Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]]
Tyler Durden wrote: Actually, depending on your App, this would seem to be th very OPPOSITE of a moot point. -TD Indeed! I've been ignoring this list for a while, so sorry for the late posting. I remember sometime in late 99, I had one of the early blackberry pagers, the small ones that ate a single AA battery which lasted about a week or so, and had email + a small web browser inside of it. It wasn't the blackberry phone. Anyway, long story short, one day, said pager crashed (it is a computer after all) and I was trying to figure out how to reboot it, so I thought, fuck it, and removed the battery, the fucker stayed ON! For over 15 minutes! Gee, I wonder why anyone would design a cell phone or pager to be able to stay on after its battery is pulled out. Yeah, yeah, it's just a capacitor or an internal rechargeable battery, but why would you want such a feature? Fast forward to 2005. Most cell phones are after all small computers with a transceiver, microphone, and speaker, and recently GPS receivers. And now we have reports of the GPS info being transmitted all the time, oops! it's a bug, we meant to turn it off. uh huh. Just how much work would it be to reprogram the soft power off key, so it shuts off all the lights, and display, but still transmits GPS info, just less often? Or also transmit audio? What are the odds that the code on the phone already comes with this feature built in? Of course, if it was legal to scan on cell phone frequencies, you might be able to confirm what it's sending and when, but of course, it's not legal to do that. Even to your own phone. Of course some phones are more equal than others. For example, T-Mobile SideKick, which if you write an email and decide to cancel it, but you're out of range, exposes its evil self with Sorry, we can't let you delete the email you're composing, because it hasn't been sent to the server yet! Gee, I wonder what that means? Nah, it's just a bug. (Of course, this is a totally owned platform, where T-Mobile owns your data, not you, oops, make that the hackers of a few months ago..) Oh and if said phone is running out of batteries, it starts to complain loudly until you recharge it. Um, yeah, it likes being on at all times. You can hear it transmit occasionally when it's near amplified computer speakers or your car radio. Fun that, but could be useful. Especially if you heard it transmit while it's supposedly off. (I've honestly not heard it transmit while it's off) Are we just too paranoid? Nah, that's just a bug in human firmware, we'll fix that in the next brainwashing session. (BTW: what the fuck's up with all the weirdo subject lines? There's a perfectly good From: line in all SMTP headers, we don't need this shit in the subject line for fuck's sake! What's this, the return of Jim Choate?)
Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]]
Tyler Durden wrote: Actually, depending on your App, this would seem to be th very OPPOSITE of a moot point. -TD Indeed! I've been ignoring this list for a while, so sorry for the late posting. I remember sometime in late 99, I had one of the early blackberry pagers, the small ones that ate a single AA battery which lasted about a week or so, and had email + a small web browser inside of it. It wasn't the blackberry phone. Anyway, long story short, one day, said pager crashed (it is a computer after all) and I was trying to figure out how to reboot it, so I thought, fuck it, and removed the battery, the fucker stayed ON! For over 15 minutes! Gee, I wonder why anyone would design a cell phone or pager to be able to stay on after its battery is pulled out. Yeah, yeah, it's just a capacitor or an internal rechargeable battery, but why would you want such a feature? Fast forward to 2005. Most cell phones are after all small computers with a transceiver, microphone, and speaker, and recently GPS receivers. And now we have reports of the GPS info being transmitted all the time, oops! it's a bug, we meant to turn it off. uh huh. Just how much work would it be to reprogram the soft power off key, so it shuts off all the lights, and display, but still transmits GPS info, just less often? Or also transmit audio? What are the odds that the code on the phone already comes with this feature built in? Of course, if it was legal to scan on cell phone frequencies, you might be able to confirm what it's sending and when, but of course, it's not legal to do that. Even to your own phone. Of course some phones are more equal than others. For example, T-Mobile SideKick, which if you write an email and decide to cancel it, but you're out of range, exposes its evil self with Sorry, we can't let you delete the email you're composing, because it hasn't been sent to the server yet! Gee, I wonder what that means? Nah, it's just a bug. (Of course, this is a totally owned platform, where T-Mobile owns your data, not you, oops, make that the hackers of a few months ago..) Oh and if said phone is running out of batteries, it starts to complain loudly until you recharge it. Um, yeah, it likes being on at all times. You can hear it transmit occasionally when it's near amplified computer speakers or your car radio. Fun that, but could be useful. Especially if you heard it transmit while it's supposedly off. (I've honestly not heard it transmit while it's off) Are we just too paranoid? Nah, that's just a bug in human firmware, we'll fix that in the next brainwashing session. (BTW: what the fuck's up with all the weirdo subject lines? There's a perfectly good From: line in all SMTP headers, we don't need this shit in the subject line for fuck's sake! What's this, the return of Jim Choate?)
Re: Well, they got what they want...
Steve Schear wrote: The term 'securisimilitude' (from verisimilitude) comes to mind. Steve True, but I think the goal was FUD and it worked. On Tuesday (I think) both the Metro and AMNY free rags reported that all of a sudden there was a rash of suspicious packages being reported. Ya think? Another incident was of a homeless guy putting his luggage on a ticket counter and claiming it had a bomb in it. Think someone yanked his chain to the point where he'd sarcasm himself into jail? Of course the bright bulbs in charge evacuated all of Penn Station supposedly. In another article, one that stated NYCLU was against the searches, but claimed most people were happy to open their bags and some even walked up to the cops, opened their bags and said here, look at mine, another gave a quote from a supposed police officer saying that July had a ~23% drop in crime. Well, that's nice and all, but the bag searches started only 3 days before, so WTF does the crime rate for July (which hasn't yet ended) have anything to do with bag searches that just started? The funniest part are the letters to the editors thanking the police and saying how wonderful it is to be living in a country where you're safe. Of course, if you were to tell these folks 10 years ago, that you'll be subject to search when entering the subway, or that you couldn't bring a nail clipper with you when boarding an airplane, they'd go Shucks, no way that would happen in my country! I love the smell of propaganda in the morning. It smells like FUD.
Re: Well, they got what they want...
Steve Schear wrote: The term 'securisimilitude' (from verisimilitude) comes to mind. Steve True, but I think the goal was FUD and it worked. On Tuesday (I think) both the Metro and AMNY free rags reported that all of a sudden there was a rash of suspicious packages being reported. Ya think? Another incident was of a homeless guy putting his luggage on a ticket counter and claiming it had a bomb in it. Think someone yanked his chain to the point where he'd sarcasm himself into jail? Of course the bright bulbs in charge evacuated all of Penn Station supposedly. In another article, one that stated NYCLU was against the searches, but claimed most people were happy to open their bags and some even walked up to the cops, opened their bags and said here, look at mine, another gave a quote from a supposed police officer saying that July had a ~23% drop in crime. Well, that's nice and all, but the bag searches started only 3 days before, so WTF does the crime rate for July (which hasn't yet ended) have anything to do with bag searches that just started? The funniest part are the letters to the editors thanking the police and saying how wonderful it is to be living in a country where you're safe. Of course, if you were to tell these folks 10 years ago, that you'll be subject to search when entering the subway, or that you couldn't bring a nail clipper with you when boarding an airplane, they'd go Shucks, no way that would happen in my country! I love the smell of propaganda in the morning. It smells like FUD.
Re: Well, they got what they want...
Tyler Durden wrote: Saw a local security expert on the news, and he stated the obvious: Random searches and whatnot are going to do zero for someone determined, but might deter someone who was thinking about blowing up the A train. In other words, everyone here in NYC knows that we've given up a lot for the sake of the appearence of security, but no one seems to give a damn. I wouldn't say we've given up at all - after all, we've had no choice in the matter. We weren't asked if we wanted to be searched, we weren't asked if we were willing to give up liberty for the appearance of security, we weren't asked if we were ok with atrocities such as the unpatriot act, or the national ID disguised as a standardized driver's license, we weren't asked if we were willing to pay lots of tax dollars to finance more police on every corner and all the toys that they have purchased for these tasks, or the various hollow cement flower pots, and other barricades. It's not exactly a liberty that we have sacrificed, when it was taken away without consent. There is another word for this: theft.
Re: Well, they got what they want...
Tyler Durden wrote: Saw a local security expert on the news, and he stated the obvious: Random searches and whatnot are going to do zero for someone determined, but might deter someone who was thinking about blowing up the A train. In other words, everyone here in NYC knows that we've given up a lot for the sake of the appearence of security, but no one seems to give a damn. I wouldn't say we've given up at all - after all, we've had no choice in the matter. We weren't asked if we wanted to be searched, we weren't asked if we were willing to give up liberty for the appearance of security, we weren't asked if we were ok with atrocities such as the unpatriot act, or the national ID disguised as a standardized driver's license, we weren't asked if we were willing to pay lots of tax dollars to finance more police on every corner and all the toys that they have purchased for these tasks, or the various hollow cement flower pots, and other barricades. It's not exactly a liberty that we have sacrificed, when it was taken away without consent. There is another word for this: theft.
Re: /. [Intel Adds DRM to New Chips]
DiSToAGe wrote: not a backdoor, we forget to much that every system is only 1 and 0 through electricity and physical circuits. If you can make them you can watch them (with time and monney i agree). Perhaps thinking that datas (certs, instructions) can be hidden behind a physical thing is only a dream ? I ask myself if not every cryptosystem where you must have something hidden or physically not accessible in point of the process is not sure ? In theory the above is absolutely correct. In practice, it's extremely difficult to properly implement an accurate enough emulator, however as an emulator writer you have far more advantages than disadvantages despite the 10-100x in slowdown. (Speaking from personal experience - no, nothing on the kind of scale we're talking about here.) You can always have your virtual CPU decide that when it sees a certain instruction, to disobey it. For example, when it sees a checksum check, to decide to jump around it and so forth. Gotta love it when you can fool a program into thinking that 2+2=5 and that everything is still A-OK with that! ;-) If you can interface with real (protected) hardware, you might even be able to get around public key schemes with the emulator. HP/Agilent made some wonderful logic analyzers, which are very useful against ancient hardware (think Motorola 68K chips at around 5MHz) too bad nothing in the GHz range is (cheaply?) available out there, but there's lots that can be done. What can be done? For example, if you have something like Palladium or whatever it's called these days, you an always build a machine that has custom RAM that can change at the flip of a switch - sort of like the old EEPROM emulators, but with RAM chips that can be flipped to a ROM instead. You flip a switch after the DRM core has validated your BIOS and operating system, and at some point once the CPU cache gets drained, it winds up running code that it did not boot, code which you've written to do *OTHER* things for example - simply change the IRQ vectors to point to your code and you've taken over... Mind you, all this is easier said that done, but it is possible to implement. Remember, security is a chain, and each (media?) player out there is a link in that chain. It only takes one broken player to wipe out your entire investment in that DRM pipe dream. Any employee with access can leak the master keys and the game is over. Any wily hardware hacker with plenty of time on his hands can take a shot at reverse engineering any (media) player to the point of cracking it, etc. In the end, it's a waste of time and money for the makers of DRM as there's enough interest that someone somewhere will break it at some point in the near future. You can play cat and mouse games by watermarking the output with the serial # of the player in order to lock out cracked players, but the attacker only has to break more than one player (perhaps two different models so they get both serial # and model #) and compare the resulting outputs from the same movie to figure out which bits contain the watermarks. XOR is very nice for figuring this out. :-) None of this worries me, because I don't give a rats ass about copying movies or what not. Couldn't care less about it. I'll wait for the shit to make it to HBO, it's usually not worth watching the waste of Hollywood plotless overhyped crud anyway, so why worry about copying it? The few titles that are worth watching, are also well worth buying, and after a few months they can be had for under $20, so why bother? What is cause for worry is that it's quite _possible_ for Intel or other chip manufacturers to insert backdoors in their hardware which someone will go through the trouble of discovering, which does put everyone at risk. No matter how good your operating system and firewall rules, if your network card (and drivers) decide to bend over upon receiving a specially crafted packet, you're owned just the same. Mind you, I've never run across anything close to this, except perhaps the old F00FC7C8 bug in the original pentium (which really was a DOS, not a back door) and the old UltraSparc I in 64 bit mode multiuser hole. The Pentium IV hyperthreading bug is something recent to worry about along the same line of thought. Sadly, you haven't got much choice in this matter, you have to assume that you can trust the hardware that you run on (unless you're willing to make your own and have the resources to do so, etc.)
