AND DEVOURED THEM. – The Word of God.

Republicans are COMPLETE HYPOCRITES . CRIMINALS. How can they ever be trusted?

They state as one of their principles smaller government, less invasive. And they look to our Constitution as the founding document. The impetus document is the Declaration of Independence and that document declares three rights as inalienable from God: Life, Liberty and the Pursuit of Happiness. The Constitution is supposed to protect those rights. It does not. Not when the GOP is in majority. HYPOCRITES!

So now we have NCGOP State Convention Republicans that have legislated away our right to Liberty, by refusing to legalize marijuana. The laws against legalized marijuana are based on LIES, it has medicinal value and ought to be viewed and treated as over the counter medication, like ibuprofin, with as PSYCHOactive botanical medicine. Look what GOD gave us! Nope they Scheduled it as Schedule 1 claiming it has no medicinal value and that it is as dangerous as HEROIN. HYPOCRITES!

OUTRIGHT BLATANT AND INESCAPABLE LIES!

And so they are COMPLETE HYPOCRITES in this regard, invading my life on their lies and judgements that I am a bad person for smoking herb, which comes from God.

They only situation that makes sense is that they are making a lot of money off the BLACK MARKET. So they are CRIMINALS! Certainly the Law Enforcement Community gets big budgets with prohibition. They are making MONEY! Durham County Sheriff’s Office

Republicans are completely lacking in integrity. But they do not see. God prevents them from seeing.

Why are they this way? They are making black market money, number 1. They think that getting high is wrong and nobody ought to do so. They think they are protecting us. Right here is the false justification they tell themselves. They think they are protecting us by taking our LIBERTY! Veterans are the ones who protect us, why are you taking our LIBERTY?

It is our CHOICE to make, not theirs. So we see how the legislature can be abused and misused. Bunch of CROOKS.

Are they protecting us with smaller government or are they telling us how to live, within our boundaries.

GOP, never to be TRUSTED. They thinkkk we are playing. Let them all know that you know that they are TOTAL HYPOCRITES. WAKE UP! UNITE! STATES RIGHTS!

๐‘พ๐‘ฌ ๐‘จ๐‘น๐‘ฌ ๐‘ถ๐‘ผ๐‘ป๐‘น๐‘จ๐‘ฎ๐‘ฌ๐‘ซ!!!

NC NORML

You see one way to view this. Our NC society suffers from MENTAL ILLNESS and we are lying to ourselves about it. GOP is telling us how to live our lives, in direct CONTRADICTION of their stated principles. How can they live with themselves after all of this EVIL DONE over DECADES?

๐‘ฉ๐’† ๐’„๐’‚๐’“๐’†๐’‡๐’–๐’, ๐’•๐’‰๐’†๐’š ๐’‚๐’“๐’† ๐‘ท๐‘บ๐’€๐‘ช๐‘ฏ๐‘ถ๐‘ป๐‘ฐ๐‘ช, ๐’๐’๐’˜…๐’ˆ๐’Š๐’—๐’† ๐’•๐’‰๐’†๐’Ž ๐’ˆ๐’๐’๐’… ๐’Ž๐’†๐’…๐’Š๐’„๐’Š๐’๐’†!!! ๐‘พ๐’† ๐’‰๐’‚๐’—๐’† ๐’‹๐’–๐’”๐’• ๐’•๐’‰๐’† ๐’•๐’‰๐’Š๐’๐’ˆ ๐’‡๐’๐’“ ๐’š๐’๐’– . .. …^,^

๐‘ฏ๐’๐’˜๐’” ๐’‚๐’ƒ๐’๐’–๐’•๐’” ๐’‚ 72-๐’‰๐’๐’–๐’“ ๐’‰๐’๐’๐’…, ๐’š๐’๐’–๐’“ ๐’‰๐’๐’๐’๐’“? ๐‘บ๐’Š๐’ˆ๐’, ๐‘บ๐’†๐’‚๐’, ๐‘ซ๐’†๐’๐’Š๐’—๐’†๐’“.

DEFCON 3 BRAVO: ROUND CALLISTO HOUSE.

