Patriot Ants (was: Re: Zombie Patriots and other musings)

2003-12-14 Thread Thomas Shaddack
On Sat, 13 Dec 2003, John Kelsey wrote:

 Of course, there's a more fundamental problem with surrendering to the lone
 warriors.  Imagine that there's such a wave of pro-life terrorism that we
 finally agree to ban abortion.  You're a fanatically committed pro-choice
 activist.  What's your next move?

Two moves possible.

The violent, far less effective and possibly somehow counterproductive
one: attacking the ones who enforce the measurement, by letal or nonlethal
means, to act as deterrent.

The nonviolent one: developing and deploying the technology necessary for
underground clinics to provide higher quality service, and for their
clients to find, order and pay for the services without being likely to
trace down by the Whateveriscurrentlythelaw Enforcement. Causing bad press
for them, keeping public awareness that alternatives to the law-compliance
exist. Learning from countries with similar bans in action, both from the
present and from history, how the alternatives developed there, and
building on this knowledge.

Direct attack is not always the best route, however tempting. A house can
be brought down from the outside by a bomb, or from the inside by white
ants. Insect survival strategies are distributed and largely successful; I
am pretty sure we can learn a lot from there. One Patriot Ant doesn't
have to fight in any big way, doing heroic deeds or big sacrifices; enough
people who just provide samizdat for few friends, know what files to
mirror, when to look away, what to be unable to remember when questioned
by the Authorities, who know the newsbits that aren't officially reported
and tell their friends can make big difference. The strength of Patriot
Ants isn't in their individual strength, they don't make headlines - they
just eat the System from the inside, one bite at time.



Open the Russian market for your business

2003-12-14 Thread OpenRussia.ru
Dear, Sirs,

We are glad to inform you that our company has been launched the Project 
OpenRussia.ru to help the entrepreneurs from the entire world access the Russian 
market and offer their products. This Project allows active search for potential 
partners in Russia. Russia has been showing a stable economic growth, and business 
cooperation with the Russian entrepreneurs has become mutually beneficial and 
effective.

When it comes to purchasing of any goods abroad or execution of a foreign trade 
transaction, the key issue for the Russian entrepreneurs is the problem of customs 
clearance (the customs duty amounts and collection procedures, clearing through the 
customs, certification of the imported goods, licensing of imports, etc.).  Our 
Project has been developed to address these and similar problems.
 
Please visit to www.openrussia.ru for more information and registration your offer in 
our catalogue.

Best regards,
The OpenRussia Team
[EMAIL PROTECTED]
www.openrussia.ru

We apologize If you have received this message in error. Your address is received from 
open sources.



Re: Patriot Ants (was: Re: Zombie Patriots and other musings)

2003-12-14 Thread Nostradumbass
From: Thomas Shaddack [EMAIL PROTECTED]
 On Sat, 13 Dec 2003, John Kelsey wrote:
 
  Of course, there's a more fundamental problem with surrendering to the lone
  warriors.  Imagine that there's such a wave of pro-life terrorism that we
  finally agree to ban abortion.  You're a fanatically committed pro-choice
  activist.  What's your next move?
 
 Two moves possible.
 
 The violent, far less effective and possibly somehow counterproductive
 one: attacking the ones who enforce the measurement, by letal or nonlethal
 means, to act as deterrent.

I think  you should the word possibly when referring to effectiveness of outcomes.  
One can never knows until one tries.  Every monment in history is unique and the 
effectiveness of the use of a particular strategy can never be ascertained beforehand. 
 Mine is based on at least two inspirations...

How we burned in the prison camps later thinking: What would things have been like if 
every security operative, when he went out at night to make an arrest, had been 
uncertain whether he would return alive? --Alexander Solzhenitzyn, Gulag Archipelago
 and

Our government... teaches the whole people by its example. If the government becomes 
the lawbreaker, it breeds contempt for law; it invites every man to become a law unto 
himself; it invites anarchy. -- Louis D. Brandeis 

As Americans I'm sure we have been tutored by some of the best.  Time to put into 
practice what we have learned.

 
 The nonviolent one: developing and deploying the technology necessary for
 underground clinics to provide higher quality service, and for their
 clients to find, order and pay for the services without being likely to
 trace down by the Whateveriscurrentlythelaw Enforcement. Causing bad press
 for them, keeping public awareness that alternatives to the law-compliance
 exist. Learning from countries with similar bans in action, both from the
 present and from history, how the alternatives developed there, and
 building on this knowledge.
 
 Direct attack is not always the best route, however tempting. A house can
 be brought down from the outside by a bomb, or from the inside by white
 ants.

The trouble with this method is that is generally requires a large percentage of the 
population to actively or passively support a position.  This almost always occurs 
after a situation has become intolerable to the masses.  I have no intention in 
placing my ability to enjoy what I consider my basic rights into the hands of a 
million Joe Sixpacks and await their enlightenment.


The only freedom which counts is the freedom to do what some other people
think to be wrong. There is no point in demanding freedom to do that which
all will applaud. All the so-called liberties or rights are things which
have to be asserted against others who claim that if such things are to be
allowed their own rights are infringed or their own liberties threatened.
This is always true, even when we speak of the freedom to worship, of the
right of free speech or association, or of public assembly. If we are to
allow freedoms at all there will constantly be complaints that either the
liberty itself or the way in which it is exercised is being abused, and, if
it is a genuine freedom, these complaints will often be justified. There is
no way of having a free society in which there is not abuse. Abuse is the
very hallmark of liberty.
 -- Quintin H. Hailsham, The Dilemma of Democracy

Get ready for a lot of abuse...



Re:

2003-12-14 Thread Joe Arnold

Now you 
can have 
HUNDREDS of 
lenders compete 
for your loan!
RATES AS LOW 
AS 1.95%!

Great rates
Less paperwork
Apply online in seconds


Save Money 
NOW!