Re: /. [Intel Adds DRM to New Chips]
DiSToAGe wrote: not a backdoor, we forget to much that every system is only 1 and 0 through electricity and physical circuits. If you can make them you can watch them (with time and monney i agree). Perhaps thinking that datas (certs, instructions) can be hidden behind a physical thing is only a dream ? I ask myself if not every cryptosystem where you must have something hidden or physically not accessible in point of the process is not sure ? In theory the above is absolutely correct. In practice, it's extremely difficult to properly implement an accurate enough emulator, however as an emulator writer you have far more advantages than disadvantages despite the 10-100x in slowdown. (Speaking from personal experience - no, nothing on the kind of scale we're talking about here.) You can always have your virtual CPU decide that when it sees a certain instruction, to disobey it. For example, when it sees a checksum check, to decide to jump around it and so forth. Gotta love it when you can fool a program into thinking that 2+2=5 and that everything is still A-OK with that! ;-) If you can interface with real (protected) hardware, you might even be able to get around public key schemes with the emulator. HP/Agilent made some wonderful logic analyzers, which are very useful against ancient hardware (think Motorola 68K chips at around 5MHz) too bad nothing in the GHz range is (cheaply?) available out there, but there's lots that can be done. What can be done? For example, if you have something like Palladium or whatever it's called these days, you an always build a machine that has custom RAM that can change at the flip of a switch - sort of like the old EEPROM emulators, but with RAM chips that can be flipped to a ROM instead. You flip a switch after the DRM core has validated your BIOS and operating system, and at some point once the CPU cache gets drained, it winds up running code that it did not boot, code which you've written to do *OTHER* things for example - simply change the IRQ vectors to point to your code and you've taken over... Mind you, all this is easier said that done, but it is possible to implement. Remember, security is a chain, and each (media?) player out there is a link in that chain. It only takes one broken player to wipe out your entire investment in that DRM pipe dream. Any employee with access can leak the master keys and the game is over. Any wily hardware hacker with plenty of time on his hands can take a shot at reverse engineering any (media) player to the point of cracking it, etc. In the end, it's a waste of time and money for the makers of DRM as there's enough interest that someone somewhere will break it at some point in the near future. You can play cat and mouse games by watermarking the output with the serial # of the player in order to lock out cracked players, but the attacker only has to break more than one player (perhaps two different models so they get both serial # and model #) and compare the resulting outputs from the same movie to figure out which bits contain the watermarks. XOR is very nice for figuring this out. :-) None of this worries me, because I don't give a rats ass about copying movies or what not. Couldn't care less about it. I'll wait for the shit to make it to HBO, it's usually not worth watching the waste of Hollywood plotless overhyped crud anyway, so why worry about copying it? The few titles that are worth watching, are also well worth buying, and after a few months they can be had for under $20, so why bother? What is cause for worry is that it's quite _possible_ for Intel or other chip manufacturers to insert backdoors in their hardware which someone will go through the trouble of discovering, which does put everyone at risk. No matter how good your operating system and firewall rules, if your network card (and drivers) decide to bend over upon receiving a specially crafted packet, you're owned just the same. Mind you, I've never run across anything close to this, except perhaps the old F00FC7C8 bug in the original pentium (which really was a DOS, not a back door) and the old UltraSparc I in 64 bit mode multiuser hole. The Pentium IV hyperthreading bug is something recent to worry about along the same line of thought. Sadly, you haven't got much choice in this matter, you have to assume that you can trust the hardware that you run on (unless you're willing to make your own and have the resources to do so, etc.)
Re: Terrorist-controlled cessna nearly attacks washington
Bill Stewart wrote: Sigh. Terrified Student Pilot isn't the same as Terrorist. Yeah, but they both start with the same four letters and sound alike, which seems to be the attention span of those who are afraid of the boogie man and consequentially imagine they see him under every rock, or bush.
Re: Terrorist-controlled cessna nearly attacks washington
Bill Stewart wrote: Sigh. Terrified Student Pilot isn't the same as Terrorist. Yeah, but they both start with the same four letters and sound alike, which seems to be the attention span of those who are afraid of the boogie man and consequentially imagine they see him under every rock, or bush.
Re: Secure erasing Info (fwd from richard@SCL.UTAH.EDU)
Jason Holt wrote: There are lots of pitfalls in secure erasure, even without considering physical media attacks. Your filesystem may not overwrite data on the same blocks used to write the data originally, for instance. Plaintext may be left in the journal and elsewhere. Even filling up the disk may not do it, as some filesystems keep blocks in reserve. I did a demo a few years ago where I wrote plaintext, overwrote, then dumped the filesystem blocks out and found parts of the plaintext. For anybody who hasn't read it, the Gutmann paper is Secure Deletion of Data from Magnetic and Solid-State Memory, and is highly recommended. He shows that even RAM isn't safe against physical media attacks. Incase anyone's too lazy to google it, Peter Gutmann's paper can be found here: http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html Good point. So, modify that with - create a block-level encrypted file system on the flash drive, so long as you key and passphrase are good, you should be safe enough... I've also seen this little toy: http://www.biostik.com/ a bit pricey, but depending on your threat model, might add another layer of protection. Not something I'd personally bother with - esp with the recent stuff about how to make fake fingerprints, etc (funny thing is that your fingerprints will be on the case of this thing, so not much security there), but YMMV based on your threat model, right?But, as always, encrypt early and often. :-D Would make an interesting side conversation about how fingerprints are passwords, but passwords that can (now?) be easily stolen and replayed. IMHO, it casts doubt on a lot of biometric methods. Wonder if it would be possible to create an image of an iris that would pass an iris scan, if so, both fingerprints and irises become much like permanent credit cards, but worse, which once duplicated, cannot be revoked. One can imagine in the future once ATM's have iris scanners, that some evil group will set up a fake ATM with a very good CCD camera setup to capture irises as well as ATM cards and pin #'s... and, why not, also finger prints if future ATM's use such scanners.
Re: Email Certification?
Suggestion - you can do what advertisers do - encode a web bug image as part of some jucy html emails on a web server that you own and check your logs. (not sure if hotmail or whatever allows this, as I don't use their cruft.) Make sure that unlike a web bug you don't set the name so it looks like a web bug (i.e. don't call it 1x1.gif) and don't set the image size attributes on the IMG SRC tag to say 1x1. Instead make the file name into something that looks like it came from a digital camera and put it in a path that matches that cover story. ie: http://127.53.22.7/phightklub_files/2004-xmas-party-pix/JoeShmoeDrunkAndHigh/Kodak/DSC03284345.JPG No guarantee that someone won't read the email as source and thus not grab the image too, but you can make it look like the content of the image is important to the message's content and jucy enough to make whomever you believe is spying on you want to fetch it. i.e. Here's a picture of the party, you can clearly see he's got a crack pipe in his hand and his eyes are dialated. I'm thinkin' of reporting him to deh fedz, what do u think?(I'm assuming that the feds are your threat model here, but you can vary this up with whatever threat model you think is appropriate. i.e. if you think your woman is spying on you, make it a fake email from your supposed mistress, something she'd want to open - i.e. subject I'm gonna tell ur wife about us if you don't do X.) I'd also make sure that nothing on the webserver itself points to the directory where this lives so it can't be picked up by the search spiders/bots accidentally, and make sure that you don't allow the directory it lives in to have an auto-index. Then, watch the server logs like a paranoid hawk with a caffeine addiction problem and hope they bite, when they do, you know they've read the other emails. You also have to make sure that you don't accidentally open these emails yourself, or leave an open web browser with your account where someone can randomly snoop.) But of course, since you are using hotmail and you're about to receive this email, if your account is watched, guess what, you can no longer use this method. Oh well. Tyler Durden wrote: Yes, but this almost misses the point. Is it possible to detect ('for certain', within previously mentioned boundary conditions) that some has read it? This is a different problem from merely trying to retain secrecy. Remember, my brain is a little punch-drunk from all the Fight Club fighting. BUT, I believe that the fact that deeper TLAs desire to hide themselves from more run-of-the-mill operations might be exploited in an interesting way. Or at least force them to commit to officially surveiling you, thereby (one hopes) subjecting them to whatever frail tatters of the law still exist. A better example may be home security systems. If they're going to tempest you, I'd bet they'd prefer not to inform your local security company. They'd rather just shut down your alarm system and I bet this is easy for them. BUT, this fact may enable one to detect (with little doubt) such an intrusion, and about this I shall say no more...
Re: Secure erasing Info (fwd from richard@SCL.UTAH.EDU)
Yeah, but these days, I'd go with the largest flash drive I could afford. USB2 or otherwise. I don't believe you can recover data from these once you actually overwrite the bits (anyone out there know any different?). They're either 1 or 0, there's no extra ferrite molecules to the left or the right of the track to pick up a signal from ;-) As always encrypt the data you write to the device. I wouldn't overwrite flash repeatedly (i.e. the Guttman method of 35 writes) though, there's a limit on the number of writes, after which it goes bad. I'd overwrite it once with random data. Eugen Leitl wrote: - Forwarded message from Richard Glaser [EMAIL PROTECTED] - From: Richard Glaser [EMAIL PROTECTED] Date: Wed, 27 Apr 2005 12:17:43 -0600 To: [EMAIL PROTECTED] Subject: Secure erasing Info Reply-To: Mac OS X enterprise deployment project [EMAIL PROTECTED] FYI: Rendering Drives Completely Unreadable Can be Difficult ---
Re: Secure erasing Info (fwd from richard@SCL.UTAH.EDU)
Yeah, but these days, I'd go with the largest flash drive I could afford. USB2 or otherwise. I don't believe you can recover data from these once you actually overwrite the bits (anyone out there know any different?). They're either 1 or 0, there's no extra ferrite molecules to the left or the right of the track to pick up a signal from ;-) As always encrypt the data you write to the device. I wouldn't overwrite flash repeatedly (i.e. the Guttman method of 35 writes) though, there's a limit on the number of writes, after which it goes bad. I'd overwrite it once with random data. Eugen Leitl wrote: - Forwarded message from Richard Glaser [EMAIL PROTECTED] - From: Richard Glaser [EMAIL PROTECTED] Date: Wed, 27 Apr 2005 12:17:43 -0600 To: [EMAIL PROTECTED] Subject: Secure erasing Info Reply-To: Mac OS X enterprise deployment project [EMAIL PROTECTED] FYI: Rendering Drives Completely Unreadable Can be Difficult ---
NSA specifies elliptic-curve crypto for security applications
http://www.eet.com/sys/news/showArticle.jhtml?articleId=60404977 NSA specifies elliptic-curve crypto for security applications By Loring Wirbel , EE Times http://www.eetimes.com/;jsessionid=3J52X3FMWO51MQSNDBGCKHSCJUMEKJVN March 03, 2005 (10:22 AM EST) URL: http://www.eet.com/article/showArticle.jhtml?articleId=60404977 http://www.eet.com/article/showArticle.jhtml;jsessionid=3J52X3FMWO51MQSNDBGCKHSCJUMEKJVN?articleId=60404977sub_taxonomyID= SNIP Last October, the agency referred to ECC as one of the few public-key systems that could meet equivalent security standards to the private-key AES. NSA (Fort Meade, Md.) is recommending a series of algorithms called Suite B for securing sensitive and unclassified data. Suite B includes Elliptic-Curve Menezes-Qu-Vanstone and Elliptic-Curve Diffie-Hellman for key agreement, along with the Elliptic Curve Digital Signature Algorithm for digital signatures. AES and Secure Hashing Algorithm also are included in Suite B.
Theory of Secure Computation - Joe Killian, NEC Labs
http://www.uwtv.org/programs/displayevent.asp?rid=2233 A bit sparse on details, but a good overview of all sorts of secure protocols. Our friends Alice and Bob are of course present in various orgies of secure protocols. :)
Theory of Secure Computation - Joe Killian, NEC Labs
http://www.uwtv.org/programs/displayevent.asp?rid=2233 A bit sparse on details, but a good overview of all sorts of secure protocols. Our friends Alice and Bob are of course present in various orgies of secure protocols. :)
Re: new egold phisher - this time it's a malware executable
Got another one today with a RAR attachment claiming it was a screen shot. Text is: Dear Sir Yesterday you have arrived the amount of $1000 into my account. Of course, I do not object, but you probably were mistaken number of the account when transferred, and it happens not first time. Please look an attached screenshot of all your transfers into my account. I have no idea why you transfer money to me, as I do not know you, and I need no money. If you were mistaken, I'll return this money to you! Sincerely. Nice... what's next? an egold transfer from a lawyer claiming a long lost uncle kicked the bucket and left me a fortune? :-D Wheee! sunder wrote: So, the e-gold phishers are at it again... received a very nice email this morning with an attachment. The Received-From header showed this beauty: from 195.56.214.184 ([EMAIL PROTECTED] [195.56.214.184] (may be forged)) Indeed! Don't know if it's a trojan, spyware, virus, or worm, and I couldn't care less since I don't use egold, but would be interesting (just for curiosity's sake) if someone were to disassemble it to see what it does. It's probably a password grabber of some kind, so falls under spyware, but who knows what other evil payloads were in the attachment. ROTFL! - Text said: Dear E-gold Customer, Herewith we strongly recommend you to install this Service Pack to your PC, as lately we have received a lot of complains regarding unauthorized cash withdrawals from our customers' accounts. This upgrade blocks all currently known Trojan modules and eliminates the possibility of cash withdrawals without your authorization. We highly recommend to install this Service Pack to secure your accounts. Please note, that E-gold doesn't take any responsibility and doesn't accept any claims regarding losses caused by fraudulent actions, if your account has not been duly protected by the present Service Pack. Please find enclosed the archive of the Service Pack installation file in the attachment to this message.
