing CNC machining, with with a powered mill, there's no need to get anything more recent than the '50s, and it's not that strange a thing.  The articles on acme threading are interesting all by themselvses, as are the disquisitions on the various uses of allow steels.</p>

<p>But I digress.</p>]]>
	 &lt;p&gt;Posted September 10, 2008 12:59 PM by Terry Karney&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292743</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292743</guid>
         <pubDate>Wed, 10 Sep 2008 12:59:09 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #94 from Mary Aileen</title>
         <description>comment from Mary Aileen on 10.Sep.08</description>
         <content:encoded><![CDATA[<p>Terry (93): <i>But I digress.</i></p>

<p>If we didn't digress, this wouldn't be the Making Light we know and love.</p>]]>
	 &lt;p&gt;Posted September 10, 2008  2:06 PM by Mary Aileen&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292759</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292759</guid>
         <pubDate>Wed, 10 Sep 2008 14:06:52 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #95 from Lee</title>
         <description>comment from Lee on 10.Sep.08</description>
         <content:encoded><![CDATA[<p>Dave, #91: True, if you just want to keep your mother from reading your mail, the simple substitution cipher I employed in college (based on Tolkien's Dwarvish runes) works just fine. But I get the impression that this post was about rather more complicated things, and situations requiring much heavier security. <br />
</p>]]>
	 &lt;p&gt;Posted September 10, 2008  3:42 PM by Lee&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292777</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292777</guid>
         <pubDate>Wed, 10 Sep 2008 15:42:28 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #96 from debcha</title>
         <description>comment from debcha on 10.Sep.08</description>
         <content:encoded><![CDATA[<p>Ajay, #88: <i>"but it doesn't pass the test of being an obvious, unsuspicious book to have lying around (for most of us anyway)."<i></i></i></p>

<p><i>Phone book?</i></p>

<p>I haven't had a phone book in my home since I first got wifi, lo these many years ago. To be fair, that may be an artifact of living in large cities (=ginormous phone books + high-rent-induced small apartments). </p>]]>
	 &lt;p&gt;Posted September 10, 2008  4:54 PM by debcha&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292782</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292782</guid>
         <pubDate>Wed, 10 Sep 2008 16:54:01 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #97 from mpo</title>
         <description>comment from mpo on 10.Sep.08</description>
         <content:encoded><![CDATA[<p><a href="http://packetstormsecurity.org/apoc2k/cue/tscmrule.q" rel="nofollow">this</a> describes the Moscow Rules<br />
</p>]]>
	 &lt;p&gt;Posted September 10, 2008  8:39 PM by mpo&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292839</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292839</guid>
         <pubDate>Wed, 10 Sep 2008 20:39:00 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #98 from Michael Turyn</title>
         <description>comment from Michael Turyn on 11.Sep.08</description>
         <content:encoded><![CDATA[<p>I'm glad rubber-hose cryptanalysis was mentioned; the first time I heard about strong encryption (early 90s, late 80s?) I responded with, 'Congratulations, the incentive to torture people just went way up.'  </p>

<p>Yes, there are other reasons why people are being tortured in my name, mostly because it makes some people <i>look</i> effective and all butch and electable and such, but maybe torture consciousness is encouraged by the presence of one situation in which it 's easy to think that it would be all you've got---it knocks the dust off that tool, making it stand out just a little bit more....</p>]]>
	 &lt;p&gt;Posted September 11, 2008  2:00 AM by Michael Turyn&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292879</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292879</guid>
         <pubDate>Thu, 11 Sep 2008 02:00:30 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #99 from Terry Karney</title>
         <description>comment from Terry Karney on 11.Sep.08</description>
         <content:encoded><![CDATA[<p>Michael Turyn:  No, I don't think strong cryptography increases the odds/incentives for torture, because the number of cases in which it comes into play hasn't gone up to any great degree.</p>

