Archive for the ‘crypto’ Category

Anonym.OS LiveCD


Like sand through the hourglass, so are the vestiges of our privacy. From increased governmental surveilance to corporate content restrictions and data brokers, what you do, where you go, and who you talk to is of more interest to more people every day.

Anonym.OS is an OpenBSD 3.8 Live CD with strong tools for anonymizing and encrypting connections. Standard network applications are provided and configured to take advantage of the tor onion routing network.


Tags: , , , , , , , , ,

kaos.theory Responds


First of all, I’d like to take a moment to express, on behalf of kaos.theory, how excited and flattered we are by all of the attention that we and Anonym.OS have received. We always thought we were working on a cool project, but we really underestimated the overwhelming response that we’ve had. Scores of terabyte upon terrabytes of data have flowed and the hit counters keep on ticking. It appears that privacy is as big of a concern for a large segment of the population as it is for us.

That being said, there have been a few comments made and viewpoints published that we would like to address while we have the bully pulpit provided by the good folks at digg, Slashdot, Reddit, Wired News, and Ars Technica, among others.

Anonym.OS in action


anonym.os screenshot
Since this picture didn’t seem to make it into the Wired article, I thought it would be nice to post it here for those who haven’t yet booted Anonym.OS.

kaos crew
I also really liked this picture from our photo shoot, though it didn’t make it to print. Great idea, decent execution. Kinda captures the spirit of Anonym.OS, wouldn’t you say?

Technorati Tags: , , ,

Anonym.OS now available!


For those that didn’t see us at ShmooCon, our Anonym.OS presentation went off superbly! Unfortunately, it seems that there have been problems downloading the ISO via SourceForge. Out of approximately 21,000 download attempts, it seems that only a few have been successful. :-(
Although it looks like the image is now slowly propagating across all of the SF mirrors, we’ve set up a torrent at so that everyone can grab a copy now.

Look forward to everyone’s feedback — get it, use it, and tell us what you think!

Technorati Tags: , , , ,

Join us at ShmooCon 2006


Final speaker selections for ShmooCon 2006 were announced yesterday and we’re on the list! Currently scheduled to talk at 3pm on Saturday, Jan 14th, we’ll be discoursing on privacy and security and introducing the first public version of Anonym.OS, our own Live CD designed to automagically anonymize and encrypt all ingress and egress traffic on any PC, anywhere!

Our presentation will introduce Anonym.OS, describe its goals and the fundamental underlying technologies, demonstrate it for the audience (an OpenBSD LiveCD that really works, w00t!), follow up with a Q&A session, then conclude by providing links to download all source and ISO images. We will also distribute as many copies of Anonym.OS on CD as we can burn the night before. :)

Technorati Tags: , , ,


MD5 in Head-on Collision


Via Schneier:

Two researchers from the Institute for Cryptology and IT-Security have generated PostScript files with identical MD5-sums but entirely different (but meaningful!) content.

Ok, so this really is a pretty amazing demonstration of MD5 collision, as it uses two PostScript files (both available for download) which render two vastly different documents but both produce the same MD5 hash. Scary.

In this example, however, note that the files used are PostScript files, and as one commenter at Schneier’s page suggests:

The drawback of this attack is that the proof of bad intent lies within both documents. That is your “evil” content exists within the “innocent” document and vice versa, so that if the documented is opened in a text editor you can realize what is going on.

The overview by Magnus Daum and Stefan Lucks is very good and I highly recommend that you pull down their example files and see this firsthand.