Re: new egold phisher - this time it's a malware executable
Got another one today with a RAR attachment claiming it was a screen shot. Text is: Dear Sir Yesterday you have arrived the amount of $1000 into my account. Of course, I do not object, but you probably were mistaken number of the account when transferred, and it happens not first time. Please look an attached screenshot of all your transfers into my account. I have no idea why you transfer money to me, as I do not know you, and I need no money. If you were mistaken, I'll return this money to you! Sincerely. Nice... what's next? an egold transfer from a lawyer claiming a long lost uncle kicked the bucket and left me a fortune? :-D Wheee! sunder wrote: So, the e-gold phishers are at it again... received a very nice email this morning with an attachment. The Received-From header showed this beauty: from 195.56.214.184 ([EMAIL PROTECTED] [195.56.214.184] (may be forged)) Indeed! Don't know if it's a trojan, spyware, virus, or worm, and I couldn't care less since I don't use egold, but would be interesting (just for curiosity's sake) if someone were to disassemble it to see what it does. It's probably a password grabber of some kind, so falls under spyware, but who knows what other evil payloads were in the attachment. ROTFL! - Text said: Dear E-gold Customer, Herewith we strongly recommend you to install this Service Pack to your PC, as lately we have received a lot of complains regarding unauthorized cash withdrawals from our customers' accounts. This upgrade blocks all currently known Trojan modules and eliminates the possibility of cash withdrawals without your authorization. We highly recommend to install this Service Pack to secure your accounts. Please note, that E-gold doesn't take any responsibility and doesn't accept any claims regarding losses caused by fraudulent actions, if your account has not been duly protected by the present Service Pack. Please find enclosed the archive of the Service Pack installation file in the attachment to this message.
new egold phisher - this time it's a malware executable
So, the e-gold phishers are at it again... received a very nice email this morning with an attachment. The Received-From header showed this beauty: from 195.56.214.184 ([EMAIL PROTECTED] [195.56.214.184] (may be forged)) Indeed! Don't know if it's a trojan, spyware, virus, or worm, and I couldn't care less since I don't use egold, but would be interesting (just for curiosity's sake) if someone were to disassemble it to see what it does. It's probably a password grabber of some kind, so falls under spyware, but who knows what other evil payloads were in the attachment. ROTFL! - Text said: Dear E-gold Customer, Herewith we strongly recommend you to install this Service Pack to your PC, as lately we have received a lot of complains regarding unauthorized cash withdrawals from our customers' accounts. This upgrade blocks all currently known Trojan modules and eliminates the possibility of cash withdrawals without your authorization. We highly recommend to install this Service Pack to secure your accounts. Please note, that E-gold doesn't take any responsibility and doesn't accept any claims regarding losses caused by fraudulent actions, if your account has not been duly protected by the present Service Pack. Please find enclosed the archive of the Service Pack installation file in the attachment to this message.
new egold phisher - this time it's a malware executable
So, the e-gold phishers are at it again... received a very nice email this morning with an attachment. The Received-From header showed this beauty: from 195.56.214.184 ([EMAIL PROTECTED] [195.56.214.184] (may be forged)) Indeed! Don't know if it's a trojan, spyware, virus, or worm, and I couldn't care less since I don't use egold, but would be interesting (just for curiosity's sake) if someone were to disassemble it to see what it does. It's probably a password grabber of some kind, so falls under spyware, but who knows what other evil payloads were in the attachment. ROTFL! - Text said: Dear E-gold Customer, Herewith we strongly recommend you to install this Service Pack to your PC, as lately we have received a lot of complains regarding unauthorized cash withdrawals from our customers' accounts. This upgrade blocks all currently known Trojan modules and eliminates the possibility of cash withdrawals without your authorization. We highly recommend to install this Service Pack to secure your accounts. Please note, that E-gold doesn't take any responsibility and doesn't accept any claims regarding losses caused by fraudulent actions, if your account has not been duly protected by the present Service Pack. Please find enclosed the archive of the Service Pack installation file in the attachment to this message.
Gait advances in emerging biometrics
Original URL: http://www.theregister.co.uk/2004/12/14/alt_biometrics/ Gait advances in emerging biometrics By John Leyden (john.leyden at theregister.co.uk) Published Tuesday 14th December 2004 15:07 GMT Great Juno comes; I know her by her gait. William Shakespeare, The Tempest Retinal scans, finger printing or facial recognition get most of the publicity but researchers across the world are quietly labouring away at alternative types of biometrics. Recognition by the way someone walk (their gait), the shape of their ears, the rhythm they make when they tap and the involuntary response of ears to sounds all have the potential to raise the stock of biometric techniques. According to Professor Mark Nixon, of the Image Speech and Recognition Research Group at the University of Southampton, each has unique advantages which makes them worth exploring. SNIP --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Gait advances in emerging biometrics
Original URL: http://www.theregister.co.uk/2004/12/14/alt_biometrics/ Gait advances in emerging biometrics By John Leyden (john.leyden at theregister.co.uk) Published Tuesday 14th December 2004 15:07 GMT Great Juno comes; I know her by her gait. William Shakespeare, The Tempest Retinal scans, finger printing or facial recognition get most of the publicity but researchers across the world are quietly labouring away at alternative types of biometrics. Recognition by the way someone walk (their gait), the shape of their ears, the rhythm they make when they tap and the involuntary response of ears to sounds all have the potential to raise the stock of biometric techniques. According to Professor Mark Nixon, of the Image Speech and Recognition Research Group at the University of Southampton, each has unique advantages which makes them worth exploring. SNIP --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Acoustic Keyboard Eavesdropping
Not new news, but interesting anyway. http://www.nytimes.com/2004/12/12/magazine/12ACOUSTIC.html (bugmenot's your uncle) Acoustic Keyboard Eavesdropping By STEPHEN MIHM Published: December 12, 2004 When it comes to computer security, do you have faith in firewalls? Think passwords will protect you? Not so fast: it is now possible to eavesdrop on a typist's keystrokes and, by exploiting minute variations in the sounds made by different keys, distinguish and decipher what is being typed. SNIP This means that firewalls and passwords will amount to nothing if someone manages to bug a room and record the cacophony of keystrokes. Asonov managed to pull off this feat with readily available recording equipment at a short distance. Even as far away as 50 feet, and with significant background noise, he was able to replicate his success using a parabolic microphone. He also anticipated an obvious practical objection: how does a would-be eavesdropper get into a building and spend enough time to ''train'' a computer program to recognize the keystrokes of a particular keyboard? Not a problem: it seems that keyboards of the same make and model sound sufficiently alike -- regardless of who is typing -- that a computer trained on one keyboard can be unleashed on another. SNIP --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
RE: Optical Tempest FAQ
IMHO, if you light up two or more other identical CRT's and have them display random junk it should throw enough noise to make it worthless - (and would put out enough similar RF to mess with RF tempest) there might be ways to filter the photons from the other monitors out, but, it would be difficult. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Thu, 2 Dec 2004, Tyler Durden wrote: Interesting. Contrary to what I thought (or what has been discussed here), only a 'scalar' of detected light is needed, not a vector. In other words, merely measuring overall radiated intensity over time seems to be sufficient to recover the message. This means that certain types of diffusive materials will not necessarily mitigate against this kind of eavesdropping. However, his discussion would indicate that the various practical concerns and limitations probably limit this to very niche-type applications...I'd bet that it's very rare when such a trechnique is both needed as well as useful, given the time, the subject and the place. -TD From: Sunder [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Optical Tempest FAQ Date: Thu, 2 Dec 2004 10:27:04 -0500 (est) http://www.cl.cam.ac.uk/~mgk25/emsec/optical-faq.html Along with tips and examples. Enjoy, and don't use a CRT in the dark. :-)
Optical Tempest FAQ
http://www.cl.cam.ac.uk/~mgk25/emsec/optical-faq.html Along with tips and examples. Enjoy, and don't use a CRT in the dark. :-) --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
RE: Optical Tempest FAQ
IMHO, if you light up two or more other identical CRT's and have them display random junk it should throw enough noise to make it worthless - (and would put out enough similar RF to mess with RF tempest) there might be ways to filter the photons from the other monitors out, but, it would be difficult. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Thu, 2 Dec 2004, Tyler Durden wrote: Interesting. Contrary to what I thought (or what has been discussed here), only a 'scalar' of detected light is needed, not a vector. In other words, merely measuring overall radiated intensity over time seems to be sufficient to recover the message. This means that certain types of diffusive materials will not necessarily mitigate against this kind of eavesdropping. However, his discussion would indicate that the various practical concerns and limitations probably limit this to very niche-type applications...I'd bet that it's very rare when such a trechnique is both needed as well as useful, given the time, the subject and the place. -TD From: Sunder [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Optical Tempest FAQ Date: Thu, 2 Dec 2004 10:27:04 -0500 (est) http://www.cl.cam.ac.uk/~mgk25/emsec/optical-faq.html Along with tips and examples. Enjoy, and don't use a CRT in the dark. :-)
Optical Tempest FAQ
http://www.cl.cam.ac.uk/~mgk25/emsec/optical-faq.html Along with tips and examples. Enjoy, and don't use a CRT in the dark. :-) --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Re: Broward machines count backward
It sounds suspiciously like an int16 issue. 32K is close enough to 32767 after which a 16 bit integer goes negative when incremented. Which is odd because it should roll over, not count backwards. perhaps they did something like this: note the use of abs on reporting. int16 votes[MAX_CANDIDATES]; void add_a_vote(uint8 candidate) { if (candidateMAX_CANDIDATES) return; votes[candidate]++; } void report(void) { int i; for (i=0; iMAX_CANDIDATES; i++) { printf(Candidate %s got %d votes\n,candidates[i],abs(votes[i])); } } --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Sat, 6 Nov 2004, R.A. Hettinga wrote: http://www.palmbeachpost.com/politics/content/news/epaper/2004/11/05/a29a_BROWVOTE_1105.html Palm Beach Post Broward machines count backward By Eliot Kleinberg Palm Beach Post Staff Writer Friday, November 05, 2004 FORT LAUDERDALE - It had to happen. Things were just going too smoothly. Early Thursday, as Broward County elections officials wrapped up after a long day of canvassing votes, something unusual caught their eye. Tallies should go up as more votes are counted. That's simple math. But in some races, the numbers had gone . . . down. Officials found the software used in Broward can handle only 32,000 votes per precinct. After that, the system starts counting backward.
Re: Broward machines count backward
It sounds suspiciously like an int16 issue. 32K is close enough to 32767 after which a 16 bit integer goes negative when incremented. Which is odd because it should roll over, not count backwards. perhaps they did something like this: note the use of abs on reporting. int16 votes[MAX_CANDIDATES]; void add_a_vote(uint8 candidate) { if (candidateMAX_CANDIDATES) return; votes[candidate]++; } void report(void) { int i; for (i=0; iMAX_CANDIDATES; i++) { printf(Candidate %s got %d votes\n,candidates[i],abs(votes[i])); } } --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Sat, 6 Nov 2004, R.A. Hettinga wrote: http://www.palmbeachpost.com/politics/content/news/epaper/2004/11/05/a29a_BROWVOTE_1105.html Palm Beach Post Broward machines count backward By Eliot Kleinberg Palm Beach Post Staff Writer Friday, November 05, 2004 FORT LAUDERDALE - It had to happen. Things were just going too smoothly. Early Thursday, as Broward County elections officials wrapped up after a long day of canvassing votes, something unusual caught their eye. Tallies should go up as more votes are counted. That's simple math. But in some races, the numbers had gone . . . down. Officials found the software used in Broward can handle only 32,000 votes per precinct. After that, the system starts counting backward.
Re: bin Laden gets a Promotion
As usual, South Park is a great source of wisdom. So, are you voting for the Giant Douche or the Turd Sandwich? --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Re: bin Laden gets a Promotion
No! You must vote for the Giant Douche! Or the Terrorists Win! But won't someone think of the chldren! If you vote for the Douche, the ChllLdren will die! ROTFL! --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Sat, 30 Oct 2004, R.A. Hettinga wrote: At 2:42 PM -0400 10/30/04, Sunder wrote: the Turd Sandwich? Turd Sandwich, of course. Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: bin Laden gets a Promotion
As usual, South Park is a great source of wisdom. So, are you voting for the Giant Douche or the Turd Sandwich? --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Re: bin Laden gets a Promotion
No! You must vote for the Giant Douche! Or the Terrorists Win! But won't someone think of the chldren! If you vote for the Douche, the ChllLdren will die! ROTFL! --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Sat, 30 Oct 2004, R.A. Hettinga wrote: At 2:42 PM -0400 10/30/04, Sunder wrote: the Turd Sandwich? Turd Sandwich, of course. Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: James A. Donald's insanity
Where did I write to you that it's horrible thing to lock people up in Gitmo, or that we (whomever that is) deserve to be attacked? Show me the email, with headers that says such a thing. Oh, wait, you can't, because I never wrote such. Let's see, so you've got lots of people questioning your version of various events, and you've got claims that various people wrote things that they did not, and lots of people challenging the accuracy and indeed, truth of your statements. Hmmm... So what is the obvious conclusion there? The whole world must be against you? Nah, you're not important enough to be paranoid. So, what is the obvious conclusion? No, no, 2+2 is not 5, even for extremely large values of 2... Come on, come on, out with it, say it, say it... That's right! *Ding* you're reality challenged. Ah! There, doesn't that feel better? Now, please, go back and take your meds before the nice men in the white coats come to take you to the funny farm. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Thu, 21 Oct 2004, James A. Donald wrote: -- On 21 Oct 2004 at 13:41, Sunder wrote: No you imbecile, I'm telling no one anything, other than you to get a clue. Where did I tell people who are under attack to suck it up? When you tell us it is horrible to lock up in Gautenamo people who show every sign of trying to kill us , and that we deserve their past efforts to kill us, efforts that some of them promptly resumed on release. We are under attack, and you are telling us to suck it up.
