17 May 2014. On May 15, 2014, an unknown person sub-signed the
Cincinnatus@lavabit.com PK. This overwrote the
previous sub-sign dated 2 Septemer 2012. On
May 14, 2014, apparently after seeing this file, a new PK was generated (Key
ID -
0x7F12EEFF3EBB602C)
for this purpose:
PGPdump Results
Old: Public Key Packet(tag 6)(1037 bytes)
Ver 4 - new
Public key creation time - Sun Sep 2 00:21:58 UTC 2012
Pub alg - RSA Encrypt or Sign(pub 1)
RSA n(8192 bits) - ...
RSA e(17 bits) - ...
Old: User ID Packet(tag 13)(43 bytes)
User ID - Cincinnatus (Tor) <cincinnatus@lavabit.com>
Old: Signature Packet(tag 2)(540 bytes)
Ver 4 - new
Sig type - Generic certification of a User ID and Public Key packet(0x10).
Pub alg - RSA Encrypt or Sign(pub 1)
Hash alg - SHA512(hash 10)
Hashed Sub: signature creation time(sub 2)(4 bytes)
Time - Thu May 15 01:06:24 UTC 2014
Sub: issuer key ID(sub 16)(8 bytes)
Key ID - 0x7F12EEFF3EBB602C
Hash left 2 bytes - ba 59
RSA m^d mod n(4095 bits) - ...
-> PKCS-1
Old: Signature Packet(tag 2)(1080 bytes)
Ver 4 - new
Sig type - Positive certification of a User ID and Public Key packet(0x13).
Pub alg - RSA Encrypt or Sign(pub 1)
Hash alg - SHA1(hash 2)
Hashed Sub: signature creation time(sub 2)(4 bytes)
Time - Sun Sep 2 00:21:58 UTC 2012
Hashed Sub: key flags(sub 27)(1 bytes)
Flag - This key may be used to certify other keys
Flag - This key may be used to sign data
Flag - This key may be used to encrypt communications
Flag - This key may be used to encrypt storage
Flag - This key may be used for authentication
Hashed Sub: preferred symmetric algorithms(sub 11)(5 bytes)
Sym alg - AES with 256-bit key(sym 9)
Sym alg - AES with 192-bit key(sym 8)
Sym alg - AES with 128-bit key(sym 7)
Sym alg - CAST5(sym 3)
Sym alg - Triple-DES(sym 2)
Hashed Sub: preferred hash algorithms(sub 21)(5 bytes)
Hash alg - SHA256(hash 8)
Hash alg - SHA1(hash 2)
Hash alg - SHA384(hash 9)
Hash alg - SHA512(hash 10)
Hash alg - SHA224(hash 11)
Hashed Sub: preferred compression algorithms(sub 22)(3 bytes)
Comp alg - ZLIB <RFC1950>(comp 2)
Comp alg - BZip2(comp 3)
Comp alg - ZIP <RFC1951>(comp 1)
Hashed Sub: features(sub 30)(1 bytes)
Flag - Modification detection (packets 18 and 19)
Hashed Sub: key server preferences(sub 23)(1 bytes)
Flag - No-modify
Sub: issuer key ID(sub 16)(8 bytes)
Key ID - 0x4C74380AF72D80B3
Hash left 2 bytes - bb 86
RSA m^d mod n(8192 bits) - ...
-> PKCS-1
14 May 2014
Cincinnatus Public Key (Edward Snowden?)
Glenn Greenwald writes in No Place to Hide that he was first contacted
by Edward Snowden in late 2012 who used the pseudonym of "Cincinnatus."
On December 1, 2012, I received my first communication from Edward Snowden,
although I had no idea at the time that it was from him.
The contact came in the form of an email from someone calling himself
Cincinnatus, a reference to Lucius Quinctius Cincinnatus, the Roman farmer
who, in the fifth century BC, was appointed dictator of Rome to defend the
city against attack. ...
The email began: The security of peoples communications is very
important to me, and its stated purpose was to urge me to begin using
PGP encryption so that Cincinnatus could communicate things in
which, he said, he was certain I would be interested. ...
