UK Dead Set On Invasively Controlling The Internet

2017-05-20 Thread grarpamp
http://www.independent.co.uk/life-style/gadgets-and-tech/news/theresa-may-internet-conservatives-government-a7744176.html
https://www.buzzfeed.com/jimwaterson/theresa-may-wants-to-regulate-the-internet

Theresa May is planning to introduce huge regulations on the way the
internet works, allowing the government to decide what is said online.
Particular focus has been drawn to the end of the manifesto, which
makes clear that the Tories want to introduce huge changes
the government intends to introduce huge restrictions on what people
can post, share and publish online.
The plans will allow Britain to become "the global leader in the
regulation of the use of personal data and the internet"
It comes just soon after the Investigatory Powers Act came into law.
That legislation allowed the government to force internet companies to
keep records on their customers' browsing histories, as well as giving
ministers the power to break apps like WhatsApp so that messages can
be read.
the government will work even harder to ensure there is no "safe space
The new rules would include laws that make it harder than ever to access porn
The government will be able to place restrictions on seeing adult
content and any exceptions would have to be justified to ministers
Tech companies would be forced to help, and pay a tax to support,
controversial government schemes like its Prevent strategy to promote
extremist government narratives.
will also seek to regulate the kind of news that is posted online and
how companies are paid for it.
If internet companies refuse to comply there will be a strict and
strong set of ways to punish them.
"We will introduce a sanctions regime and anticipate and reject
potential criticism


Re: UK Dead Set On Invasively Controlling The Internet

2017-05-20 Thread grarpamp
Countries all racing to be the low bitch and set the first example
others can point to and copy as "legit me too's". With UK US in
lead as best whores for total government surveillance, control, etc.

Fuck that, route around them, build your own.


Re: Msg-ing all [CypherPunks] disruption operators: CFP - WOOT '17

2017-05-20 Thread Georgi Guninski
On Fri, May 19, 2017 at 09:36:26AM -0700, Razer wrote:
> WOOT '17 accepts papers in both an academic security context and more
> applied work that informs the field about the state of security practice
> in offensive techniques. The goal for these submissions is to produce
> published works that will guide future work in the field. Submissions
> will be peer reviewed and shepherded as appropriate.
> 
> Submission topics include but are not limited to:
> https://www.usenix.org/conference/woot17/call-for-papers

Not joking. This is opportunity to troll another set of people.
Something like "Security, privacy and society are fucked up beyond
repair" by Academic Cypherpunks Incorporated.

There are about 10 days left before submission.



Re: Msg-ing all [CypherPunks] disruption operators: CFP - WOOT '17

2017-05-20 Thread Razer


On 05/20/2017 04:38 AM, Georgi Guninski wrote:
> On Fri, May 19, 2017 at 09:36:26AM -0700, Razer wrote:
>> WOOT '17 accepts papers in both an academic security context and more
>> applied work that informs the field about the state of security practice
>> in offensive techniques. The goal for these submissions is to produce
>> published works that will guide future work in the field. Submissions
>> will be peer reviewed and shepherded as appropriate.
>>
>> Submission topics include but are not limited to:
>> https://www.usenix.org/conference/woot17/call-for-papers
> Not joking. This is opportunity to troll another set of people.
> Something like "Security, privacy and society are fucked up beyond
> repair" by Academic Cypherpunks Incorporated.
>
> There are about 10 days left before submission.
>

I'm still trying to figure out exactly what "shepherded as appropriate"
implies.

Rr


Re: Msg-ing all [CypherPunks] disruption operators: CFP - WOOT '17

2017-05-20 Thread Steve Kinney


On 05/20/2017 10:43 AM, Razer wrote:
> 
> 
> On 05/20/2017 04:38 AM, Georgi Guninski wrote:
>> On Fri, May 19, 2017 at 09:36:26AM -0700, Razer wrote:
>>> WOOT '17 accepts papers in both an academic security context and more
>>> applied work that informs the field about the state of security practice
>>> in offensive techniques. The goal for these submissions is to produce
>>> published works that will guide future work in the field. Submissions
>>> will be peer reviewed and shepherded as appropriate.
>>>
>>> Submission topics include but are not limited to:
>>> https://www.usenix.org/conference/woot17/call-for-papers
>> Not joking. This is opportunity to troll another set of people.
>> Something like "Security, privacy and society are fucked up beyond
>> repair" by Academic Cypherpunks Incorporated.
>>
>> There are about 10 days left before submission.
>>
> 
> I'm still trying to figure out exactly what "shepherded as appropriate"
> implies.