Re: James A. Donald's insanity
Where did I write to you that it's horrible thing to lock people up in Gitmo, or that we (whomever that is) deserve to be attacked? Show me the email, with headers that says such a thing. Oh, wait, you can't, because I never wrote such. Let's see, so you've got lots of people questioning your version of various events, and you've got claims that various people wrote things that they did not, and lots of people challenging the accuracy and indeed, truth of your statements. Hmmm... So what is the obvious conclusion there? The whole world must be against you? Nah, you're not important enough to be paranoid. So, what is the obvious conclusion? No, no, 2+2 is not 5, even for extremely large values of 2... Come on, come on, out with it, say it, say it... That's right! *Ding* you're reality challenged. Ah! There, doesn't that feel better? Now, please, go back and take your meds before the nice men in the white coats come to take you to the funny farm. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Thu, 21 Oct 2004, James A. Donald wrote: -- On 21 Oct 2004 at 13:41, Sunder wrote: No you imbecile, I'm telling no one anything, other than you to get a clue. Where did I tell people who are under attack to suck it up? When you tell us it is horrible to lock up in Gautenamo people who show every sign of trying to kill us , and that we deserve their past efforts to kill us, efforts that some of them promptly resumed on release. We are under attack, and you are telling us to suck it up.
Re: Printers betray document secrets
Simple way to test. Get two printers of the same make and model. Print identical documents on both printers, scan them, diff the scans. Some will be noise, repeat several times, see which noise repeats and you get closer and closer to the serial #'s. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Wed, 20 Oct 2004, Steve Thompson wrote: I seem to recall hearing a rumour that suggested that for years now, photocopiers have been leaving their serial number on the copies they produce. If true, and I am inclined to believe it, it follows naturally that something similar might happen with laser-printers and ink-jet printers. Ian Grigg [EMAIL PROTECTED] wrote: R.A. Hettinga wrote: US scientists have discovered that every desktop printer has a signature style that it invisibly leaves on all the documents it produces. I don't think this is new - I'm pretty sure it was published about 6 or 7 years back as a technique. iang - Post your free ad now! Yahoo! Canada Personals
Re: Airport insanity
I made no claims, you did, rather I asked you sarcastically to validate your claims, after which you further assumed on top of other mistaken assumptions, that I made claims countering yours, which I did not. Perhaps you should examine your own words. IMHO, you are a misguided armchair general who sees yourself as equal to those scumbags that have risen in power to lead or enslave nations since you seem to constantly say they should have done X, and not Y and are constantly seeking to go against with reality with W should be the case, not X even though W cannot happen while X does. Yes, that is my unprofessional opinion. And yet, while impotent to achive your views of reality, you insist on sharing it, as if anyone gives a rats ass. It was entertaining, but it's getting old. I doubt that it would be long before you'll be sporting a tin foil hat. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Thu, 21 Oct 2004, James A. Donald wrote: -- On 20 Oct 2004 at 21:27, Sunder wrote: I repeat: And you were there and kept an eye on each and every guard, interrogator, and prisoner to make sure that the POW's weren't tortured? We know torture did not occur, because lots of people have been released who were and are extremely hostile to the US, and who do not claim torture. And you were there and witnessed the attrocities that said prisoners committed in order to be placed in Gitmo? Why do you assert that the US must be guilty unless it can be proven innocent by extraordinary evidence, but the detainees must be innocent unless they can be proven guilty by extraordinary evidence? Doubtless there are some innocents in Gautenamo - but the usual reason they are there is for being foreigners in Afghanistan in the middle of a war with no adequate explanation. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG PwxWpHJKrzapMUAE8Xc1hvpY0CWDO780ZY/6zW7b 4b9RBklMS97dzSSANw7jVcZlASDxbNnLMhwLptK+Z
Re: Airport insanity
No you imbecile, I'm telling no one anything, other than you to get a clue. Where did I tell people who are under attack to suck it up? All I did was point out that you weren't there and therefore any comment you care to make about it is bound to be flawed. Please find yourself a clue store and open your wallet - wide. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Thu, 21 Oct 2004, James A. Donald wrote: -- On 21 Oct 2004 at 10:26, Sunder wrote: IMHO, you are a misguided armchair general who sees yourself as equal to those scumbags that have risen in power to lead or enslave nations since you seem to constantly say they should have done X, and not Y When people are under attack, you cannot tell them to suck it up, which is what you are doing. If we had no government, we might well be doing pogroms against american muslims - and a good thing to. War causes governments, and causes governments to gain power, but the US government was not the aggressor in this war. US government meddling in the middle east was unwise and unnecessary, but it did not provoke, nor does it justify, this war. The intent of a large minority of muslims was to start a holy war between the west and Islam, and the majority of muslims lack the will or courage to stop them, or even criticize them. That was not the intent of Americans, or the American government. They started it, they meant to start it. Americans tried to avoid it, some of them are still trying to avoid it. All Americans are still trying to conduct the war on the smallest possible scale, against the smallest possible subset of Islam, disagreeing only on how small that subset can be. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG YeXgmiDN23gKNejAXLPSgfGxzFPVqFa/9pEDbWNr 41sYVdSvXQCEQniQVEIYWhWw2HjtvpvuHtQ0QXUaI
Re: Printers betray document secrets
Simple way to test. Get two printers of the same make and model. Print identical documents on both printers, scan them, diff the scans. Some will be noise, repeat several times, see which noise repeats and you get closer and closer to the serial #'s. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Wed, 20 Oct 2004, Steve Thompson wrote: I seem to recall hearing a rumour that suggested that for years now, photocopiers have been leaving their serial number on the copies they produce. If true, and I am inclined to believe it, it follows naturally that something similar might happen with laser-printers and ink-jet printers. Ian Grigg [EMAIL PROTECTED] wrote: R.A. Hettinga wrote: US scientists have discovered that every desktop printer has a signature style that it invisibly leaves on all the documents it produces. I don't think this is new - I'm pretty sure it was published about 6 or 7 years back as a technique. iang - Post your free ad now! Yahoo! Canada Personals
Re: Airport insanity
I made no claims, you did, rather I asked you sarcastically to validate your claims, after which you further assumed on top of other mistaken assumptions, that I made claims countering yours, which I did not. Perhaps you should examine your own words. IMHO, you are a misguided armchair general who sees yourself as equal to those scumbags that have risen in power to lead or enslave nations since you seem to constantly say they should have done X, and not Y and are constantly seeking to go against with reality with W should be the case, not X even though W cannot happen while X does. Yes, that is my unprofessional opinion. And yet, while impotent to achive your views of reality, you insist on sharing it, as if anyone gives a rats ass. It was entertaining, but it's getting old. I doubt that it would be long before you'll be sporting a tin foil hat. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Thu, 21 Oct 2004, James A. Donald wrote: -- On 20 Oct 2004 at 21:27, Sunder wrote: I repeat: And you were there and kept an eye on each and every guard, interrogator, and prisoner to make sure that the POW's weren't tortured? We know torture did not occur, because lots of people have been released who were and are extremely hostile to the US, and who do not claim torture. And you were there and witnessed the attrocities that said prisoners committed in order to be placed in Gitmo? Why do you assert that the US must be guilty unless it can be proven innocent by extraordinary evidence, but the detainees must be innocent unless they can be proven guilty by extraordinary evidence? Doubtless there are some innocents in Gautenamo - but the usual reason they are there is for being foreigners in Afghanistan in the middle of a war with no adequate explanation. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG PwxWpHJKrzapMUAE8Xc1hvpY0CWDO780ZY/6zW7b 4b9RBklMS97dzSSANw7jVcZlASDxbNnLMhwLptK+Z
Re: Airport insanity
No you imbecile, I'm telling no one anything, other than you to get a clue. Where did I tell people who are under attack to suck it up? All I did was point out that you weren't there and therefore any comment you care to make about it is bound to be flawed. Please find yourself a clue store and open your wallet - wide. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Thu, 21 Oct 2004, James A. Donald wrote: -- On 21 Oct 2004 at 10:26, Sunder wrote: IMHO, you are a misguided armchair general who sees yourself as equal to those scumbags that have risen in power to lead or enslave nations since you seem to constantly say they should have done X, and not Y When people are under attack, you cannot tell them to suck it up, which is what you are doing. If we had no government, we might well be doing pogroms against american muslims - and a good thing to. War causes governments, and causes governments to gain power, but the US government was not the aggressor in this war. US government meddling in the middle east was unwise and unnecessary, but it did not provoke, nor does it justify, this war. The intent of a large minority of muslims was to start a holy war between the west and Islam, and the majority of muslims lack the will or courage to stop them, or even criticize them. That was not the intent of Americans, or the American government. They started it, they meant to start it. Americans tried to avoid it, some of them are still trying to avoid it. All Americans are still trying to conduct the war on the smallest possible scale, against the smallest possible subset of Islam, disagreeing only on how small that subset can be. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG YeXgmiDN23gKNejAXLPSgfGxzFPVqFa/9pEDbWNr 41sYVdSvXQCEQniQVEIYWhWw2HjtvpvuHtQ0QXUaI
Re: Airport insanity
On Tue, 19 Oct 2004, James A. Donald wrote: Here is my prescription for winning the war on terrorism We SHOULD rely on shock and awe, administered by men in white coats far from the scene. SNIP The US government should expose and condemn these objectionable practices, subvert moderately objectionable regimes, and annihilate more objectionable regimes. The pentagon should deprive moderately objectionable regimes of economic resources, by stealing their oil, destroying their water systems, and cutting off their trade and population movements with the outside world. Syria should suffer annihilation, Iran subversion, Sudan some combination of annihilation and subversion, Saudi Arabia and similar less objectionable regimes should suffer confiscation of oil, destruction of water resources, and loss of contact with the outside world. I see. I'm sure that Dubbya has his own agenda filled with Shoulds, as does Bin Ladin, as did Lenin, as did Hitler, as did Nero, as do you. Each saw (or see) their views as the way to Utopia. Trouble is, which one of you megalomaniacs is/was right? Further to the point, reality is, and what clearly should and makes sense to to you, clearly doesn't to another. The only difference between you and the others above is that you lack the power to bend reality to your whims, and IMHO, that is a very good thing. It is sad the the above list contained megalomaniacs who did possess that power and used it to cause great misery to others, and had to be removed from inflicting their whims on the world at great expense. Perhaps in a couple of weeks, US Citizens will vote one of those out the list as he's already done plenty of damage in the last four years, and save us another miserable four years. So yes, perhaps, in the fine tradition of what should be instead of what is, you, sir, should go fuck yourself. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Re: Airport insanity
Re: Gitmo And you were there and kept an eye on each and every guard, interrogator, and prisoner to make sure that the POW's weren't tortured? Wow, you are good... or phrased another way, what brand of crack are you smokin' 'cause the rest of us thin it's some really good shit and would like to have some too... --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Mon, 18 Oct 2004, James A. Donald wrote: I expected them to be KEPT in Guantanamo. Furthermore, they were not tortured, though they should have been.
Re: Airport insanity
I repeat: And you were there and kept an eye on each and every guard, interrogator, and prisoner to make sure that the POW's weren't tortured? And I add: And you were there and witnessed the attrocities that said prisoners committed in order to be placed in Gitmo? No? to both questions? Then your comment is worthless. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Wed, 20 Oct 2004, James A. Donald wrote: -- On 20 Oct 2004 at 13:05, Sunder wrote: Re: Gitmo And you were there and kept an eye on each and every guard, interrogator, and prisoner to make sure that the POW's weren't tortured? Lots of murderous terrorists have been released from Guatanamo, and in the nearly all cases the most serious of their complaints make it sound like a beach resort, except for the fact that they could not leave. A few have more serious complaints. Either they are lying or, those who say they were well treated apart from being held captive are lying. It is hard to believe that people like Slimane Hadj Abderrahmane (who after release announced his intention to resume terrorist activities and that he would attempt to murder his hosts who lobbied to get him release) are lying to cover up torture by the US army.
Re: Airport insanity
I repeat: And you were there and kept an eye on each and every guard, interrogator, and prisoner to make sure that the POW's weren't tortured? And I add: And you were there and witnessed the attrocities that said prisoners committed in order to be placed in Gitmo? No? to both questions? Then your comment is worthless. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Wed, 20 Oct 2004, James A. Donald wrote: -- On 20 Oct 2004 at 13:05, Sunder wrote: Re: Gitmo And you were there and kept an eye on each and every guard, interrogator, and prisoner to make sure that the POW's weren't tortured? Lots of murderous terrorists have been released from Guatanamo, and in the nearly all cases the most serious of their complaints make it sound like a beach resort, except for the fact that they could not leave. A few have more serious complaints. Either they are lying or, those who say they were well treated apart from being held captive are lying. It is hard to believe that people like Slimane Hadj Abderrahmane (who after release announced his intention to resume terrorist activities and that he would attempt to murder his hosts who lobbied to get him release) are lying to cover up torture by the US army.
