Len Sassaman
   HOME

TheInfoList



OR:

Leonard Harris Sassaman (April 9, 1980 – July 3, 2011) was an American technologist,
information privacy Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as data pr ...
advocate, and the maintainer of the
Mixmaster anonymous remailer Mixmaster is a Type II anonymous remailer which sends messages in fixed-size packets and reorders them, preventing anyone watching the messages go in and out of remailers from tracing them. It is an implementation of a Chaumian Mix network. Hist ...
code and operator of the ''randseed'' remailer. Much of his career gravitated towards
cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
and protocol development.


Early life and education

Sassaman graduated from
The Hill School The Hill School (commonly known as The Hill) is a coeducational preparatory boarding school located on a campus in Pottstown, Pennsylvania, about northwest of Philadelphia. The Hill is part of the Ten Schools Admissions Organization (TSAO). ...
in 1998. By 18, he was on the
Internet Engineering Task Force The Internet Engineering Task Force (IETF) is a standards organization for the Internet and is responsible for the technical standards that make up the Internet protocol suite (TCP/IP). It has no formal membership roster or requirements and a ...
responsible for the TCP/IP protocol underlying the internet and later the
Bitcoin Bitcoin ( abbreviation: BTC; sign: ₿) is a decentralized digital currency that can be transferred on the peer-to-peer bitcoin network. Bitcoin transactions are verified by network nodes through cryptography and recorded in a public distr ...
network. He was diagnosed with depression as a teenager. In 1999, Len moved to the
Bay Area The San Francisco Bay Area, often referred to as simply the Bay Area, is a populous region surrounding the San Francisco, San Pablo, and Suisun Bay estuaries in Northern California. The Bay Area is defined by the Association of Bay Area Gov ...
, quickly became a regular in the cypherpunk community and moved in with Bram Cohen.