In this email, Cincinnatus said he had searched everywhere for
my PGP public key, a unique code set that allows people to receive
encrypted email, but could not find it. From this, he concluded that I was
not using the program and told me, That puts anyone who communicates
with you at risk. Im not arguing that every communication you are involved
in be encrypted, but you should at least provide communicants with that
option. ...
C. s email did not move me to action. Because I had become known for
covering stories the rest of the media often ignores, I frequently hear from
all sorts of people offering me a huge story, and it usually
turns out to be nothing. And at any given moment I am usually working on
more stories than I can handle. So I need something concrete to make me drop
what Im doing in order to pursue a new lead. Despite the vague allusion
to people out there I would like to hear from, there
was nothing in C. s email that I found sufficiently enticing. I read
it but did not reply. ...
After the BOUNDLESS INFORMANT article was published , Laura and
I planned to meet at Snowdens hotel. But before leaving my room, out
of nowhere, as I sat on my hotel bed, I remembered Cincinnatus, my anonymous
email correspondent from six months earlier, who had bombarded me with requests
to install PGP so that he could provide me with important information. Amid
the excitement of everything that was happening, I thought that perhaps he,
too, had an important story to give me. Unable to remember his email name,
I finally located one of his old messages by searching for keywords.
Hey: good news, I wrote to him. I know it took me a while,
but Im finally using PGP email. So Im ready to talk any time
if youre still interested. I hit send.
Soon after I arrived at his room, Snowden said, with more than a small trace
of mockery, By the way, that Cincinnatus you just emailed, thats
me.
It took me a few moments to process this and regain my composure. That person,
many months earlier , who desperately tried to get me to use email encryption
was Snowden. My first contact with him hadnt been in May, just
a month earlier, but many months ago. Before contacting Laura about the leaks,
before contacting anyone, he had tried to reach me.
Cincinnatus (Tor) <cincinnatus@lavabit.com> generated a PK on 2 September
2012. The PK 8192 bits were unusally high.
A Google listing shows <cincinnatus@lavabit.com> (but
more
under <cincinnatus(.a.)lavabit.com>) was used as a contact for a
CryptoParty in Honolulu, HI, on December 11, 2012 at which many of the comsec
tools later used by the Snowden team were to be discussed:
https://github.com/hicapacity/hicapacity-site/blob/master/_posts/2012-12-03-cryptoparty.markdown
[Excerpt]
End of Year CryptoParty @ the HNL hackerspace
Date: 11 December 2012
Time: 6PM-9PM HST
Location: HICapacity, 307a Kamani St, Honolulu, HI 96813
Format: Relaxed conference / Greek chorus: we'll start with a casual agenda,
but slot-in additional speakers in as desired. If you've got something important
to add to someone's talk, please share it (politely). When we're out of speakers,
we'll do ad-hoc tutorials on anything we can.
NOTE: Space very limited (20 people), PLEASE RSVt too long, we may not physically
be able to fit you in the room. Attendance preference will be given to people
willing to speak or demo something. [Balance of article
below.]
