Re: [OT, but curious] bye bye, 5G...

2020-06-29 Thread Mirimir
On 06/29/2020 09:45 AM, Karl wrote:



> Punk-Stasi, I think I see you agreeing with Mirimir on some points in this
> thread.

Agreeing or disagreeing with Punk-Stasi are ~equally pointless. Because
whatever you agree with, he'll pretend that he was being ironic, and
criticize you for agreeing with him.



Re: Cointelegraph: Experts Split on Practical Implications of Quantum Cryptography

2020-06-29 Thread Bill Stewart

On 6/29/2020 6:57 PM, Punk-Stasi 2.0 wrote:

On Sun, 28 Jun 2020 23:54:43 + (UTC)
jim bell  wrote:


Cointelegraph: Experts Split on Practical Implications of Quantum Cryptography.
https://cointelegraph.com/news/experts-split-on-practical-implications-of-quantum-cryptography

bullshit as usual.
As far as I know so called 'quantum key distribution' needs an 
authenticated 'classical channel' to work, so it's completely pointless.


There seem to be two kinds of Quantum Crypto out there
- the kind that needs a piece of fiber
- the kind that lets you send your photons in free space between ground 
and satellite.


The former's a very niche application, and doesn't protect you about 
things like pseudonymity vs contact tracing (because you follow the 
piece of fiber and see who's at the other end, or follow the money and 
see who's renting the fiber :-).
It's more useful if your threat model is "Auditors" than "Spies"; 
otherwise you can send an extra diverse dude with a briefcase handcuffed 
to their arm for an initial authentication key exchange and then use 
another layer of Diffie-Hellman for authentication, maybe with an 
annoyingly long ECC key, while also printing the authentication public 
key in a classified ad in the NY Times or Pravda or Federal Register.


The latter's "interesting"; I'm skeptical about its usefulness, but 
haven't looked into it deeply, beyond a quick read of

https://arxiv.org/ftp/arxiv/papers/1909/1909.13061.pdf
There seem to be three approaches
- one end-to-end quantum-protected hop (ground to bird to ground)
- two (ground to bird-in-the-middle, bird-in-the-middle to ground)
- two (trusted-bird sends entangled pair, one to Alice, one to Bob)
Approach 1 doesn't appear to exist, approach 2 lets you use two 
prepare-and-measure channels (meh), approach three could be useful-ish



	Also, my current guess/understanding is that there isn't any 'entanglement' at all.The "trusted-bird sends entangled pair, one to Alice, one to Bob" method 
uses entanglement, but needs a bigger satellite than the 
bird-in-the-middle approach.  (According to the paper, it needs more 
than a 100kg satellite, as opposed to a single-end thing which can fit 
on an under-10kg cubesat.)


Re: Any Cypherpunk there ?

2020-06-29 Thread Alexander Protector
>
> > таракан :
> > It can be argued that only 'criminals' should care about changing their
> identity but if you are targeted by a fascist regime, getting a new ID is a
> question of life and death.
>
Totally agree.

 > Imagine a real fascist power taking control of the entire planet
It has ALREADY happened.


> > how much time they need to seek and destroy opponents or individuals
> listed as potential dangers? maybe just one hour...
>
We are lucky only in that 'they' themselves (members of the fascist power)
hate each other and devour each other. And already now (you need
examples??), they destroy every REALLY threatening their power persons
(ideologically / psychologically / socially = reputation, etc.).


таракан :

> My understanding of cypherpunks is that they are/were a group of people
> trying to defeat evil things such as, indeed, Clearview and using their
> deep knowledge of cryptography to counter the use of digital technologies
> by a fascist power (imagine the Third Reich equipped with computers...)
>
> Tracking/Controlling people isn't really knew but let us say there was
> always ... ways to escape... to find another land, another ID, where there
> was no question.
>
> Think about the fictional character of Jean Valjean in "Les
> Misérables"(the book by Victor Hugo) ...
> As a convict he wore a mark on the arm, identifying him and had his
> infamous condition as a former *forcat* noted in his passport. This
> doesn't prevented him to become a notable, a rich entrepreuneur named
> Monsieur Madeleine.
>
> The action is at the beginning of the XIX century in Post-revolutionary
> France.
>
> Now imagine the same man in ... 2020... an escaped forcat... how can he
> live?, how can he change his identity? How can he transfer funds?  Anything
> he will do, any move he will make will be noticed, tracked, recorded. The
> law enforcement will look at him everywhere , in all possible databases and
> if he wants to have a new French passport "the hard way", he shall have to
> tamper protected memory and insert false the records inside a biometric
> passport, which is extremely difficult. Corruption and social enginering
> may not work any more and making fake French passport should involve deep
> knowledge of cryptography...
>
> Who can do this? Only Cypherpunks.
>
> It can be argued that only 'criminals' should care about changing their
> identity but if you are targeted by a fascist regime, getting a new ID is a
> question of life and death.
>
>  yet to my understanding, escaping and defeating the net which is building
> itself, making the world as a gigantic jail, should be the mission of
> cypherpunks, or to whatever organization that would succeed to them.
>
> Imagine a *real* fascist power taking control of the entire planet , how
> much time they need to seek and destroy opponents or individuals listed as
> potential dangers? *maybe just one hour*...
>
>


Re: Any Cypherpunk there ?

2020-06-29 Thread Zenaan Harkness
On Mon, Jun 29, 2020 at 07:23:34PM +, таракан wrote:
> My understanding of cypherpunks is that they are/were a group of people 
> trying to defeat evil things such as, indeed, Clearview and using their deep 
> knowledge of cryptography to counter the use of digital technologies by a 
> fascist power (imagine the Third Reich equipped with computers...)
> 
> Tracking/Controlling people isn't really knew but let us say there was always 
> ... ways to escape... to find another land, another ID, where there was no 
> question.


We ought remember that the world is ever changing, intentions ever in play - 
the Covid event is cause for some to push for their "fascist utopia", with 
"immunity" passes/passports, human tracking, and literally global per human 
tracking.

Certain freedoms and localities of exemption from the past, are all (afaict) 
under attack.

I.e., we must remain more than vigilant, but pro-active, and ideally consider 
those beyond ourselves - if all my actual neighbours are tracked/monitored, 
then I am left standing out in the crowd as the odd one out, the one to 
literally target.

On this basis, we have no real option but to establish freedom, and the right 
to privacy, for all.  Any exception will be used against us.

   I do not accept the giving up of the right to privacy.



> Think about the fictional character of Jean Valjean in "Les Misérables"(the 
> book by Victor Hugo) ...
> As a convict he wore a mark on the arm, identifying him and had his infamous 
> condition as a former forcat noted in his passport. This doesn't prevented 
> him to become a notable, a rich entrepreuneur named Monsieur Madeleine.
> 
> The action is at the beginning of the XIX century in Post-revolutionary 
> France.
> 
> Now imagine the same man in ... 2020... an escaped forcat... how can he 
> live?, how can he change his identity? How can he transfer funds? Anything he 
> will do, any move he will make will be noticed, tracked, recorded. The law 
> enforcement will look at him everywhere , in all possible databases and if he 
> wants to have a new French passport "the hard way", he shall have to tamper 
> protected memory and insert false the records inside a biometric passport, 
> which is extremely difficult. Corruption and social enginering may not work 
> any more and making fake French passport should involve deep knowledge of 
> cryptography...


Yes, and implicit in the words you use here, is an acquiescence.

Consequent to acquiescence, is "usage by tptb".

Biometric ID will never be limited to a "secure" chip in your passport - the 
centralised beast computer will instantaneously confirm you, regardless of 
document/chip you carry.


