Read a story about some college student whose plasma TV
was emitting quite a lot of 121.5 MHz. He got a nice visit
from SR Sheriffs types telling him to shut his TV off.
Or else. 121.5 is a satellite-received distress freq. Toshiba will
send him a new TV for free.
Chatting with an Aussie from
Various ways to stego pharmaceuticals:
http://www.usdoj.gov/dea/programs/forensicsci/microgram/bulletins_index.html
At 04:01 PM 10/16/04 -0700, James A. Donald wrote:
Tim McVeigh did not target innocents, nor was he a suicide
bomber.
Neither did M. Atta et al. target innocents, he targeted those who
elected the Caesars. And they were not pursuing suicide (a
Moslem sin), since they are enjoying a comfy
At 07:42 PM 10/16/04 -0400, Adam wrote:
First of all, there were 19 children killed in the OKC bombing. Were
these children guilty of some crime worthy of being killed by a truck
bomb?
They were being used as human shields by the fedcriminals in the
building. They were collateral damage, in the
At 12:14 PM 10/15/04 -0700, James A. Donald wrote:
--
My profile is radically different from all those who killed
nearly 3,000 of my countrymen on September 11, 2001. My
holy book of choice is the Bible. My race is Caucasian. I
am a loyal, taxpaying, patriotic, evil-hating,
At 10:57 PM 10/8/04 -0700, Bill Stewart wrote:
At 04:35 PM 10/7/2004, Thomas Shaddack wrote:
A defense is a metal board in a wallet, close to the RFID chip's
antenna.
It is readable when the licence is taken out of the wallet. When
inside,
the antenna is quite effectively shielded.
Tinfoil
At 05:06 PM 10/6/04 +0100, Dave Howe wrote:
Major Variola (ret) wrote:
There is a bill in this year's Ca election to require DNA sampling of
anyone arrested. Not convicted of a felony, but arrested.
[as in arrested for protesting]
Doesn't surprise me - the UK police collected a huge bunch
At 10:49 AM 10/5/04 -0400, R. A. Hettinga wrote:
Now it looks as if much of the fingerprinting may not have been legal
in
the first place. According to lawyers at the New York Civil Liberties
Union, the city may have violated state law by routinely fingerprinting
arrested protesters.
There is a
At 08:30 PM 10/3/04 +, Justin wrote:
On 2004-10-03T13:32:36-0500, J.A. Terranson wrote:
The US *is* the Fourth Reich.
Personally, I will take what comes.
You will make fine soap.
At 11:37 AM 10/3/04 -0400, R. A. Hettinga wrote:
Unlike the TSA's recently announced program to use computer databases
to
scan for suspicious individuals whose names occur on passenger lists,
SPOT
is instead based squarely on the human element: the ability of TSA
employees to identify suspicious
t 11:22 PM 10/1/04 -0700, Bill Stewart wrote:
Questions were going through my mind. Would it hurt? What are the
risks?
What if I want to get it out?
I ordered another drink.
In the US its generally illegal to tattoo someone who is drunk.
Comfortably numb
In many ways this fellow is.
At 05:06 PM 9/30/04 -0400, Tyler Durden wrote:
I post this not as a refernce per se, but to ask the question:
Exactly Why Does the Government Not Want to Reveal Their ID Rules?
For instance, is it indeed possible that revealing this rule would pose
an
additional security risk? If such a rule
You don't even need the Hubble-scopes pointed down that the
NRO/NIMA/whatever the fuck they're called today
has. Check out globexplorer.com; my patio is more than
several pixels and a friend of mine saw his Bronco.
You could probably make out the glint in JY's eyes.
OTOH its really easy to
Personal aside. I've started working for a medical device company.
This is not so far from security programming, as checking your
inputs, robustness, and being able to justify time spent inspecting
and testing are all common to both domains.
But today I learned that a device that keeps you heart
At 10:00 AM 9/27/04 -0400, Tyler Durden wrote:
Don't forget, the World Trade Center management was on the Intercom
trying
to tell everyone to Remain inside the Building...It's safest Inside
the
Building.
