Re: Fake Child Porn

2001-04-24 Thread Declan McCullagh

Yes, there have been prosecutions. Four of the five appelate cases
arose from criminal convictions; the Ninth Circuit case was brought by
the porn industry as a facial challenge (and was the only successful
1A defense).

See:
http://www.politechbot.com/p-01501.html

-Declan


On Tue, Apr 24, 2001 at 10:22:51PM -0700, Tim May wrote:
> On Tuesday, April 24, 2001, at 09:46 PM, Declan McCullagh wrote:
> 
> > On Tue, Apr 24, 2001 at 09:27:10PM -0700, Tim May wrote:
> >> If this becomes law, it will be a case of pure thoughtcrime. No 
> >> victims,
> >> no aggression against another person, no actual people. Just
> >> thoughtcrime.
> >
> > It is law, actually. Passed in 1996, with the Bruce Taylors of the
> > world testifying in favor of it before Senate Judiciary. Hatch
> > and Feinstein were chief sponsors.
> >
> > Five appeals courts have ruled on it. All but one (the Ninth Circuit)
> > said it was constitutional.
> >
> 
> Thanks. I had forgotten which laws passed, which were struck down, and 
> which quietly died in committee. (Feinstein, especially, proposes a lot 
> of sickeningly statist laws...)
> 
> Have there been any prosecutions yet on this? Or is prosecution on hold 
> while the courts review it?
> 
> --Tim May




Re: Fake Child Porn

2001-04-24 Thread Tim May

On Tuesday, April 24, 2001, at 09:46 PM, Declan McCullagh wrote:

> On Tue, Apr 24, 2001 at 09:27:10PM -0700, Tim May wrote:
>> If this becomes law, it will be a case of pure thoughtcrime. No 
>> victims,
>> no aggression against another person, no actual people. Just
>> thoughtcrime.
>
> It is law, actually. Passed in 1996, with the Bruce Taylors of the
> world testifying in favor of it before Senate Judiciary. Hatch
> and Feinstein were chief sponsors.
>
> Five appeals courts have ruled on it. All but one (the Ninth Circuit)
> said it was constitutional.
>

Thanks. I had forgotten which laws passed, which were struck down, and 
which quietly died in committee. (Feinstein, especially, proposes a lot 
of sickeningly statist laws...)

Have there been any prosecutions yet on this? Or is prosecution on hold 
while the courts review it?

--Tim May




Re: The Crypto State

2001-04-24 Thread Tim May

(I will use the word "nonsense" instead of "lies." Out of 
semi-politeness.)

On Tuesday, April 24, 2001, at 09:21 PM, Ray Dillinger wrote:

>> But I am willing to give you a chance: Just how many of the books on
>> my list had you either already read or did you locate and read in the
>> days between when my list was published and when you announced that
>> they were not very useful?
>
> Rand and Vinge; I had already read Hayek.

Then how do you know the reading list is "not useful"? You have only 
read a few books out of the list I gave (added to by others, too). Also, 
did you actually _read_ "Atlas Shrugged" in the brief time between when 
you saw my list and when you reported it as "not useful"? And did you 
actually find a copy of "True Names" in this period? Impressive, if not 
a lie.


>
>> Read Schneier.
>> Schneier or any other of the N basic crypto texts. Diffie-Hellman,
>> for example. Blacknet, for another example. This is really basic,
>> basic stuff.
>
> Yes, it is.  Stuff that does not get talked about here.  For
> that reason, this list is near useless to anyone who actually
> wants to learn about cryptography.  Scheier was where I started,
> but nobody wanted to talk about anything in there or develop
> any of thos ideas.

Nonsense. Remailers (Type I and II, Mixmaster), havens, Crypto++, Magic 
Money, the crypto breaks by Damien G., Ian Goldberg, David Wagner, 
others.

You are utterly ignorant of what has happened on the list.


> I now have the springer-verlag CD with the
> book that is basically a table of contents for seventeen years
> of crypto conferences.  That is also a big help, although it's
> frustrating to work with.
>
> A vast number of articles, yes.  But no discussion.

Nonsense.

>
>> Because you have shown a stubborn unwillingness to even learn the
>> basicsand yet you claim the reading list I put out was useless to
>> you, implying you had read and absorbed and evaluate those
>> books...which I doubt.
>
> Vinge and Rand, and Hayek too for that matter, had squat to do
> with cryptographic protocols.  Vinge described a few cryptographic
> applications, but the underlying PROTOCOLS were abbreviated or
> missing.  They were not what he was writing about.

You are pitiable. An abject literalist, unable to abstract.
>
>> Your questions mark you as profoundly ignorant of even the basics,
>
> Yes, damnit, I feel that I *am* ignorant of a lot of basics,
> because I read stuff, I think maybe I understand it and maybe
> I don't, and nobody will TALK about it!

As Declan pointed out, you are like someone saying "no one will TALK 
about how senators are elected, dammit!," while repeatedly ignoring 
suggestions to read the Constitution.



>  Nobody is willing to
> bounce ideas or discuss it in detail.

Nonsense. Read the discussions over the many years of the list. True, we 
don't
discuss "how keys are exchanged" anymore...that level of discussion was 
too basic even in the first months of the list. Figure out why...that's 
a homework exercise for you.

> Instead they want to
> take the damn stuff as read, forget how it works, and start
> invoking some fuzzy variation of it in some damn fantasy, the
> same way Bell did with the idea of digital cash -- it was
> pretty damn convincing until I looked close and realized he
> hadn't done his homework.

I get tired of saying this: no one on this list, that I can recall, took 
Bell's proposal as anything more than "theater."

>
> How many of the lofty invocations of other cryptographic
> concepts here won't hold water because they've been invoked in
> the same fuzzy way by ignorant people or posers?  I won't know until
> I take them apart myself, will I?  But trying to get the details
> of them from this list so they _CAN_ be analyzed is like trying
> to nail jelly to a tree, because nobody's interested in the
> "implementation details."

Nonsense.

>> and, more importantly, of being willing to spend some time reading
>> even the most basic, core texts. Asking about how keys are exchanged,
>> how things work without "trusted servers," etc., marks you as a
>> complete newbie.
>
> Those are examples of the questions I had when I came here.  Not
> the questions I still have.

You claimed recently that you were on the list when Vulis and/or 
Detweiler were on the list. Was this a stretching of the truth as well? 
If you were on the list in 1996, then you have had 5 years to "catch up" 
on the basics of cryptography.

Why haven't you read these materials?

You claim no one talks in detail. Have you read the articles on PipeNet 
by Wei Dai? How about the analyses by Hal Finney of DC Nets? How about 
my own Cyphernomicon?
And so on, for literally hundreds of posters and tens of thousands of 
nontrivial posts.

>> You claim you have been reading the list since Detweiler was active,
>> which means since about 1995-96.
>
> No, I didn't.  I claimed I had read the list for about a semester (I
> was taking a networks class, I read a lot of semi-rela

Re: Fake Child Porn

2001-04-24 Thread Declan McCullagh

On Tue, Apr 24, 2001 at 09:27:10PM -0700, Tim May wrote:
> If this becomes law, it will be a case of pure thoughtcrime. No victims, 
> no aggression against another person, no actual people. Just 
> thoughtcrime.

It is law, actually. Passed in 1996, with the Bruce Taylors of the
world testifying in favor of it before Senate Judiciary. Hatch
and Feinstein were chief sponsors.

Five appeals courts have ruled on it. All but one (the Ninth Circuit)
said it was constitutional.

See:
http://216.110.42.179/docs/nlc-frc.amicus.042301.html

http://law2.house.gov/uscode-cgi/fastweb.exe?getdoc+uscview+t17t20+965+0++%28%29%20%20AND%20%28%2818%29%20ADJ%20USC%29%3ACITE%20AND%20%28USC%20w%2F10%20%282256%29%29%3ACITE%20%20%20%20%20%20%20%20%20

-Declan




Re: Fake Child Porn

2001-04-24 Thread Tim May

On Tuesday, April 24, 2001, at 08:31 PM, Declan McCullagh wrote:

> On Tue, Apr 24, 2001 at 01:36:00PM -0700, Eric Cordian wrote:
>> It's unfortunate that the majority of the Amicus briefs filed in this 
>> case
>> seem to be from conservative groups and quasi-governmental puppet
>> organizations.
>
> It gets worse. One of the conservative groups reportedly filed on
> behalf of a bunch of right-wing congresscritters.
>
> The Free Speech Coalition's amici get a few more weeks to prepare
> their briefs.
>

"prepare their briefs"...is this sort of like "morphing their panties"?

BTW, this whole "fake child porn" issue has been coming to a head, so to 
speak, for a decade or so. I remember talking about this with Keith 
Henson back in the early 90s when he was working with the "Amateur 
Action" defendants (they went to prison, in part for having images with 
titles suggesting child porn, even though no actual images were child 
porn). This case also involved a jurisdiction in Kentucky, IIRC, getting 
a conviction of residents of California.

As this was around the time of "Terminator 2," with lots of morphing, 
and "Morph" had just appeared for the Mac, there was much discussion of 
the implications. Some morphed images were pretty convincing (Message to 
Jeff Gordon: no, I don't have copies of any of the GIFs on any of my old 
disk drives).

If this becomes law, it will be a case of pure thoughtcrime. No victims, 
no aggression against another person, no actual people. Just 
thoughtcrime.

--Tim May




Re: Right to anon. speech online upheld in US district court

2001-04-24 Thread Declan McCullagh

On Tue, Apr 24, 2001 at 10:53:20PM -0500, Aimee Farr wrote:
> That chum, Declan, in case you haven't noticed, is ME. And, that was just
> one sentence in the context of a dialogue. It is time for me to take my
> leave. My sincere apologies for abusing your hospitality.

Oh, I'm not encouraging you to leave the list. First, it's not
my place. Second, it would be a waste of my time if you decided to 
stay. Third, I'm direct enough that I'd say that if I meant it.

I'm just encouraging you to refrain from baiting the resident sharks.

-Declan




Re: Wendy Grossman: From Anarchy to Power: The Net Comes of Age

2001-04-24 Thread Declan McCullagh

On Tue, Apr 24, 2001 at 09:05:24PM -0700, Tim May wrote:
> Not a single such conference organizer has contacted me. For either a 
> paying gig or a freebie from me.

Hmm. Well, I *did* recommend you.

> I'm not meaning to sound bitter, just bemused that conferences on things 
> like "anonymity in cyberspace" (a conference a few years ago in Southern 
> California, as I recall) had a bunch of journalists and academics, but 
> none of the Bay Area folks who unveiled the most interesting remailers 
> and did much to explore the implications. Ditto for numerous other 
> conferences.

True. It was organized by AAAS, which is of course in DC and had that
kind of focus. It did have Peter Neumann and Lance Cottrell and Peter
Wayner, all of whom are technical and had something to add; I recall
that a lot of the rest were profs and lawyers.

> This is probably why Wendy Grossman agreed, as a journalist, to be 
> interviewed by another journalist: she has a book to publicize.

Are you kidding? Journalists *love* to get interviewed by other
journalists. Conferences, radio shows, TV talk shows, all are
examples of this phenomenon. Fortunately print media seems to be a bit
better. We generally don't interview other reporters unless: (1)
We're writing about them or their publications, like an article about
layoffs or getting fired; (2) they have a book out; (3) they're truly
an expert. For instance, I'd call the High Times guys (who I now know
from the NORML convention) for an article on pot smoking trends.

> I expect the CFP Conference, which even half a dozen years ago had way 
> too many journalists "comped" into it, will eventually consist mostly of 
> journalists on panels, journalists giving keynotes (that they spent an 
> hour or two preparing ideas for), journalists in the audience, and 
> journalists standing in the food line. Oh, and the government narcs and 

Hahahahaha. 