I can't come up with an interpretation other than "shall be managed to
assure that our pre-determined agenda and message is not disrupted."
The end product shall be naughty enough to attract attention but no
Sacred Cows shall be molested during its production, and nobody's grant
money jeopardized by the content of presentations, publications or press
notices.

"Disruptive" has long been Corporate duckspeak promoting "hot new
products and business opportunities."

The most disruptive trend I have seen in network security over the past
year or so is the high visibility of security contracting businesses
whose major products include propaganda:  If you want to attribute an
insider threat problem to an external actor, hire Norse, Crowdstrike or
a similar firm and tell them what you "think" they are going to find.
Their reports, suitable for quoting in press releases, will meet or
exceed your expectations.

Security Fiction in service to propaganda objectives is the Big Thing
just now.  Even Bruce Schneier has jumped on this bandwagon:  "Obama
decided not to make the accusation public before the election so as not
to be seen as influencing the election."  This refers to a propaganda
campaign kicked off on October 7, 2016, by the DHS press release
attributing the DNC mail leak to Russian Hacking.

Want to introduce disruptive new security concepts and products?  "If
you can think of anything better to do with your time than sit listening
to this recorded message, please replace the handset and go make
something happen." - Little Boots, intro track, Working Girl.

:o)










signature.asc
Description: OpenPGP digital signature


All Ur BTC Iz Mine(d): "Massive cryptocurrency botnet used leaked NSA exploits"

2017-05-20 Thread Razer
> Massive cryptocurrency botnet used leaked NSA exploits weeks before WCry
>
> Campaign that flew under the radar used hacked computers to mine
> Monero currency.
>
> On Friday, ransomware called WannaCry used leaked hacking tools stolen
> from the National Security Agency to attack an estimated 200,000
> computers in 150 countries. On Monday, researchers said the same
> weapons-grade attack kit was used in a much-earlier and possibly
> larger-scale hack that made infected computers part of a botnet that
> mined cryptocurrency.
>
> Like WannaCry, this earlier, previously unknown attack used an exploit
> codenamed EternalBlue and a backdoor called DoublePulsar, both of
> which were NSA-developed hacking tools leaked in mid April by a group
> calling itself Shadow Brokers. But instead of installing ransomware,
> the campaign pushed cryptocurrency mining software known as Adylkuzz.
> WannaCry, which gets its name from a password hard-coded into the
> exploit, is also known as WCry.
>
> Kafeine, a well-known researcher at security firm Proofpoint, said the
> attack started no later than May 2 and may have begun as early as
> April 24. He said the campaign was surprisingly effective at
> compromising Internet-connected computers that have yet to install
> updates Microsoft released in early March to patch the critical
> vulnerabilities in the Windows implementation of the Server Message
> Block protocol. In a blog post published Monday afternoon, Kafeine wrote:
>
>> In the course of researching the WannaCry campaign, we exposed a lab
>> machine vulnerable to the EternalBlue attack. While we expected to
>> see WannaCry, the lab machine was actually infected with an
>> unexpected and less noisy guest: the cryptocurrency miner Adylkuzz.
>> We repeated the operation several times with the same result: within
>> 20 minutes of exposing a vulnerable machine to the open web, it was
>> enrolled in an Adylkuzz mining botnet.
>>
>> Figure 1: EternalBlue/DoublePulsar attack from one of several
>> identified hosts, then Adylkuzz being downloaded from another host -
>> A hash of a pcap of this capture is available in the IOCs table.
>>
>>   The attack is launched from several virtual private servers which
>> are massively scanning the Internet on TCP port 445 for potential
>> targets.
>>
>>
>> Upon successful exploitation via EternalBlue, machines are infected
>> with DoublePulsar. The DoublePulsar backdoor then downloads and runs
>> Adylkuzz from another host. Once running, Adylkuzz will first stop
>> any potential instances of itself already running and block SMB
>> communication to avoid further infection. It then determines the
>> public IP address of the victim and download[s] the mining
>> instructions, cryptominer, and cleanup tools.
>>   
>> It appears that at any given time there are multiple Adylkuzz command
>> and control (C&C) servers hosting the cryptominer binaries and mining
>> instructions.
>>
>> Figure 2 shows the post-infection traffic generated by Adylkuzz
>> in this attack.
>
>
> Symptoms of the attack include a loss of access to networked resources
> and system sluggishness. Kafeine said that some people who thought
> their systems were infected in the WannaCry outbreak were in fact hit
> by the Adylkuzz attack. The researcher went on to say this overlooked
> attack may have limited the spread of WannaCry by shutting down SMB
> networking to prevent the compromised machines from falling into the
> hands of competing botnets.
>
> Proofpoint researchers have identified more than 20 hosts set up to
> scan the Internet and infect vulnerable machines they find. The
> researchers are aware of more than a dozen active Adylkuzz control
> servers. The botnet then mined Monero, a cryptocurrency that bills
> itself as being fully anonymous, as opposed to Bitcoin, in which all
> transactions are traceable.
>
> Monday's report came the same day that a security researcher who works
> for Google found digital fingerprints tying a version of WCry from
> February to Lazarus Group, a hacking operation with links to North
> Korea. In a report published last month, Kaspersky Lab researchers
> said Bluenoroff, a Lazarus Group offshoot responsible for financial
> profit, installed cryptocurrency-mining software on computers it
> hacked to generate Monero coins. "The software so intensely consumed
> system resources that the system became unresponsive and froze,"
> Kaspersky Lab researchers wrote.
>
> Assembling a botnet the size of the one that managed WannaCry and
> keeping it under wraps for two to three weeks is a major coup.
> Monday's revelation raises the possibility that other botnets have
> been built on the shoulders of the NSA but have yet to be identified.
>