> Who can do this? Only Cypherpunks.


What you're saying is true, but unfortunately entirely insufficient.  If I 
believed that a master passport hacker would provide sufficient escape from the 
beast, I woul personally become one.

But that would be almost useless.  Why?  Because each ID hack is a temporary 
(at best!) plugging of one hole in the bucket.

And this plugging of holes is EXACTLY what the powers that be want competent 
people to be doing.  Why?  Because they are left relatively free to go on and 
enslave the entire world, and so ultimately we few stand out in the crowd of 
compliant sheeple anyway.

Systemically for the sociopaths, pathways of courageous challenge achieving 
limited and ever temporary results for passionate and principled individuals, 
is a very good thing for sociopaths - these "plug a hole in the bucket" 
"opportunities" are EXACTLY what the oligarch sociopath ordered.

Today's "valiant hacker" is yesterday's valiant Knight of the realm.


> It can be argued that only 'criminals' should care about changing their 
> identity but if you are targeted by a fascist regime, getting a new ID is a 
> question of life and death.
> 
> yet to my understanding, escaping and defeating the net which is building 
> itself, making the world as a gigantic jail, should be the mission of 
> cypherpunks, or to whatever organization that would succeed to them.
> 
> Imagine a real fascist power taking control of the entire planet , how much 
> time they need to seek and destroy opponents or individuals listed as 
> potential dangers? maybe just one hour...


Yes this is what we must realise - we have no option but to handle, truly 
handle, the whole system.

What to do?

We must establish certain fundamental human rights as inalienable:

   - privacy

   - travel

   - private and anonymous travel

   - speech

   - survival - the right to do those things needed for our survival - collect 
water, grow food and medicine, build housing, make things, trade


Let's create our shared world,



Could Teleporting Ever Work?

2020-06-29 Thread jim bell
https://gizmodo.com/could-teleporting-ever-work-1844131586
"Teleportation" that can only copy a person, not merely move him, would greatly 
complicate episodes of Star Trek.

Re: [OT, but curious] bye bye, 5G...

2020-06-29 Thread \0xDynamite
> And, I ask pardon, but now I am completely sure that my life is a disgraceful 
> shit, but I do love it.  I do love being alive.  It's always fucking 
> interesting and my memories are part of who I am now.  My memories, fears, 
> and traums can be scary or sad, but are important part of my life.  So I can 
> live with them pretty well, I think.  Or I die trying it.  ;)

You sound cool.  Your picture doesn't show a disgraceful person.

> (But some problems are sooo fucking boring...  Me too, I know.  Sorry, bad 
> mood.  Need more sugar.)

Now, now, what's your problem with yourself?

Mark


Re: [OT, but curious] bye bye, 5G...

2020-06-29 Thread Cecilia Tanaka
PS:  - Just in case, I was not using stupid masks.  They were feeling bad
and, in some way, watching my face was comfortable to most of them,
specially the children.  They always think I am funny.

I gave up Criminology area when much younger, before ending the Law degree,
because of a kid's corpse.  It was fucking brutal watching it.  His father
should protect and love him, not kill him.  It was the second dead child of
my life and definitely it was enough, but had to watch more children
corpses in the last months.  And lots and lots of people older and younger
than me.

And, I ask pardon, but now I am completely sure that my life is a
disgraceful shit, but I do love it.  I do love being alive.  It's always
fucking interesting and my memories are part of who I am now.  My memories,
fears, and traums can be scary or sad, but are important part of my life.
So I can live with them pretty well, I think.  Or I die trying it.  ;)

(But some problems are sooo fucking boring...  Me too, I know.  Sorry, bad
mood.  Need more sugar.)


Re: Any Cypherpunk there ?

2020-06-29 Thread таракан
About the fascist farce and the "law of the masks" over the planet,
 this is like the "Reichstag Fire" technique... you put the virus somewhere (by 
accident or by malevolence) and you start to use it as a pretext to make the 
whole world submitting to your laws and you blame normal people for propagating 
the infection because they refuse to wear "the mask".

We live in a small community of 7 billion souls, all provided with a smartphone 
and driven by collective fears and psychoses.

That's hilarious to see all these idiots with their useless masks who think 
they're doing something great. If there was such a lethal virus, there would be 
piles of bodies in the streets everywhere by now.

It's just one more of these "mutating" viruses probably resulting from a 
combination of pollution, greed, malevolence, human experimentation and other 
similar manipulations.

And so what are we doing about that? Nothing... We let them imposing their 
pseudo-scientific laws with their limited knowledge of what really virus are...

By now many people start to understand that the Covid-19 isn't exactly a 
biological virus... more a virus in the mind itself... collective delusion and 
dementia.



Re: Cointelegraph: Experts Split on Practical Implications of Quantum Cryptography

2020-06-29 Thread таракан
> On Monday, June 29, 2020, 09:50:46 AM PDT, Karl  wrote:
>>Jim put a lot of energy here into replying to a joke.
>
> I'm not aware that:
>
> "Scientists in China managed to exchange a crypto key at a distance of over 
> 1,000 kilometers"
>
>>"Wow!"
>
>>"How can they do that?"
>
> is a joke.
>
> Actually this 50% a joke 50% serious, since the initial article did not 
> mention anything about using Quantum Entanglement and so as such the 
> challenged looked as if we were in ... 1820...

now for the 50% seriousity, I wonder how they can really use quantum 
entanglement at such a distance ... I am sceptical there and it would be 
marvelous if they really achieved what they claim they achieved... quantum 
entanglement over more than 1,000 km of distance... you flip a bit, it gets 
'instantaneously' flipped on an other part of the world, located at 1,200 km 
distance, information without matter movement, at a speed (much) faster than 
light.

I got the explaination from Jim, still besides the obvious issues with the 
cables etc... such phenomenon as quantum entanglement relies on very complex 
experimentation and so I am not convinced at all that what they exchanged ( 
cryptohgraphic keys but in that context doesn't relaly matter ) was not used by 
"ordinary" communication, eg with matter displacement.

Re: Any Cypherpunk there ?

2020-06-29 Thread таракан
> I think the people who are whipping up before breakfast the anonymity 
> networks that could save enslaved nations, are doing most of their work in 
> private nowadays, to find more success.

Are nations really enslaved? Will these anonymity networks can really save 
anyone?

I'm personally not using Tor I don't trust in it and I'm sure it's completely 
controlled by all sort of governmental systems and under heavy monitoring in 
all cases.

But anyway as you described it, anything such an impenetrable communication 
framework that would be really dangerous for 'the actual system' (eg the big 
thing who decided all the sudden we all had to wear masks all over the world) 
would be known only by a small amount of people, that's obvious. Question 
remains how these people would get to know each others in a safe way ?

Re: Any Cypherpunk there ?

2020-06-29 Thread Karl
I can't speak for this list, but since I am on my email right now:

I think the people who are whipping up before breakfast the anonymity
networks that could save enslaved nations, are doing most of their work in
private nowadays, to find more success.