cease
clubroom freckle tire adjunct stress organismic diethylstilbestrol alabamian duma topic paranoid commonality  everhart biblical deuce depute oneida ablate bigelow carborundum decal blotch jeopardy connie archfool cryptography borneo 
cabdriver tioga humidistat tang astringent bayberry modulus allan hyannis aftermath solemnity 
happen brazier brown coinage vocate pepsico schoolbook blister informant dinghy beresford cholinesterase behavioral alfresco prosthetic caveat customhouse windup avocate rasa crewmen deane flinch insurrect inaccurate while are twelve lexington ecology bonfire during patti mirfak merrymake  feathery capacity applique argue duopoly acanthus coat dido loudspeak donovan x germane libelous cathy mccoy cannot enforcible gadgetry diem kiddie walls 
bon elegy tangential permeate wrath being pushbutton noblemen aarhus flunk clan shook intemperate ballyhoo landis airmail whee degumming 
collaborate crumple decryption facilitate antennae handshake profundity meritorious up biology wingspan potts candelabra reducible cleanse shaffer hewitt infringe warfare liniment particulate taipei voss  pronunciation walkway symbiotic paymaster edward hoff polopony ruthenium burnish dietetic digitate cosmology allusive crosby duress fulminate dualism fizeau megaword never dickens inescapable abscissae compartment gimmickry inadvertent bunk enamel album riddle standstill ubiquitous isfahan privacy galactose question coleridge prizewinning aborning slavery 
bracken wraith lutetium beforehand only garage recherche transfusion clotho dumpy hairdo acidic certified slough brush dribble confucianism astatine train white altair olivia migrate when johannesburg 
tone inch epochal proclamation handset cagey ketone bolivia appanage histogram revisionary noteworthy stony tonsil debutante dalton aspire semite snorkel monk biconcave breakthrough cain wiseacre multiplicity camel roughshod structural continual pasteboard porridge connotative dichotomy postpone psychoanalyst besmirch  corroborate dispensary bam pawn mahoney satiety cathode emerson suburb cruel spool page addison labia resuscitate dutch corundum obfuscate volcano monstrous 
sandpile gules cranky motet cipher denton seismic quaff without premiere deliberate uphold kankakee kovacs esteem polygonal truancy macro graft glisten bordello alpenstock condominium arkansan 
confucian extricate cereal eightfold e'er assassinate decisional bennett honolulu buttrick loot sophistry align almaden riboflavin solar sidearm concourse orthodox almond salvatore oberlin formaldehyde midwinter yonkers witness alden merck charge shovel gap indoctrinate bridegroom niamey northrop february 
millie worn tuition rooftree daytona friction victrola ceremony constitute asteroid infamous champaign dissuade swig botany lovelace dell ignore naiad anglo brew narragansett peat precise tweeze szilard slack written oilseed coke dwindle 
vermin dilemma nectarine coniferous thunder blackball palo portrayal boswell acetate assai syllable procession vacate george despite kate zimmerman sophomore yoghurt baleen agricola mutual liturgy muskmelon menfolk nicotinamide infantryman percival elba junk ninefold wove addressograph annette katz diacritic  calvert mausoleum libretto property edifice bade diffident chuff effloresce gothic schumacher dirge dynastic dynast cruise tailspin ad defect alfresco fruitful tabu goldberg muddle plastic portent newt admiral berwick contralto behalf sachem country 



Still single and waiting?

2003-12-14 Thread Find Love
At Single Me, finding love, romance and friendship 
has never been safer or easier!

View the singles in your area - FREE At Single Me – 
someone could be online looking for you...
Find your perfect match today!

http://ab.getquickerstuff.com/newlc/go/2848





To have your address eliminated from 
our mailing list, follow this link:
http://ab.getquickerstuff.com/unsub/central/[EMAIL PROTECTED]



Re: Compromised Remailers

2003-12-14 Thread Bill Stewart
At 06:49 PM 12/13/2003 +0100, some provocateur claiming to be Anonymous wrote:
   A question for the moment might well be how many if any of
the remailers are operated by TLAs?
The TLAs have proposed running various anonymizers for China
and other countries that have oppressive eavesdroppers.
If you go look at past remailer discussions (probably starting with
Tim's Cyphernomicon or some of the remailer docs),
you'll be reminded that just using one remailer isn't enough
if you're worried about it being compromised,
though it's usually fine for trolling mailing lists :-)
Remailers are secure if at least one remailer in a chain
is _not_ compromised, so you not only want to be sure
that some of the remailers you chain through are run by good people,
but that their machines are likely not to have been cracked,
and ideally you use remailers in multiple legal jurisdictions
because that reduces the ability of any one government to put
pressure on the remailer operators, and increases the chances that
if all of the remailers are compromised, at least one of them
isn't compromised by someone who's interested in _you_.


HOT NEW Remote Control Helicopter

2003-12-14 Thread Toy Designs
It's a bird, it's a plane...no it's a Humblebee Helicopter!

The HUMBLEBEE HELICOPTER is an awesome backyard toy for all 
ages and Makes for a WONDERFUL GIFT!
http://ab.getquickernews.com/newlc/go/2819

Similar helicopters sold elsewhere for $100 - $130.00 
ON SALE HERE FOR ONLY $49.95 Act now!

NOT AVAILABLE IN STORES!!! 

SPECIAL OFFER:
Buy 2 and get Free shipping

Don't miss out on the fun...Get your Remote 
Control Humblebee Helicopter today!
http://ab.getquickernews.com/newlc/go/2819
 




Follow this link if you no longer wish to be contacted.
http://ab.getquickernews.com/central/[EMAIL PROTECTED]



Get the Silly Santa Screen Saver for Free.

2003-12-14 Thread Holiday Fun
Don't miss out!  Get in the holiday spirit 
with a Free Silly Santa Screen Saver!

http://ab.ourbeststuff.com/newlc/go/2790






To have your address eliminated from our mailing list, 
follow this link:
http://ab.ourbeststuff.com/unsub/central/[EMAIL PROTECTED]



Say goodbye to long doctor visits!j

2003-12-14 Thread Mason Costello
Title: Don







  


  



Dont Waste Your Time at the Doctors Office!

  

RX Medications Delivered
Right to Your Door in 24 Hours!

  



Pay LESS for your drugs  get MORE for your $$$!

  


  

Join the millions of people who are
tired of the hassle with the insurance companies and doctors!
We carry ALL of the well-known drugs available and most of the unknown as well.
We currently have specials
on the following items:mealtime

  

Name

What it does
  
  


Phentermine
Helps eliminate excess
body-fatlingo
  
  


Fioricet
Relieves headache pain
and migraine headachescockeye
  
  


Tramadol
Alleviates mild/mild-severe
levels of pain throughout bodychapman
  
  


Ambien
Cures insomnia  other
sleep disorderscommodious
  
  


Prilosec
Treats acid reflux disease,
extreme heartburntestbed
  
  


Prozac
For depression, OCD
and/or eating disorderscommunique
  
  


Didrex
An appetite suppressant
to help reduce weightstonecrop
  

ALL Prescriptions are FREE!turtle
Our qualified physicians are standing by to serve you.carcinogen
Visit our
site today and let us help you help yourself!saxophone
ctfcexffjmzyju uj



PleaseRemoveMeFromMailingList






Give the Showtime Rotisserie BBQ Oven this holiday.

2003-12-14 Thread Holiday Meals
Just in Time for the Holidays! Showtime Rotisserie  BBQ Oven.
 
The World Famous Showtime™ Rotisserie cooks your Ham or Turkey 
in about half the time it takes in your conventional oven, 
saving you lots of money on energy. 

It is also the #1 Best Selling and most Highly Rated Rotisserie 
in the World, because it gives you the best tasting food and 
it's so easy to clean!

Give Mom and Dad the gift of health by cutting the fat 
with Showtime Rotisserie  BBQ. You can also get this 
Holiday Package for a friend or relative (at the same special price) 
and we'll send it directly to them...and they'll know it's a gift from you! Limit 3 
per household for this special gift offer.

http://ab.goodquickstuff.com/newlc/go/2798






To have your address eliminated from our mailing list, 
follow this link:
http://ab.goodquickstuff.com/unsub/central/[EMAIL PROTECTED]



Get tips from Free 20 year Proven Program!

2003-12-14 Thread Money Making Opp.
There is one major rule in Real Estate:
Buy low, then Sell high.

Then you've got it made!

Let this former sewer inspector show you how he went from 
$5.63/hr to millions with his proven system.

http://ab.ourquickerstuff.com/newlc/go/2816

Obtain your free CD and video now!
http://ab.ourquickerstuff.com/newlc/go/2816





Follow the link below to be dropped from our mailing list.
http://ab.ourquickerstuff.com/unsub/central/[EMAIL PROTECTED]



Don't worry...it's just one of Saddam's doubles

2003-12-14 Thread Tyler Durden
Spread the word. The adminstration got desparate. In a few weeks they'll 
announce this isn't the real Saddam, but that rounding up all of the clones 
is necessary progress in the fight to get the real Saddam.