With links:
https://arstechnica.com/security/2017/05/massive-cryptocurrency-botnet-used-leaked-nsa-exploits-weeks-before-wcry/



Re: I watched the FKN Newz today Oh-boy!

2017-05-20 Thread grarpamp
On Sat, May 20, 2017 at 1:41 AM, juan  wrote:
> On Fri, 19 May 2017 18:28:46 -0700
> Razer  wrote:
>
>> Global Moroning & Climate Change Denial edition
>>
>> https://www.youtube.com/watch?v=qLcX4yUHxug
>>
>> Also... "When to kill your rulers"
>>
>> "Is it just me or does anybody else want to overthrow their
>> government? I'm not saying we should just to be clear. No... I'm just
>> wondering what kind of oppression do we have to endure before we
>> slaughter the lying murdering scum who rule over us..."
>>
>> https://www.youtube.com/watch?v=EXv40mWpJsU
>>
>> (So what are you waiting for?)
>
>
> https://www.youtube.com/watch?v=cxHvHi-MdIM
>
>
> "
> Look, if the slaves want guns, let them be!
>
> Our supremacy doesn't depend on weaponry
> with schools, media, money and meds, we control every
> aspect of your lives through ideological hegemony.
>
> But if you think you need guns to stop tyranny,
> then whatch'a waiting for, we've already stripped you of your
> liberty, privacy, civil rights and dignity... You want some more?
>
> "


https://www.youtube.com/watch?v=cYqH1FrG_Yg


Airlines Giving You Facials Too

2017-05-20 Thread grarpamp
http://money.cnn.com/2017/05/15/technology/delta-facial-recognition-luggage/
http://www.sciencefriday.com/segments/your-airline-will-see-you-now/


Torrenting The Darknets

2017-05-20 Thread grarpamp
On Mon, May 15, 2017 at 10:49 AM, Razer  wrote:
>> Indie films on darknets mate.
>
> https://en.wikipedia.org/wiki/The_President's_Analyst
> http://torrentking.eu/movie-1967/the-president-s-analyst-torrents/
> http://www.demonoid.click/files/details/3552579/
> http://www.demonoid.click/files/download/3552579/
> udp://inferno.demonoid.pw:3391/announce

> I never had much luck uploading torrents myself.

A functional darknet "torrent" system would have at least
just one "tracker"... the darknet internal DHT itself.
You'd publish the InfoHash to whatever darknet indexes you like.
In this case,
the "infohash" is 33fc6b8baa0d74e0c0c96d33a29d11dbbce9edc1
and the "index" for at least this message is the cpunks list,
while someone might "seed" it on I2P I2PSnark, I2PRufus,
I2P-Transmission... which utilize certain backend "trackers"
mechanisms not necessarily all distributed yet.