Fuck. Here on Wall Street I'm a dead man.
If you stay in NYC or DC, you are an individual
Saw general Abizaid on the news. He was so obviously
either experiencing pharmaceutically-induced nystagmus or
reading from a teleprompter it wasn't funny. Methinks
he's a robot, or taking too many go-pills. Lets hear
2K dead by the elections. We'll settle for less if they're
in DC.
At 05:53 PM 9/27/04 -0700, Bill Stewart wrote:
and preventing you from flying means you can't carry out your
Clever New Hijacking Plan, such as converting that small guitar
into a set of six piano-wire garrotes or mixing that
Organophosphates will still make it onto a plane, have been used
in
t 11:38 PM 9/20/04 -0400, R. A. Hettinga wrote:
At 8:11 PM -0700 9/20/04, Major Variola (ret) wrote:
2. UBL's mom was a low-caste yemeni, dig?
Actually, UBL's *dad* was a low-caste Yemeni, too.
And your point is?
That you can be wealthy and still find something of the underdog
in you, which you
At 04:57 PM 9/19/04 -0700, James A. Donald wrote:
But the Saudi Arabian elite, of among which Bin Laden was born with a
silver spoon in his mouth, are not getting screwed over.
1. you don't get religion
2. UBL's mom was a low-caste yemeni, dig?
At 05:07 PM 9/19/04 -0700, James A. Donald wrote:
I don't recall the American revolutionaries herding children
before them to clear minefields, nor surrounding themselves
with children as human shields.
The yank minutemen were not above taking children as soldiers,
any more than Dan'l Boone was
At 11:42 AM 9/20/04 -0500, J.A. Terranson wrote:
On Sun, 19 Sep 2004, Major Variola (ret) wrote:
(Remember the
Hiroshima bomb was *not* tested, so sure were the scientists.
Trinity
My understanding (and I am *positive* someone will correct me if I'm
wrong) was that there was a shortage of both
At 08:46 PM 9/19/04 -0700, John Young wrote:
Today, even the US uses children in war, 17 being the minimum
age to enlist. Others sneak in by lying about their age, some as
young as 14. Recruiters look the other way when the kids
and their parents lie. Been there, done that. Enlisted in the
army at
September 20, 2004
ATM Stolen in Third Such Theft in a Month
An automated teller machine was stolen from a gas station early Sunday,
the
third such theft in Orange County since mid-August, police said.
The machine was stolen from an Arco just before 4 a.m., using the same
method as in the
At 09:09 AM 9/17/04 +0200, Thomas Shaddack wrote:
On Thu, 16 Sep 2004, Major Variola (ret) wrote:
At 02:17 PM 9/16/04 -0700, Joe Touch wrote:
Except that certs need to be signed by authorities that are trusted.
Name one.
You don't have to sign the certs. Use self-signed ones, then publish
At 06:20 AM 9/17/04 +, Justin wrote:
On 2004-09-16T20:11:56-0700, Major Variola (ret) wrote:
At 02:17 PM 9/16/04 -0700, Joe Touch wrote:
Except that certs need to be signed by authorities that are trusted.
Name one.
Oh, come on. Nothing can be absolutely trusted. How much security
At 12:15 PM 9/19/04 -0400, Tyler Durden wrote:
My running, personal theory is that Muslim fundamentalism (and in
general,
most fundamentalisms) get going when the locals gain a persistent sense
that
they're gettin' screwed over,
See Crusades, which aint over til the tall buildings fall.
and that
http://rdu.news14.com/content/headlines/?ArID=55256SecID=2
Soviets:Chechnya::US:?
Isn't it *cheaper* (as well as more accurate) to have
preprinted ballots, optically scanned, then to have
an embedded computer print out a paper trail?
Ie, don't the benefits of volume printing beat the cheapest
printing tech?
Besides the other advantages of being self-verifiable,
more accurate,
At 10:28 PM 9/16/04 +0200, Hadmut Danisch wrote:
Because PKC works for this AliceBob communication scheme. If you
connect to a web server, then what you want to know, or what
authentication means is: Are you really www.somedomain.com?