Re: Airport insanity
On Tue, 19 Oct 2004, James A. Donald wrote: Here is my prescription for winning the war on terrorism We SHOULD rely on shock and awe, administered by men in white coats far from the scene. SNIP The US government should expose and condemn these objectionable practices, subvert moderately objectionable regimes, and annihilate more objectionable regimes. The pentagon should deprive moderately objectionable regimes of economic resources, by stealing their oil, destroying their water systems, and cutting off their trade and population movements with the outside world. Syria should suffer annihilation, Iran subversion, Sudan some combination of annihilation and subversion, Saudi Arabia and similar less objectionable regimes should suffer confiscation of oil, destruction of water resources, and loss of contact with the outside world. I see. I'm sure that Dubbya has his own agenda filled with Shoulds, as does Bin Ladin, as did Lenin, as did Hitler, as did Nero, as do you. Each saw (or see) their views as the way to Utopia. Trouble is, which one of you megalomaniacs is/was right? Further to the point, reality is, and what clearly should and makes sense to to you, clearly doesn't to another. The only difference between you and the others above is that you lack the power to bend reality to your whims, and IMHO, that is a very good thing. It is sad the the above list contained megalomaniacs who did possess that power and used it to cause great misery to others, and had to be removed from inflicting their whims on the world at great expense. Perhaps in a couple of weeks, US Citizens will vote one of those out the list as he's already done plenty of damage in the last four years, and save us another miserable four years. So yes, perhaps, in the fine tradition of what should be instead of what is, you, sir, should go fuck yourself. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Re: Airport insanity
Re: Gitmo And you were there and kept an eye on each and every guard, interrogator, and prisoner to make sure that the POW's weren't tortured? Wow, you are good... or phrased another way, what brand of crack are you smokin' 'cause the rest of us thin it's some really good shit and would like to have some too... --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Mon, 18 Oct 2004, James A. Donald wrote: I expected them to be KEPT in Guantanamo. Furthermore, they were not tortured, though they should have been.
RE: Airport insanity
I think you need to read this remake of the First they came for the commies poem. Short translation - whenever anyone's rights are being trampled upon, whether it affects you or not, you should protest. Goes along with one of the unsaid credos about cypherpunks: I absolutely disagree with what she said, but I'll defend to the death her right to say it. which along with Cypherpunks write code fell quite short of its goal. http://buffaloreport.com/021123rohde.html Here I'll save you the trouble. - - - They came for the Muslims, and I didn't speak up... By Stephen Rohde (Author's Note: The USA Patriot Act became law a little over one year ago.) First they came for the Muslims, and I didn't speak up because I wasn't a Muslim. Then they came for the immigrants, detaining them indefinitely solely on the certification of the attorney general, and I didn't speak up because I wasn't an immigrant. Then they came to eavesdrop on suspects consulting with their attorneys, and I didn't speak up because I wasn't a suspect. Then they came to prosecute noncitizens before secret military commissions, and I didn't speak up because I wasn't a noncitizen. Then they came to enter homes and offices for unannounced sneak and peak searches, and I didn't speak up because I had nothing to hide. Then they came to reinstate Cointelpro and resume the infiltration and surveillance of domestic religious and political groups, and I didn't speak up because I no longer participated in any groups. Then they came to arrest American citizens and hold them indefinitely without any charges and without access to lawyers, and I didn't speak up because I would never be arrested. Then they came to institute TIPS (Terrorism Information and Prevention System) recruiting citizens to spy on other citizens and I didn't speak up because I was afraid. Then they came for anyone who objected to government policy because it only aided the terrorists and gave ammunition to America's enemies, and I didn't speak up ... because I didn't speak up. Then they came for me, and by that time, no one was left to speak up. Forum Column (from the Daily Journal, 11/20/02). Stephen Rohde is an attorney. He edited American Words of Freedom and was was president of the American Civil Liberties Union of Southern California. Does Rohde's text seem familiar? It should. He based it on one of the web's most widely-circulated texts about silence in the face of evil: In Germany, the Nazis first came for the communists, and I didn't speak up because I wasn't a communist. Then they came for the Jews, and I didn't speak up because I wasn't a Jew. Then they came for the trade unionists, and I didn't speak up because I wasn't a trade unionist. Then they came for the Catholics, but I didn't speak up because I was a protestant. Then they came for me, and by that time there was no one left to speak for me. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Mon, 18 Oct 2004, James A. Donald wrote: I know when it will happen. It will happen when people interested in anon ecash go on suicide missions. :-) People who are, for the most part, not like us are trying to kill people like us. Let us chuck all those people not-like-us off those planes where most of the passengers are people like us. This really is not rocket science.
Re: Airport insanity
RTFGoogle? Google revealed: http://www.jubilee-newspaper.com/atf_last_operation.htm http://www.constitution.org/okc/jdt03-01.htm http://www.geoffmetcalf.com/qa/23076.html http://www.lpsf.org/LPSF_Newsletters/nl_10_01.html http://216.239.39.104/search?q=cache:vrlZD0TAzU8J:www.freerepublic.com/forum/a3ac7e1b57dbf.htm+ATF+paged+not+to+come+in+to+work+murrahhl=en http://www.geocities.com/Heartland/7006/proof-of-coverup.html http://www.uwsa.com/pipermail/uwsa/2001q2/006627.html and so on. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Mon, 18 Oct 2004, Justin wrote: On 2004-10-16T22:12:52-0400, Sunder wrote: There is still of course the matter of the unexploded bombs in that building that were dug out, and that the ATF received a Don't come in to work page on their beepers, and the seize and classification of all surveilance video tapes from things like ATM's across the street. Sources? -- The old must give way to the new, falsehood must become exposed by truth, and truth, though fought, always in the end prevails. -- L. Ron Hubbard
Re: Airport insanity
There is still of course the matter of the unexploded bombs in that building that were dug out, and that the ATF received a Don't come in to work page on their beepers, and the seize and classification of all surveilance video tapes from things like ATM's across the street. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Sat, 16 Oct 2004, James A. Donald wrote: Mc Veigh did not target innocents, and if he did target a plane full of innocents, perhaps in order to kill one guilty man on board, there is no way in hell he himself would be on that plane.
RE: Airport insanity
I think you need to read this remake of the First they came for the commies poem. Short translation - whenever anyone's rights are being trampled upon, whether it affects you or not, you should protest. Goes along with one of the unsaid credos about cypherpunks: I absolutely disagree with what she said, but I'll defend to the death her right to say it. which along with Cypherpunks write code fell quite short of its goal. http://buffaloreport.com/021123rohde.html Here I'll save you the trouble. - - - They came for the Muslims, and I didn't speak up... By Stephen Rohde (Author's Note: The USA Patriot Act became law a little over one year ago.) First they came for the Muslims, and I didn't speak up because I wasn't a Muslim. Then they came for the immigrants, detaining them indefinitely solely on the certification of the attorney general, and I didn't speak up because I wasn't an immigrant. Then they came to eavesdrop on suspects consulting with their attorneys, and I didn't speak up because I wasn't a suspect. Then they came to prosecute noncitizens before secret military commissions, and I didn't speak up because I wasn't a noncitizen. Then they came to enter homes and offices for unannounced sneak and peak searches, and I didn't speak up because I had nothing to hide. Then they came to reinstate Cointelpro and resume the infiltration and surveillance of domestic religious and political groups, and I didn't speak up because I no longer participated in any groups. Then they came to arrest American citizens and hold them indefinitely without any charges and without access to lawyers, and I didn't speak up because I would never be arrested. Then they came to institute TIPS (Terrorism Information and Prevention System) recruiting citizens to spy on other citizens and I didn't speak up because I was afraid. Then they came for anyone who objected to government policy because it only aided the terrorists and gave ammunition to America's enemies, and I didn't speak up ... because I didn't speak up. Then they came for me, and by that time, no one was left to speak up. Forum Column (from the Daily Journal, 11/20/02). Stephen Rohde is an attorney. He edited American Words of Freedom and was was president of the American Civil Liberties Union of Southern California. Does Rohde's text seem familiar? It should. He based it on one of the web's most widely-circulated texts about silence in the face of evil: In Germany, the Nazis first came for the communists, and I didn't speak up because I wasn't a communist. Then they came for the Jews, and I didn't speak up because I wasn't a Jew. Then they came for the trade unionists, and I didn't speak up because I wasn't a trade unionist. Then they came for the Catholics, but I didn't speak up because I was a protestant. Then they came for me, and by that time there was no one left to speak for me. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Mon, 18 Oct 2004, James A. Donald wrote: I know when it will happen. It will happen when people interested in anon ecash go on suicide missions. :-) People who are, for the most part, not like us are trying to kill people like us. Let us chuck all those people not-like-us off those planes where most of the passengers are people like us. This really is not rocket science.
Re: Airport insanity
There is still of course the matter of the unexploded bombs in that building that were dug out, and that the ATF received a Don't come in to work page on their beepers, and the seize and classification of all surveilance video tapes from things like ATM's across the street. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Sat, 16 Oct 2004, James A. Donald wrote: Mc Veigh did not target innocents, and if he did target a plane full of innocents, perhaps in order to kill one guilty man on board, there is no way in hell he himself would be on that plane.
Re: Congress Close to Establishing Rules for Driver's Licenses
Right, just because your Passport or driver's license expired, doesn't mean that you got any younger and therefore shouldn't drink. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Tue, 12 Oct 2004, Riad S. Wahby wrote: Tangentially, I was once told that, at least in Massachusetts liquor stores, even an _expired_ passport was useful identification. Can anyone confirm that this is true other than at Sav-Mor Liquors?
cryptome.org down?
DNS seems to resolve, but never get to the web server. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Re: Congress Close to Establishing Rules for Driver's Licenses
Right, just because your Passport or driver's license expired, doesn't mean that you got any younger and therefore shouldn't drink. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Tue, 12 Oct 2004, Riad S. Wahby wrote: Tangentially, I was once told that, at least in Massachusetts liquor stores, even an _expired_ passport was useful identification. Can anyone confirm that this is true other than at Sav-Mor Liquors?
cryptome.org down?
DNS seems to resolve, but never get to the web server. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Bush wins
http://www.boingboing.net/images/wbay.jpg http://www.boingboing.net/2004/10/07/tv_station_reports_t.html Thursday, October 7, 2004 TV station reports that Bush has been elected President WBAY TV in Green Bay, Wisconsin is running an AP article reporting that Bush has won the election, weeks before the election is to take place. (Click image for enlargement. wbayAt this hour, President Bush has won re-election as president by a 47 percent to 43 percent margin in the popular vote nationwide. Ralph Nader has 1 percent of the vote nationwide. That's with 51 percent of the precincts reporting SNIP --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Most Disturbing Yet - Senate Wants Database Dragnet
http://www.wired.com/news/privacy/0,1848,65242,00.html http://www.wired.com/news/print/0,1294,65242,00.html Senate Wants Database Dragnet By Ryan Singel 02:00 AM Oct. 06, 2004 PT The Senate could pass a bill as early as Wednesday evening that would let government counter-terrorist investigators instantly query a massive system of interconnected commercial and government databases that hold billions of records on Americans. The proposed network is based on the Markle Foundation Task Force's December 2003 report, which envisioned a system that would allow FBI and CIA agents, as well as police officers and some companies, to quickly search intelligence, criminal and commercial databases. The proposal is so radical, the bill allocates $50 million just to fund the system's specifications and privacy policies. SNIP To prevent abuses of the system, the Markle task force recommended anonymized technology, graduated levels of permission-based access and automated auditing software constantly hunting for abuses. {Huh? How would anonimized access PREVENT abuses?} An appendix to the report went so far as to suggest that the system should identify known associates of the terrorist suspect, within 30 seconds, using shared addressees, records of phone calls to and from the suspect's phone, e-mails to and from the suspect's accounts, financial transactions, travel history and reservations, and common memberships in organizations, including (with appropriate safeguards) religious and expressive organizations. SNIP --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
RFID Driver's licenses for VA
So the cops and RFID h4x0rZ can know your true name from a distance. and since RFID tags, are what, $0.05 each, the terrorists and ID counterfitters will be able to make fake ones too... Whee! http://www.wired.com/news/print/0,1294,65243,00.html RFID Driver's Licenses Debated By Mark Baard Story location: http://www.wired.com/news/privacy/0,1848,65243,00.html 09:50 AM Oct. 06, 2004 PT Some federal and state government officials want to make state driver's licenses harder to counterfeit or steal, by adding computer chips that emit a radio signal bearing a license holder's unique, personal information. In Virginia, where several of the 9/11 hijackers obtained driver's licenses, state legislators Wednesday will hear testimony about how radio frequency identification, or RFID, tags may prevent identity fraud and help thwart terrorists using falsified documents to move about the country. Privacy advocates will argue that the radio tags will also make it easy for the government to spy on its citizens and exacerbate identity theft, one of the problems the technology is meant to relieve. SNIP Because information on RFID tags can be picked up from many feet away, SNIP --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Most Disturbing Yet - Senate Wants Database Dragnet
http://www.wired.com/news/privacy/0,1848,65242,00.html http://www.wired.com/news/print/0,1294,65242,00.html Senate Wants Database Dragnet By Ryan Singel 02:00 AM Oct. 06, 2004 PT The Senate could pass a bill as early as Wednesday evening that would let government counter-terrorist investigators instantly query a massive system of interconnected commercial and government databases that hold billions of records on Americans. The proposed network is based on the Markle Foundation Task Force's December 2003 report, which envisioned a system that would allow FBI and CIA agents, as well as police officers and some companies, to quickly search intelligence, criminal and commercial databases. The proposal is so radical, the bill allocates $50 million just to fund the system's specifications and privacy policies. SNIP To prevent abuses of the system, the Markle task force recommended anonymized technology, graduated levels of permission-based access and automated auditing software constantly hunting for abuses. {Huh? How would anonimized access PREVENT abuses?} An appendix to the report went so far as to suggest that the system should identify known associates of the terrorist suspect, within 30 seconds, using shared addressees, records of phone calls to and from the suspect's phone, e-mails to and from the suspect's accounts, financial transactions, travel history and reservations, and common memberships in organizations, including (with appropriate safeguards) religious and expressive organizations. SNIP --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Federal program to monitor everyone on the road
http://www.boingboing.net/2004/10/01/federal_program_to_m.html Federal program to monitor everyone on the road Interesting article about the Fed's plans to develop an all-knowing intelligent highway system. Most people have probably never heard of the agency, called the Intelligent Transportation Systems Joint Program Office. And they haven't heard of its plans to add another dimension to our national road system, one that uses tracking and sensor technology to erase the lines between cars, the road and the government transportation management centers from which every aspect of transportation will be observed and managed. For 13 years, a powerful group of car manufacturers, technology companies and government interests has fought to bring this system to life. They envision a future in which massive databases will track the comings and goings of everyone who travels by car or mass transit. The only way for people to evade the national transportation tracking system they're creating will be to travel on foot. Drive your car, and your every movement could be recorded and archived. The federal government will know the exact route you drove to work, how many times you braked along the way, the precise moment you arrived -- and that every other Tuesday you opt to ride the bus. Link to actual story: http://charlotte.creativeloafing.com/news_cover.html --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Federal program to monitor everyone on the road
http://www.boingboing.net/2004/10/01/federal_program_to_m.html Federal program to monitor everyone on the road Interesting article about the Fed's plans to develop an all-knowing intelligent highway system. Most people have probably never heard of the agency, called the Intelligent Transportation Systems Joint Program Office. And they haven't heard of its plans to add another dimension to our national road system, one that uses tracking and sensor technology to erase the lines between cars, the road and the government transportation management centers from which every aspect of transportation will be observed and managed. For 13 years, a powerful group of car manufacturers, technology companies and government interests has fought to bring this system to life. They envision a future in which massive databases will track the comings and goings of everyone who travels by car or mass transit. The only way for people to evade the national transportation tracking system they're creating will be to travel on foot. Drive your car, and your every movement could be recorded and archived. The federal government will know the exact route you drove to work, how many times you braked along the way, the precise moment you arrived -- and that every other Tuesday you opt to ride the bus. Link to actual story: http://charlotte.creativeloafing.com/news_cover.html --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
How to fuck with airports - a 1 step guide for (Redmond) terrorists.