But there still desperately needs to be a distributed storage layer
that long term automagically backs up the explicit "seeders"
which tend to be volatile. At which point the original "OP seeder's"
best role is then to just inserting into the storage layer and
walking away.
"Elective non OP seeders of specific torrent sets" such as with
all torrents in Vuze / Transmission seed list, needs to transition
to offering darknet storage blocks for all insertions that may happen.


Re: I watched the FKN Newz today Oh-boy!

2017-05-20 Thread Razer


On 05/20/2017 01:59 PM, grarpamp wrote:
> On Sat, May 20, 2017 at 1:41 AM, juan  wrote:
>> On Fri, 19 May 2017 18:28:46 -0700
>> Razer  wrote:
>>
>>> Global Moroning & Climate Change Denial edition
>>>
>>> https://www.youtube.com/watch?v=qLcX4yUHxug
>>>
>>> Also... "When to kill your rulers"
>>>
>>> "Is it just me or does anybody else want to overthrow their
>>> government? I'm not saying we should just to be clear. No... I'm just
>>> wondering what kind of oppression do we have to endure before we
>>> slaughter the lying murdering scum who rule over us..."
>>>
>>> https://www.youtube.com/watch?v=EXv40mWpJsU
>>>
>>> (So what are you waiting for?)
>>
>> https://www.youtube.com/watch?v=cxHvHi-MdIM
>>
>>
>> "
>> Look, if the slaves want guns, let them be!
>>
>> Our supremacy doesn't depend on weaponry
>> with schools, media, money and meds, we control every
>> aspect of your lives through ideological hegemony.
>>
>> But if you think you need guns to stop tyranny,
>> then whatch'a waiting for, we've already stripped you of your
>> liberty, privacy, civil rights and dignity... You want some more?
>>
>> "
>
> https://www.youtube.com/watch?v=cYqH1FrG_Yg

Honest Advert for the Dakota Excess Tarpipe
https://www.youtube.com/watch?v=a9TR9G5bd7w


Re: "All fossil-fuel vehicles will vanish in 8 years..."

2017-05-20 Thread grarpamp
> In the US, after 10 years you can no longer get many parts for you car
> from the dealer.  < emphasis
> They intentionally obsolete them, ostensibly to get
> allegedly 'cleaner ones' on the road, but really, force-obsoleting cars
> after 10 years instead of having ones that could run indefinitely

While legal and consumer environment may generate incentive,
carmakers have no natural incentive but to sell.
Any shit design, poor aging, or parts dropout is their own
whole car preferential sales technique.

But still, you can get limited parts selection from dealer 10+ years out,
at their price. And 30+ years on cheap aftermarket, including
complete rebuild kit for common models. Same for junkyards.

Lern2wrench. May also be net environmentally better vs production,
and much cheaper. Do the math.


Re: Torrenting The Darknets

2017-05-20 Thread Steve Kinney


On 05/20/2017 08:42 PM, grarpamp wrote:
> On Mon, May 15, 2017 at 10:49 AM, Razer  wrote:
>>> Indie films on darknets mate.
>>
>> https://en.wikipedia.org/wiki/The_President's_Analyst
>> http://torrentking.eu/movie-1967/the-president-s-analyst-torrents/
>> http://www.demonoid.click/files/details/3552579/
>> http://www.demonoid.click/files/download/3552579/
>> udp://inferno.demonoid.pw:3391/announce
> 
>> I never had much luck uploading torrents myself.
> 
> A functional darknet "torrent" system would have at least
> just one "tracker"... the darknet internal DHT itself.
> You'd publish the InfoHash to whatever darknet indexes you like.
> In this case,
> the "infohash" is 33fc6b8baa0d74e0c0c96d33a29d11dbbce9edc1
> and the "index" for at least this message is the cpunks list,
> while someone might "seed" it on I2P I2PSnark, I2PRufus,
> I2P-Transmission... which utilize certain backend "trackers"
> mechanisms not necessarily all distributed yet.

i2p can be called "a functional darknet torrent system," in that the
large majority of traffic crossing that network is torrents.  The i2p
package includes the router, a browser based torrent client and a simple
web server.  The two biggest trackers on i2p are Postman and
Difftracker, both are stable with good uptimes.  I was pleased to note
on my last visit that some files I seeded and promoted there about five
years ago are still available.