http://sks.pkqs.net/pks/lookup?search=cincinnatus&fingerprint=on&op=index&exact=off
Search results for 'cincinnatus'
Type bits/keyID Date User ID
pub 8192R/F72D80B3 2012-09-02 Cincinnatus (Tor) <cincinnatus@lavabit.com>
Fingerprint=D07A 8DC4 11C6 3232 ED86 CCAB 4C74 380A F72D 80B3
________________________________________________________________________
Search results for '0x4c74380af72d80b3'
Type bits/keyID cr. time exp time key expir
pub 8192R/F72D80B3 2012-09-02
Fingerprint=D07A 8DC4 11C6 3232 ED86 CCAB 4C74 380A F72D 80B3
uid Cincinnatus (Tor) <cincinnatus@lavabit.com>
sig sig3 F72D80B3 2012-09-02 __________ __________ [selfsig]
________________________________________________________________________
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: SKS 1.1.4+
Comment: Hostname: sks.pkqs.net
mQQNBFBCpqYBIAC5sMKd06rZ5GyA5MjVyWI5aHe2wlb37BYZ18hvTSqzy7L/pAAO6Y+fjD9V
GX/H6qjPFHZFcg1v5rAzzGe7s3dx4xDpnvmpY+uwcspl0rnZU9Rs1KewKQqjHFYORGFpYeHI
JWgVwz9M1W8yvDJ4+fPlql5bx1KlYBm4lw54JqrTkcI9PW8/YRW13wWoYm042n5uiu98m3AO
7WJui40A1hMu6WWFZYuV2Q4BdQcMwrCdctWlcHS5Dc1TlXvihNqiYJ4m8lOqmQ6EMRQsKehI
3ZoHI++ggUi9eTW+PQYF3LQGSNDxjwP/RQq5rLN3i2SE1Asr1IcmgXPLEcnR01QhUEm+5Eyb
GAwQagAMATBY7r9k6ABbPKjd8sUj8/p6HoyzCevYXp4Ff+/EP3+ZuH9HsFhvu8MaNv7q60fu
OGBVwbSR3yVw+jfQ8PQ6ZlNcflMaw2GHIdor3cgEBNQ/+MjL3O+Sx7gd+jrYtZZvl0wCbe7t
rYcZ8i97qXRycY4TzM5Q8wCB0SoU+CEMHvIvHQeZvIXUCOXo+8l6TbQL8M4BQtdMAwBDurm/
d+hSqXUOEJH43oAJzPuBH1otTVVObXSOTqVmqz8TFuAFsLgznkTYkwvBrg8W2FgAPGXZ18Vu
TBnJKubjJEsR/yHa7XD5FvMEh2l2kb28T5X+0Ta4cBBkjgM22FN9eacBDTAsWW54u6ZHV94t
Cyqg9cPZXt2xC07GOiaWDbkGp9vRQBzkUTpceCdt3lpAYoUCcJuGFTFVGJ+RvHeUKdw8FE9e
PffN6PcA21mxiXD5CW71vViflAsqwY9iVFItr62MCoZFZ1SpOYqldWGs/m7SDZ7nLITtDbqT
krZA9loGUp+eSOv7cqRuxJc3byF9hDsv6S8du36fxThjAUP0B2OqIfhN4VXj07aWTvzy5rWW
eRkAWQ2n1h7rU8fFqN9s25qN41UpcVe1Zf7Tvk0FwaTrRatDjUFJtG5gczzJfdkkKhWVj11Q
wyl1nrnx+6pKqs20FbH6Y8rmSb0W7WR3UPAFwAa424/g4XO0pfXCMGHg+63gCVKlE7aUQV1b
gSMdVb/5tqdxoOZ847X6PnGoXVB+PYQAcZu7ArqCbuK3ix4Hn2fmKY0r9avUEmv/Zi6HvSpB
i1JumHz+HGxiJS97vw0GcThZr69Nz+MSxZJKWi6oQrgCIyELwjfGnhlYOxBQr6ukXHu27Pag
erFMKDnhJWWKXxy/4as4deB2/H9N0sptIPnVKF5GjhSDCpSpAJ0ONa4tVr4IuJW3DdDgGmcW