That's the AliceBob model. SSL is good for that.
What makes
At 02:17 PM 9/16/04 -0700, Joe Touch wrote:
Except that certs need to be signed by authorities that are trusted.
Name one.
http://news.bbc.co.uk/2/hi/technology/3661678.stm
Image flaw exposes Windows PCs
Computer users could be open to attack
from malicious hackers because of the
way that Windows displays some
images.
A buffer overrun of course. But this is even better than the PNG
vulnerability reported earlier
At 05:41 AM 9/15/04 -0400, R. A. Hettinga wrote:
NSF Award Abstract - #0442154
Yeah, this is Science (snicker)...
Surveillance, Analysis and Modeling of Chatroom Communities
Abstract
The aim of this proposal is to develop new techniques for information
gathering, analysis and modeling of
At 09:45 AM 9/15/04 -0400, Tyler Durden wrote:
Hum. Seems the Chinese government is pretty effective at
self-preservation.
Does this contradict the widely-held Cypherpunk belief in the
inevitability
of deterioration of the state?
We have always held that a sufficiently policed state can defeat
At 08:59 PM 9/13/04 -0500, J.A. Terranson wrote:
If a nuke goes off a few dozen meters under a mountain, is there anyone
there to see it? What is the sound of one mountain moving?
You can get dust rising off the mountain ---find the video of the Paki
tests. But not a big rising cloud.
An
t 10:10 AM 9/14/04 -0700, John Young wrote:
From: dumbshit [EMAIL PROTECTED]
Subject: effectively prevent computer radiation
especially computer radiation, which does much
harm to human body.
Yeah, it really taxes my feng-shei
The main material of FANGFUWANG is active nanometer
bamboo carton.
At 09:27 AM 9/14/04 -0400, John Kelsey wrote:
From: Major Variola (ret) [EMAIL PROTECTED]
Removing chunks with dynamite is trying rather hard for a Darwin
award.
As far as I can tell from what's reported in the new, a great deal of
North Korea's daily operation fits that category.
How about Iran
At 12:01 AM 9/12/04 -0500, J.A. Terranson wrote:
No big deal? Who are they kidding?
JAT, any large explosion will create a mushroom cloud. Its the
blast wave reflecting off the ground that lifts the thing, plus the
buoyancy of the hot gasses.
If it *were* a nuke, it would be easy to detect
Currently BGP is secured by
1. accepting BGP info only from known router IPs
2. ISPs not propogating BGP from the edge inwards
Its a serious vulnerability (as in, take down the net),
equivalent to the ability to confuse the post office
machinery that sorts postcards. All you need to
do is
At 06:23 PM 9/12/04 -0400, Tyler Durden wrote:
I had thought that one of the main tests was seismic...from what I
understood, Seismic monitors in the US can detect nu-cu-lar tests
(above or
below ground) and even guess where and the size of the blast.
Yes. Seismic sensors see some foreshock
At 06:59 AM 9/14/04 +1200, Peter Gutmann wrote:
(The nitrate was desensitised with ammonium sulfate and stored outside,
whenever anyone needed any they'd drill holes and blast off chunks with
dynamite.
AN is extremely deliquescent; perhaps the sulphate was for that?
Removing chunks with
t 06:59 PM 9/10/04 -0400, R. A. Hettinga wrote:
http://www.virginislandsdailynews.com/index.pl/article?id=7181775
Call for 'hackers' to try to access voting machines draws stern warning
The warning came after Elections officials received a faxed document
last
week stating that a $10,000 cash
At 12:50 PM 9/11/04 +0200, Nomen Nescio wrote:
So, since this is titled BrinCity, it surely means that the image
streams will be available from a web site and that we the people get
cameras in the emergency response center and the mayor's office?