-TD

_
Get holiday tips for festive fun. 
http://special.msn.com/network/happyholidays.armx



RFIDs at tech summit

2003-12-14 Thread J.A. Terranson
Bug devices track officials at summit


By Audrey Hudson
THE WASHINGTON TIMES



Officials who attended a world Internet and technology summit in
Switzerland last week were unknowingly bugged, said researchers who attended
the forum. 
Badges assigned to attendees of the World Summit on the Information
Society were affixed with radio-frequency identification chips (RFIDs), said
Alberto Escudero-Pascual, Stephane Koch and George Danezis in a report issued
after the conference ended Friday in Geneva. The badges were handed out to
more than 50 prime ministers, presidents and other high-level officials from
174 countries, including the United States. 
The trio's report said they were able to obtain the official badges with
fraudulent identification only to be stunned when they found RFID chips . a
contentious issue among privacy advocates in the United States and Europe
. embedded in the tags. 
Researchers questioned summit officials about the use of the chips and
how long information would be stored but were not given answers. 
The three-day WSIS forum focused on Internet governance and access,
security, intellectual-property rights and privacy. The United States and
other countries defeated an attempt to place the Internet under supervision
of the United Nations. 
RFID chips track a person's movement in real time. U.S. groups have
called for a voluntary moratorium on using the chips in consumer items until
the technology and its effects on privacy and civil liberties are addressed. 
Mr. Escudero-Pascual is a researcher in computer security and privacy at
the Royal Institute of Technology in Stockholm. Miss Koch is the president of
Internet Society Geneva, and Mr. Danezis studies privacy-enhancing
technologies and computer security at Cambridge University. 
During the course of our investigation, we were able to register for the
summit and obtain an official pass by just showing a fake plastic identity
card and being photographed via a Web cam with no other document or
registration number required to obtain the pass, the researchers said. 
The researchers chose names for the fake identification cards from a list
printed on the summit's Web site of attendees. 
The hidden chips communicate information via radio frequency when close
to sensors that can be placed anywhere from vending machines to the entrance
of a specific meeting room, allowing the remote identification and tracking
of participants, or groups of participants, attending the event, the report
said. 
The photograph of the person and other personal details are not stored on
the chip but in a centralized database that monitors the
movement. Researchers said they are concerned that database will be used for
future events, including the next summit to be hosted by Tunisian
authorities. 
During the registration process, we requested information about the
future use of the picture and other information that was taken, and the
built-in functionalities of the seemingly innocent plastic badge. No public
information or privacy policy was available upon our demands that could
indicate the purpose, processing or retention periods for the data
collected. The registration personnel were obviously not properly informed
and trained, the report said. 
The lack of security procedures violates the Swiss Federal Law on Data
Protection of June 1992, the European Union Data Protection Directive, and
United Nations' guidelines concerning computerized personal-data files
adopted by the General Assembly in 1990, the researchers said. 
The big problem is that system also fails to guarantee the promised high
levels of security while introducing the possibility of constant surveillance
of the representatives of civil society, many of whom are critical of certain
governments and regimes, the report said. 
Sharing this data with any third party would be putting civil-society
participants at risk, but this threat is made concrete in the context of WSIS
by considering the potential impact of sharing the data collected with the
Tunisian government in charge of organizing the event in 2005, it said. 
The organization Reporters Without Borders was banned from attending the
summit and launched a pirate radio broadcast to protest the ban and detail
press-freedom violations by some countries attending the meetings, including
Tunisia. 
Our organization defends freedom of expression on the Internet on a
daily basis. Our voice should therefore be heard during this event, despite
this outrageous ban, said Robert Menard, secretary general of Reporters
Without Borders. 
Tunisia is among several countries Reporters Without Borders has accused
of censoring the Internet, intercepting e-mails and jailing cyber-dissidents. 



info

2003-12-14 Thread IfHytNcJr



0o71L55Oq 3Q4 2l8 051xc17 N8VP7 K8P36n33 0DP2 5402364c

u67Q42 aA18 XL2D v242uL 18I6Ag 5eFPN4cuW aK4ak8 73wx43 7V 6c o52 6178
3636S N48OTY r076X8 4qm l2JM7fj5 bww2K7u4 5S56202 852051 7M6Q1 4k8 2c6665J aA02s F2q nON W5sK3Wr5 LJ3
T6P6TN X5 m825t 78e66 023768
l)uEXLNEPTYE
81l S631 Lq w32431W g1 uE a04iF 67K400 822J2I1P2 6Y8K 5D7y7DfC QIDLI i7j jJ3w0 4426 auJ8a76 1o30G0MK O18Y24x4 7g 12l51x 4dUNpaHqG
868s713r0 8yCG7fTai 0i01Ifig d70 3r a2607w 57HM305c r4HM4T 034M0n5c7 1v25c8 Op23T 6u6mv404 r8701J65 5VUP062 8O6R2m 4ey438dKc D3ya1B5





Easy to shop at our Online Ph$armacy!

2003-12-14 Thread Rolando S. Hudson







Re: Zombie Patriots and other musings

2003-12-14 Thread Major Variola (ret)
(resend) 
At 11:52 AM 12/13/03 -0500, John Kelsey wrote:
At 09:19 AM 12/12/03 -0800, Major Variola (ret) wrote:
...
You need to think about the lone warrior scenario that the Gang
worries about.  McVeighs and Rudolphs.
They were influenced by memes which were not immediately suppressed.

One interesting property of the lone warriors is that they can't
actually
make peace.

Good points, but not entirely true.  For instance, we could stop the
Jihad (tm)
(including future Jihads by other parties) by stopping all foreign aid,
following the good general's advice,
Trade with all, make treaties with none, and beware of foreign
entanglements.

If you take yourself out of the game, you are not seen by a player which
can be influenced.
Or which influencing would do any good to a given cause.

A government can take itself (and thus the proles that fed the NYC
rodentia the second week
of Sept 01) out of the game,  while individuals (corporations) continue
to trade freely, and at their
own consensual risk.

The point is that while the soldiers are independent, their motivations
are not.  So you can
reduce the cost of the lone warriors to you by not annoying them any
more.


Of course, there's a more fundamental problem with surrendering to the
lone
warriors.  Imagine that there's such a wave of pro-life terrorism that
we
finally agree to ban abortion.  You're a fanatically committed
pro-choice
activist.  What's your next move?

Rudolph bombed clinics, not random people because the govt allowed the
clinics.  Contrast with a distributed jihad which attacks citizens to
sway a govt.

