John's an anarchist now! LMAO!
This is a perfect example of media bias and manufacture of enemies.
Collecting public material at one place *is* anarchism today.
You may laugh but 74% (or whatever is the % who believes Saddam personally
piloted all 9/11 planes) of americans will believe it.
The person in question was just somebody with a weakness for
industrial
architecture.
The no cameras signs were very popular in east block countries. It
was forbidden to take pictures of bridges, government buildings,
airports, railway stations, industrial installations, water dams etc.
The
Does anyone *know* (first or second hand, I can speculate myself) which laptops, if
any, can safely go to zero air pressure (dropping from 1 atm to 0 in, say, 1 minute.)
Does anyone *know* (first or second hand, I can speculate myself) which laptops, if
any, can safely go to zero air pressure (dropping from 1 atm to 0 in, say, 1 minute.)
On August 6, 2002, Lucky Green wrote a reply to Anonymous (whom I will
now come clean and admit was none other than me), about the suggestion
that TCPA (now called TCG) could incorporate anonymous cryptographic
credentials to protect users' privacy, rather than the cumbersome
privacy CA mechanism
On August 6, 2002, Lucky Green wrote a reply to Anonymous (whom I will
now come clean and admit was none other than me), about the suggestion
that TCPA (now called TCG) could incorporate anonymous cryptographic
credentials to protect users' privacy, rather than the cumbersome
privacy CA mechanism
I know there are readers here who are good at optimizing code. Here are
my attempts to make simple and short versions of base64 encode/decode
in C. I'd like to hear suggestions on how to simplify them even more.
Base64 encoding is a way of turning arbitrary binary data into printable
I know there are readers here who are good at optimizing code. Here are
my attempts to make simple and short versions of base64 encode/decode
in C. I'd like to hear suggestions on how to simplify them even more.
Base64 encoding is a way of turning arbitrary binary data into printable
On Fri, 2004-04-30 at 14:12, An Metet wrote:
What technologies currently exist for receiving a/psuedononymous message?
With Mixmaster, sending mail, posting news, and even blog posting are
possible, However, receiving replies securely or, better, holding a private
conversation is difficult
What technologies currently exist for receiving a/psuedononymous message?
With Mixmaster, sending mail, posting news, and even blog posting are
possible, However, receiving replies securely or, better, holding a private
conversation is difficult or impossible. Best bet seems is to encrypt and
spam
On Fri, 2004-04-30 at 14:12, An Metet wrote:
What technologies currently exist for receiving a/psuedononymous message?
With Mixmaster, sending mail, posting news, and even blog posting are
possible, However, receiving replies securely or, better, holding a private
conversation is difficult
Eric Cordian quotes:
FBI Shill: Are we gonna exterminate the rat?
Hale: I'm going to fight within the law and, but, ... if you wish to,
ah, do anything, yourself, you can.
You're such a liar. I don't know why I even bother to respond to you.
You left off the next few lines:
So
Eric Cordian quotes:
FBI Shill: Are we gonna exterminate the rat?
Hale: I'm going to fight within the law and, but, ... if you wish to,
ah, do anything, yourself, you can.
You're such a liar. I don't know why I even bother to respond to you.
You left off the next few lines:
So
Steve Furlong writes:
Does anyone know of a reference implementation for Stefan Brands's
digital certificate scheme? Alternatively, does anyone have an email
address for Brands so I can ask him myself? (I haven't gotten anything
back from ZKS's contact us address. But I don't know if Brands is
Steve Furlong writes:
Does anyone know of a reference implementation for Stefan Brands's
digital certificate scheme? Alternatively, does anyone have an email
address for Brands so I can ask him myself? (I haven't gotten anything
back from ZKS's contact us address. But I don't know if Brands is
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Here is the blind DSA signature based on MacKenzie and Reiter,
http://www.ece.cmu.edu/~reiter/papers/2001/CRYPTO.pdf, in graphical form.
Recall that a DSA public key is p, q, g, y; private key x; signature on
hash h is:
Choose k q
r = g^k mod p mod
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Here is the blind DSA signature based on MacKenzie and Reiter,
http://www.ece.cmu.edu/~reiter/papers/2001/CRYPTO.pdf, in graphical form.