-Declan




Re: The Crypto State

2001-04-24 Thread Ray Dillinger

On Tue, 24 Apr 2001, Tim May wrote:

>Frankly, I doubt that you have read "The Communist Manifesto." For 
>multiple reasons, including its length and boringness.

Boring I'll give it, but it's brief.  

>But mainly because I have decided you are likely a liar. You said you 
>"thanked me" for my Reading List, just about 4 days after it was 
>published here.

I thanked you for pointing at something concrete, yes.  
It represented a change. 

>But I am willing to give you a chance: Just how many of the books on 
>my list had you either already read or did you locate and read in the 
>days between when my list was published and when you announced that 
>they were not very useful?

Rand and Vinge; I had already read Hayek.

>Read Schneier.
>Schneier or any other of the N basic crypto texts. Diffie-Hellman, 
>for example. Blacknet, for another example. This is really basic, 
>basic stuff.

Yes, it is.  Stuff that does not get talked about here.  For 
that reason, this list is near useless to anyone who actually
wants to learn about cryptography.  Scheier was where I started, 
but nobody wanted to talk about anything in there or develop 
any of thos ideas.  I now have the springer-verlag CD with the 
book that is basically a table of contents for seventeen years 
of crypto conferences.  That is also a big help, although it's 
frustrating to work with.  

A vast number of articles, yes.  But no discussion.

>Because you have shown a stubborn unwillingness to even learn the 
>basicsand yet you claim the reading list I put out was useless to 
>you, implying you had read and absorbed and evaluate those 
>books...which I doubt.

Vinge and Rand, and Hayek too for that matter, had squat to do 
with cryptographic protocols.  Vinge described a few cryptographic 
applications, but the underlying PROTOCOLS were abbreviated or 
missing.  They were not what he was writing about.

>Your questions mark you as profoundly ignorant of even the basics, 

Yes, damnit, I feel that I *am* ignorant of a lot of basics, 
because I read stuff, I think maybe I understand it and maybe 
I don't, and nobody will TALK about it!  Nobody is willing to 
bounce ideas or discuss it in detail.  Instead they want to 
take the damn stuff as read, forget how it works, and start 
invoking some fuzzy variation of it in some damn fantasy, the 
same way Bell did with the idea of digital cash -- it was 
pretty damn convincing until I looked close and realized he 
hadn't done his homework. 

How many of the lofty invocations of other cryptographic 
concepts here won't hold water because they've been invoked in 
the same fuzzy way by ignorant people or posers?  I won't know until 
I take them apart myself, will I?  But trying to get the details 
of them from this list so they _CAN_ be analyzed is like trying 
to nail jelly to a tree, because nobody's interested in the 
"implementation details."

>and, more importantly, of being willing to spend some time reading 
>even the most basic, core texts. Asking about how keys are exchanged, 
>how things work without "trusted servers," etc., marks you as a 
>complete newbie.

Those are examples of the questions I had when I came here.  Not 
the questions I still have.  I've found a few methods, out of 
Schneier mostly, no thanks to anyone here.  I bet there's hundreds
more methods than I've seen yet, and I want to know what they all 
are because they have different, and usefully different properties.
I'm going to be working through the conference proceedings for 
years.


>You claim you have been reading the list since Detweiler was active, 
>which means since about 1995-96.

No, I didn't.  I claimed I had read the list for about a semester (I
was taking a networks class, I read a lot of semi-related stuff)  
during 1995 and I've been elsewhere since.  I left for six years and 
came back.

Bear




Re: The Well-Read Cypherpunk

2001-04-24 Thread Tim May

On Tuesday, April 24, 2001, at 09:21 AM, Bill Stewart wrote:

> Perhaps the field has changed since I was in college, but back then,
> academic econometrics had the reputation of being dominated by 
> Marxists -
> the more-Scientific Socialists who understood that if you want a
> centrally planned economy, you have to measure it so you can control it,
> as opposed to the purely political Scientific Socialists who believed in
> centrally planning an economy based on class struggle and rewarding
> heroic truck factory workers and shooting bourgeois greedy bankers and
> other warm fuzzy liberal values stuff.
>
> While the US government doesn't strongly believe in central planning,
> it has still supported that kind of field because if you want to
> spend lots of money, either on liberal welfare state programs,
> right-wing Anti-Commie military-industrial-complex welfare programs,
> or good old fashioned bi-partisan pork for your friends,
> you need to know how and where to squeeze the economy to maximize
> revenue without overly disrupting the processes that generate it.
>

I'll provide a data point about what corporations want: they hire a 
_lot_ of MBAs, but not a lot of "economists." Sure, MBAs have to 
complete a series of econ courses, probably based on Samuelson and the 
various micro- and macro-econ courses, but mostly corporations are 
seeking those with tools to manage businesses, markets, product lines, 
etc. Classical economics is not a focus.

And as Bill said in another post, Samuelson generated a very big book 
mainly (it seems) to sell more copies. Sort of like similar big books in 
molecular biology and organic chemistry.

--Tim May




Re: Wendy Grossman: From Anarchy to Power: The Net Comes of Age

2001-04-24 Thread Tim May

On Tuesday, April 24, 2001, at 08:42 PM, Declan McCullagh wrote:

> That might be me, not sure from your description. I do speak
> frequently at conferences, including libertarian ones, and probably
> (to be frank) wouldn't be as good as some other listdenizens. I've got
> deadlines, and usually only have 1-3 hours to prepare for a
> presentation. Others might have more time to prepare, and better
> technical or mathematical knowledge. *shrug*
>
> But Tim, I *have* recommended that at least one conference organizer
> contact you for a paying gig, and I don't recall you taking it. :)
>

Not a single such conference organizer has contacted me. For either a 
paying gig or a freebie from me.

I'm not meaning to sound bitter, just bemused that conferences on things 
like "anonymity in cyberspace" (a conference a few years ago in Southern 
California, as I recall) had a bunch of journalists and academics, but 
none of the Bay Area folks who unveiled the most interesting remailers 
and did much to explore the implications. Ditto for numerous other 
conferences.

It seems organizers take the easy way out: they call a bunch of writers 
and journalists who agree to do some off the cuff speculation.

A friend of mine pointed out some years ago that the only guests ever 
seen on the Jay Leno or David Letterman shows, or similar shows, are 
those who are there to "pimp" their latest movie, book, or cause.

This is probably why Wendy Grossman agreed, as a journalist, to be 
interviewed by another journalist: she has a book to publicize.

I expect the CFP Conference, which even half a dozen years ago had way 
too many journalists "comped" into it, will eventually consist mostly of 
journalists on panels, journalists giving keynotes (that they spent an 
hour or two preparing ideas for), journalists in the audience, and 
journalists standing in the food line. Oh, and the government narcs and 
spies taking notes on who's advocating thoughtcrime.

Not that this is a new phenomenon.

--Tim May




RE: Right to anon. speech online upheld in US district court

2001-04-24 Thread Aimee Farr

Declan wrote:

> On Tue, Apr 24, 2001 at 03:08:19PM -0500, Aimee Farr wrote:
> > This caught me a nudder fish. I'm going into my reinforced
> steel shark cage,
> > 'cause this tells Mr. Big Fish could be behind him (Tim is
> like those
> > three sharks with memory in that Deep Blue Sea movie.)
>
> Aimee, I like you, I really do. I know there is a lawyer with your
> name and location since I spent a moment checking on Martindale.com;
> I'm going to take a gamble and say that you are who you say you
> are. You seem smart, somewhat tech-clueful, and even a potential
> cypherpunk.

> That said, you're now posting mainly peculiar and strange messages.

Well, some are not without intent nor subtle purpose, Declan. Some people
don't...oh, never mind. But, your point is not without validity.

> You're not doing this with a sincere desire to engage in dialogue, but
> with the stated purpose of baiting Tim, John, and others. Now, John
> may enjoy the repartee, but many cypherpunkly types would rather
> engage with someone who's doing more than baiting us and watching the
> sharks fight over the chum.

That chum, Declan, in case you haven't noticed, is ME. And, that was just
one sentence in the context of a dialogue. It is time for me to take my
leave. My sincere apologies for abusing your hospitality.

~Aimee

PS: I'm sorry for calling you a pecky Mockingbird. Texan for attention to
detail. :)




Re: The Well-Read Cypherpunk [ Samuelson-bashing ]

2001-04-24 Thread Bill Stewart

At 09:08 AM 04/22/2001 -0700, Tim May wrote:
>I haven't found Samuelson's textbook useful for any of the
>interesting discussions of markets, black markets, offshore havens, ...

I used Samuelson's textbooks to study micro and macro in college.
*Terrible*!  Badly written, verbose, not structured well at all,
especially for the mathematically literate student,
and heavily tied up in the Keynesian government-knows-what's-best
command economy view of the world.  OK, the dude *did* have a Nobel
prize in economics, but as near as I could tell, what he *really*
specialized in was the economics of textbook sales,
updating this heavy tome every year or two so students had to
buy new ones instead of getting them used and selling them back
to the campus bookstore at the end of the year.
Most of the chapters had an appendix at the end which said
most of the same material half as verbosely,
but even that was still wading through molasses.
I don't mind a certain amount of excess material if the
author can write well and enjoyably, but this wasn't it.

Some of the micro classes switched to a different textbook
a year or two later - I think the author may have been Peterson?
which was much thinner and more readable.

My micro class was taught by a University of Chicago guy
who was a good speaker, clear without oversimplifying,
and who did a good job of balancing depth for his audience.
Micro being what it is, this involved a certain amount of
"Ok, engineers, this is an integral, go back to sleep while
I show the liberal arts majors areas under curves".
That's easier to do well with micro than macro,
but it still ain't that hard.  I'd also taken economics in high school,
and once Mrs. Borish was sick and the old retired guy who used to teach
the course came in and subbed - he covered more in
two days than we did the rest of the semester and a good
third or half of the Micro 102 college course,
though not in as much depth as the college material.

It's worth reading Samuelson if you discuss economics much with
people who learned it using Samuelson, just so you can balance the
jargon and understand the themes they work with, but it's really dreck.
Get the Cliff Notes if there are any :-)




Re: Wendy Grossman: From Anarchy to Power: The Net Comes of Age

2001-04-24 Thread Declan McCullagh

On Tue, Apr 24, 2001 at 03:51:44PM -0700, Tim May wrote:
> Of course, in this day and age, it's the journalists and scribblers 
> who fill the panels at conferences, and it's the journalists sought 
> out by other journalists for comments on the Meaning of it All. One 
> of our well-known journalists, a good one, was saying recently that 
> he's been invited to many special conferences on cutting edge issues, 
> libertarian technopolitics, etc. I guess I'll need to become a 
> journalist to even be invited to my _first_ such event! Merely 

That might be me, not sure from your description. I do speak
frequently at conferences, including libertarian ones, and probably
(to be frank) wouldn't be as good as some other listdenizens. I've got
deadlines, and usually only have 1-3 hours to prepare for a
presentation. Others might have more time to prepare, and better
technical or mathematical knowledge. *shrug*

But Tim, I *have* recommended that at least one conference organizer
contact you for a paying gig, and I don't recall you taking it. :)

-Declan




Re: Amtrak & The War On Drugs

2001-04-24 Thread Declan McCullagh

On Tue, Apr 24, 2001 at 06:43:20PM -0700, Tim May wrote:
>  From our perspective, it will show the foolishness of government 
> overreaction (ordering a million animals to be slaughtered and burned 
> with tires and old pressure-treated lumber railroad ties).

Good summary. Here's an ENS report:

http://ens.lycos.com/ens/apr2001/2001L-04-19-12.html
UK's Foot and Mouth Cull Raises Toxic Dilemma
2001-04-19 23:51:15 
UK's Foot and Mouth Cull Raises Toxic Dilemma LONDON, United Kingdom,
April 19, 2001 (ENS) - The foot and mouth outbreak is under control,
according to the United Kingdom government's chief scientist, but the
logistical challenge of quickly disposing of more than a million
slaughtered animals is raising new fears over dioxins and groundwater
contamination...