02RpcPcZAe0I6hz0gLvYMOD1IjR2VeHXjKOmchgOLBPFT7tQrebJFzLMyQitQoInvaI9jFSR
A0v0nog2wkbfABEBAAG0K0NpbmNpbm5hdHVzIChUb3IpIDxjaW5jaW5uYXR1c0BsYXZhYml0
LmNvbT6JBDgEEwECACIFAlBCpqYCGy8GCwkIBwMCBhUIAgkKCwQWAgMBAh4BAheAAAoJEEx0
OAr3LYCzu4YgAK9sa0VfghiZGYQXQVCHeWX2btC0q56ECMTmisNi5ZUIXBlQyX6pjNKsOMci
V69dCnNMJPJA8C2Eq8pQsrm55ajrL4XWHMJM3KE/ratY1O3Y7p2yRzS+H8YeB/4ST5ihg3CR
i+INKpxeBIWwvaA6NkBevLnZHUZ9Z/wtVBj/WQv6kpCrSpLIKSWjaXGE7TwEfc+L+gC8QlsR
CnygyXVCsucg9EkNWIY6ahLVacpk0CIWVvq+uYPtDy2UYejIQRWKH6myOZ77W9HLdgh+JSYu
pnlw7jfQycbGYkm02vS/8euiP992Vde8DTiR8L8LN8NxtFZHRhhGvnTwJq/EmOzPEYAs2zx3
VfFPjTE586FDtlCzOWl8gHZ3XXWAD8r8qdzIfgpo7FZzvHbfjYsGcgEbxmqmOrG898RgRY8q
a5k4tgi5oO2NgcB4R1W0ksQ9zvEB/qYGf8ntPxEtjaC/NmVjkHSbQJz6+VBBd5ayrN6RR95R
melviWTW9pVjcY1tD/RrL9XVJvDpJ5cLqkuju5WKqAOIVM+9m991Vj+PHwdoLWu0RvXBP2FV
o7PdI4e525qhTkdxdFwGjhyz5+laBYf/Qcr5alusxBbtQdHeIE2ffVRW1e7vEZ5V5I9S1BEw
Oxul1jk8U3v1ZElMhuq2scNx7/FtBmDNzjO8eq6A9hiuhH/oV2pXR42UCMckN2BOozge+1u4
R8MgtXuVWD8qYPvS7tYfpj4ALxiY+LOBQ8+6cEGpri8vY8NbxX5GPjVvnRBnMgHM2il1qWRf
xVD11X+1beTwbE1eHvvHw9yp17+Hh31DT4fTjCGvDXqv8rRlcXirQ6mpbpyqtFpaEhgU++nt
mGeSuWV5CzJARdb8xO3HI52HM9o18wNkfw/EqbIuNAm6iKq7rDZKMIiN233Od0dBtoop6JjM
ATB1EywZ1zNcNQJr6Y6yX0enEHLO8vBB+BQPFf6tvuGfEJU8WYfsQnOtE0B2K6ltXlQLsFK/
ZKqRrV+Y5FQbH7Rd14tH////ByoFsYaOjMF9oH4SVOOyEBDB64BoBpL6tqLLHjUu9dmUo4ft
Oe3PwkkhoWyROvRsq+vfzLhukbZ57GlOp4ox4JhkWPia0UM/PCLZ0ZJvj0dO4jwQ/ofOrbWS
4+VuiqgScXa9g+6jQmPkOOzqAbQNnA8Aix6PBgE8gaRqTSJR72JGSzOjsq2HrkCNq1H1T4jS
T+jmd0E97Mpx8QRZqu4qRXgyNrZt7mhN+L7S5XuYrXUyhxhyMULqcTw6jWzpmcvv7fLJKkW+
hilyPsmvKsf3kCe2Ey6+Tfow6QUXiPwdUmjXU9MfVBEGDLn00QXh2qCyAS5N82bRc+0q/Hag
u0aOHozaqQk=
=W7Ka
-----END PGP PUBLIC KEY BLOCK-----
_______________________________________________________________
Old: Public Key Packet(tag 6)(1037 bytes)
Ver 4 - new
Public key creation time - Sun Sep 2 00:21:58 UTC 2012
Pub alg - RSA Encrypt or Sign(pub 1)
RSA n(8192 bits) - ...
RSA e(17 bits) - ...
Old: User ID Packet(tag 13)(43 bytes)
User ID - Cincinnatus (Tor) <cincinnatus@lavabit.com>
Old: Signature Packet(tag 2)(1080 bytes)
Ver 4 - new
Sig type - Positive certification of a User ID and Public Key packet(0x13).