Recall that a DSA public key is p, q, g, y; private key x; signature on
hash h is:
Choose k q
r = g^k mod p mod
Lew Rockwell had written:
The Rothbardian approach to a pro-freedom strategy comes down to the
following four affirmations: 1) the victory of liberty is the highest
political end; 2) the proper groundwork for this goal is a moral passion
for justice; 3) the end should be pursued by the
Lew Rockwell had written:
The Rothbardian approach to a pro-freedom strategy comes down to the
following four affirmations: 1) the victory of liberty is the highest
political end; 2) the proper groundwork for this goal is a moral passion
for justice; 3) the end should be pursued by the
Thinking about something, I found an interesting problem. It is possible
to set up a reputation-based system with nyms, where every nym is an
identity with attached reputation.
Is it possible to have a system where nyms can share reputation without
divulging the links between them? That
Thinking about something, I found an interesting problem. It is possible
to set up a reputation-based system with nyms, where every nym is an
identity with attached reputation.
Is it possible to have a system where nyms can share reputation without
divulging the links between them? That
Really, what's the difference between scanning the message in order to,
say, render HTML tags it may contain, and scanning it in order to
generate targetted advertising based on keywords it contains?
That's irrelevant. These arguments that Gmail is just like other services
are nothing but red
Major Variola writes:
Language is how you manipulate people from a distance. Much
more convenient than hitting them.
Crypto *can* keep bits free. And so maybe language.
But Men with Guns control physical reality, which limits what
those bits can do. Read the archives on the problems
Major Variola writes:
I don't know about your anecdote, but Mr. May's original point
was that the law *requires* companies to forget. Which is
of course an illegitimate intrusion of the state into private affairs.
And the responsibles need killing.
No, they don't.
There are two
Regarding the question of whether debt must be merely 'forgiven'
or actually 'forgotten', see http://www.epic.org/privacy/fcra for
information on the Fair Credit Reporting Act of 1970:
The FCRA limits the length of time some information can appear in a
consumer report. For instance, bankruptcies
Tyler Durden writes:
Ironically, some of the features of Gmail bear resemblance to BlackNet.
In particular, its claimed policy of retaining email indefinitely,
even after the recipient has stopped using the account, is reminiscent
of BlackNet's function as a data haven, as well as other
Regarding the question of whether debt must be merely 'forgiven'
or actually 'forgotten', see http://www.epic.org/privacy/fcra for
information on the Fair Credit Reporting Act of 1970:
The FCRA limits the length of time some information can appear in a
consumer report. For instance, bankruptcies
The privacy news has been full of fuss and bluster lately about
Google's proposed Gmail service. The latest complaint comes at
http://www.privacyrights.org/ar/GmailLetter.htm with an open letter from
dozens of privacy groups to the Google founders asking them to revamp
the service.
Cypherpunks
The privacy news has been full of fuss and bluster lately about
Google's proposed Gmail service. The latest complaint comes at
http://www.privacyrights.org/ar/GmailLetter.htm with an open letter from
dozens of privacy groups to the Google founders asking them to revamp
the service.
Cypherpunks
Anonymizer is working with the FBI on international blackmail cases - no
subpoena required!
From http://www.theregister.co.uk/content/55/36485.html :
To download the online picture, he used the Anonymizer.com service,
believing the companys privacy policy would protect him. Not so. Dutch
Anonymizer is working with the FBI on international blackmail cases - no
subpoena required!
From http://www.theregister.co.uk/content/55/36485.html :
To download the online picture, he used the Anonymizer.com service,
believing the companys privacy policy would protect him. Not so. Dutch
Robert Hettinga forwards:
By concentrating sensing and data storage on the body, a wearable
computer allows its user to ``control his own butt.'' The user
determines when and where his gas is released and how much to trust
the noses around him. For example, when a wearable user
enters work
Eugen* Leitl a href=http://leitl.org;leitl/a writes:
The passphrase locking idear won't fly, but a biometrics-lockable
wallet could. Isn't part of Pd envelope goal establishing a tamper-proof
compartment? We know Pd is evil, but once hardware support is everywhere,
one can as well use it for
Invisiblog is a service which uses anonymous remailers and gpg-signed
messages to allow bloggers to make their contributions anonymously.
The following essay is taken from the Unlimited Freedom blog:
http://invisiblog.com/1c801df4aee49232/article/6241d2ffded8876b97cd140c6e48694f .
It discusses
The devil is in details.