I got my copy of The President's Analyst ages ago, I would seed it but
alas, my poor overworked computer can't afford the cycles to run i2p
alongside all the other crap I am using it for:  Graphics and video
editing, etc.  A more "normal" user won't see a performance hit from i2p
unless the system they run it on is already overstressed.

:o)



> But there still desperately needs to be a distributed storage layer
> that long term automagically backs up the explicit "seeders"
> which tend to be volatile. At which point the original "OP seeder's"
> best role is then to just inserting into the storage layer and
> walking away.
> "Elective non OP seeders of specific torrent sets" such as with
> all torrents in Vuze / Transmission seed list, needs to transition
> to offering darknet storage blocks for all insertions that may happen.
> 



signature.asc
Description: OpenPGP digital signature


Re: Torrenting The Darknets

2017-05-20 Thread grarpamp
On Sat, May 20, 2017 at 10:21 PM, Steve Kinney  wrote:
> i2p can be called "a functional darknet torrent system,"

> on my last visit that some files I seeded and promoted there about five
> years ago are still available.

Only through the explicit goodwill of human "seeders"
actively seeding specifically chosen infohashes.
That's nice, and very good to have, for "speed" if
nothing else.

But the missing link is some form of AI that actually
maintains a copy on a distributed redundant storage backend
according to whatever demand or insertion parameters.
Or reasonably forever [1].

Otherwise when the last human "seeder" ceases seeding,
no matter what the popularity was, the material dies with them.

[1] Seeders life are a terrible definition of when to expire something.
And has no facility to even try to maintain a single archive copy for decades.

There's enough slack space on the planet's masses of hard
drives for an app to plugin to the darknets and do just that.

Think of it this way, even grander...
all human knowledge <= Npeople * avg unused space * darknet storage
redundancy level

This equation should be easy to estimate as true.
So it can be built...

And when you do, people won't mind running it,
after all, it's anonymous, encrypted, etc...
and they have access to indexes of all knowledge therein,
including fave pop music and puppy pictures.


Re: Torrenting The Darknets

2017-05-20 Thread Steven Schear
One of the great weaknesses of torrents (and filesharing systems in general
) is the lack of mechanisms to promote persistence. That's why a group of
us (including Bram Cohen, BitTorrent and Bryce Wilcox-O'Hearn (Zooko),
Tahoe-LAFS, MNET, ZCash) created Mojo Nation. Unfortunately, Mojo failed to
get follow-on funding due to Napster. Fortunately, the idea of a publishing
model (vs. filesharing), with an internal reward system for persistence,
was independently re-discovered by MaidSafe, IPFS and ZeroNet. I hope at
least one succeeds.

Warrant Canary creator

On May 20, 2017 7:22 PM, "Steve Kinney"  wrote:

>
>
> On 05/20/2017 08:42 PM, grarpamp wrote:
> > On Mon, May 15, 2017 at 10:49 AM, Razer  wrote:
> >>> Indie films on darknets mate.
> >>
> >> https://en.wikipedia.org/wiki/The_President's_Analyst
> >> http://torrentking.eu/movie-1967/the-president-s-analyst-torrents/
> >> http://www.demonoid.click/files/details/3552579/
> >> http://www.demonoid.click/files/download/3552579/
> >> udp://inferno.demonoid.pw:3391/announce
> >
> >> I never had much luck uploading torrents myself.
> >
> > A functional darknet "torrent" system would have at least
> > just one "tracker"... the darknet internal DHT itself.
> > You'd publish the InfoHash to whatever darknet indexes you like.
> > In this case,
> > the "infohash" is 33fc6b8baa0d74e0c0c96d33a29d11dbbce9edc1
> > and the "index" for at least this message is the cpunks list,
> > while someone might "seed" it on I2P I2PSnark, I2PRufus,
> > I2P-Transmission... which utilize certain backend "trackers"
> > mechanisms not necessarily all distributed yet.
>
> i2p can be called "a functional darknet torrent system," in that the
> large majority of traffic crossing that network is torrents.  The i2p
> package includes the router, a browser based torrent client and a simple
> web server.  The two biggest trackers on i2p are Postman and
> Difftracker, both are stable with good uptimes.  I was pleased to note
> on my last visit that some files I seeded and promoted there about five
> years ago are still available.
>
> I got my copy of The President's Analyst ages ago, I would seed it but
> alas, my poor overworked computer can't afford the cycles to run i2p
> alongside all the other crap I am using it for:  Graphics and video
> editing, etc.  A more "normal" user won't see a performance hit from i2p
> unless the system they run it on is already overstressed.
>
> :o)
>
>
>
> > But there still desperately needs to be a distributed storage layer
> > that long term automagically backs up the explicit "seeders"
> > which tend to be volatile. At which point the original "OP seeder's"
> > best role is then to just inserting into the storage layer and
> > walking away.
> > "Elective non OP seeders of specific torrent sets" such as with
> > all torrents in Vuze / Transmission seed list, needs to transition
> > to offering darknet storage blocks for all insertions that may happen.
> >
>
>