On Mon, Jun 29, 2020, 3:24 PM таракан 
wrote:

> My understanding of cypherpunks is that they are/were a group of people
> trying to defeat evil things such as, indeed, Clearview and using their
> deep knowledge of cryptography to counter the use of digital technologies
> by a fascist power (imagine the Third Reich equipped with computers...)
>
> Tracking/Controlling people isn't really knew but let us say there was
> always ... ways to escape... to find another land, another ID, where there
> was no question.
>
> Think about the fictional character of Jean Valjean in "Les
> Misérables"(the book by Victor Hugo) ...
> As a convict he wore a mark on the arm, identifying him and had his
> infamous condition as a former *forcat* noted in his passport. This
> doesn't prevented him to become a notable, a rich entrepreuneur named
> Monsieur Madeleine.
>
> The action is at the beginning of the XIX century in Post-revolutionary
> France.
>
> Now imagine the same man in ... 2020... an escaped forcat... how can he
> live?, how can he change his identity? How can he transfer funds?  Anything
> he will do, any move he will make will be noticed, tracked, recorded. The
> law enforcement will look at him everywhere , in all possible databases and
> if he wants to have a new French passport "the hard way", he shall have to
> tamper protected memory and insert false the records inside a biometric
> passport, which is extremely difficult. Corruption and social enginering
> may not work any more and making fake French passport should involve deep
> knowledge of cryptography...
>
> Who can do this? Only Cypherpunks.
>
> It can be argued that only 'criminals' should care about changing their
> identity but if you are targeted by a fascist regime, getting a new ID is a
> question of life and death.
>
>  yet to my understanding, escaping and defeating the net which is building
> itself, making the world as a gigantic jail, should be the mission of
> cypherpunks, or to whatever organization that would succeed to them.
>
> Imagine a *real* fascist power taking control of the entire planet , how
> much time they need to seek and destroy opponents or individuals listed as
> potential dangers? *maybe just one hour*...
>
>
>
>
> ‐‐‐ Original Message ‐‐‐
> On Monday, 29 June 2020 г., 21:44, Karl  wrote:
>
>
> On Mon, Jun 29, 2020, 2:43 PM Karl  wrote:
>
>> Just adding on here,
>>
>> On Fri, Jun 26, 2020, 10:13 PM coderman  wrote:
>>
>>> ‐‐‐ Original Message ‐‐‐
>>> On Friday, June 26, 2020 11:54 PM, таракан <
>>> cryptoanalyz...@protonmail.com> wrote:
>>> ...
>>>
>>> My understanding of Cypherpunks is - as per their Manifesto - that they
>>> are trying to build privacy in a world where privacy is becoming a crime.
>>>
>>> I thought recently that the biggest 'weapon' against a fascism regime
>>> would be to create the inability for that fascist regime to track, locate,
>>> monitor and spy someone.
>>>
>>>
>>> in the words of every hacker ever: "What's your threat model?"
>>>
>>> nation state attackers are fairly infallible, unless you're personally
>>> gifted and/or well resourced...
>>>
>>
>> There are different degrees of being targeted.  If you can stay
>> uninteresting, there is still lots of value.  (it's also quite inspiring to
>> see targeted people using privacy technology, as not everyone is free to:
>> and I imagine this helps talk to others without endangering them)
>>
>> I walk in the street right now. Nobody knows who I am.
>>>
>>>
>>> check out Clearview AI - and remember this is a commercial,
>>> non-classified effort!
>>>  E.g.:
>>> https://www.nytimes.com/2020/01/18/technology/clearview-privacy-facial-recognition.html
>>> , https://www.cbc.ca/news/technology/clearview-app-privacy-1.5447420
>>>
>>
>> Note that many are pausing on facial recognition now due to authority
>> abuse.  The OP would be a dot in a database who might be wearing a
>> coronavirus mask and is associated only with where he walks.
>>
>>> My SIM card isn't linked to any ID (true).
>>>
>>>
>>> check out "The Find", and other techniques that are designed to work
>>> against burner phones; they attack pattern of life data exhaust across all
>>> cell tower radios in addition to targeted attacks against specific baseband
>>> chipsets of "selected" targets
>>>
>>
>> Sounds like you need a lot of additional data to build a profile.
>>
>> My phone cannot track me because it hasn'\t a GPS and so on ...
>>>
>>>
>>> note that tower based triangulation is nearly as effective as GPS, in
>>> terms of geolocation privacy risk.
>>>
>>
>> Effective, but less effective.
>>
>> I like to keep a phone on hand bought from some physical store that sells
>> a lot of them, with its antennas and ideally radio 

Re: Any Cypherpunk there ?

2020-06-29 Thread таракан
My understanding of cypherpunks is that they are/were a group of people trying 
to defeat evil things such as, indeed, Clearview and using their deep knowledge 
of cryptography to counter the use of digital technologies by a fascist power 
(imagine the Third Reich equipped with computers...)

Tracking/Controlling people isn't really knew but let us say there was always 
... ways to escape... to find another land, another ID, where there was no 
question.

Think about the fictional character of Jean Valjean in "Les Misérables"(the 
book by Victor Hugo) ...
As a convict he wore a mark on the arm, identifying him and had his infamous 
condition as a former forcat noted in his passport. This doesn't prevented him 
to become a notable, a rich entrepreuneur named Monsieur Madeleine.

The action is at the beginning of the XIX century in Post-revolutionary France.

Now imagine the same man in ... 2020... an escaped forcat... how can he live?, 
how can he change his identity? How can he transfer funds? Anything he will do, 
any move he will make will be noticed, tracked, recorded. The law enforcement 
will look at him everywhere , in all possible databases and if he wants to have 
a new French passport "the hard way", he shall have to tamper protected memory 
and insert false the records inside a biometric passport, which is extremely 
difficult. Corruption and social enginering may not work any more and making 
fake French passport should involve deep knowledge of cryptography...

Who can do this? Only Cypherpunks.

It can be argued that only 'criminals' should care about changing their 
identity but if you are targeted by a fascist regime, getting a new ID is a 
question of life and death.

yet to my understanding, escaping and defeating the net which is building 
itself, making the world as a gigantic jail, should be the mission of 
cypherpunks, or to whatever organization that would succeed to them.

Imagine a real fascist power taking control of the entire planet , how much 
time they need to seek and destroy opponents or individuals listed as potential 
dangers? maybe just one hour...

‐‐‐ Original Message ‐‐‐
On Monday, 29 June 2020 г., 21:44, Karl  wrote:

> On Mon, Jun 29, 2020, 2:43 PM Karl  wrote:
>
>> Just adding on here,
>>
>> On Fri, Jun 26, 2020, 10:13 PM coderman  wrote:
>>
>>> ‐‐‐ Original Message ‐‐‐
>>> On Friday, June 26, 2020 11:54 PM, таракан  
>>> wrote:
>>> ...
>>>
 My understanding of Cypherpunks is - as per their Manifesto - that they 
 are trying to build privacy in a world where privacy is becoming a crime.

 I thought recently that the biggest 'weapon' against a fascism regime 
 would be to create the inability for that fascist regime to track, locate, 
 monitor and spy someone.
>>>
>>> in the words of every hacker ever: "What's your threat model?"
>>>
>>> nation state attackers are fairly infallible, unless you're personally 
>>> gifted and/or well resourced...
>>
>> There are different degrees of being targeted. If you can stay 
>> uninteresting, there is still lots of value. (it's also quite inspiring to 
>> see targeted people using privacy technology, as not everyone is free to: 
>> and I imagine this helps talk to others without endangering them)
>>
 I walk in the street right now. Nobody knows who I am.
>>>
>>> check out Clearview AI - and remember this is a commercial, non-classified 
>>> effort!
>>> E.g.: 
>>> https://www.nytimes.com/2020/01/18/technology/clearview-privacy-facial-recognition.html
>>>  , https://www.cbc.ca/news/technology/clearview-app-privacy-1.5447420
>>
>> Note that many are pausing on facial recognition now due to authority abuse. 
>> The OP would be a dot in a database who might be wearing a coronavirus mask 
>> and is associated only with where he walks.
>>
 My SIM card isn't linked to any ID (true).
>>>
>>> check out "The Find", and other techniques that are designed to work 
>>> against burner phones; they attack pattern of life data exhaust across all 
>>> cell tower radios in addition to targeted attacks against specific baseband 
>>> chipsets of "selected" targets
>>
>> Sounds like you need a lot of additional data to build a profile.
>>
 My phone cannot track me because it hasn'\t a GPS and so on ...
>>>
>>> note that tower based triangulation is nearly as effective as GPS, in terms 
>>> of geolocation privacy risk.
>>
>> Effective, but less effective.
>>
>> I like to keep a phone on hand bought from some physical store that sells a 
>> lot of them, with its antennas and ideally radio chips removed or grounded, 
>> before it is first turned on. I like to add a chain inside and keep the 
>> device chained to me. I have seen such devices do freaky things one learns 
>> to prevent, like update their system time over bluetooth. I have found them 
>> to be reliable secure storage for now.
>>
 I know that with the time that sort of life will be harder and harder. 
 Hence I feel it is a noble t