Career

Sassaman was employed as the security architect and senior systems engineer for Anonymizer. He was a
PhD PHD or PhD may refer to: * Doctor of Philosophy (PhD), an academic qualification Entertainment * '' PhD: Phantasy Degree'', a Korean comic series * ''Piled Higher and Deeper'', a web comic * Ph.D. (band), a 1980s British group ** Ph.D. (Ph.D. albu ...
candidate at the
Katholieke Universiteit Leuven KU Leuven (or Katholieke Universiteit Leuven) is a Catholic research university in the city of Leuven, Belgium. It conducts teaching, research, and services in computer science, engineering, natural sciences, theology, humanities, medicine, l ...
in Belgium, as a researcher with the Computer Security and Industrial Cryptography (COSIC) research group, led by
Bart Preneel Bart Preneel (born 15 October 1963 in Leuven, Belgium) is a Flemish cryptographer and cryptanalyst. He is a professor at Katholieke Universiteit Leuven, in the COSIC group. He was the president of the International Association for Cryptologic R ...
.
David Chaum David Lee Chaum (born 1955) is an American computer scientist, cryptographer, and inventor. He is known as a pioneer in cryptography and privacy-preserving technologies, and widely recognized as the inventor of digital cash. His 1982 dissertatio ...
and Bart Preneel were his advisors. Sassaman was a well-known
cypherpunk A cypherpunk is any individual advocating widespread use of strong cryptography and privacy-enhancing technologies as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal g ...
, cryptographer and privacy advocate. He worked for
Network Associates McAfee Corp. ( ), formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American global computer security software company head ...
on the
PGP PGP or Pgp may refer to: Science and technology * P-glycoprotein, a type of protein * Pelvic girdle pain, a pregnancy discomfort * Personal Genome Project, to sequence genomes and medical records * Pretty Good Privacy, a computer program for the ...
encryption software, was a member of the Shmoo Group, a contributor to the
OpenPGP Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitio ...
IETF The Internet Engineering Task Force (IETF) is a standards organization for the Internet and is responsible for the technical standards that make up the Internet protocol suite (TCP/IP). It has no formal membership roster or requirements and a ...
working group A working group, or working party, is a group of experts working together to achieve specified goals. The groups are domain-specific and focus on discussion or activity around a specific subject area. The term can sometimes refer to an interdis ...
, the
GNU Privacy Guard GNU Privacy Guard (GnuPG or GPG) is a free-software replacement for Symantec's PGP cryptographic software suite. The software is compliant with RFC 4880, the IETF standards-track specification of OpenPGP. Modern versions of PGP are interoperable ...
project, and frequently appeared at technology conferences like
DEF CON DEF CON (also written as DEFCON, Defcon or DC) is a hacker convention held annually in Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include computer security professionals, journalists, lawyer ...
. Sassaman was the co-founder of
CodeCon CodeCon was an annual conference for software hackers and technology enthusiasts, held every year between 2002 and 2009. CodeCon was not intended to be a computer security conference, but a conference with a focus on software developers doing presen ...
along with Bram Cohen, co-founder of the HotPETS workshop (with
Roger Dingledine Roger Dingledine is an American computer scientist known for having co-founded the Tor Project. A student of mathematics, computer science, and electrical engineering, Dingledine is also known by the pseudonym arma. As of December 2016, he contin ...
of
Tor Tor, TOR or ToR may refer to: Places * Tor, Pallars, a village in Spain * Tor, former name of Sloviansk, Ukraine, a city * Mount Tor, Tasmania, Australia, an extinct volcano * Tor Bay, Devon, England * Tor River, Western New Guinea, Indonesia Sc ...
and Thomas Heydt-Benjamin), co-author of the
Zimmermann–Sassaman key-signing protocol In cryptography, the Zimmermann–Sassaman key-signing protocol is a protocol to speed up the public key fingerprint verification part of a key signing party. It requires some work before the event. The protocol was invented during a key signing p ...
, and at the age of 21, was an organizer of the protests following the arrest of Russian programmer
Dmitry Sklyarov ''United States v. ElcomSoft and Dmitry Sklyarov'' was a 2001–2002 criminal case in which Dmitry Sklyarov and his employer ElcomSoft were charged with alleged violation of the DMCA. The case raised some concerns of civil rights and legal proces ...
. On February 11, 2006, at the fifth CodeCon, Sassaman proposed to returning speaker and noted computer scientist
Meredith L. Patterson Meredith L. Patterson (born April 30, 1977) is an American Technology, technologist, science fiction writer, and journalist. She has spoken at numerous industry conferences on a wide range of topics. She is also a blogger and software developer, ...
during the Q&A after her presentation, and they were married. The couple worked together on several research collaborations, including a critique of privacy flaws in the OLPC
Bitfrost Bitfrost is the security design specification for the OLPC XO, a low cost laptop intended for children in developing countries and developed by the One Laptop Per Child (OLPC) project. Bitfrost's main architect is Ivan Krstić. The first public ...
security platform, and a proposal of formal methods of analysis of computer insecurity in February 2011. Meredith Patterson's current startup, Osogato, aims to commercialize Patterson's
Support Vector Machine In machine learning, support vector machines (SVMs, also support vector networks) are supervised learning models with associated learning algorithms that analyze data for classification and regression analysis. Developed at AT&T Bell Laboratorie ...
-based "query by example" research. Sassaman and Patterson announced Osogato's first product, a downloadable music recommendation tool, at
SuperHappyDevHouse SuperHappyDevHouse (a.k.a. SHDH) is an international series of social events that organizers originally conceived as parties for hackers and thinkers. It was founded by Jeff Lindsay and David Weekly (founder of PBwiki) on May 29, 2005. SHDH in ...
21 in San Francisco. In 2009,
Dan Kaminsky Daniel Kaminsky (February 7, 1979 – April 23, 2021) was an American computer security researcher. He was a co-founder and chief scientist of WhiteOps, a computer security company. He previously worked for Cisco, Avaya, and IOActive, where h ...
presented joint work with Sassaman and Patterson at
Black Hat Black hat, blackhats, or black-hat refers to: Arts, entertainment, and media * Black hat (computer security), a hacker who violates computer security for little reason beyond maliciousness or for personal gain * Black hat, part of black and white ...
in
Las Vegas Las Vegas (; Spanish for "The Meadows"), often known simply as Vegas, is the 25th-most populous city in the United States, the most populous city in the state of Nevada, and the county seat of Clark County. The city anchors the Las Vegas ...
, showing multiple methods for attacking the
X.509 In cryptography, X.509 is an International Telecommunication Union (ITU) standard defining the format of public key certificates. X.509 certificates are used in many Internet protocols, including TLS/SSL, which is the basis for HTTPS, the secure ...
certificate authority infrastructure. Using these techniques, the team demonstrated how an attacker could obtain a certificate that clients would treat as valid for domains the attacker did not control. CNBC India suggested Sassaman as a potential candidate to be
Satoshi Nakamoto Satoshi Nakamoto is the name used by the presumed pseudonymous person or persons who developed bitcoin, authored the bitcoin white paper, and created and deployed bitcoin's original reference implementation. As part of the implementation, Nakam ...
.


Death

Sassaman is reported to have died on July 3, 2011. Patterson reported that her husband's death was a
suicide Suicide is the act of intentionally causing one's own death. Mental disorders (including depression, bipolar disorder, schizophrenia, personality disorders, anxiety disorders), physical disorders (such as chronic fatigue syndrome), and s ...
. A presentation given by Kaminsky at the 2011 Black Hat Briefings revealed that a testimonial in honor of Sassaman had been permanently embedded into
Bitcoin Bitcoin ( abbreviation: BTC; sign: ₿) is a decentralized digital currency that can be transferred on the peer-to-peer bitcoin network. Bitcoin transactions are verified by network nodes through cryptography and recorded in a public distr ...
's block chain.


See also

*
Information privacy Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as data pr ...
*
Information security Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorize ...


References


External links

* *
Archive of Len Sassaman's homepage from July 2011
{{DEFAULTSORT:Sassaman, Len Cypherpunks 1980 births 2011 suicides Modern cryptographers People associated with computer security Computer systems engineers Suicides in Belgium The Hill School alumni 2011 deaths