Pub alg - RSA Encrypt or Sign(pub 1)
Hash alg - SHA1(hash 2)
Hashed Sub: signature creation time(sub 2)(4 bytes)
Time - Sun Sep 2 00:21:58 UTC 2012
Hashed Sub: key flags(sub 27)(1 bytes)
Flag - This key may be used to certify other keys
Flag - This key may be used to sign data
Flag - This key may be used to encrypt communications
Flag - This key may be used to encrypt storage
Flag - This key may be used for authentication
Hashed Sub: preferred symmetric algorithms(sub 11)(5 bytes)
Sym alg - AES with 256-bit key(sym 9)
Sym alg - AES with 192-bit key(sym 8)
Sym alg - AES with 128-bit key(sym 7)
Sym alg - CAST5(sym 3)
Sym alg - Triple-DES(sym 2)
Hashed Sub: preferred hash algorithms(sub 21)(5 bytes)
Hash alg - SHA256(hash 8)
Hash alg - SHA1(hash 2)
Hash alg - SHA384(hash 9)
Hash alg - SHA512(hash 10)
Hash alg - SHA224(hash 11)
Hashed Sub: preferred compression algorithms(sub 22)(3 bytes)
Comp alg - ZLIB <RFC1950>(comp 2)
Comp alg - BZip2(comp 3)
Comp alg - ZIP <RFC1951>(comp 1)
Hashed Sub: features(sub 30)(1 bytes)
Flag - Modification detection (packets 18 and 19)
Hashed Sub: key server preferences(sub 23)(1 bytes)
Flag - No-modify
Sub: issuer key ID(sub 16)(8 bytes)
Key ID - 0x4C74380AF72D80B3
Hash left 2 bytes - bb 86
RSA m^d mod n(8192 bits) - ...
-> PKCS-1
Introduction
From the
CryptoParty
article by Parker Higgins P with (cincinnatus (.a.) lavabit.com PGP if
desired) or directly with HICapacity ASAP -- if you waiof the EFF
"...a set of global get-togethers where more experienced users can teach
beginners how to use the commonly available tools that tap into the incredibly
powerful technology of cryptography. I hope that a beginner walks away from
a #CryptoParty with an understanding of not just PGP, OTR, and the like,
but with an idea of why threat models are important, what attack vectors
she ought to consider, and most importantly a network of people
and resources she can contact for even more knowledge." Recorded #cryptoparty
benedictions from notable people.
Planning
We have a location. We have a time. We need people - that means you.
We have people willing to do hands-on workshops. Want to do a workshop or
give a talk? Please add it to this list. You don't have to put your name
down, but please ping the organizer privately so we can keep everything straight.
HICapacity has WiFi and a projector. Food and drink is okay and welcome.
Potential Workshops for 12/11 Cryptoparty
Note: if you cannot attend the 12/11 cryptoparty, please remove yourself
from this list and add to the "generally available" list below along with
contact info.
Tor & Tor Browser Bundle - Runa S. from the Tor team
Painlessly setting up your own fast exit - Cincinnatus
PGP and GnuPG - PLEASE VOLUNTEER
Key generation
Integrating GnuPG into Windows
Integrating GnuPG into Thunderbird
Configuring Thunderbird to sign, encrypt and decrypt mail
Verifying digital signatures and integrity of downloaded files
Truecrypt - Cincinnatus (can cover something else if this is all someone
can talk on -- don't be afraid to slot your name in here instead)
LUKS - PLEASE VOLUNTEER
OTR / Secure IM - PLEASE VOLUNTEER
SSL and authentication - PLEASE VOLUNTEER
VPNs - PLEASE VOLUNTEER
I2P - PLEASE VOLUNTEER
TAILS (The Amnesiac Incognito Live System) - PLEASE VOLUNTEER
Password length - PLEASE VOLUNTEER
ssh and other pki stuff (*nix admin stuff) - PLEASE VOLUNTEER
If you'd like to volunteer, please contact (cincinnatus (.a.) lavabit.com
PGP if desired) as soon as you can. Remember: you're not limited to the talks
above -- add your own!
https://cryptoparty.org/wiki/Oahu
Status
API
Training
Shop
Blog
About
© 2014 GitHub, Inc.
|