Re: Cointelegraph: Experts Split on Practical Implications of Quantum Cryptography

2020-06-29 Thread jim bell
 
On Monday, June 29, 2020, 09:50:46 AM PDT, Karl  wrote:
>Jim put a lot of energy here into replying to a joke.


I'm not aware that:
"Scientists in China managed to exchange a crypto key at a distance of over 
1,000 kilometers"

>"Wow!"

>"How can they do that?"
is a joke.  Although, in a way quantum mechanics can be described  as a cosmic 
joke played on physicists.  Somewhat akin to Kurt Godel's work being a joke 
played on mathematicians and logicians. 
https://en.wikipedia.org/wiki/Kurt_G%C3%B6del     Sometimes advances disrupt 
just about everything.  

>Jim appears to be an electronics supergenius."


Strictly speaking, quantum entanglement and optical fibers are mostly physics, 
not electronics.
So far, my main contribution to "electronics" is my second (unpublished) 
invention, which I allude to here:
https://daltonium.com/


An isotope-modified dielectric which will be used in semiconductors, a further 
advance in the use of the element hafnium as a substitute for silica (SiO2)   
https://en.wikipedia.org/wiki/Hafnium_dioxide#:~:text=Hafnium%2Dbased%20oxides%20were%20introduced,than%20that%20of%20SiO2.

Applications[edit]

Hafnia is used in optical coatings, and as a high-κ dielectric in DRAM 
capacitors and in advanced metal-oxide-semiconductor devices.[6] Hafnium-based 
oxides were introduced by Intel in 2007 as a replacement for silicon oxide as a 
gate insulator in field-effect transistors.[7] The advantage for transistors is 
its high dielectric constant: the dielectric constant of HfO2 is 4–6 times 
higher than that of SiO2.[8] The dielectric constant and other properties 
depend on the deposition method, composition and microstructure of the 
material.                [end of quote]

And:
https://en.wikipedia.org/wiki/High-%CE%BA_dielectric

"The term high-κ dielectric refers to a material with a high dielectric 
constant (κ, kappa), as compared to silicon dioxide. High-κ dielectrics are 
used in semiconductor manufacturing processes where they are usually used to 
replace a silicon dioxide gate dielectric or another dielectric layer of a 
device. The implementation of high-κ gate dielectrics is one of several 
strategies developed to allow further miniaturization of microelectronic 
components, colloquially referred to as extending Moore's Law. Sometimes, these 
materials are called "high-k" (spoken high kay), instead of "high-κ" (high 
kappa)."    [end of quote]



Here, I must be cautious about referring to my invention, for reasons of 
obtaining a patent.  My Provisional patent application has 80 claims, only a 
small number of which refer to this new isotope-modified dielectric.
                 Jim Bell



On Mon, Jun 29, 2020, 4:48 AM jim bell  wrote:

 Albert Einstein called it "spooky action at a distance".  He hated the concept 
of quantum mechanics, saying "God does not play dice with the Universe".  
Unfortunately, Einstein was quite wrong.  
The idea is that pairs of photons can be generated and can go virtually any 
distance, and then a measurement made on one of these photons essentially 
instantaneously determines the equivalent value of the other photon.  There is 
apparently no limit to the distance over which this can be done.  A few years 
ago I read that the apparent velocity of this connection is at least 10,000 
times c, or the speed of light in a vacuum.  
https://blogs.scientificamerican.com/news-blog/quantum-weirdnes-wins-again-entangl-2008-08-13/#:~:text=(In%202007%2C%20researchers%20transmitted%20entangled,two%20of%20the%20Canary%20Islands.)&text=But%20in%20reality%2C%20no%20experiment,times%20the%20speed%20of%20light.
"The photons were indeed entangled, the group reports in Nature. But in 
reality, no experiment is perfect, so what they end up with is a lower limit on 
how fast the entanglement could be traveling: 10,000 times the speed of light."
I'm not a good person to be explaining this to you:  My degree is in chemistry, 
not physics.  But read up on Bell's inequalities.  (different Bell!)  
https://en.wikipedia.org/wiki/Bell%27s_theorem   

"Bell's theorem proves that quantum physics is incompatible with local hidden 
variable theories. It was introduced by physicist John Stewart Bell in a 1964 
paper titled "On the Einstein Podolsky Rosen Paradox", referring to a 1935 
thought experiment that Albert Einstein, Boris Podolsky and Nathan Rosen used 
to argue that quantum physics is an "incomplete" theory.[1][2]

| 
| 
| 
|  |  |

 |

 |
| 
|  | 
Bell's theorem

Bell carried the analysis of quantum entanglement much further. He deduced that 
if measurements are performed in...
 |

 |

 |



 By 1935, it was already recognized that the predictions of quantum physics are 
probabilistic. Einstein, Podolsky and Rosen presented a scenario that, in their 
view, indicated that quantum particles, like electrons and photons, must carry 
physical properties or attributes not included in quantum theory, and the 
uncertainties in quantum theory's predictions are due to 

Re: [WAR] The ministry of truth: NATO liberation of Libya, 2011

2020-06-29 Thread Karl
https://www.aljazeera.com/

--

There is proof inside many peoples' electronics.  Proof that a marketing
group would contract development of a frightening virus.  A virus that
responds to peoples' keystrokes and browsing habits, and changes what
people see on their devices.  A virus that alters political behavior en
masse, for profit.

On Sun, Jun 28, 2020, 12:15 AM Zig the N.g  wrote:

> Looks like the West's evil in Libya is being checked.  Bout bloody time
> too!
>
> Russian Mercenaries Have Entered Libya's Largest Oil Field To Block Output
>
> https://www.zerohedge.com/energy/russian-mercenaries-have-entered-libyas-largest-oil-field-enforce-haftars-blockade
>
>Despite that Gen. Khalifa Haftar's year-long offensive to take the
> capital was recently was defeated and ultimately pushed back, his Libyan
> National Army (LNA) still controls most of the country's major oil fields.
>
>The Benghazi-based commander has for years secured all oil fields
> especially in the eastern half of the country, even as Libya's official
> National Oil Corporation (NOC) is based in Tripoli and operates under the
> aegis of the UN-backed Government of National Accord (GNA).
>
>Haftar has long used this "oil weapon" by threatening to impose a total
> blockade on exports. Recall that in late January and into February of this
> year he did just that, declaring a "catastrophic" blockade of oil fields
> taking output down to almost zero in order to starve Tripoli and the NOC of
> vital state revenues, which has continued to now.
>Oil production makes up over 90% of Libya's national revenue, via
> Reuters.
>
>With his dream of seizing Tripoli dashed, thanks in no small part to
> Turkey's providing significant military support to the GNA, the oil
> blockade appears to in force more severely than ever, but this time
> reportedly with Russian help.
>
>Since last year it's been widely reported that Russian mercenary firm,
> the Kremlin-based Wagner Group, is embedded with pro-Haftar forces. But
> this latest development via Reuters on Friday will certainly raise eyebrows
> in Europe and Washington. The NOC is now charging that Russia is meddling
> in its domestic production: ...
>
>
>
>
> On Sun, Aug 07, 2016 at 11:58:01PM +1000, Zenaan Harkness wrote:
> > If the following were not true, we'd be incredulous that someone would
> > propose such an unbelievable and lame movie plot.
> >
> > Sadly, this is what North America and NATO stand for.
> >
> >
> >
> >
> > I Thought NATO “Liberated” Libya in 2011?
> >
> http://journal-neo.org/2016/08/04/i-thought-nato-liberated-libya-in-2011/
> >
> > “Operation Unified Protector is one of the most successful in NATO’s
> > history… We have done this together for the people of Libya, so they can
> > take their future firmly and safely into their own hands. Libyans have
> > now liberated their country. And they have transformed the region. This
> > is their victory” - Former NATO Secretary General, Anders Fogh
> > Rasmussen, speaking in October, 2011.
> > http://www.nato.int/cps/en/natolive/news_80052.htm
> >
> > “In Libya, the death of Muammar al-Qaddafi showed that our role in
> > protecting the Libyan people, and helping them break free from a tyrant,
> > was the right thing to do” – US President, Barack Obama, speakingin
> > October, 2011.
> >
> http://www.reuters.com/article/us-obama-foreignpolicy-idUSTRE79L0MH20111023
> >
> > “I am proud to stand here on the soil of a free Tripoli and on behalf of
> > the American people I congratulate Libya. This is Libya’s moment, this
> > is Libya’s victory, the future belongs to you” – Former US Secretary of
> > State and Democratic Nominee for President, Hillary Clinton, speaking in
> > October, 2011.
> > https://www.alarabiya.net/articles/2011/10/19/172519.html
> >
> > On August the 1st, US warplanes bombed Islamic State (IS/ISIS/ISIL)
> > targets in the Libyan city of Sirte, almost exactly five years after
> > Western imperialists declared NATO’s 2011 war in Libya a complete
> > success.
> >
> http://journal-neo.org/2015/10/17/nato-s-humanitarian-intervention-in-libya-exacerbated-humanitarian-suffering/
> >
> > These strikes are not the first conducted by the US in Libya this year,
> > in a broader campaign that is officially aimed at defeating an enemy
> > that the US had a major hand in creating in the first place (I’m sure
> > the military-industrial complex isn’t complaining however).
> >
> > Peter Cook, the Pentagon’s Press Secretary, said in a statement released
> > on the 1st of August in relation to the strikes that:
> >
> http://www.defense.gov/News/News-Releases/News-Release-View/Article/881794/statement-by-pentagon-press-secretary-peter-cook-on-us-air-strike-in-libya
> > “Today, at the request of the Libyan Government of National Accord
> > (GNA), the United States military conducted precision air strikes [which
> > is Orwellian/Pentagon-speak for dropping bombs (not uncommonly on
> > civilians)] against ISIL targets in S

Fw: Re: Assange Superseding Indictment

2020-06-29 Thread coderman
list may know of a copy, somewhere? :P

not arguing against the life destroying pressure. but no sympathy for smug fuck 
you after the fact...

‐‐‐ Original Message ‐‐‐
On Monday, June 29, 2020 7:51 AM, Digitalfolklore 
 wrote:

> Sabu posted a pic...made a bet with Jester...he also posted a blockchain 
> address...
>
> see if thats around...Sabus twitter was cloned...take the S out of 
> anonymous...add Sabu and you';ll have the clone.
>
> Also important to remember Biella Coleman met with Sabu more than once.
> I 'll leave that for you to work out.
>
> It is important to remember when your family are heroin dealers and you're 
> the only family member not in jail...you will do anything to save the 
> children...Sabu was in the wrong poke at the wrong time. He should have been 
> more careful...ever notice that lovely iMac in pics?
> There were other suspect accounts...wikileaks called out AnonIRC
>
> Sabu was known in the local area as a home panel beater...he made videos on 
> YT showing how to fix bent fendershe 'was' well known in the area.
> VH
>
> ‐‐‐ Original Message ‐‐‐
> On Friday, 26 June 2020 7:52 AM, coderman  wrote:
>
>> ‐‐‐ Original Message ‐‐‐
>> On Thursday, June 25, 2020 9:50 PM, coderman  wrote:
>> ...
>>
>>> it should be noted in 2011 at DEF CON Sabu the rat fuck was helping FBI 
>>> NatSec "hack the hackers" using DirtBoxes with custom exploit chains.
>>
>> to be clear: Sabu didn't help write the hacks, only told them where to 
>> point. Sabu more script kiddie than exploit dev...
>>
>> best regards,

Re: what matters? -- Re: Superseding indictment of Julian Assange as of 6/24/2020

2020-06-29 Thread Karl
Thank you so much.

Our enemies are our allies, over here.  Nonapproval is an indicator of
efficiency in finding the shared fight.


On Sat, Jun 27, 2020, 1:20 PM Zenaan Harkness  wrote:

> On Fri, Jun 26, 2020 at 09:36:54PM +1000, Zenaan Harkness wrote:
> > On Thu, Jun 25, 2020 at 03:53:01PM -0400, John Young wrote:
> > > Assange will be sacrificed and discarded by journalists once no longer
> useful.
> > > This is a long-standing practice to assure official protection and
> privilege.
> > > Assange once advocated this warning but was eventully coopted by
> journalists
> > > who joined his team and pushed the outreach to duplicitous journalism.
> > >
> > > Braying about threat to journalism by Assange's prosecution is a
> deception op
> > > conducted in cooperation with authorities. Snowden's promoters have
> admitted
> > > consulting with USG on what to publish, what to redact, what to
> withhold.
> > > Barton Gellman describes his following this CYA standard procedure in
> Dark
> > > Mirror.
> > >
> > > WikiLeaks burned sources with loose security, incoherent management,
> Julian's
> > > vanity and opportunism, thinking he could use cohorts for his purpose
> without
> > > penalty. The indictment outlines the parties he enlisted, quite a few
> likely
> > > to have decided to cooperate, like Sabu, the "Teenager," maybe
> Appelbaum,
> > > others pseudonymed.
> > >
> > > Those he has manipulated will turn against him under pressure from
> prosecutors
> > > against them, their families and friends. Same happened to Manning,
> Swartz,
> > > kirakou, Hammond, long list of others.
> > >
> > > Snowden will eventually be handed over to USG by those he came to
> trust the
> > > most. Trust wears thin over time and goosed by planted suspicions and
> doubts,
> > > ambition, need for income. And fans are notoriously fickle, don't give
> a shit
> > > after the excitement wanes, smears are spread, bots and media
> countermesures
> > > are unleashed, rewards are offered like Greenwald's "irresistables"
> > > undergirding The Intercept.
> > >
> > > And there is always the AP option for terminating JA. Treachery of
> supporters
> > > is too.
> >
> >
> > Much true here.
> >
> > True men of principle do not suffer greatly for vainglorious ends.
> Though some may get caught up in the superficial, we should feel sorry for
> them on that count, whilst at the same time upholding principles worthy.
> >
> > Manning may have procured her relief from her "double jeopardy" with a
> (temp) non-disclosure, yet she remains vigilant to a tee in not "being a
> dog and knifing Assange" for her own physical freedom - the loyalty of a
> champion, and for the right foundation of righteous principle, so a huge
> and gracious -thank you- to Manning!
> >
> > Assange had things to learn on his journey it appears - are any of us
> exempt from such?  Let's not shoot the messenger.  Let's take a leaf from
> Manning's book of grace and loyalty - if we asked her, would she hesitate
> to say "punch up, not down" ?
> >
> > Assange was part of a team, and as incoherent and flawed as it may have
> been, that team achieved massive wins - never forget that the results, from
> a broader perspective have shaken the foundations of empire, with its
> relentless revenge mission against Assange still in full swing to this day
> after so many years.
> >
> > If as you say, Assange 'has manipulated' people on his Wikileaks
> journey, just how many more years would -you- keep him locked up in Maxi,
> how many more years from now (of Assange in jail), depriving his children
> of their father, do you personally say that Assange ought be kept in the
> slammer in order to mete out sufficient "justic" in your mind?
> >
> > This is a serious and real question to you John (no matter that we are
> not the judiciary prosecuting him) - what be your position on the actual
> pennance Assange, as you imply, ought pay?
> >
> > Yes there are always many options - perhaps we can help to spread the
> word of caution, of loyalty, remind folks that ultimate dignity is that in
> our own mirrored eyes, before our maker and with none between ...
>
>
> John perhaps the following will resonate.
>
> This battle some of us have been in is not "merely against empire," it is
> a battle for justice, truth, transparency, agency, righteousness, and in
> too many cases, for life itself (the evils of Barack "Drone-Bama" come to
> mind for example).  "We fight not against men ..."
>
> In present times, when a supporter of such actually worthy goals goes in
> to bat, to support, he may well be surprised to find that "a little genuine
> support for a good cause" ends up locating him in a battle royale - in fact
> battle after battle after night of the living dead battle!  Some of us have
> experienced this in wrenching, Soul purifying (hopefully) clarity.
>
> And when we appear to battle against "bleedingly obvious" stupidity and
> uncoordination, incoherency and so many flaws it rips tears from our h