Q: How do you cause an 800-plane pile-up at a major airport? A: Replace working Unix systems with Microsoft Windows 2000! Details: http://www.techworld.com/opsys/news/index.cfm?NewsID=2275 --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
How to fuck with airports - a 1 step guide for (Redmond) terrorists.
Q: How do you cause an 800-plane pile-up at a major airport? A: Replace working Unix systems with Microsoft Windows 2000! Details: http://www.techworld.com/opsys/news/index.cfm?NewsID=2275 --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
stegedetect - looks like we need better mice
http://freshmeat.net/projects/stegdetect/?branch_id=52957release_id=172055 http://www.outguess.org/detection.php Steganography Detection with Stegdetect Stegdetect is an automated tool for detecting steganographic content in images. It is capable of detecting several different steganographic methods to embed hidden information in JPEG images. Currently, the detectable schemes are * jsteg, * jphide (unix and windows), * invisible secrets, * outguess 01.3b, * F5 (header analysis), * appendX and camouflage. Stegbreak is used to launch dictionary attacks against JSteg-Shell, JPHide and OutGuess 0.13b. Stegdetect and Stegbreak have been developed by Niels Provos. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Re: Maths holy grail could bring disaster for internet
Forgive my ignorance, but would other PK schemes that don't rely on prime numbers such as Elliptic Curve be affected? --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Tue, 7 Sep 2004, Matt Crawford wrote: On Sep 6, 2004, at 21:52, R. A. Hettinga wrote: This would be a good thing. Because to rebuild the infrastructure based on symmetric crypto would bring the trusted third party (currently the CA) out of the shadows and into the light.
stegedetect - looks like we need better mice
http://freshmeat.net/projects/stegdetect/?branch_id=52957release_id=172055 http://www.outguess.org/detection.php Steganography Detection with Stegdetect Stegdetect is an automated tool for detecting steganographic content in images. It is capable of detecting several different steganographic methods to embed hidden information in JPEG images. Currently, the detectable schemes are * jsteg, * jphide (unix and windows), * invisible secrets, * outguess 01.3b, * F5 (header analysis), * appendX and camouflage. Stegbreak is used to launch dictionary attacks against JSteg-Shell, JPHide and OutGuess 0.13b. Stegdetect and Stegbreak have been developed by Niels Provos. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Re: Maths holy grail could bring disaster for internet
Forgive my ignorance, but would other PK schemes that don't rely on prime numbers such as Elliptic Curve be affected? --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Tue, 7 Sep 2004, Matt Crawford wrote: On Sep 6, 2004, at 21:52, R. A. Hettinga wrote: This would be a good thing. Because to rebuild the infrastructure based on symmetric crypto would bring the trusted third party (currently the CA) out of the shadows and into the light.
RE: stegedetect Variola's Suitcase
The answer to that question depends on some leg work which involves converting the source code to stegetect into hardware and seeing how fast that hardware runs, then multiplying by X where X is how many of the chips you can afford to build. I'd image that it's a lot faster to have some hw that gives you a yea/nay on each JPG, than to say, attempt to crack DES. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Tue, 7 Sep 2004, Tyler Durden wrote: So here's the 'obvious' question: How fast can dedicated hardware run if it were a dedicated Stegedetect processor? In other words, how easy would it be for NSA, et al to scan 'every' photo on the internet for Stego traces? (And then, every photo being emailed?) And then, how fast can someone write a worm that will make every photo stored on a harddrive look like it's been stegoed?
Re: The cages on the Hudson, AKA Little Guantanamo (fwd)
Um, don't know what you've been smoking but: a. there is no we, except individuals with the freedom to chose their own actions. b. cops have guns. c. some cops have armor and semi (or full?) automatics along with the non-lethal weaponry. d. non-cops don't and aren't allowed to carry the same weaponry. (Unless your version of we includes some arsenal and has been watching lots of A-Team reruns, I doubt that there's not much the cops can't do and mostly get away with it.) Yeah, Not totally. Just like Red China isn't a total totalitarian state, and it allowed the students at Tienamen Sq to demonstrate. We're not too far away from that, except these cops don't (yet?) have tanks and as far as has been reported in the media, haven't murdered anyone in the protests, and that the arrested have been let out a few days later rather than tortured. It's certainly inching towards totalitarianism and away from the right of the people peaceably to assemble, and to petition the government for a redress (not, there's nothing in that text about protest pens, open your bag searches, show me your ID, or protest permits.) --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Wed, 1 Sep 2004, Tyler Durden wrote: Not totally. That cop on a scooter rightfully got the crap kicked out of him for mowing down demonstrators. They can gain local, temporary control but if we take to the streets en masse then there's not much they can do, and they know it.
Re: The cages on the Hudson, AKA Little Guantanamo (fwd)
Wheee! NYC==Police State for the last week for those of you living under rocks... --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - -- Forwarded message -- Date: Wed, 1 Sep 2004 15:26:13 -0400 From: Edward Potter To: grimmwerks Cc: wwwac [EMAIL PROTECTED] Subject: Re: [wwwac] Yes, it's relevent! The cages on the Hudson, AKA Little Guantanamo He's out. You can't get near the place today. I tell people what happened and they can't believe it. I would not have believed it either, except I was there for 11 hours. Then another 15 hours downtown. Excellent first hand account here: http://nyc.indymedia.org/newswire/display/107675/index.php If I had not been arrested, I would not have known anything like this was going on. 1000- 2000 people, in barb-wire cages, at this very moment on the Hudson River. No joke. Totally surrounded by police. ACLU lawyers, Reporters, everyone being denied access. Just starting to hit the media. -ed On Sep 1, 2004, at 2:57 PM, grimmwerks wrote: I read the same thing - and the guy with the bike is STILL there? And held on what grounds? Has any pics surfaced yet? On 9/1/04 2:51 PM, Edward Potter [EMAIL PROTECTED] wrote: I cross posted this to the Politics list, just getting so little media coverage, and yes, I met a few Java Programmers there, plus the guy that has the bike that writes messages by WifI got nailed by the police too (writing America Home of the Free) ... so I guess hopefully the word gets out. --- Does anyone on this list know there are now up to 2000 people imprisoned in barb-wire cages on the Hudson River that don't know what their charges are, have not had any rights read to them and are being denied any access to any legal representation? I was there, it was real. It would blow your mind. YOU HAVE NEVER SEEN ANYTHING LIKE IT IN AMERICA BEFORE. Or as the police call it: Little Guantanamo Keep up with the news here: http://nyc.indymedia.org ## The World Wide Web Artists' Consortium - http://www.wwwac.org/ ## ## To Unsubscribe, send email to: [EMAIL PROTECTED] ##
Re: The cages on the Hudson, AKA Little Guantanamo (fwd)
Um, don't know what you've been smoking but: a. there is no we, except individuals with the freedom to chose their own actions. b. cops have guns. c. some cops have armor and semi (or full?) automatics along with the non-lethal weaponry. d. non-cops don't and aren't allowed to carry the same weaponry. (Unless your version of we includes some arsenal and has been watching lots of A-Team reruns, I doubt that there's not much the cops can't do and mostly get away with it.) Yeah, Not totally. Just like Red China isn't a total totalitarian state, and it allowed the students at Tienamen Sq to demonstrate. We're not too far away from that, except these cops don't (yet?) have tanks and as far as has been reported in the media, haven't murdered anyone in the protests, and that the arrested have been let out a few days later rather than tortured. It's certainly inching towards totalitarianism and away from the right of the people peaceably to assemble, and to petition the government for a redress (not, there's nothing in that text about protest pens, open your bag searches, show me your ID, or protest permits.) --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Wed, 1 Sep 2004, Tyler Durden wrote: Not totally. That cop on a scooter rightfully got the crap kicked out of him for mowing down demonstrators. They can gain local, temporary control but if we take to the streets en masse then there's not much they can do, and they know it.
Re: The cages on the Hudson, AKA Little Guantanamo (fwd)
Wheee! NYC==Police State for the last week for those of you living under rocks... --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - -- Forwarded message -- Date: Wed, 1 Sep 2004 15:26:13 -0400 From: Edward Potter To: grimmwerks Cc: wwwac [EMAIL PROTECTED] Subject: Re: [wwwac] Yes, it's relevent! The cages on the Hudson, AKA Little Guantanamo He's out. You can't get near the place today. I tell people what happened and they can't believe it. I would not have believed it either, except I was there for 11 hours. Then another 15 hours downtown. Excellent first hand account here: http://nyc.indymedia.org/newswire/display/107675/index.php If I had not been arrested, I would not have known anything like this was going on. 1000- 2000 people, in barb-wire cages, at this very moment on the Hudson River. No joke. Totally surrounded by police. ACLU lawyers, Reporters, everyone being denied access. Just starting to hit the media. -ed On Sep 1, 2004, at 2:57 PM, grimmwerks wrote: I read the same thing - and the guy with the bike is STILL there? And held on what grounds? Has any pics surfaced yet? On 9/1/04 2:51 PM, Edward Potter [EMAIL PROTECTED] wrote: I cross posted this to the Politics list, just getting so little media coverage, and yes, I met a few Java Programmers there, plus the guy that has the bike that writes messages by WifI got nailed by the police too (writing America Home of the Free) ... so I guess hopefully the word gets out. --- Does anyone on this list know there are now up to 2000 people imprisoned in barb-wire cages on the Hudson River that don't know what their charges are, have not had any rights read to them and are being denied any access to any legal representation? I was there, it was real. It would blow your mind. YOU HAVE NEVER SEEN ANYTHING LIKE IT IN AMERICA BEFORE. Or as the police call it: Little Guantanamo Keep up with the news here: http://nyc.indymedia.org ## The World Wide Web Artists' Consortium - http://www.wwwac.org/ ## ## To Unsubscribe, send email to: [EMAIL PROTECTED] ##
Backdoor found in Diebold Voting Tabulators
Oops! Is that a cat exiting the bag? http://www.blackboxvoting.org/?q=node/view/78 Issue: Manipulation technique found in the Diebold central tabulator -- 1,000 of these systems are in place, and they count up to two million votes at a time. By entering a 2-digit code in a hidden location, a second set of votes is created. This set of votes can be changed, so that it no longer matches the correct votes. The voting system will then read the totals from the bogus vote set. It takes only seconds to change the votes, and to date not a single location in the U.S. has implemented security measures to fully mitigate the risks. SNIP --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Re: Backdoor found in Diebold Voting Tabulators
allotted. Though the demonstration takes only 3 minutes, the panel refused to allow it and would not look. They did, however, meet privately with Diebold afterwards, without informing the public or issuing any report of what transpired. On Aug. 18, 2004, Harris and Stephenson, together with computer security expert Dr. Hugh Thompson, and former King County Elections Supervisor Julie Anne Kempf, met with members of the California Voting Systems Panel and the California Secretary of State's office to demonstrate the double set of books. The officials declined to allow a camera crew from 60 Minutes to film or attend. The Secretary of State's office halted the meeting, called in the general counsel for their office, and a defense attorney from the California Attorney General's office. They refused to allow Black Box Voting to videotape its own demonstration. They prohibited any audiotape and specified that no notes of the meeting could be requested in public records requests. The undersecretary of state, Mark Kyle, left the meeting early, and one voting panel member, John Mott Smith, appeared to sleep through the presentation. On Aug. 23, 2004, CBC TV came to California and filmed the demonstration. On Aug 30 and 31, Harris and Stephenson will be in New York City to demonstrate the double set of books for any public official and any TV crews who wish to see it. On Sept. 1, another event is planned in New York City, and on Sept. 21, Harris and Stephenson intend to demonstrate the problem for members and congress and the press in Washington D.C. Diebold has known of the problem, or should have known, because it did a cease and desist on the web site when Harris originally reported the problem in 2003. On Aug. 11, 2004, Harris also offered to show the problem to Marvin Singleton, Diebold's damage control expert, and to other Diebold execs. They refused to look. Why don't people want to look? Suppose you are formally informed that the gas tank tends to explode on the car you are telling people to use. If you KNOW about it, but do nothing, you are liable. LET US HOLD DIEBOLD, AND OUR PUBLIC OFFICIALS, ACCOUNTABLE. 1) Let there be no one who can say I didn't know. 2) Let there be no election jurisdiction using GEMS that fails to implement all of the proper corrective procedures, this fall, to mitigate risk. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Tue, 31 Aug 2004 [EMAIL PROTECTED] wrote: Quoting Eric Murray [EMAIL PROTECTED]: On Tue, Aug 31, 2004 at 11:30:35AM -0400, Sunder wrote: Oops! Is that a cat exiting the bag? http://www.blackboxvoting.org/?q=node/view/78 Apparently so. Going to www.blackboxvoting.org now just gives: Don't break out the tinfoil hats yet. Maybe they exceeded their bandwidth because that link was spread around.