Given small numbers and absence of any other grouping factor there needs to be an
obvious place for ZPs to refer to. Any obvious place that becomes even remotely
attractive to ZPs will be immediately raided. Because ZPs have potential to be
actually dangerous to the
I have noticed this lately:
When someone sends mail to [EMAIL PROTECTED] , shortly thereafter a query comes from
the ISP that runs the outgoing SMTP and loads http://www.thisdomain.com.
The query does not load any images, just the base html page. It comes from IP usually
in the same cloud as
The devil is in details.
Given small numbers and absence of any other grouping factor there needs to be an
obvious place for ZPs to refer to. Any obvious place that becomes even remotely
attractive to ZPs will be immediately raided. Because ZPs have potential to be
actually dangerous to the
http://recall.archive.org/?query=tim+maysearch=goafterMonth=1afterYear=1996beforeMonth=TodaybeforeYear=%A0
Tim May:
If cops ask local neighborhood members to report any suspicious
activity, the folks know that any benefits they gain from acting as
informants tend to be a lot smaller than the danger of being beat up or
even killed by the Mafia.
When the cost of acting as an informant is zero,
It would be easy for me to say that all of the operators connected with JPE
Maybe this is the place to post their names, for posterity.
NOTICE: This message may not have been sent by the Sender Name
above. Always use cryptographic digital signatures to verify
the identity of the sender of any usenet post or e-mail.
Cardenas wrote on February 18, 2003 at 15:02:
You're a fucking racist.
I didn't see anything in his post that
On Sat, 21 Dec 2002 21:22:17 -0800, you wrote:
On Saturday, December 21, 2002, at 10:07 AM, Eugen Leitl wrote:
http://sciencenow.sciencemag.org/cgi/content/full/2002/1217/1
Policing Bioterror Research
One of science's hottest fields is now becoming one of its most heavily
regulated, too.
On Sat, 21 Dec 2002 21:22:17 -0800, you wrote:
On Saturday, December 21, 2002, at 10:07 AM, Eugen Leitl wrote:
http://sciencenow.sciencemag.org/cgi/content/full/2002/1217/1
Policing Bioterror Research
One of science's hottest fields is now becoming one of its most heavily
regulated, too.
do not reply!
What are the tax implications of a US resident green card holder, with substantial
assets both in his original nation and in the US, of becoming a US citizen?
What are the tax implications of a US resident green card holder, with substantial
assets both in his original nation and in the US, of becoming a US citizen?
Maybe the subject line should actually be Die, Spammer, Die.
Don't go to JobsOnline.com -- it's a scam. They inundate you with
pop up ads while you're there, the kind that just don't quit, like
the porn sites, and once you've registered (which you have to do to
look at their job ads), you
Maybe the subject line should actually be Die, Spammer, Die.
Don't go to JobsOnline.com -- it's a scam. They inundate you with
pop up ads while you're there, the kind that just don't quit, like
the porn sites, and once you've registered (which you have to do to
look at their job ads), you start
Maybe the subject line should actually be Die, Spammer, Die.
Don't go to JobsOnline.com -- it's a scam. They inundate you with
pop up ads while you're there, the kind that just don't quit, like
the porn sites, and once you've registered (which you have to do to
look at their job ads), you
Maybe the subject line should actually be Die, Spammer, Die.
Don't go to JobsOnline.com -- it's a scam. They inundate you with
pop up ads while you're there, the kind that just don't quit, like
the porn sites, and once you've registered (which you have to do to
look at their job ads), you start
I would like to know more about who the target audience is and how this is
being advertised.
Like I mentioned, I'll know more by the end of the week. Advertising will
be through the standard Berkeley activist channels :-))
Target audience is anyone responding to ads like:
Free internet /
The Anonymous Reformatter would like to thank everyone who took the time
to comment on his efforts.
The Anonymous Reformatter is going on hiatus. Any further [Reformatted]
postings are not the Real Thing(tm).
Major Variola writes:
Caveat: its not State Censorship unless the govt requires these new
movie ratings. If (and only if) a theatre is free to show rated, or
unrated movies as it sees fit, then it is merely another PC fringe
making their mark, pissing on the movie screen.
If the rating is
Now, imagine the following: terrorists become sensible and THREE of them engage in the
shopping spree: One buys gas canisters, one buys pellets and one buys teddy bears.
Yes, there is a conspiracy but how does the government protect us from it ?
Obviously, by matching the purchase records with
DEPARTMENT OF JUSTICE
Provision of Computer Training to Certain Alien Trainees,
Additional Categories of Provisional Advance Consent
AGENCY: Department of Justice.
