Donate for the Cryptome archive of files from June 1996 to the present

5 December 2012

Assange-WikiLeaks Crypto Arms Call Triple Cross


Cryptome:

Applying cryptography's bag of tricks to Julian Assange's introduction to the new book, Cypherpunks: Freedom and the Future of the Internet, entitled "A Call to Cryptographic Arms," it could be taken as a "A Cryptographic Call to Arms," that is, an encrypted warning contained within the plain text.

Assange-WikiLeaks, like cypherpunks, is masterfully wily at practicing the characteristic cryptography feature of duplicity, never revealing what is going on beneath public assurances of trustworthiness.

Assange-WikiLeaks, like cypherpunks, invokes open-closed cryptographic duplicity as his personal behavior and as the policy of the WikiLeaks initiative. Concealing, obscuring and diverting his personal affairs while seeking publicity, and concealing, obscuring and diverting the inner affairs of the operation for disclosing documents openly. This is cryptography in action, pretending to publish source code while concealing underlying subterfuge.

In the same fashion Assange-WikiLeaks has periodically published encrypted packages as "insurance" against takedown, it has also released the unredacted State Department cables by way of a complicated, presumably, orchestrated, leak. The leak of the password to the cable collection by giving it to journalists to publish is a classic instance of cryptographic dupery.

Cryptography formulates threats, ruses, disclosures, ploys, diversions, deceptions, double-crosses, triple-crosses to hide strengths and weaknesses, attacks and defenses, lies and dissimulations, assurances of innocence and candor. The strengths and weaknesses of its algorithms are a cloak for the nefaria of implementation, rich with all-too-often-backdoored Achilles heels which exculpt designers and coders and allow their privilege to tamper with the products, and best, issue endless urgent updates, as if sysadmins of the Internet, telecomms and natsec spies claiming need for control of infrastructure for system assurance.

Crypto AG is a classic instance of NSA deception, among many, to install a backdoor in a widely adopted encrypted system, then leaked decades later as a warning to those who think they can obtain fully secure communication systems.

A recent example if that of open source cryptography promoted as means to verify encryption systems by public disclosure and examination. Its shortcoming, and virtue to the wily, is that far from all cryptographers subscribe to the sharing venture -- notably those associated with governments, corporations and mendacious individual efforts, instead take open source and not reveal what is found of its weaknesses (to be exploited in secret) nor what is done with the gift. US spies have admitted they take open source but do not give back. Privacy policies and vows of protection of sources blow smoke.

The same could be said of leak sites, anonymizers, IRC, news and mail groups, social media, Skype, varieties of comsec offerings, and the Internet itself among its many levels of access. Offer services, free, paid, purloined or onioned, for which the take is much greater than the offerings -- the standard asymmetric-warfare model, derived from governance, education, non-profits and history's all-time leader, religion, the latter exceeded only by wily hyenas patrolling the herd to mount novel attacks to take down over-confident herdmasters.

Cryptographers do not trust one another. Cypherpunks triple cross as ruse, what lies beneath the ruse is what foments beneath Assange-WikiLeaks' Cypherpunks.

Consider that the Assange-WikiLeaks book Cypherpunks is a cryptographic ruse which conveys an encrypted body of secrets, additional insurance against the takedown of Assange and WikiLeaks to be declared after the volume is widely distributed in print and e-book form. A modern Lutherian proclamation of open and encrypted dissent against the corruption of closed and secret authority.

Further, imagine that Assange-WikiLeaks is planting encrypted bits in all its releases which can be decrypted at a future time, to re-assemble into a larger disclosure. In the world of cryptography this would be expected. Cypherpunks advocate this encrypted concealment, dispersion, distribution and future coalescence.

Pre-positioning attacks and defenses well before they are needed is conventional warfare -- as well as political, economic and philosophical enterprise. Cypherpunks, before, during and after WikiLeaks, has pre-positioned encrypted packs of arms demurely clothed in dissent from and opposition to governance, finance and faith.

Assange-WikiLeaks' cryptographic call to arms is a ruse triple-cross under a double-cross planted in roots of trust, openness masquerading for multi-level deception, in short, the essence of heavily-armored cryptography.


Apparently Google does not publish .xxx domain listings. Useful for sharing XXX information.

This file is mirrored at: http://cryptome.org/2012/12/assange-wl-arms-xxx.htm