<p>We expect spies, and terrorists and crooks (more or less) to do things to hide their activities.  The amazing thing is how rarely they use strong encryption (or good tradecraft).</p>]]>
	 &lt;p&gt;Posted September 11, 2008 11:06 AM by Terry Karney&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#292991</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#292991</guid>
         <pubDate>Thu, 11 Sep 2008 11:06:14 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #100 from albatross</title>
         <description>comment from albatross on 11.Sep.08</description>
         <content:encoded><![CDATA[<p>Lee #95:</p>

<p>Yeah, any commercial encryption, even the lame ones that often come with word processors and such, will keep your prying mom out of your files.  That should be done on a computer unless you're worried about keyloggers or some such thing.  </p>

<p>Terry #99:</p>

<p>That's the sense I have, too.  Some criminals manage to use good crypto, but most of them apparently use crappy crypto.  I suspect part of this is that they don't know the difference between good and bad crypto, but laziness and the fact that it hasn't bit them before probably also come into play.  </p>

<p>One of the really hard things about trying to make casual eavesdropping/spying harder is that if you produce a strong encryption product or strong anonymizing service, some notable subset of the folks who want to use it will be obvious bad people.  Child pornographers need anonymity more than random citizens commenting on weblogs under a pseudonym.  </p>

<p>I suspect that there's a kind of J-shaped curve describing well being of the society as strong cryptography becomes widespread--the early adopters are some combination of cryptographers and privacy fanatics and bad guys, and total social well being likely goes down.  Then, further adoption makes total social well being go back up, and eventually it ends up better.  (Shorter me:  We're best off when everyone has privacy, not too bad off when nobody has privacy, and in the worst state when only the bad guys have privacy.)  </p>]]>
	 &lt;p&gt;Posted September 11, 2008  1:12 PM by albatross&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#293065</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#293065</guid>
         <pubDate>Thu, 11 Sep 2008 13:12:02 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #101 from albatross</title>
         <description>comment from albatross on 11.Sep.08</description>
         <content:encoded><![CDATA[<p>Sherrold #92:</p>

<p>The obvious one here is replay attack, and more broadly, reordering/delaying messages.  If I note that you're sending messages that set up meetings, I can delay one till I figure out where the meeting is supposed to be, then send it to your recipient and be waiting for him.  Or I may be able to cause him to return to the same place twice.  </p>

<p>Depending on the cipher, you can sometimes splice together information or alter information in the ciphertext without knowing the plaintext, or without knowing all the plaintext, or without knowing the key.  For example, in Jim's cipher above, suppose you know that the first word in the ciphertext is "Don't," and want to change it to "Won't."  D is encoded as 15, W is encoded as 27, so if you add (without carries) a 1 to the first number in the ciphertext, and a 2 to the second number, you change the ciphertext from "DONT LET THEM SCARE YOU" to "WONT LET THEM SCARE YOU".  (That's a pretty standard thing to do to this kind of cipher.)  </p>

<p>I suspect you can use this, in practice, to test guesses about the plaintext.  In a real-world system, there will be encryption errors.  If you cause a rare garbled message, it may not be detected as an attack.  So, if you think you know what a given word at some place in the text should be, alter it into a similar word using this technique, and then observe the reaction of the receiver.  </p>

<p>It's also obviously easy to "jam" the transmissions by blocking transmission of anything that looks like ciphertext.  More interestingly, it's easy to wait till you think they've got something interesting to send, and then silently block the ciphertext.  (99% effective way to prevent the use of encrypting telephones in practice:  Introduce enough line noise to mess up the call whenever you detect ciphertext.  Eventually, the users will give up and just use normal unencrypted voice, if they are given a choice.)</p>]]>
	 &lt;p&gt;Posted September 11, 2008  1:29 PM by albatross&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#293072</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#293072</guid>
         <pubDate>Thu, 11 Sep 2008 13:29:27 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #102 from Henry Troup</title>
         <description>comment from Henry Troup on 11.Sep.08</description>
         <content:encoded><![CDATA[<p>Lo, many years ago, more than forty, a British comic used to run cyphered stories available only to the "club".  My father and I spent a cheerful couple of hours breaking the transposition cypher.</p>