Yes, top-down government regulation is clearly the best way to handle
environmental crises, as the Brits showed so very well.

-Declan




Re: Amtrak & The War On Drugs

2001-04-24 Thread Declan McCullagh

No argument here. I recall a lot of this was in the '96 legislative
session, especially the summer. I have some articles on the topic
archived at www.eff.org/pub/Publications/Declan_McCullagh

-Declan

On Wed, Apr 25, 2001 at 09:34:44AM +1000, Ralph Wallis wrote:
> On Tuesday, 24 Apr 2001 at 16:13, Tim May <[EMAIL PROTECTED]> wrote:
> > However, it used to be SOP to buy train tickets at the ticket 
> > window--for cash and with no I.D. or phone numbers or SS numbers or 
> > forehead marks.
> > 
> > It looks like the "temporary measures" to combat the "TWA 800 
> > bombing" sorts of events, even though TWA 800 almost certainly wasn't 
> > a bombing, are now spreading to the trains.
> 
> I just read Database Nation, which notes that this was an immediate
> result of TWA 800 and the Atlanta Olympic bombing. (Along with similar
> policies for air travel.)
> 
> So it's not a sign of spreading. Since Atlanta was 5 years ago,
> it's not a temporary measure either.




Re: The Crypto State

2001-04-24 Thread Declan McCullagh

Yep. Brands' book is out from MIT Press, so it's even accessible.
(Well, relatively accessible; I keep planning on finishing it RSN.)

For someone to ask on cypherpunks for pointers to basic crypto
concepts and ignoring reading lists is like someone posting to a
political mailing list and asking how senators are elected, and
refusing to read the Constitution. (I'm not saying this current
case is the same, but it has similarities.)

-Declan


On Tue, Apr 24, 2001 at 06:25:23PM -0700, Tim May wrote:
> Read Schneier. Read the oft-cited (certainly cited many times in the 
> years since you claim to have been here, i.e., since when Detweiler 
> was here) Proceedings of the Crypto Conferences (Springer-Verlag, 
> every year)/




Re: Right to anon. speech online upheld in US district court

2001-04-24 Thread Declan McCullagh

On Tue, Apr 24, 2001 at 03:08:19PM -0500, Aimee Farr wrote:
> This caught me a nudder fish. I'm going into my reinforced steel shark cage,
> 'cause this tells Mr. Big Fish could be behind him (Tim is like those
> three sharks with memory in that Deep Blue Sea movie.)

Aimee, I like you, I really do. I know there is a lawyer with your
name and location since I spent a moment checking on Martindale.com;
I'm going to take a gamble and say that you are who you say you
are. You seem smart, somewhat tech-clueful, and even a potential
cypherpunk.

That said, you're now posting mainly peculiar and strange messages.
You're not doing this with a sincere desire to engage in dialogue, but
with the stated purpose of baiting Tim, John, and others. Now, John
may enjoy the repartee, but many cypherpunkly types would rather
engage with someone who's doing more than baiting us and watching the
sharks fight over the chum.

-Declan




RE: Right to anon. speech online upheld in US district court

2001-04-24 Thread Aimee Farr

Choate:

> On Tue, 24 Apr 2001, Aimee Farr wrote:
>
> > First, the law can be used to the advantage of aforesaid 'technological
> > means,' often giving hints. For example, somewhat in the context of this
> > discussion, it seems possible to have electronic communication
> that does not
> > imply third-party permission to record.

Originally, in the mists of timethis conversation came up in the context
of third-parties being subject to subpoena, if I can think that far
backyes, that was a screw up since I carried it over. Thank you.

Here is the case I had on my mind @ the time:
http://www.courts.wa.gov/opinions/opindisp.cfm?docid=193047MAJ

> What '3rd party'? Single party states require the person doing the
> recording to be a PARTICIPANT in the discussion, this implies that at
> least one other party is aware of their presence. Hardly '3rd' person.
> Two party states require ALL participants to agree, again no recognition
> of any '3rd party' right to record.
>
> How can a lawyer confuse this with a clear violation of the 4th with
> non-participatory '3rd party' recording? Hm.

How can anybody confuse privacy statutes with the 4TH Amendment?
Hmmm

> > Finally, the law has an impressive track record, in stark contrast to
> > 'crypto-anarchy.'
>
> To wit, of failure.
>
> 
>
> The solution lies in the heart of humankind.
>
>   Chris Lawson
>
>The Armadillo Group   ,::;::-.  James Choate
>Austin, Tx   /:'/ ``::>/|/  [EMAIL PROTECTED]
>www.ssz.com.',  `/( e\  512-451-7087
>-~~mm-'`-```-mm --'-
> 




RE: Amtrak & The War On Drugs

2001-04-24 Thread Phillip H. Zakas

> Tim May concludes:
> Those in other countries should not sit back and smirk. France,
> Germany, and Japan are already far along in their march to statism.
> Kanada is catching up.

And don't forget the dutch with their shiny new face & iris scans embedded
within immigrant identity cards. of course they're only in trials now, with
immigrants, because immigrants have to report to police regularly.  by the
time 2003 rolls by all dutch citizens will require the same scans be stored
on eu identity cards.  perhaps they'll require these electronic scans next
be used for online transactions as well? keep smoking.

phillip




Re: Amtrak & The War On Drugs

2001-04-24 Thread Tim May

At 5:20 PM -0700 4/24/01, David Honig wrote:
>At 11:02 AM 4/24/01 +0100, Ken Brown wrote:
>  and burn a million cows on pyres of
>>used tyres and railway sleepers (they are thinking of using napalm to
>>save money) 
>
>The chemicals in the materials you're using for your pyres are
>poisoning the locals with dioxins... napalm is a lot cleaner and faster than
>dioxin-generating old tires and railroad ties, supposedly.
>
>We have the Burning Man festival; y'all have your Burning Cow
>festival.  Whatever melts your cheese.

I saw an estimate yesterday that millions of hectares of farmland are 
now contaminated with enough dioxins from The Burnings that the U.S. 
government will likely not let their output into the U.S.

European nations, ever eager to poke a stick in England's eye, are 
reportedly considering the same ban.

If true, this is going to nuke the U.K. big time.

 From our perspective, it will show the foolishness of government 
overreaction (ordering a million animals to be slaughtered and burned 
with tires and old pressure-treated lumber railroad ties).

I wonder if the starving Brits will also be burned in piles?


--Tim May
-- 
Timothy C. May [EMAIL PROTECTED]Corralitos, California
Political: Co-founder Cypherpunks/crypto anarchy/Cyphernomicon
Technical: physics/soft errors/Smalltalk/Squeak/agents/games/Go
Personal: b.1951/UCSB/Intel '74-'86/retired/investor/motorcycles/guns




RE: Amtrak & The War On Drugs

2001-04-24 Thread Aimee Farr

BTW, I need a gray travel consultant. Lemme know if anybody knows of one.
Will accept salt-and-pepper gray.

~Aimee

> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On
> Behalf Of Tim May
> Sent: Tuesday, April 24, 2001 6:13 PM
> To: [EMAIL PROTECTED]
> Subject: Re: Amtrak & The War On Drugs
>
>
> At 3:55 PM -0800 4/24/01, Raymond D. Mereniuk wrote:
> >On 24 Apr 2001, at 11:02, Ken Brown wrote:
> >
> >>  You need phone numbers to buy train tickets? Why? Since when? The USA
> >>  may be a wonderful country but over here where we we employ
> >
> >I believe in the original story the fellow bought a train from Phoenix
> >Arizona to Boston MA.  This is a little different then buying a ticket
> >for a trip from Waterloo to Sevenoaks or London to Manchester.
> >Distance wise it is comparable to a London to Baghdad trip.
>
> However, it used to be SOP to buy train tickets at the ticket
> window--for cash and with no I.D. or phone numbers or SS numbers or
> forehead marks.
>
> It looks like the "temporary measures" to combat the "TWA 800
> bombing" sorts of events, even though TWA 800 almost certainly wasn't
> a bombing, are now spreading to the trains.
>
> "First they demanded ID and SS numbers for the airlines, but I didn't
> fly so I did nothing. Then they demanded the same for trains, but I
> didn't take trains, so I did nothing. Now they demand ID and SS
> numbers for buses and public parking lots, and my trial is next
> month."
>
> Anyone paying in untraceable funds is Assumed to be a Suspicious
> Person. Anyone not giving credit card and SS information, likewise.
>
> And in Amerika, to be a Suspicious Person is probable cause for a
> search of bags and backpacks and purses, the Fourth Amendment be
> damned.
>
> (The taking without due process, covered by other constitutional
> rights, is another matter, though the conclusion that Amerika has
> become a kleptocracy is unchanged.)
>
> Those in other countries should not sit back and smirk. France,
> Germany, and Japan are already far along in their march to statism.
> Kanada is catching up.
>
>
> --Tim May
> --
> Timothy C. May [EMAIL PROTECTED]Corralitos, California
> Political: Co-founder Cypherpunks/crypto anarchy/Cyphernomicon
> Technical: physics/soft errors/Smalltalk/Squeak/agents/games/Go
> Personal: b.1951/UCSB/Intel '74-'86/retired/investor/motorcycles/guns




Re: The Crypto State

2001-04-24 Thread Tim May

At 4:44 PM -0700 4/24/01, Ray Dillinger wrote:
>On Tue, 24 Apr 2001, Ken Brown wrote:
>
>
>>You want maybe a recipe? An instruction book for helping the state
>>wither away? Try the Communist Manifesto, it's good.
>
>I've read it already. 
>
>And no, I don't want a recipe for helping the state wither away
>or change form.  That's a several-centuries process, and I haven't
>the attention span for it.

Frankly, I doubt that you have read "The Communist Manifesto." For 
multiple reasons, including its length and boringness.

But mainly because I have decided you are likely a liar. You said you 
"thanked me" for my Reading List, just about 4 days after it was 
published here. Then you said you hadn't found the books useful. One 
possibility is that you had already read all or most of the books, 
including Benson, Axelrod, Hayek, etc., and concluded retrospectively 
that my recommending them meant that my list was not of much use. The 
other main possibility is that you were implying you had located 
these books, either via Amazon or via a well-equipped library, and 
had read them and found them wanting. Frankly, I consider both 
possibilities unlikely in the extreme.

But I am willing to give you a chance: Just how many of the books on 
my list had you either already read or did you locate and read in the 
days between when my list was published and when you announced that 
they were not very useful?

If you actually read Rand, Hayek, Benson, Axelrod, Vinge, Friedman, 
etc. in those several days, I am impressed with your reading speed. 
If you either just read summaries on Amazon of the books, or flipped 
the pages at high speed in a Borders or Barnes and Noble then I am 
not impressed at all. (And I am quite certain that no extant Borders 
will have even half of the books listed.)

If you ordered the books by Amazon--including the out of print 
editions--and then read them in the day after they all 
arrived...well, we'll talk about that later.
>
>
>What I wanted, when I showed up here looking, was evaluation of
>specific protocols for doing specific things.  For example, how
>does an election protocol with cryptographic ballots work?

Read Schneier. Read the oft-cited (certainly cited many times in the 
years since you claim to have been here, i.e., since when Detweiler 
was here) Proceedings of the Crypto Conferences (Springer-Verlag, 
every year)/

>How
>do Alice and Bob exchange keys?

Schneier or any other of the N basic crypto texts. Diffie-Hellman, 
for example. Blacknet, for another example. This is really basic, 
basic stuff.




>What are the ways in which
>different types of digital cash protect the identity of the
>buyer or seller, and how does each work?

Chaum, Brands, Schneier, etc. A vast number of articles.