ACTION: Notice of advance consent for providing computer training to
certain alien trainees.
[EMAIL PROTECTED] (Major Variola ret) writes:
[So empty bottles and empty gascans are 'unassembled Molotov
cocktails? I bet even Sandfort has a few of these unassembled weapons
of mass destruction concealed in his recycled bin. Does Nokia sell
remote detonators? If you know how to solder,
[EMAIL PROTECTED] writes:
List relevence: 1st amend, state licensing of the press, inconsistant
application of laws
http://latimes.com/news/nationworld/wire/sns-ap-brf-songwriters-lawsuit0130jan30.story?coll=la%2Dap%2Dtopnews%2Dheadlines
FCC Faces First Amendment Charge By Associated
ISLAMIC militants holding an American journalist captive have
issued photographs of their manacled hostage with a gun to his
head along with a series of ransom demands in an e-mail
attachment.
http://www.thetimes.co.uk/article/0,,2002040002-2002045394,00.html
We have to seize your wife's crypto
http://www.upi.com/view.cfm?StoryID=24012002-045045-5924r
Patients trigger subway radiation detector
Published 1/28/2002 5:49 PM
WASHINGTON, Jan. 24 (UPI) -- Patients who receive routine medical procedures using
radioisotopes could
trip a new detection system in the Washington subway system
For a rough translation of the original article see
http://w3.systranlinks.com/systran/cgi?partner=SystranSoft-
enf=2lp=de_enurl=http://www.wort.lu%2Farticles%2Fbit_byte_1954891.ht
m
q/depesche 02.1.27/1
Krypto: Attacke auf AES
Ein Mathematiker aus Luxemburg hat den DES mit einer neuen
[EMAIL PROTECTED] writes:
-BEGIN PGP SIGNED MESSAGE-
John wrote:
Tis a vast apparatus operating well beyond the cover story of the
famous 13. How far it extends into the private sector is a most
interesting question, sometimes examined here but not as much as it
deserves,
Deep,
Two stories here. First, a judge rules you can't ban 'violent'
videogames, and orders city to pay $$ to video arcades. Second,
a Brit is charged for running a site offering training to members
of his religion.
We await the Al Qaeda Video Sim/Training Series...
Remailer operators should have permanent encrypted links to one another,
with constant (or at least message-uncorrelated) traffic volumes.
They can still use latency, message pools, and other features, of course.
But when it comes time to deliver messages to the next remailer in the
list,
Havenco's talked for a while about metastasizing,
putting servers in a bunch of places for reliable fast performance
for non-critical data and mainly keeping the critical database parts
There are persistent rumors that Havenco does not really host anything on the
platform, all bits are on dry
Deadly Gas Pumped Into Senate Office Building to Kill Remaining Criminals
May's handlers are panicking.
Anonymous whined:
It's nice that there's a forum available to you
where you are free to assert and assume whatever
you wish, without the inconvenience of any
substantiation.
And it's pretty fucking obvious that you have never been
in any situation dealing with the police
Nomen wrote:
According to collected data, the average speed in 30 mph zones ranged
from 35.5 to 46 mph. In the 35 mph zones, the average speed was about 43
mph. The highest speed, clocked by Colonial Estates East Citizens on
Patrol group, was 62 mph in a 30 mph zone.
Too bad this wasn't
Yeah, but will you divest?
Frissy whined:
As I said to some one the other day, If this is war no smoking regulations.
SWmoke 'em if nyou've got 'em.
DCF.
Fuck that noise. If this is war it means I get to blow your stupid
ass away if you blow smoke in my direction.
May belched:
I wonder if the GenXers
Faustine wrote:
So why is it that the vast majority of the technical and insightful
contributions here seem to come from people who aren't averse to
using a reasonable simulacrum of a real name and address?
I find the content from remailers is far higher than average for the
list.
I made
It's also rather interesting that Aimee is objecting to
people cowering behind remailers. On the cypherpunk list?
On the contrary, we should all be using remailers. Someone
seriously does need to start a node which only accepts posts
from remailers. I'm beginning to strongly suspect Aimee as
Tim May graciously wrote:
The physics cited by Anonymous is hand-waving.
Absolutely. It's my weak understanding of a beginning physics book.
Thank you for your reply.
If a block of a metal is hollowed out and a small port is drilled to
see in, the radiance of the cavity is substantially
Black Unicorn, esquire, wrote:
(Lesson for other posters- to get legal research for free out of
Uni, just insult him a lot)...