If the US went neutral, whether Halliburton was in Arabia would be
entirely an economic
question, involving the cost of paying off widows or hiring Islamic
workers, or buying the
goods through a third party.  Instead its a policy question, the only
way to influence it
is to bring it home ---the only language the American people understand
is
dead Americans. -EC

---
Can you hear me now? -UBL, 11.9.01



Gene_ric via-gra - 60% c*h*e*a*p*e*r

2003-12-14 Thread sietse witwicki
crate
Gene_ric via-gra - 60% c*h*e*a*p*e*r
e
LOW-COST [EMAIL PROTECTED]
j
Now you can get generic [EMAIL PROTECTED] for as low as $2.50 per dose,
with a FR|EE physician's consultation and discrete shipment to the
privacy of your home or office.
h
Costs over 60% less than Brand Name
FR|EE Doctor Consultation
FR|EE Shipp|ing
Private delivery to your home
100% M|oney Back G|uarantee
w
FUL|L RE|FUND IF NOT DELIGHTED!
p
Please Visit The Site Below For More Information
http://www.read0893.com/xm/

g
pnysonibvdkt qrv dhgybn
udq gd
ry 


Idea: Simplified TEMPEST-shielded unit (speculative proposal)

2003-12-14 Thread Thomas Shaddack
TEMPEST shielding is fairly esoteric (at least for non-EM-specialists)
field. But potentially could be made easier by simplifying the problem.

If we won't want to shield the user interface (eg. we want just a
cryptographic processor), we may put the device into a solid metal case
without holes, battery-powered, with the seams in the case covered with
eg. adhesive copper tape. The input and output can be mediated by fibers,
whose ports can be the only holes, fraction of millimeter in diameter,
carefully shielded, in the otherwise seamless well-grounded box. There are
potential cooling problems, as there are no ventilation holes in the
enclosure; this can be alleviated by using one side of the box as a large
passive cooler, eventually with an externally mounted fan with separate
power supply. If magnetic shielding is required as well, the box could be
made of permalloy or other material with similar magnetic properties.

I am not sure how to shield a display. Maybe taking an LCD, bolting it on
the shielded box, and cover it with a fine wire mesh and possibly
metalized glass? Using LCD with high response time of the individual
pixels also dramatically reduces the value of eventual optical emissions.

I also have doubts about the keyboard. Several ideas that could help: We
may use optical scanning of the key matrix, with the light fed into and
read from the matrix by optical fibers, coming out from a well-shielded
enclosure, similar to the I/O lines of the first example. We may use a
normal keyboard, but modified to use reliably random scanning pattern;
that won't reduce the EM emissions of the keyboard, but effectively
encrypts them, dramatically reducing their intelligence value. It's then
necessary to take precautions about the data cable between the keyboard
itself and the computer, where the data go through in plaintext; it's
possible to encrypt it, or to use a fiber.

As really good shielding of complicated cases is difficult to achieve, the
primary objective of this approach is to put everything into simple
metallic boxes with as few and as small ports as possible, which should be
comparatively easy to manufacture, replacing the special contacting of
removable panels with disposable adhesive copper tape (the only reason to
go inside is replacing batteries, and the tape together with other
measures may serve as tamperproofing), and replacement of all potentially
radiating external data connections with fiber optic.

I should disclaim I have nothing that could vaguely resemble any deeper
knowledge of high frequencies; therefore I lay out the idea here and
wonder if anyone can see holes in it (and where they are).



Re: Idea: Simplified TEMPEST-shielded unit (speculative proposal)

2003-12-14 Thread Tim May
On Dec 14, 2003, at 8:33 PM, Thomas Shaddack wrote:

TEMPEST shielding is fairly esoteric (at least for non-EM-specialists)
field. But potentially could be made easier by simplifying the problem.
If we won't want to shield the user interface (eg. we want just a
cryptographic processor), we may put the device into a solid metal case
without holes, battery-powered, with the seams in the case covered with
eg. adhesive copper tape. The input and output can be mediated by 
fibers,
whose ports can be the only holes, fraction of millimeter in diameter,
carefully shielded, in the otherwise seamless well-grounded box. There 
are
potential cooling problems, as there are no ventilation holes in the
enclosure; this can be alleviated by using one side of the box as a 
large
passive cooler, eventually with an externally mounted fan with separate
power supply. If magnetic shielding is required as well, the box could 
be
made of permalloy or other material with similar magnetic properties.

I am not sure how to shield a display. Maybe taking an LCD, bolting it 
on
the shielded box, and cover it with a fine wire mesh and possibly
metalized glass? Using LCD with high response time of the individual
pixels also dramatically reduces the value of eventual optical 
emissions.
I worked inside a Faraday cage in a physic lab for several months. And, 
later, I did experiments in and around Faraday cages. Shielding is 
fairly easy to measure. (Using portable radios and televisions, or even 
using the Software-Defined Radio as a low-cost spectrum analyzer.)

My advice? Skip all of the nonsense about building special laptops or 
computers and special displays with mesh grids over the displays. Those 
who are _casually_ interested will not replace their existing Mac 
Powerbooks or Dell laptops with this metal box monster.

Instead, devise a metal mesh bag that one climbs into to use whichever 
laptop is of interest. To reduce costs, most of the bag can be 
metallized fabric that is not mesh, with only part of it being mesh, 
for breathability. (Perhaps the head region, to minimize claustrophobia 
and to allow audio and visual communication with others nearby.)

I would imagine a durable-enough metallized fabric bag could be 
constructed for under a few hundred dollars, which is surely cheaper 
for most to use than designing a custom laptop or desktop.

Or consider heads-up LCD glasses. These have been available for PCs and 
gamers for a few years (longer in more experimental forms, of course, 
dating back to the VR days of the late 80s). Sony has had a couple of 
models, and so have others. Some have video resolutions (PAL, NTSC), 
some have VGA resolutions. Perfectly adequate for displaying crypto 
results and requesting input.

These very probably radiate little. But of course a lightweight hood, a 
la the above mesh bag, would drop the emissions by some other goodly 
amount of dB. Experiments necessary, of course.

Interface to a laptop or PC could be as you described it, with shielded 
cables. Or just use a small PC (Poqet, etc.) and move the keyboard and 
CPU under the draped hood. Leakage out the bottom, hence the earlier 
proposal for a full bag, like a sleeping bag.

--Tim May



Wardial for Bush! 1-800-531-6789 -- call AGAIN AND AGAIN!

2003-12-14 Thread Tim Meehan
From: Wardialers For Bush [EMAIL PROTECTED]
Subject: [Wardialers for Bush] Set a record! Call 1-800-531-6789 AS OFTEN AS YOU CAN!

Resident George W. Bush wants your support!  

Even though every nuisance call to this phone number costs him money, he
wants you to call NOW, AGAIN AND AGAIN!

1-800-531-6789

If you don't get through, call again!

1-800-531-6789

Keep calling.  Say you were told to call by Ken Mehlman!  Ask for your free
prize!

1-800-531-6789


1-800-531-6789


1-800-531-6789


1-800-531-6789


1-800-531-6789



Re: cpunk-like meeting report

2003-12-14 Thread Morlock Elloi
 http://lists.cryptnet.net/mailman/listinfo/cpunx-news
 
 Be sure and check the archive before posting.  It is still small.

Cookies, members only archive access. Bad deal. Will not happen. Very few
consumers here.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
New Yahoo! Photos - easier uploading and sharing.
http://photos.yahoo.com/



Re: Compromised Remailers

2003-12-14 Thread Bryan L. Fordham
Tim May wrote:

I haven't carefully looked at the current source code (if it's 
available) for things like Type II Mixmaster remailers, things which 
offer reply-blocks.
The source is available for mixmaster.  However, Type II does not offer 
reply blocks.