>Are there ways to
>distribute "shares" of identity so that groups of people can
>participate in another protocol as though they were one person,
>and if so how does that work?

N-out-of-M protocols, Shamir's secret-sharing. Again, basic crypto stuff.


>What types of authentication can
>happen without trusted servers and how does each work?


"Trusted servers" are a highly misleading, and security-fucked, 
approach. Webs of trust, interstellar communication, Blacknet, 
reputations.

>
>I've gotten maybe three scraps of help on such questions
>from this list, and they were minimal -- pointers to offlist
>and off-net resources.

Because you have shown a stubborn unwillingness to even learn the 
basicsand yet you claim the reading list I put out was useless to 
you, implying you had read and absorbed and evaluate those 
books...which I doubt.


>  In order to get that, I've put up with
>a lot of sneers, condescencion, posing, and political rants
>with no underpinning of reality, which I personally find
>distasteful.


Your questions mark you as profoundly ignorant of even the basics, 
and, more importantly, of being willing to spend some time reading 
even the most basic, core texts. Asking about how keys are exchanged, 
how things work without "trusted servers," etc., marks you as a 
complete newbie.

You claim you have been reading the list since Detweiler was active, 
which means since about 1995-96.

This means you are uneducable. Or lying. Or both.

--Tim May
-- 
Timothy C. May [EMAIL PROTECTED]Corralitos, California
Political: Co-founder Cypherpunks/crypto anarchy/Cyphernomicon
Technical: physics/soft errors/Smalltalk/Squeak/agents/games/Go
Personal: b.1951/UCSB/Intel '74-'86/retired/investor/motorcycles/guns




RE: Trolling....(((((aluger)))))

2001-04-24 Thread Aimee Farr

? aluger, in gentlemanly defense, wrote:
?? aluger, because he is a big damn hotshot showoff, wrote:
??? aluger, preemptively, in defense of his buddy, wrote:

> At Tue, 24 Apr 2001 15:08:17 -0700, Tim May <[EMAIL PROTECTED]> wrote:
>
> >
> >At 1:11 PM -0500 4/24/01, Aimee Farr wrote:
> >>Mike said, quoting me, quoting Tim: (I'm on lunch - billable hour sink
> >this place.)
> >>
> >>>  Further, I don't think individuals owe any obligation to the law as
> to
> >>>  the participants, form, content or retention of private
> communications.
> >>
> >>Recognizing that the law does not agree with you, that's a
> valid opinion.
> >
> >Show me the law on who can *participate* in private communications.
>
> See Generally:  Several penal codes re: probation prohibiting individuals
> from conducting certain communications with felons, minors,
> foreign nationals
> (in the case of espionage) and etc.  See also, the oil embargo.
>
> >Show me the law on what *form* private communications must have, may
> >have, may not have, etc.
>
> Feel free to review any number of banking regulations that stipulate the
> nature and form of otherwise private dealings between two actors.
>
> >Show me the law on what *content* is permitted in private communications.
>
> See Generally: Criminal Law - Conspiracy.
>
> >Show me the law on *retention* of private communications.
>
> See financial record keeping requirements imposed even on private
> companies,
>  import export firms, taxation, etc.  See also, currency
> reporting requirements
> for other wise "private" transactions.  See also, regulations for record
> retention in the transaction of firearms. etc. etc.
>
> >I can think of various laws about child porn, death threats,
> >classified secrets, etc., which affect some of the above, but these
> >are "clearly special cases" and it is a mistake to confuse laws about
> >child porn, for example, with disputing Mike's general point that the
> >law simply does not regulate private communications.
>
> Well, suffice it to say that there are a lot of "clearly special cases."
>
> >Not as to participants, form, content, or retention.
>
> See above.

See woman *fiendishly* working on a response to May's poodle attack.
See woman's face when..

I am reflecting on the evils I have suffered through, just to get one
handful of the hair of that dog that bit me. And then you run in and STEAL
it out from my little hand.

This just in: May says you have no hair. Next, he will claim you have
unwittingly stepped into his trap. Yepsure 'nuff.

You have 1st chair, Mr. Hushmail jacket, but it is not worth your time.

'oil embargo?'

~Aimee




Re: Recording conversations and the laws of men

2001-04-24 Thread David Honig

At 11:05 AM 4/24/01 -0700, Tim May wrote:
>"The laws of mathematics, not the laws of men." (I think Eric Hughes 
>came up with this, but I could be wrong.)

Gilmour I think.

>Again, just so. The laws about tape-recording conversations have no 
>basis in any moral theory I can support. If I choose to "gargoyle" 
>myself and have a tape recorder, even a video recorder, running at 
>all times, how is this doing physical violence to others?

Indeed.  If you are a minor in a mandatory youth re-education camp ("public
school")
in Calif, it is illegal to bring electronics into school.  As wireless
(with cameras)
permeates the culture, this becomes ridiculous; I could point to letters to
the editor
in a local (yuppie) paper calling for removal of this law, and using
Columbine/Santee/etc.
as the excuse.

Personally I plan to teach Jr. how to do covert recording; otherwise it might
be his word vs. a schoolyard bully or state-employed bully.  [FWIW, I think
some girl
was recently acquitted of wiretap charges for taping or imaging a teacher's
lecture 
(for review later) because there was no expectation of privacy.  Teachers are
after all your employees.]


>(Even contractual issues are amenable to this analysis. If Alice 
>doesn't want to be taped in her interactions with Bob, she can 
>negotiate an arrangement that he turns off his tape recorders in her 
>presence. If he violates this contract, perhaps she can collect. Some 
>day this will likely be done via polycentric law, a la "Snow Crash.")

Nice.

..

Sci Fi: its becoming possible to separate [1] various effects of
benzodiazepines
so that you could have a pharm tool which knocks out memory reliably (but
doesn't depress respiration, cause ataxia, addiction, etc.) which could
replace the NDA.  "We'll tell your our bizplan if you take this amnesic"
Sort of Johnny Mnemonic without the recall.  Interesting for resumes, too:
"Consulted for XYZ company, presumably using my ABC skills, but I don't
recall."

[1] see recent studies in mice with particular subclasses of receptors
knocked out




Re: Trolling

2001-04-24 Thread Tim May

At 5:19 PM -0700 4/24/01, [EMAIL PROTECTED] wrote:
>  >Well, suffice it to say that there are a lot of "clearly special cases."
>>
>And suffice it to say that if we drop probation, financial exchanges and
>corporate topics and stick with conversations ( information exchanges )
>between ordinary individuals all is well but keep pushing the technology
>since the bad guys will never give up.


Exactly, precisely, totally!

The list of "restrictions on communications" from our Hushmail 
contributor was expected. I could have generated such a list myself, 
obviously.

The problem with the mindset of folks like Aimee and Ms./Mr. Hushmail 
is that they have essentially _given up_. They have taken the welter 
of laws regarding how corporate officers may communicate with other 
corporate officers (dating back to 1890), how draft opponents may 
communicate with the public (dating back to 1920), and so on and so 
forth, and have said this "means" government has the authority to 
order the form, content, and participants in a conversation.

Feh.

--Tim May
-- 
Timothy C. May [EMAIL PROTECTED]Corralitos, California
Political: Co-founder Cypherpunks/crypto anarchy/Cyphernomicon
Technical: physics/soft errors/Smalltalk/Squeak/agents/games/Go
Personal: b.1951/UCSB/Intel '74-'86/retired/investor/motorcycles/guns




Re: Teller, Garwin, and H-Bomb

2001-04-24 Thread David Honig

At 11:31 AM 4/24/01 -0700, Tim May wrote:
>By the way, I consider Teller to be one of the most ethically 
>forthright public figures I've encountered. He has argued _against_ 
>classification of secrets except in rare circumstances (troop 
>movements, submarine positions, nuclear bomb designs). I heard him 
>make this point eloquently at a lecture I attended in 1972 or so. It 
>always stuck with me.

You might find Sam Cohen's _Shame_ (published by Xlibris.com, ie
self-published) 
interesting. After he discusses his mother's infliction of enemas on himself,
he gets into the ethics of neutron weapons, which he invented and thinks
is a pretty cool solution for lots of geopolitical problems.

He's part of the jewish nuclear conspiracy, but not the hungarian jewish
nuclear conspiracy
like Teller, von Neumann, etc..

(:-)




Trolling

2001-04-24 Thread mmotyka

>Well, suffice it to say that there are a lot of "clearly special cases."
>
And suffice it to say that if we drop probation, financial exchanges and
corporate topics and stick with conversations ( information exchanges )
between ordinary individuals all is well but keep pushing the technology
since the bad guys will never give up.




Re: The Crypto State

2001-04-24 Thread Ray Dillinger

On Tue, 24 Apr 2001, Ken Brown wrote:

>Ray Dillinger wrote:
>
>> The only real difference is that the functions of government are
>> distributed instead of being vested in particular people.
>
>Which is pretty near a definition of anarchy according to my anarchist
>friends.

Alright.  Then, perhaps, I should clarify that I wasn't talking 
necessarily about a society in which all interactions are voluntary, 
which seems to be the goal of many anarchists. 

>You want maybe a recipe? An instruction book for helping the state
>wither away? Try the Communist Manifesto, it's good. 

I've read it already.  

And no, I don't want a recipe for helping the state wither away 
or change form.  That's a several-centuries process, and I haven't 
the attention span for it.

What I wanted, when I showed up here looking, was evaluation of 
specific protocols for doing specific things.  For example, how 
does an election protocol with cryptographic ballots work?  How 
do Alice and Bob exchange keys?  What are the ways in which 
different types of digital cash protect the identity of the 
buyer or seller, and how does each work?  Are there ways to 
distribute "shares" of identity so that groups of people can 
participate in another protocol as though they were one person, 
and if so how does that work?  What types of authentication can 
happen without trusted servers and how does each work? 

I've gotten maybe three scraps of help on such questions 
from this list, and they were minimal -- pointers to offlist 
and off-net resources.  In order to get that, I've put up with 
a lot of sneers, condescencion, posing, and political rants 
with no underpinning of reality, which I personally find 
distasteful.

>> What I've been able to do since is find that there are ways
>> to solve a bunch of technical problems 
>
>So tell us the ways.

I have, a couple of times.  A few months ago, when the 
american presidential election debacle was at its peak, I 
posted an election protocol to the list.  I was disappointed
that no substantive discussion of its technical merits or 
problems ensued.  A few people even chided me for posting 
something substantive, or tried to pose as omniscient by 
saying it was too simple to merit their attention.  I frankly 
don't give a flying damn about such chest-beating, but the 
absence of anyone willing or able to discuss it was a 
disappointment.

An Election Protocol is not a path through history to 
crypto anarchy.  It is a method of building one thing using 
cryptography.  It is one solution of thousands possible, 
for one problem out of thousands or millions.  

My search is a search for useful stuff, not a search for 
ways to get rid of government employees. But even if you 
choose crypto anarchy as the object of your work, are you 
so obsessed with what you think it might look like that 
you disdain to consider the protocols which are the 
individual building blocks you'd have to use to build it?

It is true that I despise governments, for  inefficiencies 
and oppression; however, I've no reason to suspect that 
I would despise the Crypto State any less, on either score.
Both involve coercion by effective monopolies on violence.
It would have the same power to spend public money inefficiently 
and corruptly, and I see no reason to believe that it would 
do so any less.  Also, it could have the same power to 
transgress against individuals, and I don't see a reason 
to believe that it would exercise it any less.  

>What "proof" can there be that implementation is possible? 

Implementation of particular protocols is what I intended to 
ask about.  Hard Science - functioning protocols for particular 
tasks.  Without the support of thousands of protocols, the  
political fantasies of which you accuse me are so much wishful 
thinking and hot air, less relevant than a fart. 