Is adultery a crime in Chicago? Given the
At 08:23 AM 9/10/04 -0400, R. A. Hettinga wrote:
http://www.vnunet.com/print/1157970
Perplexing proof
E-commerce is only one mathematical breakthrough away from disaster
Robert Valpuesta, IT Week 09 Sep 2004
The fact that even experts often do not fully understand how IT systems
work was
At 07:53 AM 9/10/04 -0400, R. A. Hettinga wrote:
http://www.techcentralstation.com/090904A.html
Is it possible for one to be libertarian about policies at home and
neo-conservative about policies abroad? After all, isn't the principle
of
non-coercion incompatible with the interventionist policies
A nuke physicist talks about taking out a US city,
nonlethal weapons, and more
http://www.fas.org/rlg/index.html
http://www.fas.org/rlg/04-nonlethal.pdf
http://www.fas.org/rlg/040309-drell.htm
At 11:19 AM 9/8/04 -0400, Tyler Durden wrote:
Hum. I wonder. Do you think these secret regulations are communicated
via
secure channels? What would happen if someone decided to send their own
regulations out to all of the local airline security offices rescinding
any
private regs, particularly if
At 11:48 AM 9/8/04 -0700, Hal Finney wrote:
Seth Schoen of the EFF proposed an interesting cryptographic primitive
called a hard to verify signature in his blog at
http://vitanuova.loyalty.org/weblog/nb.cgi/view/vitanuova/2004/09/02 .
The idea is to have a signature which is fast to make but slow
At 11:57 AM 9/7/04 -0400, Sunder wrote:
The answer to that question depends on some leg work which involves
converting the source code to stegetect into hardware and seeing how
fast
that hardware runs, then multiplying by X where X is how many of the
chips
you can afford to build.
A quick perusal
At 08:57 AM 9/3/04 -0400, Tyler Durden wrote:
Well, W did say he'd do whatever is necessary.
I caught the last bit of Bush's rant. The scary
part was him talking about the resurrection of
NYC. Given how his little bubble-brain is addicted
to xianity, and his coterie has geo-political messianic
At 10:55 PM 9/1/04 -0700, Bill Stewart wrote:
Puerto Ricans in the ethnic neighborhoods along the shore
might get uppity and take over the naval base, which everybody knew
had Nuke-u-lur Weapons even though they'd never admit it,
and the naval base might not be able to defend itself against a mob,
http://www.thesmokinggun.com/archive/0831041_photostamps_1.html?link=eaf
At 01:30 PM 9/1/04 +0200, Nomen Nescio wrote:
Yet we need
to make sure we're not abused too much since sooner or later laws
will catch up with the remailers should abuse sky-rocket.
You need a Bill of Rights that specifies freedom of expression,
and judges that understand it. Since you appear
We remain concerned about any devices or software that permit listeners
to transform a broadcast into a music library, RIAA spokesman Jonathan
Lamy said.
http://wired.com/news/digiwood/0,1412,64761,00.html?tw=wn_tophead_6
The pigs want to be able to send anonymous messages over
IP or POTS using their emergency 700 Mhz comm system:
http://www.ncs.gov/informationportal/Web_Proxy_Report.doc
http://www.dhs.gov/interweb/assetlibrary/Vendor_Day_List_FIN818.pdf
The following list of companies have expressed an interest in the
US-VISIT System requirement by participating in the Industry Conference
and/or responding to the
sources sought RFI. This list is being provided in an attempt to
JY reports on the Fed nervousness about his publications;
but anyone with a few hundred $ can buy a CDROM or
nicely printed map of the same info.
[listsig: surveillance, 1st amendment, everyone is a reporter]
MAP DETAILS
This 2003/2004 edition of the N. American Natural Gas
System map is the
http://www.blackboxvoting.org/?q=node/view/77 is up
Seems its due to an intentional, insider job, and not just as
an engineering backdoor (c) Cisco
Consumer Report: Part 2 - Problems with GEMS Central Tabulator
Submitted by Bev Harris on Thu,
http://www.psywarrior.com/sexandprop.html
H.M.G.'s secret pornographer
http://www.seftondelmer.co.uk/hmg.htm
would be, how many
*other* cameras have column 67 disabled? One of every thousand?