Re: Any Cypherpunk there ?

2020-06-29 Thread Karl
On Mon, Jun 29, 2020, 2:43 PM Karl  wrote:

> Just adding on here,
>
> On Fri, Jun 26, 2020, 10:13 PM coderman  wrote:
>
>> ‐‐‐ Original Message ‐‐‐
>> On Friday, June 26, 2020 11:54 PM, таракан <
>> cryptoanalyz...@protonmail.com> wrote:
>> ...
>>
>> My understanding of Cypherpunks is - as per their Manifesto - that they
>> are trying to build privacy in a world where privacy is becoming a crime.
>>
>> I thought recently that the biggest 'weapon' against a fascism regime
>> would be to create the inability for that fascist regime to track, locate,
>> monitor and spy someone.
>>
>>
>> in the words of every hacker ever: "What's your threat model?"
>>
>> nation state attackers are fairly infallible, unless you're personally
>> gifted and/or well resourced...
>>
>
> There are different degrees of being targeted.  If you can stay
> uninteresting, there is still lots of value.  (it's also quite inspiring to
> see targeted people using privacy technology, as not everyone is free to:
> and I imagine this helps talk to others without endangering them)
>
> I walk in the street right now. Nobody knows who I am.
>>
>>
>> check out Clearview AI - and remember this is a commercial,
>> non-classified effort!
>>  E.g.:
>> https://www.nytimes.com/2020/01/18/technology/clearview-privacy-facial-recognition.html
>> , https://www.cbc.ca/news/technology/clearview-app-privacy-1.5447420
>>
>
> Note that many are pausing on facial recognition now due to authority
> abuse.  The OP would be a dot in a database who might be wearing a
> coronavirus mask and is associated only with where he walks.
>
>> My SIM card isn't linked to any ID (true).
>>
>>
>> check out "The Find", and other techniques that are designed to work
>> against burner phones; they attack pattern of life data exhaust across all
>> cell tower radios in addition to targeted attacks against specific baseband
>> chipsets of "selected" targets
>>
>
> Sounds like you need a lot of additional data to build a profile.
>
> My phone cannot track me because it hasn'\t a GPS and so on ...
>>
>>
>> note that tower based triangulation is nearly as effective as GPS, in
>> terms of geolocation privacy risk.
>>
>
> Effective, but less effective.
>
> I like to keep a phone on hand bought from some physical store that sells
> a lot of them, with its antennas and ideally radio chips removed or
> grounded, before it is first turned on.  I like to add a chain inside and
> keep the device chained to me.  I have seen such devices do freaky things
> one learns to prevent, like update their system time over bluetooth.  I
> have found them to be reliable secure storage for now.
>
>> I know that with the time that sort of life will be harder and harder.
>> Hence I feel it is a noble task to build a system where people can live a
>> normal life and stay anonymous - as they want.
>>
>>
>> indeed! as mentioned before:
>>
>> first deploy encryption to kill passive Eve's ears.
>>  then keying Hardened end-to-end to avoid active Mallory in the Middle.
>>   finally, harden Physical Security against burglary and rubber brutes...
>>
>
> All things people have worked hard on but not quite normalized.  Don't
> forget EMI.
>
>> Interesting enugh soon there will be Quantum crypto, and maybe NSA has
>> already it.
>> How long can we trust these good old programs such as PGP?  RSA wouldn't
>> last a long time against a quantum computer ...
>>
>>
>> side benefit of privacy enhancing technologies like Fully Homomorphic
>> Encryption: they're resistant to quantum attacks (e,g. Post-Quantum ready
>> crypto :)
>>
>> C.f.: https://github.com/homenc/HElib ,
>> https://github.com/IBM/fhe-toolkit-macos , etc.
>>
>
> Thank you for this.  Inspiring.  Missing from pqcrypto.org .
>
> Karl
>
> There is proof inside many peoples' electronics.  Proof that a marketing
> group would contract development of a frightening virus.  A virus that
> responds to peoples' keystrokes and browsing habits, and changes what
> people see on their devices.  A virus that alters political behavior en
> masse, for profit.
> There is proof inside many peoples' electronics.  Proof that a marketing
> group would contract development of a frightening virus.  A virus that
> responds to peoples' keystrokes and browsing habits, and changes what
> people see on their devices.  A virus that alters political behavior en
> masse, for profit.
>


Re: Any Cypherpunk there ?

2020-06-29 Thread Karl
Just adding on here,

On Fri, Jun 26, 2020, 10:13 PM coderman  wrote:

> ‐‐‐ Original Message ‐‐‐
> On Friday, June 26, 2020 11:54 PM, таракан 
> wrote:
> ...
>
> My understanding of Cypherpunks is - as per their Manifesto - that they
> are trying to build privacy in a world where privacy is becoming a crime.
>
> I thought recently that the biggest 'weapon' against a fascism regime
> would be to create the inability for that fascist regime to track, locate,
> monitor and spy someone.
>
>
> in the words of every hacker ever: "What's your threat model?"
>
> nation state attackers are fairly infallible, unless you're personally
> gifted and/or well resourced...
>

There are different degrees of being targeted.  If you can stay
uninteresting, there is still lots of value.  (it's also quite inspiring to
see targeted people using privacy technology, as not everyone is free to:
and I imagine this helps talk to others without endangering them)

I walk in the street right now. Nobody knows who I am.
>
>
> check out Clearview AI - and remember this is a commercial, non-classified
> effort!
>  E.g.:
> https://www.nytimes.com/2020/01/18/technology/clearview-privacy-facial-recognition.html
> , https://www.cbc.ca/news/technology/clearview-app-privacy-1.5447420
>

Note that many are pausing on facial recognition now due to authority
abuse.  The OP would be a dot in a database who might be wearing a
coronavirus mask and is associated only with where he walks.

