Welcome to The New York Times on the Web
Welcome bbb2323, Thank you for registering with The New York Times on the Web. As a registered user of NYTimes.com, you now have free access not only to the news of the daily New York Times, but also to a wealth of additional news, features and services -- as well as updates throughout the day from the reporters and editors of The Times. We now have two teams dedicated to preparing updated reports exclusively for the Web: one in The New York Times newsroom, and the other in a newsroom we operate jointly with TheStreet.com. These updates are complemented by a wide range of wire reports from sources including the Associated Press, Reuters and CNET. No matter what the hour, you can look to The Times on the Web for the most authoritative coverage of important events as they unfold. NYTimes.com also offers a variety of sections and features you'll find only at The Times on the Web. Browse our Photo section (http://www.nytimes.com/photos), which takes an illustrative look at the stories covered by The Times through photo essays and multimedia tours. Read updated news about the Internet and original daily columns in our Technology area (http://www.nytimes.com/technology), where we examine the impact of technology on topics ranging from e-commerce and politics to education and law. Additional site features include: * E-mail newsletters with headlines from NYTimes.com -- sign up now! http://www.nytimes.com/email * Political Points, a weekday video Webcast covering Campaign 2000 http://www.nytimes.com/politics * The New York Times Magazine, available all week long http://www.nytimes.com/magazine * A free, searchable library of over 50,000 book reviews and author interviews http://www.nytimes.com/books *A premium archive service http://www.nytimes.com/archives * The famous New York Times crossword puzzle, available by subscription http://www.nytimes.com/diversions * Current film reviews plus a complete collection of recent reviews http://www.nytimes.com/arts * On This Day in History http://www.nytimes.com/learning/general/onthisday/ * The New York Times Navigator, a selective guide to the Internet http://www.nytimes.com/navigator Thanks again for registering. We hope that you will visit NYTimes.com again soon. Sincerely, Rich Meislin Editor in Chief New York Times Digital ** Your account information is listed below for future reference: Your ID is bbb2323 You selected your password at registration. Your e-mail address is [EMAIL PROTECTED] If you have any questions about the use of the information you supplied at registration, please refer to our Privacy Statement at http://www.nytimes.com/privacy If you did not authorize this registration, someone has mistakenly registered using your e-mail address. We regret the inconvenience; please see http://www.nytimes.com/subscribe/help/cancel.html for instructions.
Re: Keg waiting periods
Tim May writes: Basically, Chaumian blinding would allow the holder of a credential to selectively reveal bits of a credential, like uncovering just window of an envelope with many data fields. An age credential could be revealed without revealing a meatspace name credential. (There are issues of biometric authentication to consider, else this envelope could be loaned to others, like driver's licenses are for getting into bars.) Right, and this is why all the whining about biometrics is misplaced. Biometrics are a perfectly reasonable and useful technology. They are absolutely essential for a world which protects privacy via cryptography. Biometrics enable is-a-person credentials which can be used to prevent improper sharing of other credentials. They allow for anonymous credit ratings, where you can prove that you have paid your debts without revealing your ID. There are a host of other applications which depend on people not being able to freely swap credentials and being able to prove membership in various groups. Of course it is a long way from here to there. Power-hungry institutions have little incentive to move away from a world in which people are increasingly tracked and recorded in every detail. And paranoid cypherpunks shy away from any system which will add accountability even when wrapped in a shield of pseudonymity. The result is that there is little or no market for this technology. The fact that it's patented up the wazoo doesn't help, either, of course.