The question is not whether you can 'justify' crypto anarchy, 
or whether there's a way to get there, or even whether that's 
a worthwhile goal - the question is whether there's even 
anything to justify or get TO.  Until I had seen several 
hundred individual protocols, there was nothing for me to 
discuss.  

>We can't even
>prove that a non-trivial computer program is correct, never mind a
>political program. 

Sodomize all political programs.  They disgust me.  I am 
interested in solving problems and building useful things. 
I am interested in government only insofar as it is useful 
or solves problems.  Solving problems sometimes has political 
consequences, and I accept that. 

Governments, like the lemur-like creatures of the cretacious 
which are the ancestors of modern human, will adapt until 
they are no longer recognizable to us as governments.  Perhaps 
one day they will have adapted sufficiently far that there are 
no government employees and no one left to blame but ourselves 
for the injustices we do one another.  Perhaps not.  

Ultimately, it doesn't matter how large or how distributed 
the group abusing public

Re: Trolling

2001-04-24 Thread aluger

At Tue, 24 Apr 2001 15:08:17 -0700, Tim May <[EMAIL PROTECTED]> wrote:

>
>At 1:11 PM -0500 4/24/01, Aimee Farr wrote:
>>Mike said, quoting me, quoting Tim: (I'm on lunch - billable hour sink 
>this place.)
>>
>>>  Further, I don't think individuals owe any obligation to the law as 
to
>>>  the participants, form, content or retention of private communications.
>>
>>Recognizing that the law does not agree with you, that's a valid opinion.
>
>Show me the law on who can *participate* in private communications.

See Generally:  Several penal codes re: probation prohibiting individuals 
from conducting certain communications with felons, minors, foreign nationals 
(in the case of espionage) and etc.  See also, the oil embargo.

>Show me the law on what *form* private communications must have, may 
>have, may not have, etc.

Feel free to review any number of banking regulations that stipulate the 
nature and form of otherwise private dealings between two actors.

>Show me the law on what *content* is permitted in private communications.

See Generally: Criminal Law - Conspiracy.

>Show me the law on *retention* of private communications.

See financial record keeping requirements imposed even on private companies,
 import export firms, taxation, etc.  See also, currency reporting requirements 
for other wise "private" transactions.  See also, regulations for record 
retention in the transaction of firearms. etc. etc.

>I can think of various laws about child porn, death threats, 
>classified secrets, etc., which affect some of the above, but these 
>are "clearly special cases" and it is a mistake to confuse laws about 
>child porn, for example, with disputing Mike's general point that the 
>law simply does not regulate private communications.

Well, suffice it to say that there are a lot of "clearly special cases."

>Not as to participants, form, content, or retention.

See above.

Free, encrypted, secure Web-based email at www.hushmail.com




Re: Amtrak & The War On Drugs

2001-04-24 Thread Tim May

At 3:55 PM -0800 4/24/01, Raymond D. Mereniuk wrote:
>On 24 Apr 2001, at 11:02, Ken Brown wrote:
>
>>  You need phone numbers to buy train tickets? Why? Since when? The USA
>>  may be a wonderful country but over here where we we employ
>
>I believe in the original story the fellow bought a train from Phoenix
>Arizona to Boston MA.  This is a little different then buying a ticket
>for a trip from Waterloo to Sevenoaks or London to Manchester.
>Distance wise it is comparable to a London to Baghdad trip.

However, it used to be SOP to buy train tickets at the ticket 
window--for cash and with no I.D. or phone numbers or SS numbers or 
forehead marks.

It looks like the "temporary measures" to combat the "TWA 800 
bombing" sorts of events, even though TWA 800 almost certainly wasn't 
a bombing, are now spreading to the trains.

"First they demanded ID and SS numbers for the airlines, but I didn't 
fly so I did nothing. Then they demanded the same for trains, but I 
didn't take trains, so I did nothing. Now they demand ID and SS 
numbers for buses and public parking lots, and my trial is next 
month."

Anyone paying in untraceable funds is Assumed to be a Suspicious 
Person. Anyone not giving credit card and SS information, likewise.

And in Amerika, to be a Suspicious Person is probable cause for a 
search of bags and backpacks and purses, the Fourth Amendment be 
damned.

(The taking without due process, covered by other constitutional 
rights, is another matter, though the conclusion that Amerika has 
become a kleptocracy is unchanged.)

Those in other countries should not sit back and smirk. France, 
Germany, and Japan are already far along in their march to statism. 
Kanada is catching up.


--Tim May
-- 
Timothy C. May [EMAIL PROTECTED]Corralitos, California
Political: Co-founder Cypherpunks/crypto anarchy/Cyphernomicon
Technical: physics/soft errors/Smalltalk/Squeak/agents/games/Go
Personal: b.1951/UCSB/Intel '74-'86/retired/investor/motorcycles/guns




Re: Wendy Grossman: From Anarchy to Power: The Net Comes of Age

2001-04-24 Thread Tim May

At 6:16 PM -0400 4/24/01, Matthew Gaylor wrote:
>From: "Jon Lebkowsky" <[EMAIL PROTECTED]>
>Subject: Wendy Grossman
>Date: Sun, 22 Apr 2001 19:56:22 -0600
>
>Shameless plug: I'm interviewing Wendy Grossman in Inkwell.vue on the WELL.
>You can read the interview at:
>
>http://engaged.well.com/engaged/engaged.cgi?c=inkwell.vue&f=0&t=109
>
>Wendy's a London-based writer with a couple of books coming out; the one we're
>focusing on in the interview is _From Anarchy to Power: The Net Comes of
>Age_, available from Amazon:


Congratulations to Jon for getting an interview with a _journalist_!

(I'm hoping to get an interview with Jon, so I can say I interviewed 
someone who interviewed a journalist.)


Of course, in this day and age, it's the journalists and scribblers 
who fill the panels at conferences, and it's the journalists sought 
out by other journalists for comments on the Meaning of it All. One 
of our well-known journalists, a good one, was saying recently that 
he's been invited to many special conferences on cutting edge issues, 
libertarian technopolitics, etc. I guess I'll need to become a 
journalist to even be invited to my _first_ such event! Merely 
inventing a bunch of things and writing about them for the past 13 
years on the Net doesn't hardly qualify for inclusion amongst the 
_journalists_!

With the proliferation of "Oracle 8i World, the magazine for Oracle 
8i Administrators" and "Python Times" and several hundred other niche 
computer magazines, maybe we'll _all_ have to become journalists just 
to fill the pages.

(OTOH, I expect a shakeout in the b.s. magazines comparable to the 
bursting of the bubble for the dot gones.)


--Tim May
-- 
Timothy C. May [EMAIL PROTECTED]Corralitos, California
Political: Co-founder Cypherpunks/crypto anarchy/Cyphernomicon
Technical: physics/soft errors/Smalltalk/Squeak/agents/games/Go
Personal: b.1951/UCSB/Intel '74-'86/retired/investor/motorcycles/guns




Re: The anarchies my destination...

2001-04-24 Thread Tim May

At 1:06 PM -0700 4/24/01, Ray Dillinger wrote:
>On Mon, 23 Apr 2001, Tim May wrote:
>
>>And I really did not get started on this path toward "crypto anarchy"
>>because I was _seeking_ anarchy as some sort of utopian fantasy. In
>>fact, I had largely moved away from politics by the mid-70s, and was
>>not very political in the 1987-88 period when I figured out that the
>>technologies then emerging would make new forms of anarchy nearly
>>inevitable.
>
>I'll go as far as "workable".  "Inevitable" is perhaps a bit strong.

"Inevitable" in a sense analogous to how the invention of the 
printing press made certain societal changes (forms of anarchies, 
actually) "inevitable."

-- the widespread dissemination of printed knowledge, with the 
resulting loss of monopolies on forms of knowledge by guilds, 
priesthoods, and kings.

-- the spread of political tracts, calls for revolution, broadsheets, 
Samizdats, etc.

-- the development of corporations and other large enterprises 
dependent on literacy and the printed word to disseminate orders, 
instructions, book accounting, etc.

The spread of "book anarchy" was a profound development, as we are 
all taught. It led directly, and within only several decades, to a 
mostly anarchic religious schism: Martin Luther, Protestantism, 
independent Bibles in the popular languages of the time (Luther's 
German version, the King James version, etc.), and the explosion of 
sects into Lutheran, Calvinist, Presbyterian, Church of England, 
Baptist, etc.

In parallel with the recent discussions of crypto anarchy, a 
"skeptic" in 1450, looking toward the coming changes predicted by 
some, might have wondered: "But I don't see how it will all work. I 
don't see how alternatives to the Church can give us the things we've 
become accustomed to. I'd like to see a detailed plan of how all of 
this is going to work!"

That the future evolution of complicated systems is not easily 
predicted does not make the inevitability of change less likely.

Books and printing altered the basic equations. A fork in the road 
appeared and the world veered in a different direction. Forks like 
this have happened many times.

"And then things were different..."

Importantly, books, magazines, Web sites, broadsheets, fliers, 
pamphlets, and so on form one of the _best_ examples of "anarchy" we 
have. (I mentioned this to David Friedman, that we don't need to go 
to examples from 10th century Iceland to find excellent examples of 
anarchies...they are all around us if we are able to open our eyes 
and recognize them for what they are.)

The wide availability of tools to make completely voluntary and 
uncoerced transactions, regardless of the country or even continent 
of the participants is just such a fork in the road.

Governments know this, too. Even if many government agents and 
consultants are bozos, some of them are smart enough to see what's 
coming. (I like to think we saw the implications several years before 
their consultants, like Dorothy Denning and the NSA and FBI folks 
did, but they eventually got the picture.)

This is why the U.S.S.R. cracked down on copy machines, fax machines, 
etc. This is why the PRC is _still_ cracking down. This is why 
neo-fascist countries like France and Germany are banning free speech 
in order, they say, to save free speech. This is why the U.S. tried 
to limit crypto exports, hoped to get encryption even inside the U.S. 
restricted and backdoored, and is still gibbering about the dangers 
of uncontrolled "crypto anarchy!"

(This was the third intended pun from this name.)

>Certainly there are some statutes (mainly IP laws) that simply
>cannot stand in the presence of a crypto-enabled people, and there
>are some goods (information, entertainment, etc) on which monopolies,
>including the monopoly granted by copyright, cannot exist. 
>
>However, this is not the same as saying that anarchy (in terms of
>a change in form of government) is inevitable.  It simply says that
>there are some things government (of *any* kind) cannot do when
>people have access to cryptography. The inability to do those
>things is not sufficient to substantially undermine government
>power and authority.

The implications of not being able to interfere in transactions are 
quite profound. The implications of not being able to tax certain 
transactions is also profound. How long it might take for a "tipping 
point" to be reached where _other_ parts of society are affected is 
debatable.

Just as it was with books. Sure, the Catholic Church continues, and 
still continues. Sure, governments still exist. But the widespread 
use of reading and books changed the equation and led us to where we 
are today.

This is all I hope for. I am not interested in "ab initio" anarchies, 
such as many hypothesis for asteroid colonies and parallel earths. 
Interesting to read about, but not interesting for implementation 
purposes.


--Tim May
-- 
Timothy C. May [EMAIL PROTECTED]Corralit

Trolling

2001-04-24 Thread Tim May

At 1:11 PM -0500 4/24/01, Aimee Farr wrote:
>Mike said, quoting me, quoting Tim: (I'm on lunch - billable hour sink this
>place.)
>
>>  Further, I don't think individuals owe any obligation to the law as to
>>  the participants, form, content or retention of private communications.
>
>Recognizing that the law does not agree with you, that's a valid opinion.

Show me the law on who can *participate* in private communications.

Show me the law on what *form* private communications must have, may 
have, may not have, etc.

Show me the law on what *content* is permitted in private communications.

Show me the law on *retention* of private communications.