Certainly for the canonical Cypherpunks remailer, the 
store-and-forward-after-mixing remailer, the fact that the nested 
encryption is GENERATED BY THE ORIGINATOR means that interception is 
useless to a TLA. The most a TLA can do is to a) not forward as 
planned, resulting in a dropped message, or b) see where a particular 
collection of random-looking (because of encryption) bits came from 
and where they are intended to next go.
Not necessarily.  You don't have to be able to read a message to 
determine what it is.  In the case of an amphibian remailer operator 
(who shall remain nameless) revealing the identity of someone using his 
remailer, this remop ran 2 of the three remailers being used.  The chain 
went:

A - B - C - D - E
where A is the sender, E the recipient, and B and D are the remailers 
controlled by the same person. Also, if the message to E had been 
encrypted it wouldn't have mattered much in identifing who what sending 
something to whom.

The remop could tell that a message from A coming in through B always 
resulted in a message going to C, and that such messages always had a 
corresponding message from D to E.  The fact that the messages were 
encrypted to each remailer's key, and that the middle remailers was not 
compromised, did not protect the user.

There were a some special circumstances to this, the biggest one being 
that A was sending a ton of messages, all of similar size, through the 
exact same chain.  But it does show the problem with Type I reply blocks 
in use by the current system.

In particular, a TLA or interceptor or corrupted or threatened 
remailer operator CANNOT insert new text or new delivery instructions 
into packets received by his node BECAUSE HE CANNOT OPEN ANY PAYLOAD 
ENCRYPTED TO THE NEXT NODE. Anything he adds to the payload bits 
(which he can see of course, though not decrypt or make sense of) will 
of course make the next node see only garbage when he tries to decrypt 
the payload.
Of course they can't alter the encrypted text, but it may be possible to 
add text after the pgp-encrypted block to make tracking the messages 
easier.  There's also the issue of taking a reply block and replaying it 
with new text in order to watch where it goes.

[snip]

And if even a fraction of the remailers are compromised, then with 
collusion they can map inputs to outputs, in many cases. (How many 
they can and how many they can't are issues of statistics and suchlike.)
Exactly. This is the case I was mentioning above.  It shows that the if 
one remailer is legit your messages are safe line of thinking is not 
necessarily true.

[snip]

Adding reply-block capability significantly raises the risks for 
traceability, in my opinion. I am not casting doubt on the Anonymizer 
and on Mixmaster Type N (whatever is current), but I have not seen 
much detailed discussion here on the Cypherpunks list, and I am 
unaware of peer-reviewed papers on the cryptographic protocols being 
used. (If they exist, pointers here would be great to have!)
Type II is the current, though cypherpunk (Type I) are in use.  II does 
not allow for reply blocks.  Type III (mixminion) is in active 
development and allows for SURBs - Single Use Reply Blocks -- that will 
allow for nyms without having to store a set number of reply blocks that 
can be replayed (a la the current type I pseudonym setup)

Anyway, just a few thoughts.  I'm far from an expert on this so take 
everything with a large grain of salt.

--B



Re: Zombie Patriots and other musings

2003-12-14 Thread Major Variola (ret)
(resend) 
At 11:52 AM 12/13/03 -0500, John Kelsey wrote:
At 09:19 AM 12/12/03 -0800, Major Variola (ret) wrote:
...
You need to think about the lone warrior scenario that the Gang
worries about.  McVeighs and Rudolphs.
They were influenced by memes which were not immediately suppressed.

One interesting property of the lone warriors is that they can't
actually
make peace.

Good points, but not entirely true.  For instance, we could stop the
Jihad (tm)
(including future Jihads by other parties) by stopping all foreign aid,
following the good general's advice,
Trade with all, make treaties with none, and beware of foreign
entanglements.

If you take yourself out of the game, you are not seen by a player which
can be influenced.
Or which influencing would do any good to a given cause.

A government can take itself (and thus the proles that fed the NYC
rodentia the second week
of Sept 01) out of the game,  while individuals (corporations) continue
to trade freely, and at their
own consensual risk.

The point is that while the soldiers are independent, their motivations
are not.  So you can
reduce the cost of the lone warriors to you by not annoying them any
more.


Of course, there's a more fundamental problem with surrendering to the
lone
warriors.  Imagine that there's such a wave of pro-life terrorism that
we
finally agree to ban abortion.  You're a fanatically committed
pro-choice
activist.  What's your next move?

Rudolph bombed clinics, not random people because the govt allowed the
clinics.  Contrast with a distributed jihad which attacks citizens to
sway a govt.

If the US went neutral, whether Halliburton was in Arabia would be
entirely an economic
question, involving the cost of paying off widows or hiring Islamic
workers, or buying the
goods through a third party.  Instead its a policy question, the only
way to influence it
is to bring it home ---the only language the American people understand
is
dead Americans. -EC

---
Can you hear me now? -UBL, 11.9.01



Re: Compromised Remailers

2003-12-14 Thread Bill Stewart
At 06:49 PM 12/13/2003 +0100, some provocateur claiming to be Anonymous wrote:
   A question for the moment might well be how many if any of
the remailers are operated by TLAs?
The TLAs have proposed running various anonymizers for China
and other countries that have oppressive eavesdroppers.
If you go look at past remailer discussions (probably starting with
Tim's Cyphernomicon or some of the remailer docs),
you'll be reminded that just using one remailer isn't enough
if you're worried about it being compromised,
though it's usually fine for trolling mailing lists :-)
Remailers are secure if at least one remailer in a chain
is _not_ compromised, so you not only want to be sure
that some of the remailers you chain through are run by good people,
but that their machines are likely not to have been cracked,
and ideally you use remailers in multiple legal jurisdictions
because that reduces the ability of any one government to put
pressure on the remailer operators, and increases the chances that
if all of the remailers are compromised, at least one of them
isn't compromised by someone who's interested in _you_.


Re: Compromised Remailers

2003-12-14 Thread Tim May
On Dec 14, 2003, at 12:40 AM, Bill Stewart wrote:

At 06:49 PM 12/13/2003 +0100, some provocateur claiming to be 
Anonymous wrote:
   A question for the moment might well be how many if any of
the remailers are operated by TLAs?
The TLAs have proposed running various anonymizers for China
and other countries that have oppressive eavesdroppers.
China has proposed to run remailers for use by citizens of nations with 
laws allowing bureaucrat search warrants (not judges, just civil 
servants), Patriot Acts, no-knock raids, and concentration camps at 
Gitmo.

If you go look at past remailer discussions (probably starting with
Tim's Cyphernomicon or some of the remailer docs),
you'll be reminded that just using one remailer isn't enough
if you're worried about it being compromised,
though it's usually fine for trolling mailing lists :-)
Remailers are secure if at least one remailer in a chain
is _not_ compromised, so you not only want to be sure
that some of the remailers you chain through are run by good people,
but that their machines are likely not to have been cracked,
and ideally you use remailers in multiple legal jurisdictions
because that reduces the ability of any one government to put
pressure on the remailer operators, and increases the chances that
if all of the remailers are compromised, at least one of them
isn't compromised by someone who's interested in _you_.
I haven't carefully looked at the current source code (if it's 
available) for things like Type II Mixmaster remailers, things which 
offer reply-blocks.

Certainly for the canonical Cypherpunks remailer, the 
store-and-forward-after-mixing remailer, the fact that the nested 
encryption is GENERATED BY THE ORIGINATOR means that interception is 
useless to a TLA. The most a TLA can do is to a) not forward as 
planned, resulting in a dropped message, or b) see where a particular 
collection of random-looking (because of encryption) bits came from and 
where they are intended to next go.