<p>This particular one is a little cooler than Caesar:  you need two words that total 13 letters with no repetition.  e.g.</p>

<p>DOLPHINSAFETY<br />
then write the remaining letters in order<br />
BCGJKMQRUVWXZ</p>

<p>and encode straight up and down.</p>

<p>wurz! Cqgz xec ecsb xc seougg.</p>

<p>Useless for anything serious ... although short messages - like passwords for something stronger ... are hard to break.</p>]]>
	 &lt;p&gt;Posted September 11, 2008 10:16 PM by Henry Troup&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#293183</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#293183</guid>
         <pubDate>Thu, 11 Sep 2008 22:16:50 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #103 from David Dyer-Bennet</title>
         <description>comment from David Dyer-Bennet on 13.Sep.08</description>
         <content:encoded><![CDATA[<p>Getting a secure computer:  Boot a public system, like a demo in a store, off optical or USB media.  Depending on the level of opposition you're facing, booting *your own* computer that way might be good enough (obviously not if they've installed a *hardware* keylogger).  </p>

<p>Software for Palm, phone, or Nokia tablet platforms may also make it harder to install a hardware keylogger. These probably also protect you against the bit where they can tell what you're typing from the sounds. </p>]]>
	 &lt;p&gt;Posted September 13, 2008  4:23 PM by David Dyer-Bennet&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#293548</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#293548</guid>
         <pubDate>Sat, 13 Sep 2008 16:23:53 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #104 from Mycroft W</title>
         <description>comment from Mycroft W on 15.Sep.08</description>
         <content:encoded><![CDATA[<p>#103:  Optical, or WRITE-ONLY USB.  There are way too many compromising ways to infect the USB drive, and then you're using a "known secure" system, which is worse than using an insecure system.</p>

<p>Unfortunately, hardware write-lock USB keys are harder to find these days.</p>

<p>But one big key, which I'm glad to see others mention here, is "how long?" and "against whom?"  Unfortunately, if "how long?" > a week, the law is getting to the point where strong cryptography is no longer useful, because they'll just put you in jail/force decryption through discovery requests anyway.  Strong Crypto == good for anything involving money, because "against whom?" is "about 10 000 people who are getting paid to get banking information from people like ME."</p>]]>
	 &lt;p&gt;Posted September 15, 2008  3:36 PM by Mycroft W&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#294448</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#294448</guid>
         <pubDate>Mon, 15 Sep 2008 15:36:37 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #105 from Mary Aileen sees old maybe-spam</title>
         <description>comment from Mary Aileen sees old maybe-spam on  8.May.10</description>
         <content:encoded><![CDATA[<p>#90 makes a stab at being on-topic, but it's his only post here and is touting his blog.</p>]]>
	 &lt;p&gt;Posted May  8, 2010 10:24 AM by Mary Aileen sees old maybe-spam&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#422917</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#422917</guid>
         <pubDate>Sat, 08 May 2010 10:24:15 -0500</pubDate>
      </item>
      
      <item>
         <title>Keep It Secret, Keep It Safe -- comment #106 from Elliott Mason sees spam in intriguing character set</title>
         <description>comment from Elliott Mason sees spam in intriguing character set on 25.Mar.15</description>
         <content:encoded><![CDATA[<p>I think that's Thai? On the name field.</p>]]>
	 &lt;p&gt;Posted March 25, 2015  8:10 AM by Elliott Mason sees spam in intriguing character set&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/010554.html#4044750</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/010554.html#4044750</guid>
         <pubDate>Wed, 25 Mar 2015 08:10:26 -0500</pubDate>
      </item>
      
   </channel>
</rss>