I can think of various laws about child porn, death threats, 
classified secrets, etc., which affect some of the above, but these 
are "clearly special cases" and it is a mistake to confuse laws about 
child porn, for example, with disputing Mike's general point that the 
law simply does not regulate private communications.

Not as to participants, form, content, or retention.

>
>  > > Finally, the law has an impressive track record, in stark
>>  contrast to 'crypto-anarchy.'
>>  >
>>  > ~Aimee
>
>I knew that would catch a fish.

Indeed, you are obviously trolling.


>
>
>~Aimee
>Counsel for The Establishment


Needless to say. No doubt active in the Waco area in narcing out 
illegal religions like the BDs.

Sickening.


--Tim May
-- 
Timothy C. May [EMAIL PROTECTED]Corralitos, California
Political: Co-founder Cypherpunks/crypto anarchy/Cyphernomicon
Technical: physics/soft errors/Smalltalk/Squeak/agents/games/Go
Personal: b.1951/UCSB/Intel '74-'86/retired/investor/motorcycles/guns




Re: Fwd: James Bamford to be on Fresh Air tomorrow (April 24)

2001-04-24 Thread Greg Broiles

At 01:01 PM 4/24/2001 -0700, I wrote:

>The Bamford interview is online at 
><http://www.npr.org/ramfiles/fa/20010424.fa.01.ram> - not sure how long 
>that URL will be good.

The interview is 42 minutes long - if you're busy and mostly interested in 
current events, skip to about minute 30, where he starts discussing Echelon 
(he describes it as "a big search engine"), drug intercepts (DEA pushes for 
lots of intel, NSA doesn't like that), competitor intelligence (Airbus vs. 
Boeing - he said NSA doesn't play that), personal privacy (says that it's 
difficult for NSA to get its job done without violating people's privacy, 
and that NSA's statutory duty to report crimes makes this harder), and 
recently identified Russian double agent/FBI counterintel specialist Robert 
Hanssen (a personal friend of Bamford's; Bamford doesn't dish dirt on 
friends or sources, but was very surprised to hear of the arrest).

There's also a Flash-infected website at <http://www.bodyofsecrets.com>, 
which has some reference and bibliographic detail.


--
Greg Broiles
[EMAIL PROTECTED]
"Organized crime is the price we pay for organization." -- Raymond Chandler




RE: Recording conversations and the laws of men

2001-04-24 Thread Aimee Farr

Tim's Latest Treatise said:


> At 10:27 AM -0700 4/24/01, [EMAIL PROTECTED] wrote:
>
> (commenting on Aimee's words)
>
> >
> >It sounds to me like you are suggesting gutting the threat models that
> >should be used during the design phase of any communication system. You
> >are implying that if there's a legal way of saying that something may
> >not be recorded then being recorded is no longer a threat. That is not
> >and never will be the case no matter what the court du jour may have to
> >say about it.
>
> Just so. Regardless of "no phone recording" laws, people continue to
> do it. Linda Tripp got caught in this, and only because she
> publicized her taping of her phone conversations with Monica
> Lewinsky. Millions of other people do it everyday. Many modern phones
> and answering machines make it easier than ever.

Like I could disagree with this one.

> Thinking that "the law" will fix this problem (if it even _is_ a
> problem!) is wrong-headed.

I said NOTHING of the kind, just that the law does, every now and then, give
you an advantage. Where it does, take advantage of it.

> And the law has never stopped the NSA, CIA, and FBI from recording
> and tapping at will (Shamrock, Echelon, Carnivore). Even if the tapes
> cannot be used in court without a warrant, so what? They get what
> they want by taping and tapping, whether they can use the results as
> evidence or not.

It was just an example, of limited application, based on one of the most
restrictive state privacy statutes in the country. (WA)

> Technological means are our best protection.

Obviously.

> "The laws of mathematics, not the laws of men." (I think Eric Hughes
> came up with this, but I could be wrong.)

Mathematical meditations, I understand.

> >Further, I don't think individuals owe any obligation to the law as to
> >the participants, form, content or retention of private communications.
> >I don't see how the law can improve upon this opportunity for privacy.
> >In fact, based on past performance, I would expect exactly the opposite
> >effect.
>
> Again, just so. The laws about tape-recording conversations have no
> basis in any moral theory I can support. If I choose to "gargoyle"
> myself and have a tape recorder, even a video recorder, running at
> all times, how is this doing physical violence to others?

Okay, so aside from 'physical violence' law (broadly defined) has no
purpose? Where were you BEFORE I want to law school, Tim?

> (Even contractual issues are amenable to this analysis. If Alice
> doesn't want to be taped in her interactions with Bob, she can
> negotiate an arrangement that he turns off his tape recorders in her
> presence. If he violates this contract, perhaps she can collect. Some
> day this will likely be done via polycentric law, a la "Snow Crash.")

Yes. You already know I have polycentric leanings.

> Meanwhile, we don't need more stinking laws allegedly protecting our
> privacy while actually interfering with our ability to make and form
> voluntary relationships.

Agree..and then some.

> >>  Finally, the law has an impressive track record, in stark contrast
> >>to 'crypto-anarchy.'
> >>
> >>  ~Aimee
> >>
> >I think an even more impressive track record is how people manage to
> >create and operate economies and communications under any number of
> >oppressive systems. Systems come and go and still people trade and
> >communicate. I suppose they have no choice...
>
> These are the myriad anarchies I referred to in my post, "The
> anarchies my destination."

A thoughtful post.

> Top-down rule from a strong man is actually computationally
> expensive. Direct communication is more efficient. The street knows
> this well.

Like I could argue with this.

> Kevin Kelly's book "Out of Control" is another book folks here
> should read.

My reading list is large enough already. :)

~Aimee




Re: [Fwd: YOU ARE INVITED: "Will Encryption Protect Privacy and Make Government Obsolete?" -- Next Independent Policy Forum (4/24/01)]

2001-04-24 Thread Faustine

Quoting "Fred C. Moulton" <[EMAIL PROTECTED]>:

(snip)

> See David Friedman's related essays:
> 
> "A World of Strong Privacy: Promises and Perils of Encryption"
> http://www.best.com/~ddfr/Academic/Strong_Privacy/Strong_Privacy.html
> 
> "Contracts in Cyberspace"
> http://www.best.com/~ddfr/Academic/contracts_in_%
20cyberspace/contracts_in_cyberspace.htm
> 
> "Anarchy and Efficient Law" 
> 
http://www.best.com/~ddfr/Academic/Anarchy_and_Eff_Law/Anarchy_and_Eff_Law.html.


I read these essays: is this really representative of his best work? It seemed 
awfully rudimentary. In fact, I did a search on the NBER website for any real 
academic journal articles by (or even mentioning) him: nada. Now don't blow a 
gasket on me, but if this is as good as it gets I'd have to say he strikes me 
as more of a polemicizer/theorist than an analyst. 

His 'reputational enforcement model' seemed more like a way to wow the 
layperson than anything else: as presented here, it's kiddy stuff that tells me 
absolutely nothing. This might pass for rigorous scholarship at Santa Clara, 
but in a quality policy analysis program, even grad students couldn't get away 
with turning it in. 

Gotta love this quote: "This is not a full formal analysis of the dynamics of 
the model: indeed it is hard to see in what sense one can talk rigorously of 
dynamics in my simple model..." No shit. Where is it then. Where's the model 
that really means something.

As far as I'm concerned, this is a shame: personally, I'd like nothing better 
than for someone to show that for "contracts in cyberspace in the future, 
public enforcement will work less well and private enforcement better than for 
contracts in realspace at present." But this just isn't it, folks. 

I'll keep on looking over his site since you people seem so sold on it. If you 
don't think I have anything useful to say about Friedman till I read the 
relevant books on Tim's list, fine. But if anyone wants to point me toward the 
hard core analysis here, I'd be delighted. 

Too bad I can't make it to Oakland tonight either, I'm sure it would have been 
fun. Especially the Q & A. heh.


~Faustine.





'We live in a century in which obscurity protects better than the law--and 
reassures more than innocence can.' Antoine Rivarol (1753-1801). 




Fwd: James Bamford to be on Fresh Air tomorrow (April 24)

2001-04-24 Thread Greg Broiles

The Bamford interview is online at 
<http://www.npr.org/ramfiles/fa/20010424.fa.01.ram> - not sure how long 
that URL will be good.

The book was released today - Amazon apparently shipped pre-ordered copies 
yesterday, mine hasn't arrived yet but is eagerly awaited.

>From: "Tim Dierks" <[EMAIL PROTECTED]>
>To: <[EMAIL PROTECTED]>
>Subject: James Bamford to be on Fresh Air tomorrow (April 24)
>Date: Mon, 23 Apr 2001 14:24:12 -0700
>
>James Bamford will be plugging his new book on the NSA, _Body of Secrets_,
>tomorrow on Fresh Air, the NPR-syndicated interview show normally hosted by
>Terry Gross.
>
>Check local listings for showtimes.
>(Or: <http://freshair.npr.org/stationsFA.cfm>).
>
>  - Tim

--
Greg Broiles
[EMAIL PROTECTED]
"Organized crime is the price we pay for organization." -- Raymond Chandler




Re: The anarchies my destination...

2001-04-24 Thread Ray Dillinger

On Mon, 23 Apr 2001, Tim May wrote:

>And I really did not get started on this path toward "crypto anarchy" 
>because I was _seeking_ anarchy as some sort of utopian fantasy. In 
>fact, I had largely moved away from politics by the mid-70s, and was 
>not very political in the 1987-88 period when I figured out that the 
>technologies then emerging would make new forms of anarchy nearly 
>inevitable.

I'll go as far as "workable".  "Inevitable" is perhaps a bit strong. 
Certainly there are some statutes (mainly IP laws) that simply 
cannot stand in the presence of a crypto-enabled people, and there 
are some goods (information, entertainment, etc) on which monopolies, 
including the monopoly granted by copyright, cannot exist.  

However, this is not the same as saying that anarchy (in terms of 
a change in form of government) is inevitable.  It simply says that 
there are some things government (of *any* kind) cannot do when 
people have access to cryptography. The inability to do those 
things is not sufficient to substantially undermine government 
power and authority.  

Bear




RE: Right to anon. speech online upheld in US district court

2001-04-24 Thread Aimee Farr

John Young wrote:

> Aimee Farr spun:

I spin, you lyre.

> >Finally, the law has an impressive track record, in stark contrast to
> >'crypto-anarchy.'

This caught me a nudder fish. I'm going into my reinforced steel shark cage,
'cause this tells Mr. Big Fish could be behind him (Tim is like those
three sharks with memory in that Deep Blue Sea movie.)

> So law proponents ever adversarial, no matter the facts. Homework
> on the exegesis of cryptoanarchy would demonstrate otherwise:
> it is law (and its siamese twin, order) which appears whereever
> cryptoanarchy rises to prominence in a people -- L&O a perfect
> means to strenghening strangleholds.

I WHOLLY RESENT THIS CYPHERPUNK COURT-APPOINTMENT TO REPRESENT LAW & ORDER
AND ALL THINGS ESTABLISHMENT. You guys keep denying my petition to withdraw,
wanting somebody to fight with.

> Opposition to organized control of law and order is timeless,
> spaceless. Time and space a conceit of L&O in the scientific
> realm.
>
> Opposition to government is timeless and spaceless, or was
> until the notion of imperial full employment was concocted,
> imperialism coming to America during WW2. And now more
> people work for government in the US than in any other nation
> today, and most others of the citizenry get a piece of the dole
> in one way or the other.