And how many thousand cameras were sold?
Pope Major Variola (ret)
At 01:26 PM 8/24/04 -0400, Tyler Durden wrote:
PS: I thought Tyler had nominated himself as leader? :-)
No, almost the opposite. I propose that any 'Cypherpunk' can declare
himself
to be leader and make 'official statements' at any time.
Oh, then you'd be reformed cypherpunk. The orthodoxy is
At 09:09 PM 8/23/04 -0400, An Metet wrote:
You may laugh but 74% (or whatever is the % who believes Saddam
personally
piloted all 9/11 planes) of americans will believe it.
So Mr. Young is anarchist for all practical purposes and consequences.
And you are all his associates.
While acknowledging
ok, from /., but highly amusing
Meet the Peeping Tom worm
A worm that has the capability to using webcams to spy on users is
circulating across the
Net.
http://www.theregister.co.uk/2004/08/23/peeping_tom_worm/
At 09:20 AM 8/18/04 -0400, R. A. Hettinga wrote:
Hey, I have an idea! Why don't I write a script crossposting
everything from sci.crypt to cypherpunks! How about a few dozen
other on-topic newsgroups and mailing lists too?
Go ahead. Are you going to reformat them for legibility first, if
Contrary to widespread belief, it was more
likely American voters in Israel, not Florida,
who put George W. Bush in the White
House four years ago a phenomenon that has Kerry's supporters in
Israel vowing to do whatever it takes to make certain that doesn't
happen
again in November.
Those who
At 02:43 AM 8/15/04 +0200, Thomas Shaddack wrote:
On Sat, 14 Aug 2004, Major Variola (ret) wrote:
It was disturbing that, as the bottom fell out of telecom, and
handsets
became commoditized, faceplates and ringtones were highly profitable.
Faceplates are at least made of atoms
At 05:30 AM 8/14/04 +0200, Thomas Shaddack wrote:
On Fri, 13 Aug 2004, Major Variola (ret) wrote:
Even if you map a particular hash into one of a million known-benign
values, which takes work, there are multiple orthagonal hash
algorithms
included on the NIST CD. (Eg good luck finding values
We worried about compromized OSes, BIOSes, read last week about
a PNG library bug that lets images run buffer exploits, now CPUs
can be backdoored:
From Scheier's Crypto-gram:
Here's an interesting hardware security vulnerability. Turns out that
it's possible to update the AMD K8 processor
At 01:48 AM 8/14/04 +0200, Thomas Shaddack wrote:
Then you have
the forest where every tree is marked and the leprechaun is laughing.
Love that story. But the self-watermarking you later mention is a
problem.
Even if you map a particular hash into one of a million known-benign
values, which
Quoth Thomas Shaddack [EMAIL PROTECTED]
Obvious lesson: Steganography tool authors, your programs
should use the worm/HIV trick of changing their signatures
with every invocation. Much harder for the forensic
fedz to recognize your tools. (As suspicious, of course).
It should be enough to
At 10:07 PM 8/13/04 +0200, Thomas Shaddack wrote:
On Fri, 13 Aug 2004, Tyler Durden wrote:
And it seems to me to be a difficult task getting ahold of enough
photos
that would be believably worth encrypting.
Homemade porn?
Your 16 year old son's homemade porn.
[google on Heidl rape; a deputy
At 01:46 PM 8/13/04 -0400, John Kelsey wrote:
From: Major Variola (ret) [EMAIL PROTECTED]
Obvious lesson: Steganography tool authors, your programs
should use the worm/HIV trick of changing their signatures
with every invocation. Much harder for the forensic
fedz to recognize your tools
On Fri, 13 Aug 2004, Thomas Shaddack wrote:
In the world of industrial espionage and divorce lawyers, the FedZ
aren't
the only threat model.
At 03:06 PM 8/13/04 -0400, Sunder wrote:
Right, in which case GPG (or any other decent crypto system) is just
fine,
or you wouldn't be looking for
At 02:11 PM 8/13/04 -0400, Sunder wrote:
If you're suspected of something really big, or you're middle eastern,
then you need to worry about PDA forensics. Otherwise, you're just
another geek with a case of megalomania thinking you're important
enough
for the FedZ to give a shit about you.