Re: Torrenting The Darknets

2017-05-20 Thread grarpamp
Rewards seem nice, yet not everyone who wants to play
can pay, or the math overhead is crushing, or it becomes
centralized. Definitely worth trying, especially if it fits some
usage model.

Another form is to just let the network use whatever
CPU, RAM, DISK, NET that you're not currently
using, or give it whatever limits you want. In short,
set it and forget it. Let the network figure out how
to best use your node to support the network.
Maybe it's a strictly filesharing network,
or a general purpose network.
That's on the "Hey I just want to donate
this because it's cool like Seti@Home, etc."

Users actual use of the network would
be through different apps... be it submitting
infohashes, or compute jobs, etc.

Does eliminating all the reward tracking overhead
provide substantial resources back to support
free use.

ie: Most people and their computer resources sit idle,
probably more than enough to provide back whatever
multimedia they want to consume.
If true, all balances out, no need to bother track accounting
with "pay to play" style system?

I like "pay to play" as it offers at least some
firm guarantee to the consumer offeror.

But an accounting free system is more fun as in free beer :)

Hybrids might work too.

https://en.wikipedia.org/wiki/Exabyte
https://en.wikipedia.org/wiki/Zettabyte
https://en.wikipedia.org/wiki/Yottabyte
https://en.wikipedia.org/wiki/Orders_of_magnitude_(data)

100M users donating 10GiB slack space is about 0.93 EiB
of non redundant storage, excluding overhead.

Example, at 4x redundancy, that probably easily covers
lossless versions of all movies (at least 1080p)
and all audio (FLAC), all wikipedia, all OS and apps.

Approaching mini-NSA scale... not a bad start.


Re: Torrenting The Darknets

2017-05-20 Thread Steven Schear
Warrant Canary creator

On May 20, 2017 9:34 PM, "grarpamp"  wrote:

Rewards seem nice, yet not everyone who wants to play
can pay, or the math overhead is crushing, or it becomes
centralized. Definitely worth trying, especially if it fits some
usage model.

Another form is to just let the network use whatever
CPU, RAM, DISK, NET that you're not currently
using, or give it whatever limits you want. In short,
set it and forget it. Let the network figure out how
to best use your node to support the network.
Maybe it's a strictly filesharing network,
or a general purpose network.
That's on the "Hey I just want to donate
this because it's cool like Seti@Home, etc.


Mojo's internal currency was based on the resources offered, shared or
consumed. We even patented it (apparently unknown to MaidSafe; hell they
never even heard about us :)


Users actual use of the network would
be through different apps... be it submitting
infohashes, or compute jobs, etc.

Does eliminating all the reward tracking overhead
provide substantial resources back to support
free use.


Probably not.


ie: Most people and their computer resources sit idle,
probably more than enough to provide back whatever
multimedia they want to consume.
If true, all balances out, no need to bother track accounting
with "pay to play" style system?

I like "pay to play" as it offers at least some
firm guarantee to the consumer offeror.

But an accounting free system is more fun as in free beer :)

Hybrids might work too.

https://en.wikipedia.org/wiki/Exabyte
https://en.wikipedia.org/wiki/Zettabyte
https://en.wikipedia.org/wiki/Yottabyte
https://en.wikipedia.org/wiki/Orders_of_magnitude_(data)

100M users donating 10GiB slack space is about 0.93 EiB
of non redundant storage, excluding overhead.

Example, at 4x redundancy, that probably easily covers
lossless versions of all movies (at least 1080p)
and all audio (FLAC), all wikipedia, all OS and apps.

Approaching mini-NSA scale... not a bad start.