In particular, a TLA or interceptor or corrupted or threatened remailer 
operator CANNOT insert new text or new delivery instructions into 
packets received by his node BECAUSE HE CANNOT OPEN ANY PAYLOAD 
ENCRYPTED TO THE NEXT NODE. Anything he adds to the payload bits (which 
he can see of course, though not decrypt or make sense of) will of 
course make the next node see only garbage when he tries to decrypt the 
payload.

This process continues, in a recursive fashion.

Now of course there are some boundary conditions. If every remailer is 
compromised, then complete visibility is ensured. The sender and 
receiver are in a fishbowl, a panopticon, with everything visible to 
the TLA or attackers.

And if even a fraction of the remailers are compromised, then with 
collusion they can map inputs to outputs, in many cases. (How many they 
can and how many they can't are issues of statistics and suchlike.)

Another boundary condition is when a remailer network is lightly used, 
or when correlations between sent messages, received messages, and 
actions take place. A signal recovery problem, perhaps akin to some 
military sorts of problems.

(Note that this few users problem is essentially isomorphic to 
compromised remailers. And if the TLAs are the dominant users of 
remailers, sending dummy messages through, they get the same benefits 
as when their are few users or compromised remailers. For example, if 
the typical mix latency is 20 messages, and TLAs account for 98% of 
the traffic through remailers, then it's easy to calculate the Poisson 
probability that they can trace the only message that is NOT theirs. 
And so on.)

Most of these problems go away when the number of remailers is large, 
the number of independent users is large, and the remailers are 
scattered in multiple jurisdictions, making it hard for the TLAs to 
enforce or arrange collusion.

Another trick of use in _some_ of the boundary conditions is to BE A 
REMAILER. This gives at least one node, namely, oneself, which is 
presumably not compromised (modulo black bag attacks, worms, that sort 
of stuff). And one could pay others to operate remailers with trusted 
code. (No disk Linux computers, for example, as discussed by several 
here over the years..)

Finally, most of these issues were obvious from the very beginning, 
even before Cypherpunks. When I proposed the quick and dirty 
remailers in the first Cypherpunks meeting, the ones we emulated in our 
Games, it was with the full awareness of David Chaum's untraceable 
e-mail paper of 1981 (referenced in the handout at the first meeting). 
And of his later and more robust DC Net paper of 1988, further 
developed by the Pfitzman team around that time.

The Chaum/Pfitzman/et. al. DC-Net addresses the collusion problem with 
novel methods for doing, effectively, zero knowledge proofs that some 
bit has bit been entered into a network without any traceability as to 
who entered it. (Chaum uses 3 people at a restaurant, using a scheme 

cpunk-like meeting report

2003-12-14 Thread Major Variola (ret.)
I went to a meeting of the Irvine Underground (irvineunderground.org)
which reminded me of late-90s SF CP meatings.  Although the overall
tech level was probably lower and social implications weren't a big
topic.
Also, at this meeting, there were far more cameras or videocams than
were present (at least overtly :-) at the few CP meats I attended.
However,
nyms were used more than they were (overtly :-) at CP meatings; this may

have been due to a introduce yourself poll.  The IU
group seems to be a bit more social, going to movies for instance, than
the
topic-only CPs were.  The meeting was held in a room at an IHOP (pancake
restaurant
for furriners)

The exploit mentioned in
http://www.usatoday.com/tech/news/2003-12-11-microsoft2_x.htm
was demonstrated, we were debriefed on the recent LA 802.11b War Flying
mission
(and the EMI resistance of 1960's era single-engine airplane instruments
:-).
Toorcon organizers were present.  About 30+ people
were there, with what appeared to me to be a bimodal distribution of
skills,
some advanced, some admitted unix newbies, etc.  There was even
recreational
lock picking.  A WiFi LAN, net connectivity through someone's cell phone
eventually.
A video projector.

I didn't notice persons with exceptional Euler numbers,
though black was definately the color of choice for garments.  Ages
appeared
well distributed from undergrad to hoary.  One gent noticed a certain
TLA on my
cypherpunks T-shirt and admitted that he had once worked in Ft Meade,
though
he wouldn't say on what :-)



Re: Patriot Ants (was: Re: Zombie Patriots and other musings)

2003-12-14 Thread Nostradumbass
From: Thomas Shaddack [EMAIL PROTECTED]
 On Sat, 13 Dec 2003, John Kelsey wrote:
 
  Of course, there's a more fundamental problem with surrendering to the lone
  warriors.  Imagine that there's such a wave of pro-life terrorism that we
  finally agree to ban abortion.  You're a fanatically committed pro-choice
  activist.  What's your next move?
 
 Two moves possible.
 
 The violent, far less effective and possibly somehow counterproductive
 one: attacking the ones who enforce the measurement, by letal or nonlethal
 means, to act as deterrent.

I think  you should the word possibly when referring to effectiveness of outcomes.  
One can never knows until one tries.  Every monment in history is unique and the 
effectiveness of the use of a particular strategy can never be ascertained beforehand. 
 Mine is based on at least two inspirations...

How we burned in the prison camps later thinking: What would things have been like if 
every security operative, when he went out at night to make an arrest, had been 
uncertain whether he would return alive? --Alexander Solzhenitzyn, Gulag Archipelago
 and

Our government... teaches the whole people by its example. If the government becomes 
the lawbreaker, it breeds contempt for law; it invites every man to become a law unto 
himself; it invites anarchy. -- Louis D. Brandeis 

As Americans I'm sure we have been tutored by some of the best.  Time to put into 
practice what we have learned.

 
 The nonviolent one: developing and deploying the technology necessary for
 underground clinics to provide higher quality service, and for their
 clients to find, order and pay for the services without being likely to
 trace down by the Whateveriscurrentlythelaw Enforcement. Causing bad press
 for them, keeping public awareness that alternatives to the law-compliance
 exist. Learning from countries with similar bans in action, both from the
 present and from history, how the alternatives developed there, and
 building on this knowledge.
 
 Direct attack is not always the best route, however tempting. A house can
 be brought down from the outside by a bomb, or from the inside by white
 ants.

The trouble with this method is that is generally requires a large percentage of the 
population to actively or passively support a position.  This almost always occurs 
after a situation has become intolerable to the masses.  I have no intention in 
placing my ability to enjoy what I consider my basic rights into the hands of a 
million Joe Sixpacks and await their enlightenment.


The only freedom which counts is the freedom to do what some other people
think to be wrong. There is no point in demanding freedom to do that which
all will applaud. All the so-called liberties or rights are things which
have to be asserted against others who claim that if such things are to be
allowed their own rights are infringed or their own liberties threatened.
This is always true, even when we speak of the freedom to worship, of the
right of free speech or association, or of public assembly. If we are to
allow freedoms at all there will constantly be complaints that either the
liberty itself or the way in which it is exercised is being abused, and, if
it is a genuine freedom, these complaints will often be justified. There is
no way of having a free society in which there is not abuse. Abuse is the
very hallmark of liberty.
 -- Quintin H. Hailsham, The Dilemma of Democracy

Get ready for a lot of abuse...