Re: Backdoor found in Diebold Voting Tabulators
allotted. Though the demonstration takes only 3 minutes, the panel refused to allow it and would not look. They did, however, meet privately with Diebold afterwards, without informing the public or issuing any report of what transpired. On Aug. 18, 2004, Harris and Stephenson, together with computer security expert Dr. Hugh Thompson, and former King County Elections Supervisor Julie Anne Kempf, met with members of the California Voting Systems Panel and the California Secretary of State's office to demonstrate the double set of books. The officials declined to allow a camera crew from 60 Minutes to film or attend. The Secretary of State's office halted the meeting, called in the general counsel for their office, and a defense attorney from the California Attorney General's office. They refused to allow Black Box Voting to videotape its own demonstration. They prohibited any audiotape and specified that no notes of the meeting could be requested in public records requests. The undersecretary of state, Mark Kyle, left the meeting early, and one voting panel member, John Mott Smith, appeared to sleep through the presentation. On Aug. 23, 2004, CBC TV came to California and filmed the demonstration. On Aug 30 and 31, Harris and Stephenson will be in New York City to demonstrate the double set of books for any public official and any TV crews who wish to see it. On Sept. 1, another event is planned in New York City, and on Sept. 21, Harris and Stephenson intend to demonstrate the problem for members and congress and the press in Washington D.C. Diebold has known of the problem, or should have known, because it did a cease and desist on the web site when Harris originally reported the problem in 2003. On Aug. 11, 2004, Harris also offered to show the problem to Marvin Singleton, Diebold's damage control expert, and to other Diebold execs. They refused to look. Why don't people want to look? Suppose you are formally informed that the gas tank tends to explode on the car you are telling people to use. If you KNOW about it, but do nothing, you are liable. LET US HOLD DIEBOLD, AND OUR PUBLIC OFFICIALS, ACCOUNTABLE. 1) Let there be no one who can say I didn't know. 2) Let there be no election jurisdiction using GEMS that fails to implement all of the proper corrective procedures, this fall, to mitigate risk. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Tue, 31 Aug 2004 [EMAIL PROTECTED] wrote: Quoting Eric Murray [EMAIL PROTECTED]: On Tue, Aug 31, 2004 at 11:30:35AM -0400, Sunder wrote: Oops! Is that a cat exiting the bag? http://www.blackboxvoting.org/?q=node/view/78 Apparently so. Going to www.blackboxvoting.org now just gives: Don't break out the tinfoil hats yet. Maybe they exceeded their bandwidth because that link was spread around.
Re: JYA in NYT
Let's dissect this mother. On Sun, 29 Aug 2004, Nomen Nescio wrote: http://nytimes.com/2004/08/29/nyregion/29pipeline.html August 29, 2004 Mapping Natural Gas Lines: Advise the Public, Tip Off the Terrorists By IAN URBINA John Young says he is an agent for change, hoping to point out places where the government needs to bolster national security. Since 1996, he has been posting documents on his Web site, ranging from detailed maps of nuclear storage facilities in New Mexico to aerial photographs of police preparations for the Republican National Convention. He has never attracted much attention from the authorities, and what he does is fully legal. So where's the beef then? But last month, Mr. Young, a 68-year-old architect originally from Odessa, Tex., began publishing maps and pictures of natural gas pipelines in New York City on his site (www.cryptome.org). One photograph was of a large sign in Midtown Manhattan warning about the presence of a major gas main, a sign that had been meant to prevent deadly accidents. Within a week, the company that owns the pipeline took the sign down. Yeah, those were pictures taken from public locations, I'd assume, right? No different than taking a picture of the Statue of Liberty or of the moon. They posted the signs because they thought someone might accidentally blow the pipeline up,'' Mr. Young said. Now, they're taking them down because they think someone might intentionally blow it up.'' Sounds like a lose lose situation to me. For Mr. Young - and for a range of experts across the country - the strange and unnoticed little episode in Manhattan underscores one of the great tensions of the post-9/11 world: how to balance the desire for secrecy with decisions on what is best for public safety. So there, you go, Mr. Young has become an expert. What's the problem? Few issues highlight that tension better than the topic of natural gas. Or perhaps flatulence? Private industry and local governments have spent much of the last several decades trying to make natural gas pipelines safer by publicizing where they are. Natural gas, highly explosive and transported in pipes underneath unknowing residents or uncharted along waterways, has been the cause of scores of lethal accidents - fiery explosions caused by misdirected backhoes or wayward boat anchors. There you go. They've made their bed, now they can't complain when someone points at it and says Uh, look at that! But recent concerns have pushed in the opposite direction. Increasingly, gas companies have been clearing their Web sites of pipeline maps previously used by contractors before excavating. Almost all nautical charts once indicated where gas pipes run. Fewer do now. So, we're back to someone accidentally dropping anchor in the wrong place and boom... can't have it both ways boys. Federal regulations require companies to make these lines as obvious as possible and educate the public about where they are,'' said Kelly So John was simply helping the companies follow Federal Regulations. Swan, a spokesman for Williams, the company that owns the pipe supplying Manhattan. But local laws indicate that we were allowed to get rid of that particular sign, and after the recent publicity about it, we did.'' Oops, too much publicity, couldn't handle the spin control. ... Natural gas arrives in New York City through six so-called city gates, reached after traveling thousands of miles in pipes running from deposits deep beneath southeastern Texas and Sable Island, off the east coast of Nova Scotia. Here it enters a local grid of smaller pipes owned by Consolidated Edison in Manhattan, the Bronx and portions of Queens, and owned by Keyspan in the rest of the city. The gas is used for heating, cooking, and increasingly for fuel in city power plants. And now the author of this article is feeding the terrorists vital intel - or following Federal regulations? But natural gas is also at risk of sabotage. So is water, so is air, so is everything. Hell, if the CIA thought they could implant a transmitter in a cat and set the cat loose in a park where Soviets, Commies, and Spies (Oh My!) might talk, what's to stop the terrorists from doing the same style of thing? This tactic actually comes from our own playbook,'' said Thomas C. Reed, the former secretary of the Air Force under President Gerald R. Ford and the author of At the Abyss: An Insider's History of the Cold War.'' In 1982, the C.I.A. hacked into the software that controlled Soviet natural gas pipelines, causing vital pumps, turbines and valves to go haywire, he explained. The result, Mr. Reed said, was the largest nonnuclear explosion and fire ever seen from space and a major blow to Soviet sales of natural gas to Western Europe. The tactic was a stroke of genius,'' he said. Sure, why didn't he also say that flying 747's into high buildings were a stroke
Wired: Attacking the 4th Estate
http://www.wired.com/news/politics/0,1283,64680,00.html?tw=wn_tophead_6 or, the HTML crap free version: http://www.wired.com/news/print/0,1294,64680,00.html Attacking the Fourth Estate By Adam L. Penenberg | Also by this reporter Page 1 of 2 next 02:00 AM Aug. 25, 2004 PT John Ashcroft and the Department of Justice must be stopped. There, I've said it. Of course, now I half expect federal agents to drag me off to prison for violating the No One Dare Question the Government While We Are Engaged in the War Against Terror Act. (Duration: perhaps forever.) Sure, you say, no such act exists. But Ashcroft himself once testified that bellyaching over what he called phantoms of lost liberty only serves to aid terrorists and give ammunition to America's enemies. And recently FBI agents attempted to intimidate political activists by visiting them at their homes to warn about causing trouble at the upcoming Republican convention. More to the point, under Justice Department guidelines, Ashcroft must approve any subpoena of a journalist, so how do you explain the rash of subpoenas that Special Prosecutor Patrick J. Fitzgerald, the U.S. attorney from Chicago, has doled out to Time magazine, The New York Times, The Washington Post and NBC? Already one reporter -- Matthew Cooper from Time -- has been held in contempt by a federal judge for refusing to appear before the grand jury that Fitzgerald convened to investigate which Bush administration senior official(s) leaked a covert spy's identity to columnist Robert Novak. SNIP --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
RE: Another John Young Sighting
All Hail Cthulhu! Why worship the lesser evil? Vote for Cthulhu! Why vote for the lesser evil? --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Wed, 25 Aug 2004, kawaii ryuko wrote: Hail Eris. All hail Discordia!
Reason on Gilmore VS Ashcroft
http://www.reason.com/links/links082404.shtml --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Re: Digital camera fingerprinting...
Yes, your holiness, but how much of that will survive jpeg compression, photshop (or GIMP) cleanups, and shrinking down to lower resolutions, and insertion of stego? Or what about those disposable digital cameras that are hackable? Perhaps there should be a cypherpunks pool to swap disposable digital cameras? --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Wed, 25 Aug 2004, Major Variola (ret) wrote: Very relevant, traffic analysis and fingerprinting (intentional or not) are always tasty subjects. One question for the court would be, how many *other* cameras have column 67 disabled? One of every thousand? And how many thousand cameras were sold? Pope Major Variola (ret)
Wired: Attacking the 4th Estate
http://www.wired.com/news/politics/0,1283,64680,00.html?tw=wn_tophead_6 or, the HTML crap free version: http://www.wired.com/news/print/0,1294,64680,00.html Attacking the Fourth Estate By Adam L. Penenberg | Also by this reporter Page 1 of 2 next 02:00 AM Aug. 25, 2004 PT John Ashcroft and the Department of Justice must be stopped. There, I've said it. Of course, now I half expect federal agents to drag me off to prison for violating the No One Dare Question the Government While We Are Engaged in the War Against Terror Act. (Duration: perhaps forever.) Sure, you say, no such act exists. But Ashcroft himself once testified that bellyaching over what he called phantoms of lost liberty only serves to aid terrorists and give ammunition to America's enemies. And recently FBI agents attempted to intimidate political activists by visiting them at their homes to warn about causing trouble at the upcoming Republican convention. More to the point, under Justice Department guidelines, Ashcroft must approve any subpoena of a journalist, so how do you explain the rash of subpoenas that Special Prosecutor Patrick J. Fitzgerald, the U.S. attorney from Chicago, has doled out to Time magazine, The New York Times, The Washington Post and NBC? Already one reporter -- Matthew Cooper from Time -- has been held in contempt by a federal judge for refusing to appear before the grand jury that Fitzgerald convened to investigate which Bush administration senior official(s) leaked a covert spy's identity to columnist Robert Novak. SNIP --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
RE: Another John Young Sighting
All Hail Cthulhu! Why worship the lesser evil? Vote for Cthulhu! Why vote for the lesser evil? --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Wed, 25 Aug 2004, kawaii ryuko wrote: Hail Eris. All hail Discordia!
Reason on Gilmore VS Ashcroft
http://www.reason.com/links/links082404.shtml --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Re: Digital camera fingerprinting...