CFP for special security section of Communications of the ACM
My appologies for this late notice. This call for papers went out awhile ago on some mailing lists and news groups, but a colleague of mine suggested some of you readers might be interested in responding as well. I you are interested but don't think that you can meet the deadline for abstracts (see CFP, below), then please contact Imran Bashir mailto:[EMAIL PROTECTED], who is to be the guest editor. Thanks for your interest! -kevin wall === Call for Papers --- We seek articles for a special section of the Communications of the ACM on the security of inter-, intra-, and extranet software applications. This special section will be published as part of the February 2001 issue of the CACM. The ubiquitous World Wide Web, the fastest growing element of the Internet provides a perfect shooting target for the computer crackers, script kiddies, and other such "bad guys". Since WWW is being utilized equally by small and large corporations, and by governments, for conducting their business electronically, people with malicious intent do not have to leave their home to bring a business to its knees. Contrary to the traditional model of distributing a software application to a known set of "customers", today's web software model exposes a software application to everyone alike. Any potential security holes in the software can be exploited to cause various kinds of damage. Similarly, the inherent nature of the internet environment is conducive to the privacy invasion of individuals. Others questions have been raised about the freedom of speech, and of anonymous speech, on the internet. The goal of this special section is to expose the software engineering industry to the threats facing them in the development and deployment of web-based software applications, and to expose the challenges of the liberty-protecting software while maintaining the civil liberty rights. We seek articles of varying length, where short articles/experience reports could be as short as 2000 words, and other articles could be longer but not exceeding 4000 words. We especially seek experience reports that address a wide range of issues and ongoing developments in the web security, privacy, freedom of speech, including, but not limited to: - Securing Web/Application servers and their applications - Security of the E-Commerce software applications - Testing of the security aspect of web-based software - Security pitfalls of programming languages - Evaluation of existing security models - Security architectures for the web-based software - Protection of civil liberty rights on the web - Privacy, freedom of speech, and the internet The authors must adhere to the standards set out by CACM; the standards can be viewed by visiting: http://www.acm.org/cacm/Authors.html The article will be reviewed and authors will be informed of the final selection. Submission deadlines are as follows: Abstract (1-2 pages) due: Aug 15, 2000 Full Papers Due:Aug 25, 2000 Acceptance Notification:September 4, 2000 Revision requests: September 11, 2000 Revised copies due: September 25, 2000 Send electronic submissions to Imran Bashir [EMAIL PROTECTED] --- Kevin W. Wall Qwest Communications International, Inc. [EMAIL PROTECTED]Phone: 614.932.5542 "Microsoft set the security state-of-the-art back 25 years with DOS, and they have continued that legacy to this day." -- Bruce Schneier, CRYPTO-GRAM, 6/15/99
[adailyjoke] August 9th, 2000
_ A Daily Joke - August 9th, 2000! http://www.adailyjoke.com _ ~~~Quote of the day~~~ The advantage of a bad memory is that one enjoys several times the same good things for the first time. -- Friedrich Nietzsche _ This is her first time... http://www.dailymegajoke.com/pass/firsttime.html What a bunch of IDIOTS! http://www.dailymegajoke.com/pass/pose.html Prasie the LORDTHIS is why! http://www.dailymegajoke.com/pass/praise.html _ Laughter makes you live longer. That is, unless you laugh so hard you choke. Please, do not read this list whilst trying to eat. Clean humor suitable for each and every member of your family, and you can even send it to the neighbors, just don't send it back! mailto:[EMAIL PROTECTED] _ Today's Jokes: 1. Bicycle Test 2. Winning Get your Free Horoscope http://www.cyberbounty.com/ad?a=79b=c=2391 _ 1. Bicycle Test There was a young fellow who was quite inventive and was always trying out new things. One day he thought he'd see just how fast a bicycle could go before it became uncontrollable. He asked his friend, who owned an old Mustang, if he could tie his bike to the bumper of his car to test his theory. His friend said, "Sure." So the young man tied his bike to the back of the car and said to his friend: "I'll ring my bike bell once if I want you to go faster, twice if I want you maintain speed, and repeatedly if I want you to slow down." With that, off they went. Things were going pretty well, with the car driver slowly speeding up to well over 60 mph. The young fellow on the bike was handling the speed just fine. But, all of sudden, a black Corvette came up beside them and before you knew it the fellow driving the Mustang forgot all about the fellow on the bike and took to drag racing the Corvette. A little