A cool thing for this purpose could be a patch for gcc to produce
unique
code every time, perhaps using some of the polymorphic methods used
by
viruses.
The purpose would be that they do not figure out that you are using
some
security program, so they don't suspect that noise in the file or
Saint John of Cryptome has a particularly tasty link to
http://csrc.nist.gov/publications/drafts.html#sp800-72
which describes the state of the art in PDA forensics.
There is also a link to a CDROM of secure hashes of
various benign and less benign programs that the
NIST knows about. Including a
With the possibility of earning a $1 billion bounty, however,
professional Bin Laden hunting firms would form, allowing the U.S. to
enlist the efficiency and creativity of the free market in our fight
against Osama.
This is brilliant, worthy of being called channelling Tim M. As it
relies
Al Qaeda operatives rarely travel directly from Point A to Point B.
Instead, they jump from country to country, with each destination
having its own end use and with multiple stops between beginning and
end.
Hey, don't they know that onion-routing was patented by the Navy?
Or that the mix network
At 04:58 AM 8/6/04 -0700, Sarad AV wrote:
Since they are using symmetric keys, for a network of
'n' nodes, each node need to know the secret key that
they share with the remaining (n-1) nodes.Total number
of symmetric keys that need to be distributed is
[n*(n-1)]/2. Key management is harder when
Re Is Source Code Is Like a Machine Gun?
A better thought experiment would be a numerically controlled machine
and a control tape, which, when the machine is turned on, produces
sculpture that is also a machine gun (or merely the sear for a machine
gun which can be dropped into a semi-automatic
http://www.technologyreview.com/articles/04/08/wo_garfinkel080404.asp
Good article re secure hashing
At 02:23 AM 8/5/04 +0200, Thomas Shaddack wrote:
The impracticability of breaking symmetric ciphers is only a
comparatively
small part of the overall problem.
Indeed. Following Schneier's axiom, go for the humans, it would not
be too hard to involutarily addict someone to something which the
At 10:18 PM 8/3/04 +0100, Ian Grigg wrote:
http://www.thesmokinggun.com/archive/jihad13chap3.html
[Moderator's Note: One wonders if the document on the Smoking Gun
website is even remotely real. It is amazingly amateurish -- the sort
of code practices that were obsolete before the Second World
At 09:53 PM 8/1/04 -0400, Tyler Durden wrote:
the following statements are officially* fairly cypherpunkinsh:
* Fuck you Variola...I just had a couple of dark Spatens ON TAP. I
therefore
declare that any Cypherpunk is officially authorized to make an
official
Cypherpunk statement, particularly if
At 05:17 PM 8/2/04 +0200, Eugen Leitl wrote:
Assuming I generate a key on a RSA smart card made by GD, what kind of
prestige
track do these people have?
They seem to be pretty secretive, that's not a good sign.
FWIW:
They make the SIMs for T-Mobile (ie Deutsche Telecom AG) so they
are part of
At 02:39 PM 8/2/04 -0400, John Kelsey wrote:
This is silly. They have black budgets, but not infinite ones. Given
their budget (whatever it is), they want to buy the most processing bang
for their buck.
Yes. They can't break a 128 bit key. That's obvious. (if all the
atoms in the
universe
At 05:23 PM 8/1/04 -0400, Tyler Durden wrote:
No, the NSA is probably generations ahead in some areas, but their fabs
aren't much better than what's available commercially.
Yes, upon consideration I agreed, re critical dimensions. That's why I
brought up uneconomically sized chips, and the
At 12:58 PM 8/1/04 -0400, Sunder wrote:
You Al-Qaeda types
hate us for having freedom, right?
You're not taken in by that mularky, are you?
Read the Fatwa. Best summarized by a line from a 'Floyd song,
get your filthy hands off my desert.
Go for the Baltimore/Maryland prep schools. Soft
Tyler D asked about how the NSA could be so far ahead.