Re: Torrenting The Darknets

2017-05-20 Thread Steve Kinney


On 05/21/2017 12:32 AM, grarpamp wrote:
> Rewards seem nice, yet not everyone who wants to play
> can pay, or the math overhead is crushing, or it becomes
> centralized. Definitely worth trying, especially if it fits some
> usage model.
> 
> Another form is to just let the network use whatever
> CPU, RAM, DISK, NET that you're not currently
> using, or give it whatever limits you want. In short,
> set it and forget it. Let the network figure out how
> to best use your node to support the network.
> Maybe it's a strictly filesharing network,
> or a general purpose network.
> That's on the "Hey I just want to donate
> this because it's cool like Seti@Home, etc."

Now I think you're describing Freenet.  How doth Freenet suck, let me
count the ways... massive computational overhead was the main thing,
last time I tried it which was ages ago.  It really needed its own
dedicated box to "just work."  But it does distribute files, increase
the availability of more popular ones (via increased redundancy of
storage), and is censorship resistant due to distributed storage of data
which itself is encrypted and anonymized.

I think a project that aims to improve on the implementation of the
basic ideas in Freenet could be a big winner.

:o)




> Users actual use of the network would
> be through different apps... be it submitting
> infohashes, or compute jobs, etc.
> 
> Does eliminating all the reward tracking overhead
> provide substantial resources back to support
> free use.
> 
> ie: Most people and their computer resources sit idle,
> probably more than enough to provide back whatever
> multimedia they want to consume.
> If true, all balances out, no need to bother track accounting
> with "pay to play" style system?
> 
> I like "pay to play" as it offers at least some
> firm guarantee to the consumer offeror.
> 
> But an accounting free system is more fun as in free beer :)
> 
> Hybrids might work too.
> 
> https://en.wikipedia.org/wiki/Exabyte
> https://en.wikipedia.org/wiki/Zettabyte
> https://en.wikipedia.org/wiki/Yottabyte
> https://en.wikipedia.org/wiki/Orders_of_magnitude_(data)
> 
> 100M users donating 10GiB slack space is about 0.93 EiB
> of non redundant storage, excluding overhead.
> 
> Example, at 4x redundancy, that probably easily covers
> lossless versions of all movies (at least 1080p)
> and all audio (FLAC), all wikipedia, all OS and apps.
> 
> Approaching mini-NSA scale... not a bad start.
> 



signature.asc
Description: OpenPGP digital signature


Re: Fwd: [Webinar] Decrypting the WannaCry ransomware: Why is it happening and (how) is it going to end?

2017-05-20 Thread grarpamp
> I think whoever blasted this hack off may never touch their money.
> Apparently all the infections come with instructions for payment
> to be made to one of only three static wallets.. and everybody has
> their eyes on the block chain :P

There's enough cryptos, exchange points, tumblers and anon
networks out there to make John Gotti rise up and dance a happy jig.

> They've only brought in like $60k or something from 200k infections.
> Horrible return on infection ratio...

Until they daytrade it in cryptos for a year reaching $1M+.
Move it out saying they kept no logs, pay their tax on $0 basis.
Or keep and use it as crypto.

> there many statists in the blockchain community

Really? Damn, who knew.

> Any bets on whether ending cryptocurrency (esp. bitcoin)
> privacy & fungibility will be near the top of the discussions?

Come on, heads of state have been making sideways public comments
at crypto for years, and now at crypto currencies... "damn swiss bank
account on your phone". You have any idea how much lack of sleep
this dilemma is causing them?

Unfortunately rhetoric is getting stronger, like from that
bitch May in the UK and the retirees in US Gov.

Cryptos need to up their deployment and political game.

> hobble currencies ... advantage investments ... achieve political ends

Sounds like cryptocurrencies job... already happening in
some parts and directions.


Re: Torrenting The Darknets

2017-05-20 Thread juan
On Sun, 21 May 2017 01:45:20 -0400
Steve Kinney  wrote:


> Now I think you're describing Freenet.  How doth Freenet suck, let me
> count the ways...

actually freenet seems like the best project of its kind. It's
not garbage produced by the pentagon, and it tries to be really
decentralized. 

> massive computational overhead was the main thing,

I never experienced that, although it would be nice if they
didn't use java. 


> last time I tried it which was ages ago.  It really needed its own
> dedicated box to "just work." 

nonsense.