further down the road sat Officer John in his police cruiser, radar gun at the ready. He heard the two cars before his radar flashed 105 mph. He called into headquarters on his radio: "Hey, you guys aren't going to believe this, but there's a Corvette and a Mustang racing out here on Highway 3, and there's a guy on a bike ringing his bell and waving his arms trying to pass them!" _ Here is today's DAILY HUMOR LINK: (See the entire collection at: http://www.dailymegajoke.com/pass.html) What is Santa doing on your roof? http://www.dailymegajoke.com/pass/ice.html _ 2. Winning A blonde walks up to a Coke machine and puts in a coin. Out pops a Coke. The blonde looks amazed and runs away to get some more coins. She returns and starts feeding the machine madly and of course the machine keeps feeding out drinks. Another person walks up behind the blonde and watches her antics for a few minutes before stopping her and asking if someone else could have a go. The blonde turns around and shouts, "Can't you see I'm winning!" _ Enter these SWEEPSTAKES and WIN! Are you tired of high gas prices? Win FREE GAS for 1 whole Year! http://www.onresponse.com/onR_Ads.asp?a=17806d=735 Win this Gateway Solo 2550 LS Deluxe Laptop computer!! http://www.onresponse.com/onR_Ads.asp?a=17806d=753 Enter now to win Pizza for a Year and $250 online credit to Areyougame! http://www.onresponse.com/onR_Ads.asp?a=17806d=633 --- AOL Clickable LINKS --- a href="http://www.onresponse.com/onR_Ads.asp?a=17806d=735" Are you tired of high gas prices? Win FREE GAS for 1 whole Year! /a a href="http://www.onresponse.com/onR_Ads.asp?a=17806d=753" Win this Gateway Solo 2550 LS Deluxe Laptop computer!!/a a href="http://www.onresponse.com/onR_Ads.asp?a=17806d=633" Enter now to win Pizza for a Year and $250 online credit!/a _ This is a free mailing brought to you by JokesEveryDay.Com. get Free Jokes and More at a href=" http://www.jokeseveryday.com "Click Here!/a Archives: http://www.adailyjoke.com/archives ADVERTISING/SPONSORSHIP: [EMAIL PROTECTED] ___ You are currently subscribed as: [EMAIL PROTECTED] To unsubscribe send a e-mail from the address above to: [EMAIL PROTECTED] The ID of this message is: 344353.
Re: Intertesting article on Mogadishu, business, no gov't
-- At 09:06 AM 8/10/2000 -0400, David Lesher wrote: X-URL: http://www10.nytimes.com/library/world/africa/081000somalia-govern.html So it may come as a surprise that business people in Mogadishu, the wrecked and lawless capital, are begging for a government. They would love to be taxed and would gladly let politicians meddle at least a bit in their affairs. I have been following this peace conference, and I do not find it very worrying. If some of these groups were saying "I want a government, and I want it so much I am prepared to sacrifice something important", then there would be some danger that the peace conference might produce a government. Instead they are saying "It is vital to the interests of Somalia that someone else be sacrificed to benefit me, and we need a government in order to force these selfish people to make the necessary sacrifices to help me carry out my benevolent intentions." While most people at the peace conference are in favor of some sort of government, they are in favor of very different governments, so there is little likelihood they will agree. Each of the big clans wants a powerful government dominated by their particular clan. (Hence the numerous and passionate disputes as to where the new capital shall be.) Each of the business groups wants a limited government, limited to giving them special monopolistic privileges, but no similar privileges to any other business group "I am in favor of free markets, except that my business is a special case". Each of the small clans wants a limited government, limited to restraining the power of the big clans. And so on and so forth. The conference has become a bid for power by the big clans at the expense of everyone else. But the big clans will not agree amongst themselves, and if they did, they would still not have the power to make the government they created stick. As soon as it becomes obvious to all the other interest groups that they are screwed, the shit will hit the fan. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG hxvGCMkAUiIUzRf2vrGH/ae8spQRH+FCIGgknv2/ 4dgJsD0P5LiyXrVuZhLczQnbuqueL3TClDQv2j/WR
Re: Non-Repudiation in the Digital Environment (was Re: First Monday August 2000)
At 7:15 PM -0700 8/10/00, Ed Gerck wrote: Hi Salz! Saving time, labor money and gaining in the money market for transaction time differentials was the banks initial motivation but the co$t advantages of unsupervised authentication assurances, liability confinment and real-time auditing Jesus Fucking Christ, can you people on the "Digital Bearer" and "dcsb" and "cryptography" and other such lists, __PLEASE__ stop cc:ing the Cypherpunks list on your closed-list missives? --Tim May -- -:-:-:-:-:-:-: Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, "Cyphernomicon" | black markets, collapse of governments.
Free membership request
Yo hackers! We are going to see some free hardcore movie or what? __ Do You Yahoo!? Kick off your party with Yahoo! Invites. http://invites.yahoo.com/