> That does not mean there is not considerable anti-government
> sentiment among the govs beneficiaries, perhaps the most
> vociferous of gov critics are those who know it from the inside.
>
> This interior dissent, too, is bred by imperialism, with it incessant
> interior struggle among it beneficiaries.
>
> It is no accident that cypherpunks was founded by and is fed by
> dissident beneficiaries of government largesse and protection
> from bad, bad people who give shit not for L&O in any disguise.
>
> National defense education, with it emphasis on training an
> elite citizenry, has produced thousands of Jim and Jane Bells
> still searching for what was promised the smart guys if they just
> abided the rules. Their promisers chuckling at the bright-eyed
> idiots who never knew what it was like to survive under
> oldtime cryptoanarchy -- when keeping secrets from the
> day's tax criminals was the highest accomplishment --
> especially the rats in their midst whispering rules of right
> and wrong, what history proved and didn't, who was
> first and who is clueless.
>
> Me, I'm an immortal, got medical and preaching licenses to
> prove it, in the name of Anonymous, awarded by Anonymous.
>
> Teller lied, the NYT says, it was a young physicist who
> designed the H-bomb, the very one who later became
> a fierce opponent of nuclear weapons. A rat.

John Young The Pied Piper - rats, and more rats, and rats, even rats in
hats, rats pretending to be other rats, rats pretending to be one rat.
Lions, Tigers, & Rats...oh, my! John Young.

~Aimee
Attorney for Global Law & Order, under duress
"...needs raidin'..."




Comm

2001-04-24 Thread mmotyka

AF Wrote:
> > Further, I don't think individuals owe any obligation to the law as to
> > the participants, form, content or retention of private communications.
> 
> Recognizing that the law does not agree with you, that's a valid opinion.
>
I don't think that the law requires me to make all communications
comprehensible or trackable or to get approval prior to creating the
contents or keep copies for later use. Please explain where the law does
not agree.

Let's avoid the mess that comes along with calling some sort of active
material a "communication" or the regulation that goes along with
certain RF channels and stick with conventional text, voice, image sorts
of communications.

Break a communication into three phases :

1. Composition
2. Transfer
3. Receipt

#1 is certainly legally unfettered - I can write, draw, speak whatever
the hell I please. I can record it on paper, on a hard drive or yell it
to the crowd at an A's game.

#2 is more subject to attack than #1 but is legally unencumbered - I can
address and transfer my data wherever I want to. I do not need to notify
anyone, keep any records, nor am I obliged to make the transfer or
contents observable.

#3 it's when someone takes offense that the consequences of speech may
be felt. This is where the fight is. It also happens to be, in the case
of adequate precautions having been observed in 1&2, too damn late to
object. 

I'm sure the law here in the US will try to adapt via a RIP-like
approach. Technology won't stand still and wait for the law to catch up.

Mike




Teller, Garwin, and H-Bomb

2001-04-24 Thread Tim May

At 1:38 PM -0400 4/24/01, John Young wrote:
>
>Teller lied, the NYT says, it was a young physicist who
>designed the H-bomb, the very one who later became
>a fierce opponent of nuclear weapons. A rat.


I just read this article--thanks for mentioning that it existed!--and 
find your statement above, that Teller lied, to misrepresent what the 
article said.

http://www.nytimes.com/2001/04/24/science/24TELL.html?searchpv=nytToday

The article says, amongst other things:

--begin excerpt--

...Edward Teller took a breath, sat down with a friend and a tape 
recorder and offered his views on the secret history of the hydrogen 
bomb.

"So that first design," Dr. Teller said, "was made by Dick Garwin." 
He repeated the credit, ensuring there would be no misunderstanding.

Dr. Teller, now 93, was not ceding the laurels for devising the bomb 
- a glory he claims for himself. But he was rewriting how the rough 
idea became the world's most feared weapon. His tribute, made more 
than two decades ago but just now coming to light, adds a surprising 
twist to a dispute that has roiled historians and scientists for 
decades: who should get credit for designing the H-bomb?
...
The New York Times obtained a transcript of the recording recently 
from the friend with whom Dr. Teller shared his memories. Some 
historians of science praise Dr. Teller's tribute to Dr. Garwin as 
candid; others fault it as disingenuous.


In an interview, Dr. Garwin said Dr. Teller was correct to include 
him among the bomb's designers, likening himself to its midwife. "It 
was the kind of thing I do well," he said of joining theory, 
experiment and engineering to make complex new devices.

If Dr. Teller's version of events is right, he and Dr. Garwin were 
the main forces behind one of the most ominous inventions of all 
time, a bomb that harnessed the fusion power of the sun.

Dr. Teller had championed the goal since the early 1940's, long 
before the atomic bomb flashed to life. His basic idea was to use the 
high heat of an exploding atomic bomb to ignite hydrogen fuel, fusing 
its atoms together and releasing even larger bursts of nuclear 
energy. But no one working at Los Alamos could figure out how to do 
that.

Dr. Garwin arrived at Los Alamos in May 1951 from the University of 
Chicago, where he had been a star in the laboratory of Enrico Fermi, 
the Nobel laureate and arguably the day's top physicist. Dr. Garwin 
had been at Los Alamos the previous summer and, intrigued by the 
work, had come back for another atomic sabbatical.

In the interview, Dr. Garwin recalled that Dr. Teller had told him of 
the new idea and asked him to design an experiment to prove that it 
would work - something the Los Alamos regulars failed to do. "They 
were burnt out" from too many rush efforts to build and test 
prototype nuclear arms, Dr. Garwin recalled. "So I did it."

--end excerpt--

Tim's comments: the new information is welcome. A pity Richard Rhodes 
did not have access to this information when he wrote "Dark Sun," his 
excellent history of the H-bomb project.

Teller has certainly never claimed, that I have seen, that he was the 
sole inventor. He was the champion, the driving force, as Garwin 
acknowledges. Garwin played an important role as an engineer of the 
working design, but such is the nature of teams.

Why his role was never discussed publically until now, even by _him_, 
is interesting. Perhaps there were security clearance issues, or even 
personal security concerns (kidnapping of Garwin, for example).

By the way, I consider Teller to be one of the most ethically 
forthright public figures I've encountered. He has argued _against_ 
classification of secrets except in rare circumstances (troop 
movements, submarine positions, nuclear bomb designs). I heard him 
make this point eloquently at a lecture I attended in 1972 or so. It 
always stuck with me.

Whether people like or dislike the H-bomb, or whether they think 
Teller was the model for Dr. Strangelove [see note], these feelings 
have no bearing on his integrity. He spoke out forthrightly on what 
he considered to be the shortcomings of Oppenheimer, which earned him 
(Teller) many enemies, but his comments were his honest assessments 
of Oppenheimer's political leanings.

Note: There have been several articles on the Net about who the 
likely influences for Strangelove were. Some say Herman Kahn, the 
American scientist and expert on escalation scenarios...reading "On 
Thermonuclear War" in high school was eye-opening for me. Others say 
Werner von Braun, especially with the heavy German accent Strangelove 
had. And others claim John von Neumann was an influence, as he was 
advocating a pre-emptive nuclear strike on the U.S.S.R. in the 
mid-50s. Edward Teller is also cited as a model. I believe Kubrick 
was coy to the end about who he modelled Strangelove after, and I 
also recollect that Kubrick once said Strangelove was a composite of 
many influences.]


--Tim May

RE: The anarchies my destination...

2001-04-24 Thread Aimee Farr

Tim mysteriously leaves out the part when he was targeted for radicalisation
by certain third-parties.

*only kidding* before I am accused of trying to "trigger a raid."

You say tomatoe...they say tomhatoe. You say needs killin'...they say needs
raidin'...

~Aimee

Tim May wrote:

> And I really did not get started on this path toward "crypto anarchy"
> because I was _seeking_ anarchy as some sort of utopian fantasy. In
> fact, I had largely moved away from politics by the mid-70s, and was
> not very political in the 1987-88 period when I figured out that the
> technologies then emerging would make new forms of anarchy nearly
> inevitable.
>
> (As I have explained several times, but will do so once again, I was
> evaluating the business plan of Phil Salin, a friend who was trying
> to get funding for an "information markets" company he called AmIX.
> AmIX was essentially a 1987-88 verision of EBay, with more of a focus
> on consulting services than Pez dispensers and Star Wars memorabilia.
> It eventually got funding from Autodesk, the maker of Autocad, along
> with its sister company Xanadu. Both eventually went out of business.
> Ahead of their times, poor management, whatever. Anyway, I evaluated
> Phil's idea and dug up some of Chaum's papers and applied the
> concepts to create a hypothetical "Blacknet" market for corporate and
> other information. Over the next few years, I developed the ideas for
> a novel I was working on...never finished. As one example, I worked
> out how image and soundfile steganography would work, and wrote
> perhaps the first proposal for "LSB" stego. The implications were
> pretty easy to figure out--every week or so from 1988 to 1991
> produced new conclusions about things Cypherpunks now take for
> granted.)
>
> So, I don't present anarchy or crypto anarchy as "utopian," merely as
> "nearly unavoidable." Which makes it interesting to study. Heinlein
> called this the "if this goes on..." viewpoint.
>
> Issues of morality are usually pedestrian when compared to inevitability.
>
>
> --Tim May
> --
> Timothy C. May [EMAIL PROTECTED]Corralitos, California
> Political: Co-founder Cypherpunks/crypto anarchy/Cyphernomicon
> Technical: physics/soft errors/Smalltalk/Squeak/agents/games/Go
> Personal: b.1951/UCSB/Intel '74-'86/retired/investor/motorcycles/guns




RE: Right to anon. speech online upheld in US district court

2001-04-24 Thread mmotyka

> Tim said, talking about 3rd party subpoena vulnerability:
> 
> > We need to do our part to stop this kind of confusion. More people
> > might be using *technological* means to protect their identity and
> > privacy if they had less misplaced faith in the law protecting them.
> 
> Wellthis sentiment goes DITTO FOR THE TECHNOLOGICAL WAYS & MEANS DEPT.
> 
> First, the law can be used to the advantage of aforesaid 'technological
> means,' often giving hints. For example, somewhat in the context of this
> discussion, it seems possible to have electronic communication that does not
> imply third-party permission to record.
> 
It sounds to me like you are suggesting gutting the threat models that
should be used during the design phase of any communication system. You
are implying that if there's a legal way of saying that something may
not be recorded then being recorded is no longer a threat. That is not
and never will be the case no matter what the court du jour may have to
say about it. 

Further, I don't think individuals owe any obligation to the law as to
the participants, form, content or retention of private communications.
I don't see how the law can improve upon this opportunity for privacy.
In fact, based on past performance, I would expect exactly the opposite
effect.

[..]

> Finally, the law has an impressive track record, in stark contrast to 
>'crypto-anarchy.'
> 
> ~Aimee
> 
I think an even more impressive track record is how people manage to
create and operate economies and communications under any number of
oppressive systems. Systems come and go and still people trade and
communicate. I suppose they have no choice...

Mike




RE: Right to anon. speech online upheld in US district court

2001-04-24 Thread Aimee Farr

Mike said, quoting me, quoting Tim: (I'm on lunch - billable hour sink this
place.)
>
> > Tim said, talking about 3rd party subpoena vulnerability:
> >
> > > We need to do our part to stop this kind of confusion. More people
> > > might be using *technological* means to protect their identity and
> > > privacy if they had less misplaced faith in the law protecting them.
> >
> > Wellthis sentiment goes DITTO FOR THE TECHNOLOGICAL WAYS &
> MEANS DEPT.
> >
> > First, the law can be used to the advantage of aforesaid 'technological
> > means,' often giving hints. For example, somewhat in the context of this
> > discussion, it seems possible to have electronic communication
> that does not
> > imply third-party permission to record.
> >
> It sounds to me like you are suggesting gutting the threat models that
> should be used during the design phase of any communication system. You
> are implying that if there's a legal way of saying that something may
> not be recorded then being recorded is no longer a threat. That is not
> and never will be the case no matter what the court du jour may have to
> say about it.