> But it does distribute files, increase
> the availability of more popular ones (via increased redundancy of
> storage), and is censorship resistant due to distributed storage of
> data which itself is encrypted and anonymized.


yes, the concept is pretty 'cypherpunk'.


> 
> I think a project that aims to improve on the implementation of the
> basic ideas in Freenet could be a big winner.
> 
> :o)
> 
> 
> 
> 
> > Users actual use of the network would
> > be through different apps... be it submitting
> > infohashes, or compute jobs, etc.
> > 
> > Does eliminating all the reward tracking overhead
> > provide substantial resources back to support
> > free use.
> > 
> > ie: Most people and their computer resources sit idle,
> > probably more than enough to provide back whatever
> > multimedia they want to consume.
> > If true, all balances out, no need to bother track accounting
> > with "pay to play" style system?
> > 
> > I like "pay to play" as it offers at least some
> > firm guarantee to the consumer offeror.
> > 
> > But an accounting free system is more fun as in free beer :)
> > 
> > Hybrids might work too.
> > 
> > https://en.wikipedia.org/wiki/Exabyte
> > https://en.wikipedia.org/wiki/Zettabyte
> > https://en.wikipedia.org/wiki/Yottabyte
> > https://en.wikipedia.org/wiki/Orders_of_magnitude_(data)
> > 
> > 100M users donating 10GiB slack space is about 0.93 EiB
> > of non redundant storage, excluding overhead.
> > 
> > Example, at 4x redundancy, that probably easily covers
> > lossless versions of all movies (at least 1080p)
> > and all audio (FLAC), all wikipedia, all OS and apps.
> > 
> > Approaching mini-NSA scale... not a bad start.
> > 
> 



Re: Torrenting The Darknets

2017-05-20 Thread Steven Schear
Warrant Canary creator

On May 20, 2017 10:46 PM, "Steve Kinney"  wrote:



On 05/21/2017 12:32 AM, grarpamp wrote:
> Rewards seem nice, yet not everyone who wants to play
> can pay, or the math overhead is crushing, or it becomes
> centralized. Definitely worth trying, especially if it fits some
> usage model.
>
> Another form is to just let the network use whatever
> CPU, RAM, DISK, NET that you're not currently
> using, or give it whatever limits you want. In short,
> set it and forget it. Let the network figure out how
> to best use your node to support the network.
> Maybe it's a strictly filesharing network,
> or a general purpose network.
> That's on the "Hey I just want to donate
> this because it's cool like Seti@Home, etc."

Now I think you're describing Freenet.  How doth Freenet suck, let me
count the ways... massive computational overhead was the main thing,
last time I tried it which was ages ago.  It really needed its own
dedicated box to "just work."  But it does distribute files, increase
the availability of more popular ones (via increased redundancy of
storage), and is censorship resistant due to distributed storage of data
which itself is encrypted and anonymized.

I think a project that aims to improve on the implementation of the
basic ideas in Freenet could be a big winner.

:o)

Mojo was being developed contemporanously with Freenet and shares some of
its distributed features. It was sort of like Freenet + a resource based
currency. You do not want a filesharing system as it removes any hope of
plausible deniability for content.




> Users actual use of the network would
> be through different apps... be it submitting
> infohashes, or compute jobs, etc.
>
> Does eliminating all the reward tracking overhead
> provide substantial resources back to support
> free use.
>
> ie: Most people and their computer resources sit idle,
> probably more than enough to provide back whatever
> multimedia they want to consume.
> If true, all balances out, no need to bother track accounting
> with "pay to play" style system?
>
> I like "pay to play" as it offers at least some
> firm guarantee to the consumer offeror.
>
> But an accounting free system is more fun as in free beer :)
>
> Hybrids might work too.
>
> https://en.wikipedia.org/wiki/Exabyte
> https://en.wikipedia.org/wiki/Zettabyte
> https://en.wikipedia.org/wiki/Yottabyte
> https://en.wikipedia.org/wiki/Orders_of_magnitude_(data)
>
> 100M users donating 10GiB slack space is about 0.93 EiB
> of non redundant storage, excluding overhead.
>
> Example, at 4x redundancy, that probably easily covers
> lossless versions of all movies (at least 1080p)
> and all audio (FLAC), all wikipedia, all OS and apps.
>
> Approaching mini-NSA scale... not a bad start.
>