> My SIM card isn't linked to any ID (true).
>
>
> check out "The Find", and other techniques that are designed to work
> against burner phones; they attack pattern of life data exhaust across all
> cell tower radios in addition to targeted attacks against specific baseband
> chipsets of "selected" targets
>

Sounds like you need a lot of additional data to build a profile.

My phone cannot track me because it hasn'\t a GPS and so on ...
>
>
> note that tower based triangulation is nearly as effective as GPS, in
> terms of geolocation privacy risk.
>

Effective, but less effective.

I like to keep a phone on hand bought from some physical store that sells a
lot of them, with its antennas and ideally radio chips removed or grounded,
before it is first turned on.  I like to add a chain inside and keep the
device chained to me.  I have seen such devices do freaky things one learns
to prevent, like update their system time over bluetooth.  I have found
them to be reliable secure storage for now.

> I know that with the time that sort of life will be harder and harder.
> Hence I feel it is a noble task to build a system where people can live a
> normal life and stay anonymous - as they want.
>
>
> indeed! as mentioned before:
>
> first deploy encryption to kill passive Eve's ears.
>  then keying Hardened end-to-end to avoid active Mallory in the Middle.
>   finally, harden Physical Security against burglary and rubber brutes...
>

All things people have worked hard on but not quite normalized.  Don't
forget EMI.

> Interesting enugh soon there will be Quantum crypto, and maybe NSA has
> already it.
> How long can we trust these good old programs such as PGP?  RSA wouldn't
> last a long time against a quantum computer ...
>
>
> side benefit of privacy enhancing technologies like Fully Homomorphic
> Encryption: they're resistant to quantum attacks (e,g. Post-Quantum ready
> crypto :)
>
> C.f.: https://github.com/homenc/HElib ,
> https://github.com/IBM/fhe-toolkit-macos , etc.
>

Thank you for this.  Inspiring.  Missing from pqcrypto.org .

Karl

There is proof inside many peoples' electronics.  Proof that a marketing
group would contract development of a frightening virus.  A virus that
responds to peoples' keystrokes and browsing habits, and changes what
people see on their devices.  A virus that alters political behavior en
masse, for profit.
There is proof inside many peoples' electronics.  Proof that a marketing
group would contract development of a frightening virus.  A virus that
responds to peoples' keystrokes and browsing habits, and changes what
people see on their devices.  A virus that alters political behavior en
masse, for profit.


Re: ZFS encrypted HOME, krypt vols, combine /boot with / root, + rando snippets

2020-06-29 Thread Karl
thank you.

i remember the days of teenage hacking when the perl manual was candy.  no
longer in those days.

I restarted ZFS a few days ago and immediately ran into an unpatched issue
(reformatted my device without closing up the pool using it, no way to do
so now without reboot, other long running processes active).  ZFS is
powerful and needed.

On Mon, Jun 29, 2020, 9:16 AM Zenaan Harkness  wrote:

> On Tue, Oct 01, 2019 at 12:08:34AM +1000, Zenaan Harkness wrote:
> > For those yet to leap into the cool clear waters of ZFS and Luks
> > encrypted sparse ZFS files, or who need to combine /boot with / root
> > if /boot has filled up or is insufficient for needs, the beginnings
> > of some hints:
> >
> > https://github.com/zenaan/quick-fixes-ftfw
> >
> > Create your world,
>
>
> Revisited ZFS backups in vigour, wrote an easy to follow little tute so I
> don't bloody forget how to do it next time :/
>
> Update here:
>
> https://github.com/zenaan/quick-fixes-ftfw
>
> and the backups "4 actually simple steps", part way down the direct link
> here:
>
> https://github.com/zenaan/quick-fixes-ftfw/blob/master/zfs/zfs.txt
>
> When it sings, ZFS is the git of filesystems, only with a leaner, more
> elegant TUI.  Enjoy,
>

There is proof inside many peoples' electronics.  Proof that a marketing
group would contract development of a frightening virus.  A virus that
responds to peoples' keystrokes and browsing habits, and changes what
people see on their devices.  A virus that alters political behavior en
masse, for profit.

>


Re: Cointelegraph: Experts Split on Practical Implications of Quantum Cryptography

2020-06-29 Thread Karl
Jim put a lot of energy here into replying to a joke.

Jim appears to be an electronics supergenius.

On Mon, Jun 29, 2020, 4:48 AM jim bell  wrote:

> Albert Einstein called it "spooky action at a distance".  He hated the
> concept of quantum mechanics, saying "God does not play dice with the
> Universe".  Unfortunately, Einstein was quite wrong.
>
> The idea is that pairs of photons can be generated and can go virtually
> any distance, and then a measurement made on one of these photons
> essentially instantaneously determines the equivalent value of the other
> photon.  There is apparently no limit to the distance over which this can
> be done.  A few years ago I read that the apparent velocity of this
> connection is at least 10,000 times c, or the speed of light in a vacuum.
> https://blogs.scientificamerican.com/news-blog/quantum-weirdnes-wins-again-entangl-2008-08-13/#:~:text=(In%202007%2C%20researchers%20transmitted%20entangled,two%20of%20the%20Canary%20Islands.)&text=But%20in%20reality%2C%20no%20experiment,times%20the%20speed%20of%20light.
>
> "The photons were indeed entangled, the group reports in *Nature*
> .
> But in reality, no experiment is perfect, so what they end up with is a
> lower limit on how fast the entanglement could be traveling: 10,000 times
> the speed of light."
>
> I'm not a good person to be explaining this to you:  My degree is in
> chemistry, not physics.
> But read up on Bell's inequalities.  (different Bell!)
> https://en.wikipedia.org/wiki/Bell%27s_theorem
>
>
> *"Bell's theorem* proves that quantum physics
>  is incompatible with local
> hidden variable theories
> . It was
> introduced by physicist John Stewart Bell
>  in a 1964 paper titled
> "On the Einstein Podolsky Rosen Paradox
> ", referring to a 1935 thought
> experiment  that Albert
> Einstein , Boris Podolsky
>  and Nathan Rosen
>  used to argue that quantum
> physics is an "incomplete" theory.[1]
> [2]
>  By
> 1935, it was already recognized that the predictions of quantum physics are
> probabilistic . Einstein,
> Podolsky and Rosen presented a scenario that, in their view, indicated that
> quantum particles, like electrons 
>  and photons , must carry physical
> properties or attributes not included in quantum theory, and the
> uncertainties in quantum theory's predictions are due to ignorance of these
> properties, later termed "hidden variables". Their scenario involves a pair
> of widely separated physical objects, prepared in such a way that the quantum
> state  of the pair is
> entangled . "
> [partial quote]
>
>
> Quantum communication over fiber optics has been done to a record distance
> of 50 kilometers.
>
>
> https://www.sciencedaily.com/releases/2019/08/190829150732.htm#:~:text=For%20the%20first%20time%2C%20a,for%20a%20future%20quantum%20internet.&text=FULL%20STORY-,For%20the%20first%20time%2C%20a%20team%20has%20sent%20a%20light,50%20km%20of%20optical%20fiber.
>
>
> Ironically, I have actually made a major contribution to this field,
> although almost nobody realizes it yet.  The limit to the distance of
> quantum entanglement, 50 kilometers above, is based on the amount of
> optical loss present in the fiber.  Prior to my invention, and currently,
> the record for a low-loss single-mode optical fiber is by Sumitomo
> Electric, and is 0.1419 db/kilometer.
> https://global-sei.com/company/press/2017/03/prs029.html#:~:text=Now%20Sumitomo%20Electric%20has%20advanced,lowest%20loss%20of%20optical%20fiber.
>
> Fiber optics scientists and engineers achieved a fiber loss of about 0.200
> db/km in 1978, and about 0.160 by the mid-1980's.  They are apparently
> approaching a limit asymptotically, the limit defined by the presence of
> natural-quantities of spin-containing isotopes in silica.
>
> In about December 2008, while stuck in a Federal prison cell at USP
> Tucson, Arizona, I realized that the cause of the residual loss in these
> fibers is the Si-29 and O-17 isotope atoms, and for Corning-type fibers
> (containing germania, or GeO2, dopant), the Ge-73 isotope atoms.  Remove
> these spin-containing isotopes from optical fiber silica, and it should be
> possible to drop the loss by at least a factor of 100, 