Hell no I'm not. Just grepping for an example. I AM saying that in the
design phase of a communication system, the legal ramifications are often
ignored. Countless examples of where this has been detrimental.

> Further, I don't think individuals owe any obligation to the law as to
> the participants, form, content or retention of private communications.

Recognizing that the law does not agree with you, that's a valid opinion.

> I don't see how the law can improve upon this opportunity for privacy.
> In fact, based on past performance, I would expect exactly the opposite
> effect.

Again, a valid opinion.

>
> > Finally, the law has an impressive track record, in stark
> contrast to 'crypto-anarchy.'
> >
> > ~Aimee

I knew that would catch a fish.

> I think an even more impressive track record is how people manage to
> create and operate economies and communications under any number of
> oppressive systems. Systems come and go and still people trade and
> communicate. I suppose they have no choice...

I merely meant to emphasize that law should be taken into account more than
it is, and never underestimated.

~Aimee
Counsel for The Establishment




Recording conversations and the laws of men

2001-04-24 Thread Tim May

At 10:27 AM -0700 4/24/01, [EMAIL PROTECTED] wrote:

(commenting on Aimee's words)

>
>It sounds to me like you are suggesting gutting the threat models that
>should be used during the design phase of any communication system. You
>are implying that if there's a legal way of saying that something may
>not be recorded then being recorded is no longer a threat. That is not
>and never will be the case no matter what the court du jour may have to
>say about it.

Just so. Regardless of "no phone recording" laws, people continue to 
do it. Linda Tripp got caught in this, and only because she 
publicized her taping of her phone conversations with Monica 
Lewinsky. Millions of other people do it everyday. Many modern phones 
and answering machines make it easier than ever.

Thinking that "the law" will fix this problem (if it even _is_ a 
problem!) is wrong-headed.

And the law has never stopped the NSA, CIA, and FBI from recording 
and tapping at will (Shamrock, Echelon, Carnivore). Even if the tapes 
cannot be used in court without a warrant, so what? They get what 
they want by taping and tapping, whether they can use the results as 
evidence or not.

Technological means are our best protection.

"The laws of mathematics, not the laws of men." (I think Eric Hughes 
came up with this, but I could be wrong.)

>
>Further, I don't think individuals owe any obligation to the law as to
>the participants, form, content or retention of private communications.
>I don't see how the law can improve upon this opportunity for privacy.
>In fact, based on past performance, I would expect exactly the opposite
>effect.

Again, just so. The laws about tape-recording conversations have no 
basis in any moral theory I can support. If I choose to "gargoyle" 
myself and have a tape recorder, even a video recorder, running at 
all times, how is this doing physical violence to others?

(Even contractual issues are amenable to this analysis. If Alice 
doesn't want to be taped in her interactions with Bob, she can 
negotiate an arrangement that he turns off his tape recorders in her 
presence. If he violates this contract, perhaps she can collect. Some 
day this will likely be done via polycentric law, a la "Snow Crash.")

Meanwhile, we don't need more stinking laws allegedly protecting our 
privacy while actually interfering with our ability to make and form 
voluntary relationships.

>
>
>>  Finally, the law has an impressive track record, in stark contrast 
>>to 'crypto-anarchy.'
>>
>>  ~Aimee
>>
>I think an even more impressive track record is how people manage to
>create and operate economies and communications under any number of
>oppressive systems. Systems come and go and still people trade and
>communicate. I suppose they have no choice...

These are the myriad anarchies I referred to in my post, "The 
anarchies my destination."

Top-down rule from a strong man is actually computationally 
expensive. Direct communication is more efficient. The street knows 
this well.

Kevin Kelly's book "Out of Control" is another book folks here should read.


--Tim May
-- 
Timothy C. May [EMAIL PROTECTED]Corralitos, California
Political: Co-founder Cypherpunks/crypto anarchy/Cyphernomicon
Technical: physics/soft errors/Smalltalk/Squeak/agents/games/Go
Personal: b.1951/UCSB/Intel '74-'86/retired/investor/motorcycles/guns




RE: Right to anon. speech online upheld in US district court

2001-04-24 Thread John Young

Aimee Farr spun:

>Finally, the law has an impressive track record, in stark contrast to
>'crypto-anarchy.'

So law proponents ever adversarial, no matter the facts. Homework
on the exegesis of cryptoanarchy would demonstrate otherwise:
it is law (and its siamese twin, order) which appears whereever
cryptoanarchy rises to prominence in a people -- L&O a perfect
means to strenghening strangleholds.

Opposition to organized control of law and order is timeless,
spaceless. Time and space a conceit of L&O in the scientific
realm.

Opposition to government is timeless and spaceless, or was
until the notion of imperial full employment was concocted,
imperialism coming to America during WW2. And now more
people work for government in the US than in any other nation
today, and most others of the citizenry get a piece of the dole
in one way or the other.

That does not mean there is not considerable anti-government
sentiment among the govs beneficiaries, perhaps the most
vociferous of gov critics are those who know it from the inside.

This interior dissent, too, is bred by imperialism, with it incessant
interior struggle among it beneficiaries.

It is no accident that cypherpunks was founded by and is fed by 
dissident beneficiaries of government largesse and protection
from bad, bad people who give shit not for L&O in any disguise.

National defense education, with it emphasis on training an
elite citizenry, has produced thousands of Jim and Jane Bells 
still searching for what was promised the smart guys if they just 
abided the rules. Their promisers chuckling at the bright-eyed
idiots who never knew what it was like to survive under 
oldtime cryptoanarchy -- when keeping secrets from the 
day's tax criminals was the highest accomplishment --
especially the rats in their midst whispering rules of right
and wrong, what history proved and didn't, who was
first and who is clueless.

Me, I'm an immortal, got medical and preaching licenses to 
prove it, in the name of Anonymous, awarded by Anonymous.

Teller lied, the NYT says, it was a young physicist who
designed the H-bomb, the very one who later became
a fierce opponent of nuclear weapons. A rat.




RE: Right to anon. speech online upheld in US district court

2001-04-24 Thread Aimee Farr

Tim said, talking about 3rd party subpoena vulnerability:

> We need to do our part to stop this kind of confusion. More people
> might be using *technological* means to protect their identity and
> privacy if they had less misplaced faith in the law protecting them.

Wellthis sentiment goes DITTO FOR THE TECHNOLOGICAL WAYS & MEANS DEPT.

First, the law can be used to the advantage of aforesaid 'technological
means,' often giving hints. For example, somewhat in the context of this
discussion, it seems possible to have electronic communication that does not
imply third-party permission to record.

Second, the law can be used indirectly to combat aforesaid 'technological
means.' The law will ALWAYS reach to provide a remedy. Somebody recently
proposed 'not keeping records.' This has been tried in a corporate context,
and not having 'a good faith electronic record retention policy' can get you
damage awards running into the millions in some jurisdictions.
Forum-shopping is being put in question in a number of legal contexts. We
are starting to see negative legal 'presumptions' imposed when certain
technologies are used and so on, and so on.

Third, the law changes. While 'crypto-anarchy' is a _process_ (quoting Tim)
sustainable business plans are needed to lay the foundations. And, there is
zero competitive advantage in knowing what the law 'is,' since won't stay
that way.

Finally, the law has an impressive track record, in stark contrast to
'crypto-anarchy.'

~Aimee




biochemwomdterror -- the latest in Congress

2001-04-24 Thread Declan McCullagh

HOUSE TRANSPORTATION AND INFRASTRUCTURE COMMITTEE AND HOUSE GOVERNMENT 
REFORM COMMITTEE
Combating Terrorism House Transportation and Infrastructure Committee's 
Economic Development, Public Buildings, and Emergency Management 
Subcommittee and House Government Reform Committee's National Security, 
Veteran's Affairs and International Relations Subcommittee joint hearing on 
Combating Terrorism: options to improve the federal response examining 
H.R.525, Preparedness Against Domestic Terrorism Act of 2001; H.R.1158, 
National Homeland Security Strategy Act; H.R.1292, Homeland Security 
Strategy Act of 2001. Witnesses: Rep. Wayne Gilchrest, R-Md.; Rep. William 
"Mac" Thornberry, R-Texas; Rep. Ike Skelton, D-Mo.; Raymond Decker, General 
Accounting Office; William Ellis, Congressional Research Service; General 
James Clapper, the Advisory Panel to Assess Domestic Response Capabilities 
for Terrorism Involving Weapons of Mass Destruction; General Charles Boyd, 
USAF, retired, U.S. Commission on National Security for the 21st Century; 
Frank Cilluffo, Center for Strategic and International Studies; Amy 
Smithson, The Henry Stimson Center Location: 2167 Rayburn House Office 
Building. 3 p.m. Contact: 202-225-9446 http://www.house.gov/transportation 
or 202-225-5074 http://www.house.gov/reform **REVISED**




RE: Making the Agora Vanish

2001-04-24 Thread Sampo Syreeni

On Sun, 22 Apr 2001, James A. Donald wrote:

>When I visited Cuba, I found that all the telephones accessible to an
>ordinary cuban, or at least all the ones that I encountered, had a man with
>a gun nearby, conspicuously visible to the person making the call, and in
>one case someone with headphones listening in on the call, conspicuously
>visible to the person making the call.
>
>Presumably the Cuban government found it very difficult to deter people
>from "spreading rumors".

I think a more suitable parallel would be to consider how difficult it would
be to ban the use of telephones, especially in a time where few widespread,
consumer visible applications exist.

>Intimidation and censorship suffers from the law of declining returns.
>[...] The same is true of governmental efforts to control cryptography.

Agreed. Not reassured, though...

Sampo Syreeni, aka decoy, mailto:[EMAIL PROTECTED], gsm: +358-50-5756111
student/math+cs/helsinki university, http://www.iki.fi/~decoy/front




Re: The Crypto State

2001-04-24 Thread Ken Brown

Ray Dillinger wrote:

[...that he wasn't talking about anarchy...]

> The only real difference is that the functions of government are
> distributed instead of being vested in particular people.

Which is pretty near a definition of anarchy according to my anarchist
friends.

[...]
 
> Bell's "AP" paper may not have been where the seed came from
> originally, but aside from pointers at some science-fiction
> books with zero technical content and impossible economics
> and cultures, there has been no trace whatsoever of any other
> protocols for replacing government on this list.

You want maybe a recipe? An instruction book for helping the state
wither away? Try the Communist Manifesto, it's good. No really, it is, a
great bit or writing. Of course it didn't actually come out right when
they tried to bake the cake. As a description of what was happening in
the world at the time it was brilliant, as a a program fro what to do
next it was crap, and helped set up states which kept millions under
tyranny and oppression for decades.  There are no predictable rules or
laws of history.

[...]

> What I've been able to do since is find that there are ways
> to solve a bunch of technical problems 

So tell us the ways.

[...]

> there's
> either no hint of how to actually implement nor any proof
> that an implementation is possible, 

What "proof" can there be that implementation is possible? We can't even
prove that a non-trivial computer program is correct, never mind a
political program. Your name is maybe Hari Selden?  In a real revolution
(violent or otherwise) unexpected things happen. It's all up for grabs.
History is contingent, not predictable, stuff happens, "events" take
over, there IS NO ROAD MAP. There can't be a road map, it is totally
impossible. You can have a weather vane, or you can stick you head above
the parapet and see which way the wind blows. You can have
thought-experiments, you can try things on for size in discussion, in
models, in fiction, in fantasies, in the pub. You can have a basic set
up principles that you intend to apply to whatever situation you find
yourself. (Me, I'm a Christian. A Calvinist even.  God knows the future
but I don't pretend to. Also a Socialist - there, I said the S-word, you
can all have a good laugh now.)

Economists and so-called "political scientists" mostly don't know what's
going on right now, never mind what will happen next. There is no road
map, there is no proof, there is no protocol, all there is is people
trying to get along as things change.

Ken