...Seriously interested researchers will spend time at the library,
look up statutes and learn to Shepardize. I happened to be at the
law library for an unrelated
[From The Economist magazine]
New privacy services will soon allow consumers to buy goods anonymously onlineÑforcing
web-based retailers to change the way they do business
OVER the past couple of months, a Dallas-based company called Digital Convergence has
given away more than 1m bar-code
by Joel Enos
January 08, 2001
Ê
At last, a book about secret codes that isn't boring or too technical!
As any kid from any era knows, the pinnacle of privacy is the secret code (from
decoder rings to James Bond to Harriet the Spy and beyond). So why is it that when
most authors write about
By JAMES RISEN
ASHINGTON, Jan. 4 Ñ President Clinton has issued an order reorganizing the
government's counterintelligence efforts, creating a new czar with a broad mandate to
identify potential security threats and vulnerabilities, administration officials said
today.
The directive,
Published Wednesday, Jan. 3, 2001, in the San Jose Mercury News
BY KEVIN G. HALL
Mercury News Rio de Janeiro Bureau
RIO DE JANEIRO, Brazil -- At Agencia Roberta, a call-girl service in this tourist
haven known for sun and sin, business is booming, thanks in large part to the Internet.
http://www.kentuckyconnect.com/heraldleader/news/111900/yourmonydocs/19Tech-TrackingDevices.htm
Published Sunday, November 19, 2000, in the Herald-Leader
Tracking devices will be able to follow your every move
By Anick Jesdanun
ASSOCIATED PRESS
NEW YORK Imagine walking by a Starbucks in an
http://www.anu.edu.au/people/Roger.Clarke/II/PKIMisFit.html
Some worry that information could get into the wrong hands
By Nicole Harris
THE WALL STREET JOURNAL
Ê Ê Nov. 10 Ñ ÊSprint Corp.Õs wireless division said it will put
global-positioning-system chips in its cell phones to locate its users, stirring up
hot-button privacy concerns that
By CARL S. KAPLAN
In an opinion sure to heighten the tension between some parents and school systems
over the Internet's role in publicly financed education, a New Hampshire judge has
decided that a parent is entitled to see a list of the Internet sites or addresses
visited by computer users
http://www.independent.co.uk/news/World/Middle_East/2000-11/ruthless061100.shtml
An influential think-tank advises Palestinian Authority to ruthlessly repress militant
elements without regard for basic human rights
By Robert Fisk in Gaza
6 November 2000
Palestinian leaders have been
By: Lucy Sherriff
http://www.theregister.co.uk/content/6/14451.html
Posted: 03/11/2000 at 11:23 GMT
Vinton Cerf, one of the founding fathers of the Internet, has attacked the RIP bill as
a dangerous new piece of legislation.
Speaking at the Compsec conference in London yesterday he
By Michael J. Sniffen
Associated Press Writer
Friday, Nov. 3, 2000; 5:56 p.m. EST
WASHINGTON ÐÐ A 20-year veteran FBI agent went to court Friday seeking the right to
report to President Clinton and key members of Congress what he considers serious and
criminal misconduct by federal workers
http://digitalmass.boston.com/news/daily/11/01/minesweeper.html
By Gareth Cook, Boston Globe Staff, 11/1/2000
The key to solving one of the most vexing and profound problems of modern mathematics
could lie in a most unusual place: Minesweeper, a simple computer game that rivals
solitaire as
[EMAIL PROTECTED] wrote:
I hope whenever you Americans see on the news what is going on in
Afghanistan you remember that your government paid for their weapons and
their training, that those guys were educated in US-run schools and
guerilla warfare training camps - all because Reagan and Bush
Can anyone reccomend any email lists for discussing surveillance technology?
tia
By LANCE GAY
Scripps Howard News Service
September 07, 2000
WASHINGTON - At least four federal agencies are sharing taxpayer data they are
gathering from Internet visitors to government Web sites with trade organizations,
retailers or other outside parties, congressional investigators say.
In
Rob Kramer and Ian Clarke's new venture, Uprizer, wants to be the Red Hat of
peer-to-peer networks. What's behind their wall of secrecy?
- - - - - - - - - - - -
By Damien Cave
Aug. 28, 2000 | About a year ago, Rob Kramer read about Freenet and wanted to get
involved. The recording industry
89 matches
Mail list logo