๐‘ณ๐’•. ๐‘ช๐’๐’. ๐‘น๐’๐’ƒ๐’†๐’“๐’• ๐‘พ๐‘ฐ๐’•๐’‰๐’†๐’“๐’”, ๐‘ช๐’…๐’“ 42๐’๐’… ๐‘ฝ๐’Š๐’“๐’ˆ๐’Š๐’๐’Š๐’‚ ๐‘ฐ๐’๐’‡๐’‚๐’๐’•๐’“๐’š ๐‘น๐’†๐’ˆ๐’Š๐’Ž๐’†๐’๐’•

Time to free the slaves again, GOP. Sons of Confederate Veterans #SONSOFCONFEDERATEVETERANS #SCV

PS. NCGOP State Convention Directly Amendment the NC Constitution and remove Article I, Sections 4, post haste, as well as amending Article I, Sections 5, to state:

Sec. 5. Allegiance to our State.

Every citizen of this State owes paramount allegiance to the Constitution and government of the State of North Carolina, as formed from out of the Peoples of our God Given State, ensuring the God given rights of Life, Liberty and the Pursuit of Happiness as declared in the Mecklenburg Declaration of Independence and the US Declaration of Independence, acting as satrep [1] for the United States of America, to Whom We Belong, and no law or ordinance of the State in contravention or subversion thereof can have *Any* binding force upon its Peoples.

Listen, we have a firm foundation. Nullification right here.

[1] SATREPS – https://en.wikipedia.org/wiki/SATREPS SATREPS #SATREPS

pledge to We have a different path ahead. #NCGOP #NCREPUBLICANS #CONFEDERATESTATESOFAMERICA

๐‘ณ๐’•. ๐‘ช๐’๐’. ๐‘น๐’๐’ƒ๐’†๐’“๐’• ๐‘พ๐‘ฐ๐’•๐’‰๐’†๐’“๐’”, ๐‘ช๐’…๐’“ 42๐’๐’… ๐‘ฝ๐’Š๐’“๐’ˆ๐’Š๐’๐’Š๐’‚ ๐‘ฐ๐’๐’‡๐’‚๐’๐’•๐’“๐’š ๐‘น๐’†๐’ˆ๐’Š๐’Ž๐’†๐’๐’•

๐‘พ๐‘ฌ ๐‘ฉ๐‘ฌ ๐‘ญ๐‘ฐ๐‘ณ๐‘ณ๐‘ฌ๐‘ซ ๐‘พ๐‘ฐ๐‘ป๐‘ฏ ๐‘ป๐‘ฏ๐‘จ๐‘ป ๐‘ฏ๐‘ถ๐‘ณ๐’€ ๐‘บ๐‘ท๐‘ฐ๐‘น๐‘ฐ๐‘ป!! ๐‘ญ๐‘ฌ๐‘ฌ๐‘ณ๐‘บ ๐‘บ๐‘ถ ๐‘ฎ๐‘ถ๐‘ถ๐‘ถ๐‘ซ! You don’t know. I feel your pain.

๐‘พ๐’† ๐’‚๐’“๐’† ๐’•๐’‚๐’Œ๐’Š๐’๐’ˆ ๐’๐’–๐’“ ๐’‡๐’๐’‚๐’ˆ ๐’ƒ๐’‚๐’„๐’Œ.
Featured AND DEVOURED THEM. โ€“ The Word of God. Republicans are COMPLETE HYPOCRITES . CRIMINALS. How can they ever be trusted? They state as one of their principles smaller government, less invasive. And they look to our Constitution as the founding document. The impetus document is the Declaration…

Sec. 5. Allegiance to our State.

We have a different path ahead.