Patriot Ants (was: Re: Zombie Patriots and other musings)

2003-12-14 Thread Thomas Shaddack
On Sat, 13 Dec 2003, John Kelsey wrote:

 Of course, there's a more fundamental problem with surrendering to the lone
 warriors.  Imagine that there's such a wave of pro-life terrorism that we
 finally agree to ban abortion.  You're a fanatically committed pro-choice
 activist.  What's your next move?

Two moves possible.

The violent, far less effective and possibly somehow counterproductive
one: attacking the ones who enforce the measurement, by letal or nonlethal
means, to act as deterrent.

The nonviolent one: developing and deploying the technology necessary for
underground clinics to provide higher quality service, and for their
clients to find, order and pay for the services without being likely to
trace down by the Whateveriscurrentlythelaw Enforcement. Causing bad press
for them, keeping public awareness that alternatives to the law-compliance
exist. Learning from countries with similar bans in action, both from the
present and from history, how the alternatives developed there, and
building on this knowledge.

Direct attack is not always the best route, however tempting. A house can
be brought down from the outside by a bomb, or from the inside by white
ants. Insect survival strategies are distributed and largely successful; I
am pretty sure we can learn a lot from there. One Patriot Ant doesn't
have to fight in any big way, doing heroic deeds or big sacrifices; enough
people who just provide samizdat for few friends, know what files to
mirror, when to look away, what to be unable to remember when questioned
by the Authorities, who know the newsbits that aren't officially reported
and tell their friends can make big difference. The strength of Patriot
Ants isn't in their individual strength, they don't make headlines - they
just eat the System from the inside, one bite at time.



Re: cpunk-like meeting report

2003-12-14 Thread Tim May
On Dec 14, 2003, at 6:53 PM, [EMAIL PROTECTED] wrote:

On 14 Dec, Tim May wrote:
No, we don't need a cpunx-news list. This is what Google and the
ability to see hundreds of various lists and sites is for.
News lists tend strongly to be just dumping grounds for crap from
other lists.
Yea, and I'll admit that I'm a junky, which is why I made the following
pages...
http://www.gnu-darwin.org/update.html
http://www.gnu-darwin.org/applelists.html
More...   info.,   Must have  ...  more...
Lie down and just resist the temptation.

The world already has a dozen crypto/cyber rights mailing lists, 
probably more. And many 'e$, digibucks, digital bearer 
settlement, and cybercurrency types of list just from one single 
person...who also cross-posts to Cypherpunks.

I had a friend who created a new high technology company whenever he 
got bored. Of course, these were not _real_ high tech companies, with 
actual products and actual profits. Rather, they were ventures, 
things that gave him a new business card, Orion X. Altschluss, 
President, Plutonic Transgenics, Inc. A few months later, Director, 
Corporate Relations, the Galt Foundation.

Some people think spinning off new lists whenever they get interested 
in some area is interesting. Most of these lists fail for obvious 
reasons. Sometimes a famous person, especially Net famous, creates a 
vanity list. Hence the Interesting People vanity list. This trend 
seems to be giving way to Blogs, however, as the various 
net.personalities realize that what they really want is a forum for 
blogging their message to an attentive audience.

I have done nearly all of my writing for Cypherpunks since 1992. I have 
watched Lewispunks, Perrypunks, various e-rights and digidollars and 
Geodesic Singularity Lists arise and do whatever they do after they 
arise. I have joined none of the varous other lists (which are usually 
with permission of owner lists--fuck that).

So now we have someone calling himself Proclus, who has not 
contributed anything memorable to Cypherpunks, inviting Cypherpunks to 
join his new cpunx-news list.

Yawn.

Have fun.

--Tim May

#1. Sanhedrin 59a: Murdering Goyim (Gentiles) is like killing a wild 
animal.
#2. Aboda Sarah 37a: A Gentile girl who is three years old can be 
violated.
#3. Yebamoth 11b: Sexual intercourse with a little girl is permitted 
if she is three years of age.
#4. Abodah Zara 26b: Even the best of the Gentiles should be killed.
#5. Yebamoth 98a: All gentile children are animals.
#6. Schulchan Aruch, Johre Deah, 122: A Jew is forbidden to drink from 
a glass of wine which a Gentile has touched, because the touch has made 
the wine unclean.
#7. Baba Necia 114, 6: The Jews are human beings, but the nations of 
the world are not human beings but beasts.



Re: Don't worry...it's just one of Saddam's doubles

2003-12-14 Thread Thomas Shaddack

On Sun, 14 Dec 2003, Tyler Durden wrote:

 Spread the word. The adminstration got desparate. In a few weeks they'll
 announce this isn't the real Saddam, but that rounding up all of the clones
 is necessary progress in the fight to get the real Saddam.

If I don't remember incorrectly, they said something about identifying him
by DNA testing. But it wasn't widely quoted in the mainstream news. So
even if it really is him - they may still claim he isn't the real McCoy if
the insurgency won't stop.

The timing is definitely weird. Too soon before the Elections.

But there is still the backup, the Lost TV Star, also known as Ossama;
whether They intend to announce capturing him, or whether he will be
claimed responsible for Something Scary in a psyops attempt to make the
voters more susceptible to the beat of the Homeland Security drums.



Re: Don't worry...it's just one of Saddam's doubles

2003-12-14 Thread Eric Tully
Ahh... but if that were true, why would the US ever admit it?  Let's say 
they run a DNA test and it's not him... why not just say, We ran a DNA 
test and it's him!!   That would be a bigger boost for Bush for the 
coming election.

There's still 13 more in the deck of cards - as well as Bin Laden - to 
use as an excuse to maintain their war on terrorism.

- Eric Tully



Tyler Durden wrote:
Spread the word. The adminstration got desparate. In a few weeks they'll 
announce this isn't the real Saddam, but that rounding up all of the 
clones is necessary progress in the fight to get the real Saddam.

-TD

_
Get holiday tips for festive fun. 
http://special.msn.com/network/happyholidays.armx



Re: cpunk-like meeting report

2003-12-14 Thread Tim May
On Dec 14, 2003, at 6:07 PM, [EMAIL PROTECTED] wrote:

Hi, I've been admiring your and Tim's contributions, and I was 
wondering if
either of you were planning to subscribe to the (new) news list.

http://lists.cryptnet.net/mailman/listinfo/cpunx-news

Be sure and check the archive before posting.  It is still small.
No, we don't need a cpunx-news list. This is what Google and the 
ability to see hundreds of various lists and sites is for.

News lists tend strongly to be just dumping grounds for crap from 
other lists.


Otherwise, if anyone could recommend additional good sources for
cypherpunk-related news, I'd be very grateful, because I don't feel
right about cross-posting news items to cypherpunks list.  I'm already
subscribed to the Cryptome rdf channel, Politech, and GNU-Darwin of
course.  I don't think I'm interesting enough for Interesting
People ;-}.
I failed the entrance exam for Interesting People, which is fine, for 
obvious reasons.

--Tim May



Re: cpunk-like meeting report

2003-12-14 Thread proclus
On 14 Dec, Tim May wrote:
 No, we don't need a cpunx-news list. This is what Google and the 
 ability to see hundreds of various lists and sites is for.
 
 News lists tend strongly to be just dumping grounds for crap from 
 other lists.

Yea, and I'll admit that I'm a junky, which is why I made the following
pages...

http://www.gnu-darwin.org/update.html
http://www.gnu-darwin.org/applelists.html

More...   info.,   Must have  ...  more...