Besides their ability to make 2 sq. chips at 10% yield (not
something a commercial entity could get away with)
they can also *thin and glue* those chips into say stacks
of 5 thinned die.
2 sq = 4 x performance
5 thinned die with GHz vias = 20
At 12:07 AM 7/29/04 -0500, J.A. Terranson wrote:
On Wed, 28 Jul 2004, Major Variola (ret) wrote:
Did you know that your teeth enamel contain isotope ratios that
encode regions where you might have grown up around age 6?
Yes. I am also aware that tooth enamel has the interesting property
At 12:36 PM 7/29/04 -0400, Tyler Durden wrote:
Remember that the spookfabs don't have to contend with *economics and
yield*.
Damn, this is precisely where I wish Tim May was still around.
We are all just echoes of the voices in his head.
But I did work for a company that owned fabs. And have
At 06:44 PM 7/24/04 -0500, J.A. Terranson wrote:
On Sat, 24 Jul 2004, Major Variola (ret) wrote:
There might be blind cypherpunks, we don't discriminate[1],
There Is No We.
touche'
[1] the original phone phreaks were blind,
This is a ridiculous statement, and even worse, leaks information
At 03:52 PM 7/27/04 -0400, Tyler Durden wrote:
Variola wrote...
In the *public* lit.
Well, perhaps but perhaps not. Burst-mode signaling, transceivers, and
networking technology are a good example. If you see DISA, NSA, and
DARPA
all working with the acknoledged experts inthe academic field, and
1. Thanks Declan for pruning my beliefs ---I had actually thought the
younger, stupider, more surrounded by idiots Bush had puked that quote
re Athiests not being 'Merikans. But Googling and your 0-ROI investment
in Lexis-Nexus shows that stupidity is heriditary. But this is why you
are
an
At 12:40 PM 7/23/04 +0200, Thomas Shaddack wrote:
On Thu, 22 Jul 2004, Major Variola (ret) wrote:
My point is only that they will be killed should they leak their
actual capabilities.
Well... I am reading a book about intelligence now. Specifically,
Ernst
Volkman: Spies - the secret agents who
Working for a major Kiretsu, I learn that a certain keypress sequence
during boot enables SSH. Security by obscurity, baby. Never
heard of Mr. Kirchoff? Undocumented backdoor feature, baby.
LMAO,
yours,
MV
At 09:47 PM 7/23/04 -0500, J.A. Terranson wrote:
What I meant was, Ames and that FBI dude Hansen (sp?), at least the
KGB
got Ames' wife as part of the package, whereas the FBI CI dude
let his wife off as part of the deal he cut. Nice xian that he was,
he
was into strippers.
Aren't we *all*
At 10:27 AM 7/22/04 -0400, Tyler Durden wrote:
Gilmore et al used a bunch of old Sun Chassis for his Kocher's
DEScracker. You think this is somehow more than 100 watts, in a
diplo suitcase, nowadays?
My point was, Gilmore et al were way behind what's capable.
Proof of concept needn't be
At 12:39 AM 7/22/04 -0500, J.A. Terranson wrote:
On Wed, 21 Jul 2004, Major Variola (ret) wrote:
I'm following the Principle of not underestimating the
adversary,
Don't go overboard: remember that there is a difference between
underestimating your adversary and unrealistically *over*estimating
At 10:09 AM 7/21/04 -0400, Tyler Durden wrote:
Variola wrote...
Dark fiber.
Dark Fiber ain't a talisman you merely wave at data to get it to
magically
move to where you want it to.You've got to LIGHT that fiber, and to
light
that fiber you need LOTS and LOTS of power-hungry, space-occupying
At 11:28 AM 7/21/04 -0400, Tyler Durden wrote:
As for the cable landings, likewise I've never heard anyone mention
that
they saw any government equipment at the landings, so I suspect it's
relatively minimal.
I'm sorry but I have to puke at your cluelessness. Do you actually
think the folks in
101 - 200 of 696 matches
Mail list logo