Who’s the best #๐—ฃ๐—ฆ๐—ฌ๐—–๐—›๐—ข๐—›๐—”๐—–๐—ž๐—˜๐—ฅ? You know I AM!!! ๐—›๐—˜๐—Ÿ๐—Ÿ๐—ข ๐—ฆ๐—ข๐— ๐—˜๐—•๐—ข๐——๐—ฌ! #RealConservativesSmokeMarijuana_RCSM_ #RCSM

๐‘ฐ๐’ ๐’•๐’‰๐’† ๐’†๐’๐’… ๐’•๐’Š๐’Ž๐’†๐’”, ๐’•๐’‰๐’†๐’“๐’† ๐’˜๐’Š๐’๐’ ๐’ƒ๐’† ๐’Ž๐’–๐’„๐’‰ ๐’ˆ๐’๐’‚๐’”๐’‰๐’Š๐’๐’ˆ ๐’๐’‡ ๐’•๐’†๐’†๐’•๐’‰. ๐‘ป๐’‰๐’† ๐‘พ๐’๐’“๐’… ๐’๐’‡ ๐‘ฎ๐’๐’…!

[๐™๐™๐™š๐™ง๐™š ๐™จ๐™๐™–๐™ก๐™ก ๐™—๐™š ๐™ฌ๐™š๐™š๐™ฅ๐™ž๐™ฃ๐™œ ๐™–๐™ฃ๐™™ ๐™œ๐™ฃ๐™–๐™จ๐™๐™ž๐™ฃ๐™œ ๐™ค๐™› ๐™ฉ๐™š๐™š๐™ฉ๐™, ๐™ฌ๐™๐™š๐™ฃ ๐™ฎ๐™š ๐™จ๐™๐™–๐™ก๐™ก ๐™จ๐™š๐™š ๐˜ผ๐™—๐™ง๐™–๐™๐™–๐™ข, ๐™–๐™ฃ๐™™ ๐™„๐™จ๐™–๐™–๐™˜, ๐™–๐™ฃ๐™™ ๐™…๐™–๐™˜๐™ค๐™—, ๐™–๐™ฃ๐™™ ๐™–๐™ก๐™ก ๐™ฉ๐™๐™š ๐™ฅ๐™ง๐™ค๐™ฅ๐™๐™š๐™ฉ๐™จ, ๐™ž๐™ฃ ๐™ฉ๐™๐™š ๐™ ๐™ž๐™ฃ๐™œ๐™™๐™ค๐™ข ๐™ค๐™› ๐™‚๐™ค๐™™, ๐™–๐™ฃ๐™™ ๐™ฎ๐™ค๐™ช ๐™ฎ๐™ค๐™ช๐™ง๐™จ๐™š๐™ก๐™ซ๐™š๐™จ ๐™ฉ๐™๐™ง๐™ช๐™จ๐™ฉ ๐™ค๐™ช๐™ฉ.]

– ๐™‡๐™๐™†๐™€ 13:28

๐‘ป๐‘ฏ๐‘น๐‘ผ๐‘บ๐‘ป ๐‘ถ๐‘ผ๐‘ป #๐‘ป๐‘ฏ๐‘น๐‘ผ๐‘บ๐‘ป๐‘ถ๐‘ผ๐‘ป

[๐‘ป๐’‰๐’† ๐‘บ๐’๐’ ๐’๐’‡ ๐’Ž๐’‚๐’ ๐’”๐’‰๐’‚๐’๐’ ๐’”๐’†๐’๐’… ๐’‡๐’๐’“๐’•๐’‰ ๐’‰๐’Š๐’” ๐’‚๐’๐’ˆ๐’†๐’๐’”, ๐’‚๐’๐’… ๐’•๐’‰๐’†๐’š ๐’”๐’‰๐’‚๐’๐’ ๐’ˆ๐’‚๐’•๐’‰๐’†๐’“ ๐’๐’–๐’• ๐’๐’‡ ๐’‰๐’Š๐’” ๐’Œ๐’Š๐’๐’ˆ๐’…๐’๐’Ž ๐’‚๐’๐’ ๐’•๐’‰๐’Š๐’๐’ˆ๐’” ๐’•๐’‰๐’‚๐’• ๐’๐’‡๐’‡๐’†๐’๐’…, ๐’‚๐’๐’… ๐’•๐’‰๐’†๐’Ž ๐’˜๐’‰๐’Š๐’„๐’‰ ๐’…๐’ ๐’Š๐’๐’Š๐’’๐’–๐’Š๐’•๐’š;

๐‘จ๐’๐’… ๐’”๐’‰๐’‚๐’๐’ ๐’„๐’‚๐’”๐’• ๐’•๐’‰๐’†๐’Ž ๐’Š๐’๐’•๐’ ๐’‚ ๐’‡๐’–๐’“๐’๐’‚๐’„๐’† ๐’๐’‡ ๐’‡๐’Š๐’“๐’†: ๐’•๐’‰๐’†๐’“๐’† ๐’”๐’‰๐’‚๐’๐’ ๐’ƒ๐’† ๐’˜๐’‚๐’Š๐’๐’Š๐’๐’ˆ ๐’‚๐’๐’… ๐’ˆ๐’๐’‚๐’”๐’‰๐’Š๐’๐’ˆ ๐’๐’‡ ๐’•๐’†๐’†๐’•๐’‰.

๐‘ป๐’‰๐’†๐’ ๐’”๐’‰๐’‚๐’๐’ ๐’•๐’‰๐’† ๐’“๐’Š๐’ˆ๐’‰๐’•๐’†๐’๐’–๐’” ๐’”๐’‰๐’Š๐’๐’† ๐’‡๐’๐’“๐’•๐’‰ ๐’‚๐’” ๐’•๐’‰๐’† ๐’”๐’–๐’ ๐’Š๐’ ๐’•๐’‰๐’† ๐’Œ๐’Š๐’๐’ˆ๐’…๐’๐’Ž ๐’๐’‡ ๐’•๐’‰๐’†๐’Š๐’“ ๐‘ญ๐’‚๐’•๐’‰๐’†๐’“. ๐‘พ๐’‰๐’ ๐’‰๐’‚๐’•๐’‰ ๐’†๐’‚๐’“๐’” ๐’•๐’ ๐’‰๐’†๐’‚๐’“, ๐’๐’†๐’• ๐’‰๐’Š๐’Ž ๐’‰๐’†๐’‚๐’“.]

– ๐‘ด๐‘จ๐‘ป๐‘ป๐‘ฏ๐‘ฌ๐‘พ 13:41-43

[๐‘จ๐’๐’… ๐’˜๐’‰๐’†๐’ ๐’•๐’‰๐’† ๐’•๐’‰๐’๐’–๐’”๐’‚๐’๐’… ๐’š๐’†๐’‚๐’“๐’” ๐’‚๐’“๐’† ๐’†๐’™๐’‘๐’Š๐’“๐’†๐’…, ๐‘บ๐’‚๐’•๐’‚๐’ ๐’”๐’‰๐’‚๐’๐’ ๐’ƒ๐’† ๐’๐’๐’๐’”๐’†๐’… ๐’๐’–๐’• ๐’๐’‡ ๐’‰๐’Š๐’” ๐’‘๐’“๐’Š๐’”๐’๐’,

๐‘จ๐’๐’… ๐’”๐’‰๐’‚๐’๐’ ๐’ˆ๐’ ๐’๐’–๐’• ๐’•๐’ ๐’…๐’†๐’„๐’†๐’Š๐’—๐’† ๐’•๐’‰๐’† ๐’๐’‚๐’•๐’Š๐’๐’๐’” ๐’˜๐’‰๐’Š๐’„๐’‰ ๐’‚๐’“๐’† ๐’Š๐’ ๐’•๐’‰๐’† ๐’‡๐’๐’–๐’“ ๐’’๐’–๐’‚๐’“๐’•๐’†๐’“๐’” ๐’๐’‡ ๐’•๐’‰๐’† ๐’†๐’‚๐’“๐’•๐’‰, ๐‘ฎ๐’๐’ˆ, ๐’‚๐’๐’… ๐‘ด๐’‚๐’ˆ๐’๐’ˆ, ๐’•๐’ ๐’ˆ๐’‚๐’•๐’‰๐’†๐’“ ๐’•๐’‰๐’†๐’Ž ๐’•๐’๐’ˆ๐’†๐’•๐’‰๐’†๐’“ ๐’•๐’ ๐’ƒ๐’‚๐’•๐’•๐’๐’†: ๐’•๐’‰๐’† ๐’๐’–๐’Ž๐’ƒ๐’†๐’“ ๐’๐’‡ ๐’˜๐’‰๐’๐’Ž ๐’Š๐’” ๐’‚๐’” ๐’•๐’‰๐’† ๐’”๐’‚๐’๐’… ๐’๐’‡ ๐’•๐’‰๐’† ๐’”๐’†๐’‚.

๐‘จ๐’๐’… ๐’•๐’‰๐’†๐’š ๐’˜๐’†๐’๐’• ๐’–๐’‘ ๐’๐’ ๐’•๐’‰๐’† ๐’ƒ๐’“๐’†๐’‚๐’…๐’•๐’‰ ๐’๐’‡ ๐’•๐’‰๐’† ๐’†๐’‚๐’“๐’•๐’‰, ๐’‚๐’๐’… ๐’„๐’๐’Ž๐’‘๐’‚๐’”๐’”๐’†๐’… ๐’•๐’‰๐’† ๐’„๐’‚๐’Ž๐’‘ ๐’๐’‡ ๐’•๐’‰๐’† ๐’”๐’‚๐’Š๐’๐’•๐’” ๐’‚๐’ƒ๐’๐’–๐’•, ๐’‚๐’๐’… ๐’•๐’‰๐’† ๐’ƒ๐’†๐’๐’๐’—๐’†๐’… ๐’„๐’Š๐’•๐’š: ๐’‚๐’๐’… ๐’‡๐’Š๐’“๐’† ๐’„๐’‚๐’Ž๐’† ๐’…๐’๐’˜๐’ ๐’‡๐’“๐’๐’Ž ๐‘ฎ๐’๐’… ๐’๐’–๐’• ๐’๐’‡ ๐’‰๐’†๐’‚๐’—๐’†๐’, ๐’‚๐’๐’… ๐’…๐’†๐’—๐’๐’–๐’“๐’†๐’… ๐’•๐’‰๐’†๐’Ž.]

– ๐‘น๐‘ฌ๐‘ฝ๐‘ฌ๐‘ณ๐‘จ๐‘ป๐‘ฐ๐‘ถ๐‘ต 20:7-9

๐‘ซ๐‘จ๐‘ด๐‘ต๐‘จ๐‘ป๐‘ฐ๐‘ถ๐‘ต!!! https://www.youtube.com/watch?v=N8FRLHJmC9c

NSA Advisory (TLSI)

Now this release of a NSA Advisory on TLS encrypted channels, with inspection enabled, has some interesting information.

[TLSI (aka TLS break and inspect) is the process through which enterprises can inspect encrypted traffic with the help of a dedicated product such as a proxy device, a firewall, intrusion detection or prevention systems (IDS/IPS) ๐™ฉ๐™๐™–๐™ฉ ๐™˜๐™–๐™ฃ ๐™™๐™š๐™˜๐™ง๐™ฎ๐™ฅ๐™ฉ ๐™–๐™ฃ๐™™ ๐™ง๐™š-๐™š๐™ฃ๐™˜๐™ง๐™ฎ๐™ฅ๐™ฉ ๐™ฉ๐™ง๐™–๐™›๐™›๐™ž๐™˜ ๐™š๐™ฃ๐™˜๐™ง๐™ฎ๐™ฅ๐™ฉ๐™š๐™™ ๐™ฌ๐™ž๐™ฉ๐™ ๐™๐™‡๐™Ž.]

DOH! They can already monitor traffic, with compromised certificates.

[While some enterprises use this technique for monitoring potential threats such as data exfiltration, active command and control (C2) communication channels, or malware delivery via encrypted traffic, this will also introduce risks.]

C2 malware delivered over encrypted channels? YIKES!

https://www.bleepingcomputer.com/news/security/nsa-publishes-advisory-addressing-encrypted-traffic-inspection-risks/#.XdSmulZOing.facebook

China has started ranking citizens…just like Callisto House’s plans

Well now, if you have read my About page [1], you will see that my proposal is practically identical to China’s social scoring system they are testing. Here are my old business plans [2][3], I call their Social Score, building Esteem or Reputation. Awesome! The adjustments are my trick or treats, blessings or curses. We have fundamentally different ways of tricking or treating, anarchy is my solution the most spread, decentralized networks, every individual can give blessings and curses to each other!

Every individual has sovereignty over their conduct. Go Hong Kong!

[1] About – http://callistohouse.club/index.php/about/
[2] CallistoHouse Biz Plan – https://www.dropbox.com/s/vs1wsz6v8qqtdvf/CallistoHouse%20Business%20Plan%20v9.pdf?dl=0
[3] Homeless Council Biz Plan – https://www.dropbox.com/s/b1zjj4k12u5tlpv/RabbitPhone%2BBusiness%2BPlan.pdf?dl=0

https://www.businessinsider.com/china-social-credit-system-punishments-and-rewards-explained-2018-4

Thoughts of the great internet/DOJ war over the right to privacy during data-in-motion encryption

With the coming ability, in ParrotTalk, to detect initiation of encrypted connection negotiations, among many different protocols, along with the introduction of a redirect message, allows for implementation of a superb encrypted negotiation traffic analyzer. With connection control at the locally scoped naming services, the host domain of internal networks can be searched, managed & monitored.

a) No weakening encryption for the purposes of personal security.

We do not accept either the addition of back-doors or ghost protocols requiring group encryption negotiation, in order to eavesdrop in data-in-motion encryption, as it would result in the weakening of the encryption.

b) public security is limited to network traffffic analysis

We do allow that such a negotiation traffic analyzer, mentioned above, and monitoring of who is communicating with whom is of some value and acceptable state monitoring, by those authorized to monitor the local domain context.

It is the network authority‘s right to information to search & monitor this activity.

PAPAS – Redesigning ParrotTalk as an Automated Protocol Analyzer & Selector…

Through the AgentMap (config), a list of supported protocolNames are specified. In construction of the SessionProtocolSelector, a ProtocolSelectorRegistration with the SessionOperationโ€™s subclass for that protocolName is installed into the Selector. A call and answer ProtocolState is installed into the Selectorโ€™s compiled stateMap, within the expectCall and expectAnswer states. As well, the protocol is installed as a selectable protocol through protocolOffered & protocolAccepted messages for explicit ParrotTalk protocol negotiation. The result is installation of the selected protocol sessionOperations into the subjectStack accomplished through either negotiation or the initial sending of initial call/answer message headers.

The last is possible due to ASN1 structure definitions which construct the appropriate header class from the DER encoding. So the appropriate header will be distinguishable between different protocol versions. As such, within the version history of ParrotTalk headers, due to the frame specification of ParrotTalk, each protocol can be determined & will setup the stack with that protocolโ€™s sessionOperations, starting in the correct initial state to reprocess the frame that resulted in that protocolโ€™s installation, so the rendezvous will proceed, for that version of the protocol.

Thought has been given to the other area of discrimination, which is the FrameBuffer. That includes an assumption about frame specification and is currently only supporting ParrotTalk frames. With full implementations of SSL (TLS v1.2) [1] and SSH [2], with its required Telnet [3] package, initially ported onto ParrotTalk’s [4] framework, in Squeakโ€™s Cryptography project, a FrameAnalyzer may be able to be defined to automatically detect frame specifications for a given incoming frame and choose non-ParrotTalk frames and the associated SessionOperations.

From the package comment for ParrotTalk-rww.31 :::

I ported initial attempts to subclass an important stateMachine, from
each of SSL and SSH, to be rooted at ParrotTalk’s SessionOperations.
More work is needed, including defining active frameSpecifications that can detect appropriate frames for these new Protocols, in a new
FrameAnalyzer, to be used by the new SessionProtocolSelector. I
renamed the ParrotTalk SessionOperations. The current hierarchy of
SessionOperations as follows:

SessionOperations…
– ParrotTalkSessionOperations_v3_8
– ParrotTalkSessionOperations_v3_7
– ParrotTalkSessionOperations_v3_6
– SSLHandshakeStateMachine
– SSHTransportHandshakeStateMachine

and hence distinguish Protocol SessionOperations subclasses :::

  • ParrotTalkSessionOperations_v3_8
  • ParrotTalkSessionOperations_v3_7
  • ParrotTalkSessionOperations_v3_6
  • SSL_TLS_1_2
  • SSL_TLS_v1_3
  • SSH
  • Signal

That would be a powerful capability.

In thinking further about the current state of affairs, it would be a powerful addition to define a SignalSessionOperations and detect&read Signal [5] frames/messages.

For Squeak/Pharo…

[1] SSL – http://www.squeaksource.com/Cryptography/SSL-rww.20.mcz
[2] SSH – http://www.squeaksource.com/Cryptography/SSH-rww.13.mcz
[3] Telnet – http://www.squeaksource.com/Cryptography/Telnet-rww.105.mcz
[4] ParrotTalk – http://www.squeaksource.com/Cryptography/ParrotTalk-rww.31.mcz
[5] libsignal-protocol-java – https://github.com/signalapp/libsignal-protocol-java

Browse Oceanside or Cryptography, for latest developments.

The logic behind ParrotTalk

Problem Space

Per the recent C4ISR Conference (https://c4isrconf.com/) the problem is how to link thousands of connections in a military communications network, that needs reliable, simple encryption? [1][2][3][4][5] Foremost in mind is the requirement that this be integrated and operational in Combined Arms, Joint and Coalition contexts. When the concept of identity is baked into the protocol, we loose an ability to evolve solutions. So part of the problem is adaptability and a design that supports experimentation. We need a layered solution that can be modified in Cyber time-frames.

To meet these needs a standard & extensible framework for encrypted communications is absolutely necessary. I would introduce ParrotTalk as an inviting solution.


ParrotTalk as a solution

ParrotTalk is a minimal protocol for establishing a secured link between two computers. It allows for user-defined cipher and encoder. It exchanges Diffie-Hellman parameters with 2048-bit primes/generator to determine the shared key. It uses 2048-bit RSA Public/Private keys only for the purpose of signing the message traffic for Authentication, avoiding issues with RSA Certificate encryption which has been shown to be vulnerable. There are no Certificates, so there is no Certificate Management. It meets the minimal, capable requirements to establish an encrypted connection. Small in scope, wide in applicability.

We deferred the issue of identity verification to a software management layer above the secure connections. This provides a pathway to evolution and experimentation in identity management. The result of this decision implies various things about the encryption layer. It should be the simplest, most-minimal protocol negotiation that can be achieved. It should have the flexibility to specify cipher and encoding.

It must have the ability to encrypt end-to-end, between users (automated or actual). This implies the requirement to have double encryption: a capability to encrypt between computers and also encrypt a layer above over a route of links of computer connections. So we can manage routing, as well as deal with NATs and firewalls protecting internal networks. That would require a naming service and a coordinated bridging service, to bridge links. So we need a doubly layered encryption mechanism. With naming we need an identity solution.

However, the capability to negotiate a second higher layer encryption is missing in ParrotTalk, though the pieces to do so are there. As ParrotTalk was designed carefully to offer building blocks of a componentized, composable, reconfigurable manufacturing design nature, such a second layer of encryption can be realized with this framework. The existence of a naming service and a bridging service are absent. The identity is not present.

View 3 message specification for ParrotTalk-v3.7 Protocol.
Browse the Java code for ParrotTalk.
Browse the Squeak/Pharo code for ParrotTalk.

Given the shortcomings, more development is needed to meet all the objectives in the Problem Space. However, what exists is a simply designed, highly adjustable protocol that could fill the need to have an encryption standard across countries, branches and units. It is flexible enough to sustain evolutionary requirements. It may be able to support TLS-v1.2 and SSH. With such a capability it is an obvious framework for doing automated encrypted traffic analysis.

[1] If the Army doesnโ€™t get the network right, is everything else a wasted effort?

[2] The Army wants a singular focus, not one-off solutions

[3] Can the Army innovate on a traditional budget?

[4] The Navy and the need for interoperability in the fleet

[5] Army cannot rely on the cloud at the end of the spectrum