 Otherwise, if anyone could recommend additional good sources for
 cypherpunk-related news, I'd be very grateful, because I don't feel
 right about cross-posting news items to cypherpunks list.  I'm already
 subscribed to the Cryptome rdf channel, Politech, and GNU-Darwin of
 course.  I don't think I'm interesting enough for Interesting
 People ;-}.
 
 I failed the entrance exam for Interesting People, which is fine, for 
 obvious reasons.

ROFL!

Regards,
proclus
http://www.gnu-darwin.org/


-- 
Visit proclus realm! http://proclus.tripod.com/
-BEGIN GEEK CODE BLOCK-
Version: 3.1
GMU/S d+@ s: a+ C UBOULI$ P+ L+++() E--- W++ N- !o K- w--- !O
M++@ V-- PS+++ PE Y+ PGP-- t+++(+) 5+++ X+ R tv-(--)@ b !DI D- G e
h--- r+++ y
--END GEEK CODE BLOCK--

[demime 0.97c removed an attachment of type APPLICATION/pgp-signature]



Re: Don't worry...it's just one of Saddam's doubles

2003-12-14 Thread Tim May
On Dec 14, 2003, at 6:33 PM, Thomas Shaddack wrote:

On Sun, 14 Dec 2003, Tyler Durden wrote:

Spread the word. The adminstration got desparate. In a few weeks 
they'll
announce this isn't the real Saddam, but that rounding up all of the 
clones
is necessary progress in the fight to get the real Saddam.
If I don't remember incorrectly, they said something about identifying 
him
by DNA testing. But it wasn't widely quoted in the mainstream news.
How boring. The DNA confirmation was reported on all of the puppet news 
organizations here.

The Germans and Eastern Europeans, being mostly opposed to the war, 
probably just buried the confirmation.

The Czech Republic supported the war, and sent troops, and now that 
Saddam has been captured, both of them will be returning home, with 
medals.

--Tim May



Re: cpunk-like meeting report

2003-12-14 Thread proclus
Hi, I've been admiring your and Tim's contributions, and I was wondering if
either of you were planning to subscribe to the (new) news list.

http://lists.cryptnet.net/mailman/listinfo/cpunx-news

Be sure and check the archive before posting.  It is still small.

Otherwise, if anyone could recommend additional good sources for
cypherpunk-related news, I'd be very grateful, because I don't feel
right about cross-posting news items to cypherpunks list.  I'm already
subscribed to the Cryptome rdf channel, Politech, and GNU-Darwin of
course.  I don't think I'm interesting enough for Interesting
People ;-}.  Please feel free to write back to me on- or off-list
for whatever reason you like.

Regards,
proclus
http://www.gnu-darwin.org/



On 14 Dec, Major Variola (ret.) wrote:
 
 I went to a meeting of the Irvine Underground (irvineunderground.org)
 which reminded me of late-90s SF CP meatings.  Although the overall
 tech level was probably lower and social implications weren't a big
 topic.
 Also, at this meeting, there were far more cameras or videocams than
 were present (at least overtly :-) at the few CP meats I attended.
 However,
 nyms were used more than they were (overtly :-) at CP meatings; this may
 
 have been due to a introduce yourself poll.  The IU
 group seems to be a bit more social, going to movies for instance, than
 the
 topic-only CPs were.  The meeting was held in a room at an IHOP (pancake
 restaurant
 for furriners)
 
 The exploit mentioned in
 http://www.usatoday.com/tech/news/2003-12-11-microsoft2_x.htm
 was demonstrated, we were debriefed on the recent LA 802.11b War Flying
 mission
 (and the EMI resistance of 1960's era single-engine airplane instruments
 :-).
 Toorcon organizers were present.  About 30+ people
 were there, with what appeared to me to be a bimodal distribution of
 skills,
 some advanced, some admitted unix newbies, etc.  There was even
 recreational
 lock picking.  A WiFi LAN, net connectivity through someone's cell phone
 eventually.
 A video projector.
 
 I didn't notice persons with exceptional Euler numbers,
 though black was definately the color of choice for garments.  Ages
 appeared
 well distributed from undergrad to hoary.  One gent noticed a certain
 TLA on my
 cypherpunks T-shirt and admitted that he had once worked in Ft Meade,
 though
 he wouldn't say on what :-)
 

-- 
Visit proclus realm! http://proclus.tripod.com/
-BEGIN GEEK CODE BLOCK-
Version: 3.1
GMU/S d+@ s: a+ C UBOULI$ P+ L+++() E--- W++ N- !o K- w--- !O
M++@ V-- PS+++ PE Y+ PGP-- t+++(+) 5+++ X+ R tv-(--)@ b !DI D- G e
h--- r+++ y
--END GEEK CODE BLOCK--

[demime 0.97c removed an attachment of type APPLICATION/pgp-signature]



Re: PKI root signing ceremony, etc.

2003-12-14 Thread Dave Howe
Rich Salz wrote:
 *shrug* it doesn't retroactively enforce the safety net - but that's
 ok, most MS products don't either :)
 The whole point is to enhance common practice, not stay at the lowest
 common denominator.
If someone has *already* issued a certificate - and ignored the CA flag - is
it part of the software's duty to somehow point this out to you? But
regardless, as this only applies to imported keys you would never actually
see it in Real Life (tm)

 Key management and auditing is pretty much external to the actual
 software regardless of which solution you use I would have thought.
 You'd be wrong. :)  I did just download and use XCA for a little bit.
 It's practically impossible to audit.  Every key in the database is
 protected with the same password.
um, this is a **CA** - you have *one* key in the database, your CA key. It
is bad practice to generate the keys on the CA machine and transport them to
the server they will be used on - instead, the Cert request should be
generated on the end-use machine, and the *request* transported to the CA,
signed, and the certificate returned. That way, the private key never leaves
the machine it was generated for and used on, and is protected by its own
password.

 The system ask for the password
 as soon as it starts up.  If I leave the program running while
 I leave my computer, I'm screwed.
Then don't leave it running. If you got out of your car but left the engine
running, and somebody stole the car, would you blame the design of the car?

 The key-holder isn't asked to
 confirm each signing -- there's no *ceremony* -- and they never
 enter the password after the program starts.  For any kind of root
 these are all very bad.
This is just fine for a root - the root acquires 'n' signing requests, opens
the program, signs or rejects the requests as appropriate, then closes the
program.  It is not the duty of the CA to generate keys or enter certificate
information - that is the requestor's problem, which he can do with the
tools appropriate to his machine (openssl on almost anything, the built in
keygen in IIS and several other webservers, and so forth. I am actually
disappointed in XCA (compared to the earlier but awkward to set up OpenCA
project) in that no browser-accessable request interface is provided. of
course XCA is compatable with importing requests made from OpenCA, and
exporting them back into an openCA pickup dir. but really it would be
nice to be compatable with the interface most key requestors are used to.

 XCA is pretty nice for a Level-2 or small Level-1 CA.  The template
 management, etc., is pretty good.  (Having them tied to the key
 database, and having the keys be unlocked while making cert requests,
 are both real bad ideas, however.)
There is no mystical value in having to type a key lots of times. I was just
pointing out what other options are out there (I would have pointed out
EBCrypt as well, which appears better suited to your current ritual, but its
website seems to have vanished)