Re: ZFS encrypted HOME, krypt vols, combine /boot with / root, + rando snippets

2020-06-29 Thread Zenaan Harkness
On Tue, Oct 01, 2019 at 12:08:34AM +1000, Zenaan Harkness wrote:
> For those yet to leap into the cool clear waters of ZFS and Luks
> encrypted sparse ZFS files, or who need to combine /boot with / root
> if /boot has filled up or is insufficient for needs, the beginnings
> of some hints:
> 
> https://github.com/zenaan/quick-fixes-ftfw
> 
> Create your world,


Revisited ZFS backups in vigour, wrote an easy to follow little tute so I don't 
bloody forget how to do it next time :/

Update here:

https://github.com/zenaan/quick-fixes-ftfw

and the backups "4 actually simple steps", part way down the direct link here:

https://github.com/zenaan/quick-fixes-ftfw/blob/master/zfs/zfs.txt

When it sings, ZFS is the git of filesystems, only with a leaner, more elegant 
TUI.  Enjoy,


Re: Cointelegraph: Experts Split on Practical Implications of Quantum Cryptography

2020-06-29 Thread jim bell
 Albert Einstein called it "spooky action at a distance".  He hated the concept 
of quantum mechanics, saying "God does not play dice with the Universe".  
Unfortunately, Einstein was quite wrong.  
The idea is that pairs of photons can be generated and can go virtually any 
distance, and then a measurement made on one of these photons essentially 
instantaneously determines the equivalent value of the other photon.  There is 
apparently no limit to the distance over which this can be done.  A few years 
ago I read that the apparent velocity of this connection is at least 10,000 
times c, or the speed of light in a vacuum.  
https://blogs.scientificamerican.com/news-blog/quantum-weirdnes-wins-again-entangl-2008-08-13/#:~:text=(In%202007%2C%20researchers%20transmitted%20entangled,two%20of%20the%20Canary%20Islands.)&text=But%20in%20reality%2C%20no%20experiment,times%20the%20speed%20of%20light.
"The photons were indeed entangled, the group reports in Nature. But in 
reality, no experiment is perfect, so what they end up with is a lower limit on 
how fast the entanglement could be traveling: 10,000 times the speed of light."
I'm not a good person to be explaining this to you:  My degree is in chemistry, 
not physics.  But read up on Bell's inequalities.  (different Bell!)  
https://en.wikipedia.org/wiki/Bell%27s_theorem   

"Bell's theorem proves that quantum physics is incompatible with local hidden 
variable theories. It was introduced by physicist John Stewart Bell in a 1964 
paper titled "On the Einstein Podolsky Rosen Paradox", referring to a 1935 
thought experiment that Albert Einstein, Boris Podolsky and Nathan Rosen used 
to argue that quantum physics is an "incomplete" theory.[1][2] By 1935, it was 
already recognized that the predictions of quantum physics are probabilistic. 
Einstein, Podolsky and Rosen presented a scenario that, in their view, 
indicated that quantum particles, like electrons and photons, must carry 
physical properties or attributes not included in quantum theory, and the 
uncertainties in quantum theory's predictions are due to ignorance of these 
properties, later termed "hidden variables". Their scenario involves a pair of 
widely separated physical objects, prepared in such a way that the quantum 
state of the pair is entangled. "      [partial quote]


Quantum communication over fiber optics has been done to a record distance of 
50 kilometers.  
https://www.sciencedaily.com/releases/2019/08/190829150732.htm#:~:text=For%20the%20first%20time%2C%20a,for%20a%20future%20quantum%20internet.&text=FULL%20STORY-,For%20the%20first%20time%2C%20a%20team%20has%20sent%20a%20light,50%20km%20of%20optical%20fiber.
    
Ironically, I have actually made a major contribution to this field, although 
almost nobody realizes it yet.  The limit to the distance of quantum 
entanglement, 50 kilometers above, is based on the amount of optical loss 
present in the fiber.  Prior to my invention, and currently, the record for a 
low-loss single-mode optical fiber is by Sumitomo Electric, and is 0.1419 
db/kilometer.      
https://global-sei.com/company/press/2017/03/prs029.html#:~:text=Now%20Sumitomo%20Electric%20has%20advanced,lowest%20loss%20of%20optical%20fiber.
Fiber optics scientists and engineers achieved a fiber loss of about 0.200 
db/km in 1978, and about 0.160 by the mid-1980's.  They are apparently 
approaching a limit asymptotically, the limit defined by the presence of 
natural-quantities of spin-containing isotopes in silica.  
In about December 2008, while stuck in a Federal prison cell at USP Tucson, 
Arizona, I realized that the cause of the residual loss in these fibers is the 
Si-29 and O-17 isotope atoms, and for Corning-type fibers (containing germania, 
or GeO2, dopant), the Ge-73 isotope atoms.  Remove these spin-containing 
isotopes from optical fiber silica, and it should be possible to drop the loss 
by at least a factor of 100, or to about 0.001db/kilometer.
(Corning-type fibers use a core of 8% GeO2 and 92% SiO2, and pure silica in the 
cladding.   Sumitomo-type fibers use(s) a pure-silica core, and a 
fluorine-doped cladding.  Since there are fewer spin-containing isotopes in 
pure silica than in germania-doped silica, Sumitomo had/has a small loss 
advantage over Corning.)
If this fiber is used for comunication between New York and Ireland, the hop 
should be achievable by a single, continuous fiber.  It will not need to 
contain the 40-odd EDFA  https://en.wikipedia.org/wiki/Optical_amplifier  
amplifiers currently employed.  
Similarly, if such fiber is used for a quantum link, it should be possible to 
do the link at least at a distance of 5000 kilometers, 100x better than the 
recent (2019) record.
The Chinese have been doing entanglement experiments on a satellite named 
Micius.  https://en.wikipedia.org/wiki/Quantum_Experiments_at_Space_Scale
 "QUESS is a proof-of-concept mission designed to facilitate quantum optics 
experiments over long distances to allow the devel

Re: Cointelegraph: Experts Split on Practical Implications of Quantum Cryptography

2020-06-29 Thread таракан
I quote the main title of the article:

"Scientists in China managed to exchange a crypto key at a distance of over 
1,000 kilometers"

Wow!

How can they do that?

On Monday, 29 June 2020 г., 2:54, jim bell  wrote:

> Cointelegraph: Experts Split on Practical Implications of Quantum 
> Cryptography.
> https://cointelegraph.com/news/experts-split-on-practical-implications-of-quantum-cryptography