Yes, your holiness, but how much of that will survive jpeg compression, photshop (or GIMP) cleanups, and shrinking down to lower resolutions, and insertion of stego? Or what about those disposable digital cameras that are hackable? Perhaps there should be a cypherpunks pool to swap disposable digital cameras? --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Wed, 25 Aug 2004, Major Variola (ret) wrote: Very relevant, traffic analysis and fingerprinting (intentional or not) are always tasty subjects. One question for the court would be, how many *other* cameras have column 67 disabled? One of every thousand? And how many thousand cameras were sold? Pope Major Variola (ret)
T. Kennedy == Terrorist says TSA
http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2004/08/20/MNGQ28BM1O1.DTL Washington -- Sen. Edward Ted Kennedy said Thursday that he was stopped and questioned at airports on the East Coast five times in March because his name appeared on the government's secret no-fly list. SNIP That a clerical error could lend one of the most powerful people in Washington to the list -- it makes one wonder just how many others who are not terrorists are on the list, said Reggie Shuford, a senior ACLU counsel. Someone of Sen. Kennedy's stature can simply call a friend to have his name removed, but a regular American citizen does not have that ability. He had to call three times himself. SNIP --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
T. Kennedy == Terrorist says TSA
http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2004/08/20/MNGQ28BM1O1.DTL Washington -- Sen. Edward Ted Kennedy said Thursday that he was stopped and questioned at airports on the East Coast five times in March because his name appeared on the government's secret no-fly list. SNIP That a clerical error could lend one of the most powerful people in Washington to the list -- it makes one wonder just how many others who are not terrorists are on the list, said Reggie Shuford, a senior ACLU counsel. Someone of Sen. Kennedy's stature can simply call a friend to have his name removed, but a regular American citizen does not have that ability. He had to call three times himself. SNIP --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Excerpts from Rudy Rucker's new Book
From Rudy Rucker's new book: The Lifebox, the Seashell and the Soul. (The interesting bits to which Tim fantasizes to.) As seen on: http://www.boingboing.net/text/guestbar.html SNIP Rant at Start of Chapter on Society I write this book during a dark time. America.s government is in the hands of criminals and morons. I.d like to break through to a radically different way of talking about society, to throw a bucket of ice-water in the face of the sleep-walking sheep who think that history is about presidents and kings. A baby filling a diaper is infinitely more significant than a congress placing a movement on the floor. SNIP Twin Towers Facts: The twin towers fell. The terrorists were Saudis. Bush invaded Iraq. .Ah,. someone might say, .if nobody wanted to fight, we.d be invaded. Look at the twin towers. The world.s not safe... And I would submit that the administration.s reaction to the twin towers was exactly the wrong one. Instead of jumping into the repetitive tit-for-tat class two Israelis-versus-Palestinians mode, the government should have gone class four. What would make men kill themselves while destroying a part of our lovely New York City? What system produced them? Isn.t there a way to get in and jolt it in some totally unexpected way, something more original than rocket fire vs. car bombs? Emigration Before virtually every American presidential election, I.ve heard people say, .If so and so wins, I.m leaving the country.. But they never do. The only time my friends eve remigrated was during the Viet Nam war, a time when the hive mind was undertaking the wholesale slaughter of a generation. But most of the time, for most of us, things aren.t bad enough to make emigration seem reasonable. If the election is stolen again in Fall, 2004, the answer could be armed revolution, not emigration. If the Bush faction tries to retain power, a significant number of people may feel compelled to go to D.C. and fight in the streets until the tyrant is deposed. However long it takes, however dearly it costs. Would it be worth it? Hopefully he'll lose the election by too great a margin to fudge. But for that to happen, we have to vote. The popular vote margin matters, if not in the electoral college, then in the hearts and minds of our oppressed populace. If the margin were big enough, the house of cards could collapse. SNIP --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Excerpts from Rudy Rucker's new Book
From Rudy Rucker's new book: The Lifebox, the Seashell and the Soul. (The interesting bits to which Tim fantasizes to.) As seen on: http://www.boingboing.net/text/guestbar.html SNIP Rant at Start of Chapter on Society I write this book during a dark time. America.s government is in the hands of criminals and morons. I.d like to break through to a radically different way of talking about society, to throw a bucket of ice-water in the face of the sleep-walking sheep who think that history is about presidents and kings. A baby filling a diaper is infinitely more significant than a congress placing a movement on the floor. SNIP Twin Towers Facts: The twin towers fell. The terrorists were Saudis. Bush invaded Iraq. .Ah,. someone might say, .if nobody wanted to fight, we.d be invaded. Look at the twin towers. The world.s not safe... And I would submit that the administration.s reaction to the twin towers was exactly the wrong one. Instead of jumping into the repetitive tit-for-tat class two Israelis-versus-Palestinians mode, the government should have gone class four. What would make men kill themselves while destroying a part of our lovely New York City? What system produced them? Isn.t there a way to get in and jolt it in some totally unexpected way, something more original than rocket fire vs. car bombs? Emigration Before virtually every American presidential election, I.ve heard people say, .If so and so wins, I.m leaving the country.. But they never do. The only time my friends eve remigrated was during the Viet Nam war, a time when the hive mind was undertaking the wholesale slaughter of a generation. But most of the time, for most of us, things aren.t bad enough to make emigration seem reasonable. If the election is stolen again in Fall, 2004, the answer could be armed revolution, not emigration. If the Bush faction tries to retain power, a significant number of people may feel compelled to go to D.C. and fight in the streets until the tyrant is deposed. However long it takes, however dearly it costs. Would it be worth it? Hopefully he'll lose the election by too great a margin to fudge. But for that to happen, we have to vote. The popular vote margin matters, if not in the electoral college, then in the hearts and minds of our oppressed populace. If the margin were big enough, the house of cards could collapse. SNIP --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Gilmore VS Ashcroft opens today
http://www.papersplease.org/gilmore/ In this corner we have John Gilmore. He's a 49 year-old philanthropist who lives in San Francisco, California. Through a lot of hard work (and a little luck), John made his fortune as a programmer and entrepreneur in the software industry. Whereas most people in his position would have moved to a tropical island and lived a life of luxury, John chose to use his fortune to protect and defend the US Constitution. He's challenging the unconstitutionally evil stench of the Asscruftinator! Who will win? Place your bets, place your bets, the courtroom showdown begins today: http://www.boingboing.net/2004/08/16/john_gilmore_vs_ashc.html Ding! --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Gilmore VS Ashcroft opens today
http://www.papersplease.org/gilmore/ In this corner we have John Gilmore. He's a 49 year-old philanthropist who lives in San Francisco, California. Through a lot of hard work (and a little luck), John made his fortune as a programmer and entrepreneur in the software industry. Whereas most people in his position would have moved to a tropical island and lived a life of luxury, John chose to use his fortune to protect and defend the US Constitution. He's challenging the unconstitutionally evil stench of the Asscruftinator! Who will win? Place your bets, place your bets, the courtroom showdown begins today: http://www.boingboing.net/2004/08/16/john_gilmore_vs_ashc.html Ding! --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Re: Forensics on PDAs, notes from the field
On Fri, 13 Aug 2004, Morlock Elloi wrote: The purpose would be that they do not figure out that you are using some security program, so they don't suspect that noise in the file or look for stego, right? The last time I checked the total number of PDA programs ever offered to public in some way was around 10,000 (5,000 ? 100,000 ? Same thing.) That can be trivially checked for. Any custom-compiled executable will stand out as a sore thumb. How? Not if you get something like a Sharp Zaurus and compile your own environment. Hey, I want to get as much performance out of this shitty little ARM chip as I can. You will suffer considerably less bodily damage inducing you to spit the passphrase than to produce the source and the complier. What makes you think they'll have enough of a clue as to how to read the files off your PDA without booting it in the first place? 99% of these dorks use very expensive automated hardware tools that do nothing more than dd your data to their device, then run a scanner on it which looks for well known jpg's of kiddie porn. If you're suspected of something really big, or you're middle eastern, then you need to worry about PDA forensics. Otherwise, you're just another geek with a case of megalomania thinking you're important enough for the FedZ to give a shit about you. Just use the fucking PGP. It's good for your genitals. And PGP won't stand out because ? --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Re: Forensics on PDAs, notes from the field
On Fri, 13 Aug 2004, Morlock Elloi wrote: The purpose would be that they do not figure out that you are using some security program, so they don't suspect that noise in the file or look for stego, right? The last time I checked the total number of PDA programs ever offered to public in some way was around 10,000 (5,000 ? 100,000 ? Same thing.) That can be trivially checked for. Any custom-compiled executable will stand out as a sore thumb. How? Not if you get something like a Sharp Zaurus and compile your own environment. Hey, I want to get as much performance out of this shitty little ARM chip as I can. You will suffer considerably less bodily damage inducing you to spit the passphrase than to produce the source and the complier. What makes you think they'll have enough of a clue as to how to read the files off your PDA without booting it in the first place? 99% of these dorks use very expensive automated hardware tools that do nothing more than dd your data to their device, then run a scanner on it which looks for well known jpg's of kiddie porn. If you're suspected of something really big, or you're middle eastern, then you need to worry about PDA forensics. Otherwise, you're just another geek with a case of megalomania thinking you're important enough for the FedZ to give a shit about you. Just use the fucking PGP. It's good for your genitals. And PGP won't stand out because ? --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Re: Forensics on PDAs, notes from the field
Right, in which case GPG (or any other decent crypto system) is just fine, or you wouldn't be looking for stego'ing it inside of binaries in the first place. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Fri, 13 Aug 2004, Thomas Shaddack wrote: In the world of industrial espionage and divorce lawyers, the FedZ aren't the only threat model.
Re: A Billion for Bin Laden
Yeah, about as brilliant as a turd. Didn't they recently call Al-Qaeda's network a hydra? correct me if I don't recall my Ancient Greek myths, but when you cut off one head on the hydra, two more grow back, so are we to assume that future heads that grow back will carry such bounties? A billion here, a billion there, and pretty soon you're talking real money. I guess they do realize that these guys are idologists and the allmighty dollar is anathema to them, so they have to raise the bounty in order to get someone to betray him... Never discount greed, no matter how ideological someone may be, at some ridiculous sum, someone somewhere will rat him out... perhaps just before the elections. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Wed, 11 Aug 2004, Major Variola (ret) wrote: This is brilliant, worthy of being called channelling Tim M. As it relies entirely on free association and the rational marketplace. Nevermind that the reward is stolen from the sheeple. What the DC future-corpses don't grok is that the Sheik's network is not financially or career motivated, unlike themselves. And xianity (or even amerikan patriotism which sometimes substitutes) is too neutered to counter it.
Re: A Billion for Bin Laden
Yeah, about as brilliant as a turd. Didn't they recently call Al-Qaeda's network a hydra? correct me if I don't recall my Ancient Greek myths, but when you cut off one head on the hydra, two more grow back, so are we to assume that future heads that grow back will carry such bounties? A billion here, a billion there, and pretty soon you're talking real money. I guess they do realize that these guys are idologists and the allmighty dollar is anathema to them, so they have to raise the bounty in order to get someone to betray him... Never discount greed, no matter how ideological someone may be, at some ridiculous sum, someone somewhere will rat him out... perhaps just before the elections. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Wed, 11 Aug 2004, Major Variola (ret) wrote: This is brilliant, worthy of being called channelling Tim M. As it relies entirely on free association and the rational marketplace. Nevermind that the reward is stolen from the sheeple. What the DC future-corpses don't grok is that the Sheik's network is not financially or career motivated, unlike themselves. And xianity (or even amerikan patriotism which sometimes substitutes) is too neutered to counter it.
2+2=5 and mention of cryptome
Original URL: http://www.theregister.co.uk/2004/08/11/al_q_geek_us_overthrow_plot/ Al-Qaeda computer geek nearly overthrew US By Thomas C Greene (thomas.greene at theregister.co.uk) Published Wednesday 11th August 2004 16:45 GMT Update A White House with a clear determination to draw paranoid conclusions from ambiguous data has finally gone over the top. It has now implied that the al-Qaeda computer geek arrested last month in Pakistan was involved in a plot to destabilize the USA around election time. Two and two is five As we reported here (http://www.theregister.co.uk/2004/08/03/us_terror_alert_political_football) and here (http://www.theregister.co.uk/2004/08/02/al_qaeda_cyber_terror_panic), so-called al-Qaeda computer expert Muhammad Naeem Noor Khan, a Pakistani, was arrested on 13 July in possession of detailed but rather old surveillance documents related to major financial institutions in New York, Newark, and Washington. Since that time, other intelligence has led the US security apparatus to imagine that a plot to attack the USA might be in the works. (No doubt there are scores of plots in the works, but we digress.) Therefore, last week, the ever-paranoid Bush Administration decided that Khan's building surveillance documents, and the hints of imminent danger, had to be connected. Indeed, if al Qaeda is to strike at all, it is most likely to strike the targets mentioned in Khan's documents, as opposed to thousands of others, the Bushies reasoned. New York, Newark and Washington were immediately put on high alert, at great expense, and to the inconvenience of millions of residents. SNIP --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Re: maybe he would cash himself in? (Re: A Billion for Bin Laden)
Nah, if Bush already had him in a hole somewhere to produce him just in time for the elections, he'd collect the billion for himself as his personal reward. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. - On Thu, 12 Aug 2004, Dave Howe wrote: of course someone *really* cynical might think they already had him, but needed to spring a billion towards shrub's reelection campaign
stealth tempest wallpaper
http://www.newscientist.com/news/print.jsp?id=ns6240 or http://www.newscientist.com/news/news.jsp?id=ns6240lpos=home3 Stealth wallpaper keeps company secrets safe 10:00 08 August 04 Special Report from New Scientist Print Edition. Subscribe and get 4 free issues. A type of wallpaper that prevents Wi-Fi signals escaping from a building without blocking mobile phone signals has been developed by a British defence contractor. The technology is designed to stop outsiders gaining access to a secure network by using Wi-Fi networks casually set up by workers at the office. SNIP --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -