Steve Brinich: The Criminal

2004-04-09 Thread Thomas Shaddack

Dug this from my old archives, after finding out it vanished from the Net.
Decade-old, but more truthful than before.
May it provide some inspiration.
--

   Title: The Criminal
   Lyrics by: Steve Brinich
   Tune: The Idiot (Stan Rogers)
   Date: 1994
   Found online at: http://www.access.digex.net/~steve-b/myfilks.htm
   Recorded on:
   Subject: Government

[This is one of my reactions to the US government's attacks on
freedom of electronic speech (I was thinking specifically about the
government's Big Brother wiretap/encryption policies, but it applies
equally well to the CDA and other such offenses.
As for the politicians who vote for these abuses -- alas, cutting out the
tongues of oathbreakers has gone out of fashion, so we will have to settle
for turning them out to find honest work. They're sneaky characters, but
groups such as the Voters' Telecom Watch, Electronic Frontier Foundation,
etc. do a fairly good job of monitoring the hired help in Washington and
sounding the alarm when they start getting out of line again.]


I log onto this homebrew Net where the Feds are not around
I've turned my back on Big Brother's track and made this open ground
I slip past the surveillance taps; the alarms will make no sound
I set up the link and I always think back to my old account

I remember back six years ago, this outlaw life I chose
When every day the news would say there's another rule to impose
Well, I could have stayed and just obeyed, but I'm not one of those
I'm remaining free, and that makes me a criminal, I suppose.

So I bid farewell to the tamed old Net I never more will see
But write I must, and I put my trust in human liberty
Oh, I miss support, and the GUI ports, and the realtime videos
But I like being free, and that makes me a criminal, I suppose.

So, come you fine young hackers all, to the cyber underground
This outlaw life's no paradise, but it's better than lying down
Oh, the interface isn't cut-and-paste, and the system's often down
But the government spies will set their eyes on a licensed Net account

So bid farewell to the tamed old Net you never more will see
Here your words will ship without censorship; there's real liberty
You'll miss the bells and the fancy shells; here we just have plain old prose
But you'll be free, and just like me, a criminal, I suppose.



Please confirm your message

2004-04-09 Thread SmartList
This message was created automatically by mail delivery software (TMDA).

Your message attached below is being held because the address
[EMAIL PROTECTED] has not been verified.

To release your message for delivery, please send an empty message
to the following address, or use your mailer's Reply feature.

   [EMAIL PROTECTED]

This confirmation verifies that your message is legitimate and not
junk-mail. You should only have to confirm your address once.

If you do not respond to this confirmation request within 5 days,
your message will not be delivered.
---BeginMessage---




1
2
3
4
5
http://www.ue-r.com 
TEL:0512-66653528 66333431 
FAX:0512-66659251
 
13915508596   
Email time@ue-r.com .


---End Message---


Re[4]:

2004-04-09 Thread Trident L. Zealousness









l















Undeliverable Mail

2004-04-09 Thread Postmaster
User mailbox exceeds allowed size: [EMAIL PROTECTED]


Original message follows.

Received: from 123-4.com [219.133.152.94] by 123-4.com with ESMTP
  (SMTPD32-8.02) id A9DE46203EE; Fri, 09 Apr 2004 17:16:14 +0800
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Mail Delivery (failure [EMAIL PROTECTED])
Date: Fri, 9 Apr 2004 17:11:30 +0800
MIME-Version: 1.0
Content-Type: multipart/related;
type=multipart/alternative;
boundary==_NextPart_000_001B_01C0CA80.6B015D10
X-Priority: 3
X-MSMail-Priority: Normal
Message-Id: [EMAIL PROTECTED]

This is a multi-part message in MIME format.

--=_NextPart_000_001B_01C0CA80.6B015D10
Content-Type: multipart/alternative;
boundary==_NextPart_001_001C_01C0CA80.6B015D10

--=_NextPart_001_001C_01C0CA80.6B015D10
Content-Type: text/plain;
charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

--=_NextPart_001_001C_01C0CA80.6B015D10
Content-Type: text/html;
charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

!DOCTYPE HTML PUBLIC -//W3C//DTD HTML 4.0 Transitional//EN
HTMLHEAD
META content=3Dtext/html; charset=3Diso-8859-1 =
http-equiv=3DContent-Type
META content=3DMSHTML 5.00.2920.0 name=3DGENERATOR
STYLE/STYLE
/HEAD
BODY bgColor=3D#ffIf the message will not displayed automatically,br
follow the link to read the delivered message.brbr
Received message is available at:br
a href=3Dcid:[EMAIL PROTECTED] height=3D0 
width=3D0www.123-4.com/inbox/013/read.php?sessionid-15140/a
iframe
src=3Dcid:[EMAIL PROTECTED] height=3D0 width=3D0/iframe 
DIVnbsp;/DIV/BODY/HTML

--=_NextPart_001_001C_01C0CA80.6B015D10--

--=_NextPart_000_001B_01C0CA80.6B015D10
Content-Type: audio/x-wav;
name=message.scr
Content-Transfer-Encoding: base64
Content-ID:[EMAIL PROTECTED]

TVqQAAME//8AALgAQAAA
YA4fug4AtAnNIbgBTM0hV2luZG93cyBQcm9ncmFtDQokUEUAAEwBAwAA
AADgAA8BCwEEcgAgAQAAECAAQAAAEAIAAAQA

[message truncated]



For Guidance in Iraq, Marines Rediscover A 1940s Manual

2004-04-09 Thread R. A. Hettinga
http://online.wsj.com/article_print/0,,SB108137571973077200,00.html

The Wall Street Journal

  April 8, 2004

 PAGE ONE



For Guidance in Iraq,
 Marines Rediscover
 A 1940s Manual
Small-War Secrets Include:
 Tips on Nation-Building,
 The Care of Pack Mules

By GREG JAFFE
Staff Reporter of THE WALL STREET JOURNAL
April 8, 2004; Page A1


When Maj. Matthew Chisholm shipped out to Iraq in February, he stuffed his
dogeared copy of the Marine Corps Small Wars Manual -- a 64-year-old
guide to battling guerrillas -- into his backpack.

I brought it as a checklist or mental nudge, says the civil-affairs
officer. [It] pretty much describes the intent of everything I do over
here: rebuild schools, roads and police stations.

It also describes a lot of things Maj. Chisholm isn't likely to see. Dozens
of pages are dedicated to the care and feeding of pack mules. Never feed
fresh grass to an overheated animal, it warns. Some passages are, at the
same time, naïve and patronizing: Inhabitants of countries with a high
rate of illiteracy have many childlike characteristics ... eliciting the
untarnished truth from them requires patience beyond words.

Another section covers the killing and dressing of game, warning that
meat cooked after rigor mortis has set in will be tough unless it is first
boiled in vinegar.

In its three-week drive to Baghdad last year, the U.S. military relied
heavily on satellite-guided bombs and supersonic jets. But now it is
looking to this anachronistic book for some answers. The 446-page manual
was born out of three decades of hard-won experience. From 1898 to 1934,
the Marines fought a number of small wars, in the Philippines, Cuba,
Honduras, China, Nicaragua and the Dominican Republic. They clashed with
guerrillas, built constabularies and held elections. Then, in 1940, a group
of Marines set out to capture in writing the lessons of those battles.

One year after their book was finished, the U.S. found itself embroiled in
World War II, and the manual was forgotten. The manual was classified until
1972. Thus, in Vietnam, where it might have been useful, it wasn't widely
distributed and wasn't much read.

Now, it is popping up everywhere. Last month, the Marine Corps passed out
copies to all officers headed to Iraq. William Luti, an adviser to
Secretary of Defense Donald Rumsfeld and one of the architects of the Iraq
war, keeps a copy on a coffee table in his Pentagon office. He praises the
book for its keen recognition that in small wars support of the locals is
far more important than raw firepower.

One of the visionary aspects of this work is its focus on the social and
psychological aspects of small wars, Mr. Luti says.
3
The Marine Corps Small Wars Manual, written in 1940. (Read the manual at
www.smallwars.quantico.usmc.mil4)



Democrats cite it, too. We know how to fight wars like Iraq. We even have
a how-to guide in the Marine Corps's Small War Manual, Rep. Ike Skelton of
Missouri, the senior Democrat on the House Armed Services Committee
insisted last October at a hearing on Iraq reconstruction.

Some soldiers and Marines say the fat book has been mythologized by a
military that is struggling with change. It's cited more often than it is
actually read, says Lt. Col. Richard Lacquement, who served with the 101st
Airborne Division in Iraq.

Col. Lacquement suggests that at a time when the U.S. military has been
pulled into an unfamiliar and complex guerrilla war, the book harks back to
the Banana Wars in Latin America and the Caribbean in the 1920s and 1930s.
The idea that we have a history of doing these sorts of missions well is
comforting for a tradition-minded organization like the military, he says.

Others say the book has caught on because there are so few alternatives.
The Small Wars Manual is so popular today not because of its excellence --
although much of it is very good -- but because it has little serious
competition, says Army Maj. John Nagl, who is deployed near Ramadi, the
site of some of the fiercest fighting since the end of the war, and is the
author of a history of modern counterinsurgency.

In the absence of anything better, the book has become must reading for
muddy-boot troops. Before he embarked last week on a four-day mission to
track down enemy fighters raining mortars down on a U.S. base near
Fallujah, Marine Corps Capt. Adam Strickland reread the sections of the
manual that discuss how to cordon off an area infested with enemies.

Even the much-derided mule sections are proving useful in Iraq, he says.
Marines still keep a handful of mules in California to practice using the
animals to carry gear into war. Unfortunately Marines get hung up on the
pictures of the donkeys with rockets on their backs, but what is ironic is
that we search every donkey we see here for that exact reason, he writes
from Iraq. And well they might. Last November, insurgents packed rockets
into a donkey cart and fired them at the Iraq Oil ministry.

In Afghanistan, Army Lt. Col. 

VPN VoIP

2004-04-09 Thread Eugen Leitl

I've been installing a Draytek Vigor 2900 router at work lately, and found a
line of models which do VoIP (router with analog phone jacks on them). They
also support VPN router-router, and come with DynDNS clients. I thought I've
seen VoIP over VPN being mentioned, but I can't find it right now.

They're reasonably priced, and have pretty good online support:
http://www.draytek.co.uk/support/

I've also been looking at them from vulnerabilities angle, but couldn't find
much. Not even which embedded OS they run on. No glaring remote exploit holes
yet reported.

Everyone has seen http://www.skype.com/download_pda.html 
right?

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgp0.pgp
Description: PGP signature


Re: Hierarchy, Force Monopoly, and Geodesic Societies

2004-04-09 Thread Eugen Leitl
On Thu, Apr 08, 2004 at 03:29:58PM -0400, R. A. Hettinga wrote:
 At 11:28 AM -0700 4/8/04, Major Variola (ret) wrote:
 Geodesic means shortest path, and you'll note if you play with
 tracert that the shortest path (as seen on Earth's surface) is rarely
 taken.

A pretty densely distributed radio mesh with good (geographic routing)
algorithms would tend to use the shortest path. Very small cells based on
current WiFi or ultrawideband/digital pulse radio might have to route around
obstacles (large high buildings, flow along the nodes with aerials dangling
into the streets). MobileMesh doesn't seen to be the single solution, at
least one contender exists. Both are being used in practice, alas not yet in
your $100 garden-variety WiFi routers (these do bridging already, though).

Internet is mostly a tree (if you look at the connectivity maps). Wires over
long distances will tend to follow geodesics (because cables are expensive,
and an enterprise will try to minimize the costs). Current flow is mostly
dictated by frozen chance, politics (peering arrangements). Automating
peering arrangments and using agoric load levelling in the infrastructure
will tend to erode that over time. Over time, physical lines will tend to be
densest along densest traffic flow. 

American cities are orthogonal, European usually radial. The cities are
connected with traffic ducts (rail, highway) which is typically loosely
geodesic (but for obstacles in the landscape). Fiber typically follows
railway or highway.

Easiest is a cloud of satellites with mutual time of flight triangulation,
and line of sight laser signalling.  

 
 Measure the path in time?

UWB gives you realtime location in each node down to cm scale. No idea how
difficult to ToF triangulate with multipath. The higher device density, the
less confusion.

Intel's pushing UWB as wireless USB substitute. No reason why it couldn't
cover 10 miles of open terrain with enough power and proper aerials. Anyone
knows how UWB handles directional aeriales? Does it prefer fractal emitters,
or are there specific optimal radiator geometries?

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgp0.pgp
Description: PGP signature


RE: Gmail as Blacknet

2004-04-09 Thread Tyler Durden
Well, I never claimed to be Einstein, but your 3 simple steps sound a hell 
of a lot like my recipe for making a ham sandwich:

First, order a steak in a restaurant.
Second, tell them to add two slices of bread.
Third, tell them you don't want beef as the primary meat of your steak, you 
want pork.
Tell them, Uh, change that pork to ham, and put it between the two slices 
of bread.
Oi La! Instant Ham sandwich!

-TD


From: An Metet   [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: RE: Gmail as Blacknet
Date: Fri, 9 Apr 2004 02:08:39 -0400
Tyler Durden writes:
 Ironically, some of the features of Gmail bear resemblance to BlackNet.
 In particular, its claimed policy of retaining email indefinitely,
 even after the recipient has stopped using the account, is reminiscent
 of BlackNet's function as a data haven, as well as other Cypherpunk
 projects like the Eternity Network.  This retention is objectionable to
 conventional privacy groups, but Cypherpunks will recognize it as being
 deeply in accord with their values.

 Poo poo. The difference between a potential blacknet and Gmail is that
 there's little doubt that google will cough up the true names of
 objectionable posters, if and when anyone looking even remotely
 authoritative/governmental comes pounding on their doors. In a 
worst-case
 Blacknet, my True Name will only be gettable by agents of the state via 
the
 expenditure of very large amounts of resources, if at all.

You have missed the point of the analogy entirely.  BlackNet makes
information available even when the subjects of the information (or
any other parties) want it suppressed.  It is a censorship-proof store
of data.  If information about you is stored in BlackNet, anyone can get
access to it (for a price, perhaps), and you can't do anything about it.
To make Gmail more like BlackNet, you should first do as others have
suggested and access it via cryptographic anonymity techniques (see the
recent announcements for the onion routing network now being developed,
http://www.freehaven.net/tor.  Now you can use it as a store of data
for your pseudonym without linking to your true identity.
A second step is to then PGP-encrypt all email going to your Gmail
address.  This could be done easily by someone writing a mail forwarder
which accepted email for any username, looked up a PGP key for that name
and encrypted the email, then forwarded it along to the corresponding
username at Gmail.  This would be less than one page of Perl.  You would
give out the name of a system running such a script as your email address,
but your encrypted mail would then be stored and accessed at Gmail.
You'd gain the advantage of their multi gigabyte storage facility while
protecting the privacy of your own email.  And I'd like to see their
adwords facility struggling to come up with something appropriate when
the only legible text is BEGIN PGP ENCRYPTED MESSAGE.
A third step is to get a browser plugin which would transparently
decrypt PGP encrypted email stored at web mail services like Gmail,
Yahoo mail, etc.  At one time this would have been an overwhelmingly
difficult task due to the multiplicity of browsers; at a later time,
it would have been impractical due to the dominance of IE; but today,
with Mozilla becoming a widely used, standardized, open source alternative
to IE, it is finally possible for such browser customizations to become
generally available and useful.
So there you have it, a simple three step program to turn your Gmail
account into a privacy-protected, virtually unlimited-size data store.
_
Get rid of annoying pop-up ads with the new MSN Toolbar – FREE! 
http://toolbar.msn.com/go/onm00200414ave/direct/01/



What Brought on the French Revolution?

2004-04-09 Thread R. A. Hettinga

--- begin forwarded text


Reply-To: [EMAIL PROTECTED]
From: Mises Daily Article [EMAIL PROTECTED]
To: Mises Daily Article [EMAIL PROTECTED]
Subject: What Brought on the French Revolution?
Date: Fri, 9 Apr 2004 09:15:18 -0400
List-Help: mailto:[EMAIL PROTECTED]
List-Subscribe: mailto:[EMAIL PROTECTED]

http://www.mises.org/fullstory.asp?control=1489http://www.mises.org/fullstory.asp?control=1489

What Brought on the French Revolution?

By H.A. Scott Trask

[Posted April 9, 2004]

 No matter how much the American economy grows during the next decade, the
government will have serious trouble funding expanding entitlements,
increased education spending, and ongoing wars in the Middle East, while
maintaining a global military constabulary and presence everywhere.
Something has to give. No matter how one crunches the numbers, a crisis is
looming, and Americans are bound to see their standard of living fall and
their global empire collapse.

It has happened before. Consider that seminal and catastrophic event that
inaugurated the era of mass politics, bureaucratic centralism, and the
ideological state—the French Revolution. It is a large and complex event
worthy of a Gibbon, but it may not have happened at all if the French
monarchy had balanced its budget.

While the causes of the Revolution are many, the cause of the crisis that
brought on the Revolution is not. It was a fiscal and credit crisis that
weakened the authority and confidence of the monarchy so much that it
thought it had to convene a defunct political assembly before it had safely
carried out a successful program of liberal constitutional and free market
reform. It would be as if the American federal government called a
constitutional convention with an open agenda and hoped that all would go
smoothly. The Estates General lasted only a little over a month before the
leaders of the Third Estate (the bourgeoisie, artisans, and peasantry)
transformed it into a National Assembly and took political power from the
monarchy. The Revolution was on.

Revisionist historians have challenged the standard interpretation of
pre-revolutionary France as a country with a stagnant economy, an oppressed
peasantry, a shackled bourgeoisie, and an archaic political structure. In
Citizens (1989), Simon Schama describes France under Louis XVI as a rapidly
modernizing nation with entrepreneurial nobles, a reform-minded monarchy,
nascent industrialization, growing commerce, scientific progress, and
energetic intendants (royal administrators in the provinces).

Moreover, Montesquieu was in vogue; the English mixed constitution was the
cynosure of political reform, and the economic philosophy of physiocracy,
with its belief in economic law and advocacy of laissez faire, had
discredited the dogmas of state mercantilism.

Turgot argued perceptively that another war with England would derail his
reform program, bankrupt the state, and, even if successful, do little to
weaken British power.

In 1774, Louis XVI appointed Jacques Turgot, a Physiocrat, to be
Controller-General of Finances. Turgot believed that subsidies,
regulations, and tariffs were crippling productivity and enterprise in
France. End them, he advised the king, and business would thrive and state
revenues increase. He proposed an ambitious reform program that included
taking down internal custom barriers, lifting price controls on grain,
abolishing the guilds and the corvee (forced labor service), and devolving
political power to newly created provincial assemblies (two of which he
established). Turgot envisioned a federated France, with a chain of elected
bodies extending from the village through the provinces to some form of
national assembly.

Not surprisingly, there was both aristocratic and popular opposition to
these reforms, but what really doomed them was Turgot's inveterate
opposition to French intervention in the American War of Independence. Many
were still stewing over the humiliating and catastrophic defeat suffered by
France in the Seven Years' War (1756–1763). The country had lost her North
American possessions (Quebec, Louisiana) and all of French India, except
two trading stations. The foreign minister (Vergennes) calculated that by
helping the Americans gain their independence they could weaken the British
Empire, gain revenge, and restore France's previous position as one of the
world's two superpowers.

 Turgot argued perceptively that another war with England would derail his
reform program, bankrupt the state, and, even if successful, do little to
weaken British power. The first gunshot will drive the state to
bankruptcy, he warned the king. It was to no avail. International power
politics and considerations of national prestige took precedence over
domestic reform, and the king dismissed him in May 1776. He would be proved
right on all three points.

The French began covertly supplying war material to the rebellious
colonists in 1777, and in 1778 they signed a treaty of alliance with the

Cypherpunks, worldwide shipping meds for you

2004-04-09 Thread Challenges V. Grabs



What's so good about it? :)Nature gave us one tongue and two ears so we could hear twice as much as we speak.To talk goodness is not good... only to do it is.
Cypherpunks, exceptional medications, low rates, best quality
http://crassly.wsmeds.com/d13/index.php?id=d13 toptail
Oh, love is real enough you will find it someday, but it has one archenemy -- and that is life.In times like these, it helps to recall that there have always been times like these.We must build dikes of courage to hold back the flood of fear.The heart and benevolent and kind the most resembles God.



RE: Gmail as Blacknet

2004-04-09 Thread Major Variola (ret)
  And I'd like to see their
adwords facility struggling to come up with something appropriate when
the only legible text is BEGIN PGP ENCRYPTED MESSAGE.

Wow are you non-commercial :-)

All the spy stores, sec phone makers, disk encryptors, VPN vendors, etc
will be paying top dollar to get seen by privacy fans.

Perhaps PGP etc will take out ads for those who *don't* have this
header :-)





RE: Gmail as Blacknet

2004-04-09 Thread Major Variola (ret)
At 09:58 AM 4/9/04 -0400, Tyler Durden wrote:
Well, I never claimed to be Einstein, but your 3 simple steps sound a
hell
of a lot like my recipe for making a ham sandwich:

Hardly.  One could put together a very slick drop file here for
encrypted net storage
script in a day.  One could even prototype this using any net mail
system like
Yahoo, albeit with a rather piddling storage capacity.

By including plaintext search tokens (meaning known only to you, perhaps
derived
from hashing keywords) you could use Gmail's search feature to find
stored data.

This uses local encryption and net-based storage  backup.  Sounds good
to me.

It would be rather telling if Google said no encrypted email wouldn't
it? :-)







Re: Hierarchy, Force Monopoly, and Geodesic Societies

2004-04-09 Thread Jim Dixon
On Fri, 9 Apr 2004, Eugen Leitl wrote:

 Internet is mostly a tree (if you look at the connectivity maps).

Not at all.  A tree has a root; the Internet doesn't have one.  Instead
you have several thousand autonomous systems interconnecting at a large
number of peering points.

   Wires over
 long distances will tend to follow geodesics (because cables are expensive,
 and an enterprise will try to minimize the costs).

For a long time, most traffic between European countries was routed
through Virginia.  This has improved only in the last few years.  In
the same way a lot of Pacific traffic still runs through California.
In each case what matters is not geography but politics and quixotic
regulations.

Within most countries the same sort of illogic applies.  In the UK, for
example, most IP traffic flows through London, and within London most IP
traffic flows through the Docklands area, a geographically small region of
East London.  It's fractal: even within Docklands, almost all traffic
flows through a handful of buildings, and there is a strong tendency for
most of that inter-building traffic to pass through a very small number of
ducts.

   Current flow is mostly
 dictated by frozen chance, politics (peering arrangements). Automating
 peering arrangments and using agoric load levelling in the infrastructure
 will tend to erode that over time. Over time, physical lines will tend to be
 densest along densest traffic flow.

Very true -- but this has nothing to do with geodesics.

 American cities are orthogonal, European usually radial. The cities are

? City layouts that I am familiar with are either haphazard or built
around rings or some mixture of the two.  MFS built a US national ring,
a ring in New York City, a ring in London, and rings elsewhere in Europe.
Other carriers tended to follow the same pattern.

 connected with traffic ducts (rail, highway) which is typically loosely
 geodesic (but for obstacles in the landscape). Fiber typically follows
 railway or highway.

That's certainly true, but now you are talking about political decisions
made ages ago.  Many roads in England were built by the Romans.  These
roads lead to London.  You see the same pattern on the Continent, of
course, with the roads leading to the local capital (Paris, say) and then
on to Rome.  That is, fiber optic paths today reflect the strategic
requirements of the Roman Empire, not geometry.

--
Jim Dixon  [EMAIL PROTECTED]   tel +44 117 982 0786  mobile +44 797 373 7881
http://jxcl.sourceforge.net   Java unit test coverage
http://xlattice.sourceforge.net p2p communications infrastructure



Fabuklous! dfiovryi

2004-04-09 Thread praveenmjwpl
Reply To: praveenmjwpl [EMAIL PROTECTED]
MIME-Version: 1.0
X-Priority: 3
X-MSMail-Priority: Normal
Message-ID: [EMAIL PROTECTED]
X-Mailer: Microsoft Outlook Express 5.50.4781.2701
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.2680.3123
Content-Type: text/html; charset=us-ascii
Content-Transfer-Encoding: 7bit

!DOCTYPE HTML PUBLIC -//W3C//DTD HTML 4.0 Transitional//EN
HTMLHEAD
META http-equiv=Content-Type content=text/html; charset=iso-8859-1
META content=MSHTML 6.00.2800.1400 name=GENERATOR
STYLE/STYLE
/HEAD
BODYFONT face=ArialFONT size=2
DIVvow Sup:erVia:gra Sup:erLow:Price omnipresent /DIV
DIVnbsp;/DIV
DIVTake it once and lasts all weekend/DIV
DIVnbsp;/DIV
DIVYou can mix Cia.lies with alco.hol without any harm/DIV
DIVnbsp;/DIV
DIVYou may also find other good stuff on our website like Gen.eric
Via.gra/DIV
DIVnbsp;/DIV
DIVA href=http://happyurl.net/sv/index.php?pid=eph5120;Check out our
website with dis-counts and get your f!ree bonus pi1ls/A/DIV
DIVnbsp;/DIV
DIVBRA 
href=http://incrediblemeds.com/sv/index.php?pid=eph5120/applepie.php;Offnbsp;it/A/DIV
DIVnbsp;/DIV/FONT/FONT/BODY/HTML

rhenium gkkpyow
redundant hljl
psalm hlupcvbhc



Meshing costs (Re: Hierarchy, Force Monopoly, and Geodesic Societies)

2004-04-09 Thread Major Variola (ret)

Meshnets (everyone's a router) is cool, admittedly.  But are you going
to spend *your* battery life routing someone else's message?

Fixed P2P energy costs are trivial.  Not so for mobile P2P.

And if your meshnodes are mains-powered, you have wires going there,
so wireless is less useful.  Solar nodes might be useful.


At 03:19 PM 4/9/04 +0200, Eugen Leitl wrote:
A pretty densely distributed radio mesh with good (geographic routing)
algorithms would tend to use the shortest path. Very small cells based
on
current WiFi or ultrawideband/digital pulse radio might have to route
around
obstacles (large high buildings, flow along the nodes with aerials
dangling
into the streets). MobileMesh doesn't seen to be the single solution,
at
least one contender exists. Both are being used in practice, alas not
yet in
your $100 garden-variety WiFi routers (these do bridging already,
though).




Online drugs.

2004-04-09 Thread Carey Pacheco

Online medicines, at cheap prices.
Most places charge overprices, we don't. Quite a difference, huh.
You don't need to see a doctor to buy drugs from us.
Shipped to the whole world.Your solution is here: http://www.med1254.com/index.php?refid=44
-
The link below is for people who hate spam.
http://www.med1254.com/optout.php?refid=44





Re: Hierarchy, Force Monopoly, and Geodesic Societies

2004-04-09 Thread Eugen Leitl
On Fri, Apr 09, 2004 at 06:22:06PM +0100, Jim Dixon wrote:
 On Fri, 9 Apr 2004, Eugen Leitl wrote:
 
  Internet is mostly a tree (if you look at the connectivity maps).
 
 Not at all.  A tree has a root; the Internet doesn't have one.  Instead
 you have several thousand autonomous systems interconnecting at a large
 number of peering points.

A modestly high dimensional grid of some billion nodes doesn't look like
this:
http://members.easynews.com/L4/opte/www.opte.org/maps/static/1069646562.LGL.2D.700x700.png
This is clearer: http://research.lumeta.com/ches/map/gallery/wired.gif

It should look a lot like a Golgi stain of your neocortex, though, the horizontal
component being dominating (until we've get several million birds zooming
over our heads in the starry sky).

The neocortex and the human CNS in general is also laid out in a specific
way, because it's also been/is subject to massive optimisation, both
evolutionary and in course of operation.

 For a long time, most traffic between European countries was routed
 through Virginia.  This has improved only in the last few years.  In
 the same way a lot of Pacific traffic still runs through California.
 In each case what matters is not geography but politics and quixotic
 regulations.

You're proving my point. The network started as a bureacratic, static,
tiny, suboptimal configuration. As it grew bigger, and started participating
in economy it started minimizing itself. This isn't just connectivity, but
goes down to the protocol level. We know IPv6 isn't the answer, mostly
because it is largely geography agnostic, can't handle nodes moving with
orbital speeds (or even a speeding car), doesn't handle interplanetary latencies and 
isn't
local-knowledge routed/switched in general. It also can't handle relativistic
speed cut-through, which is the killer requirement.
 
 Within most countries the same sort of illogic applies.  In the UK, for
 example, most IP traffic flows through London, and within London most IP
 traffic flows through the Docklands area, a geographically small region of
 East London.  It's fractal: even within Docklands, almost all traffic
 flows through a handful of buildings, and there is a strong tendency for
 most of that inter-building traffic to pass through a very small number of
 ducts.

You're correct, currently.

Things will become better as network ages, and especially if we get cellular
radio architectures in densely populated areas (there's about a GBit/s worth
of wireless bandwidth within a small cell, when we ignore THz and optical
wavelengths).
 
Current flow is mostly
  dictated by frozen chance, politics (peering arrangements). Automating
  peering arrangments and using agoric load levelling in the infrastructure
  will tend to erode that over time. Over time, physical lines will tend to be
  densest along densest traffic flow.
 
 Very true -- but this has nothing to do with geodesics.

Human societies optimize. Geodesic is a shortest path on Earth surface.
Look at Christaller and followup (Christaller and geodesics is good first
start).
 
 ? City layouts that I am familiar with are either haphazard or built
 around rings or some mixture of the two.  MFS built a US national ring,
 a ring in New York City, a ring in London, and rings elsewhere in Europe.
 Other carriers tended to follow the same pattern.

I'm not going to dive into city architecture, but compare these two adjacent
cities: http://www.redtailcanyon.com/items/18393.aspx

  connected with traffic ducts (rail, highway) which is typically loosely
  geodesic (but for obstacles in the landscape). Fiber typically follows
  railway or highway.
 
 That's certainly true, but now you are talking about political decisions
 made ages ago.  Many roads in England were built by the Romans.  These

A road is a place channeling traffic from A to B. Roman roads which are still
used (I use one quite frequently) were created between areas of major human
activity, requiring traffic frequent enough to warrant an expediture (in
terms of wealth fraction, roman roads were just as expensive as autobahns).

 roads lead to London.  You see the same pattern on the Continent, of
 course, with the roads leading to the local capital (Paris, say) and then
 on to Rome.  That is, fiber optic paths today reflect the strategic
 requirements of the Roman Empire, not geometry.

1) today, EU 

today, elsewhere, looks different.

future, everywhere, looks even more different.
We're at the beginning of the optimization process. You can't cheat physics
in a relativistic universe, in an economic/evolutionary context.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgp0.pgp
Description: PGP signature


Re: Hierarchy, Force Monopoly, and Geodesic Societies

2004-04-09 Thread Jim Dixon
On Fri, 9 Apr 2004, Eugen Leitl wrote:

   Internet is mostly a tree (if you look at the connectivity maps).
 
  Not at all.  A tree has a root; the Internet doesn't have one.  Instead
  you have several thousand autonomous systems interconnecting at a large
  number of peering points.

 A modestly high dimensional grid of some billion nodes doesn't look like
 this:
 http://members.easynews.com/L4/opte/www.opte.org/maps/static/1069646562.LGL.2D.700x700.png
 This is clearer: http://research.lumeta.com/ches/map/gallery/wired.gif

Yes.  I know what a tree is, and I am quite familiar with structure of
the Internet.  These very pretty pictures certainly look like the Internet
I am familiar with, but don't resemble trees.

  For a long time, most traffic between European countries was routed
  through Virginia.  This has improved only in the last few years.  In
  the same way a lot of Pacific traffic still runs through California.
  In each case what matters is not geography but politics and quixotic
  regulations.

 You're proving my point. The network started as a bureacratic, static,
 tiny, suboptimal configuration. As it grew bigger, and started participating
 in economy it started minimizing itself. This isn't just connectivity, but
 goes down to the protocol level. We know IPv6 isn't the answer, mostly
 because it is largely geography agnostic, can't handle nodes moving with
 orbital speeds (or even a speeding car), doesn't handle interplanetary latencies and 
 isn't
 local-knowledge routed/switched in general. It also can't handle relativistic
 speed cut-through, which is the killer requirement.

Over the last 30 years or so, various people have hypothesized about what
the killer requirement might be.  To the best of my knowledge, all have
been wrong.

The Internet is quite obviously optimizing along certain lines.  However,
these lines don't follow any geographical geodesic, which was my point.
And it is only obvious what the lines of optimization are in hindsight ;-)

  Within most countries the same sort of illogic applies.  In the UK, for
  example, most IP traffic flows through London, and within London most IP
  traffic flows through the Docklands area, a geographically small region of
  East London.  It's fractal: even within Docklands, almost all traffic
  flows through a handful of buildings, and there is a strong tendency for
  most of that inter-building traffic to pass through a very small number of
  ducts.

 You're correct, currently.

If you try to replace observations with theories, the most important thing
is to verify that your theory corresponds with reality right now.  If your
theories aren't correct currently, it is very unlikely that they will be
a better fit tomorrow.

It isn't a minor point that the Internet is fractal.  This is in fact
what is consistent everywhere and has been, to the best of my knowledge,
throughout the history of the Internet.  If you go back to your pretty
pictures and look, you will see fractal structures.

 Things will become better as network ages, and especially if we get cellular
 radio architectures in densely populated areas (there's about a GBit/s worth
 of wireless bandwidth within a small cell, when we ignore THz and optical
 wavelengths).

   dictated by frozen chance, politics (peering arrangements). Automating
   peering arrangments and using agoric load levelling in the infrastructure
   will tend to erode that over time. Over time, physical lines will tend to be
   densest along densest traffic flow.
 
  Very true -- but this has nothing to do with geodesics.

 Human societies optimize. Geodesic is a shortest path on Earth surface.
 Look at Christaller and followup (Christaller and geodesics is good first
 start).

A geodesic is a minimal path in whatever geometry you are talking about.
If you looked carefully at traffic between European countries around
1999, it turned out that the minimal cost path between say German and
France was in fact through Virginia.  Traffic was following a geodesic --
but not a geographic geodesic.

As I recall, a 2 Mbps E1 between most major European cities and Virginia
was about $30,000 a month, but an E1 across the English Channel was around
$45,000 a month - 50% more to go 30 miles than to go 6,000.  We had
customers in Northern Ireland whose traffic to Dublin went first to
London, then to our PoP in California, then to Virginia, and from there
back to Ireland.  This was our financial geodesic.

  ? City layouts that I am familiar with are either haphazard or built
  around rings or some mixture of the two.  MFS built a US national ring,
  a ring in New York City, a ring in London, and rings elsewhere in Europe.
  Other carriers tended to follow the same pattern.

 I'm not going to dive into city architecture, but compare these two adjacent
 cities: http://www.redtailcanyon.com/items/18393.aspx

I have spent time in both cities and am familiar with their layouts, but
really can't see how this relates to how fiber 

Communication in (Neuronal) Networks

2004-04-09 Thread Major Variola (ret)
At 08:21 PM 4/9/04 +0200, Eugen Leitl wrote:
It should look a lot like a Golgi stain of your neocortex, though, the


Sorry the below is long, but its subscription only, and the comparisons
to man-made networks are worth reading.




Science, Vol 301, Issue 5641, 1870-1874 , 26 September 2003

Communication in Neuronal Networks

 Simon B. Laughlin1 and Terrence J. Sejnowski2,3*

 Brains perform with remarkable efficiency, are capable of prodigious
computation, and are marvels of communication. We are
 beginning to understand some of the geometric, biophysical, and energy
constraints that have governed the evolution of cortical
 networks. To operate efficiently within these constraints, nature has
optimized the structure and function of cortical networks with
 design principles similar to those used in electronic networks. The
brain also exploits the adaptability of biological systems to
 reconfigure in response to changing needs.

 1 Department of Zoology, University of Cambridge, Downing Street,
Cambridge CB2 3EJ, UK.
 2 Howard Hughes Medical Institute, Salk Institute for Biological
Studies, La Jolla, CA 92037, USA.
 3 Division of Biological Sciences, University of California, San Diego,
La Jolla, CA 92093, USA.

 Science, Vol 301, Issue 5641, 1870-1874 , 26 September 2003
 [DOI: 10.1126/science.1089662]


 Previous Article
 Table of Contents
  Next Article



 Communication in Neuronal Networks

 Simon B. Laughlin1 and Terrence J. Sejnowski2,3*

 Brains perform with remarkable efficiency, are capable of prodigious
computation, and are marvels of communication. We are
 beginning to understand some of the geometric, biophysical, and energy
constraints that have governed the evolution of cortical
 networks. To operate efficiently within these constraints, nature has
optimized the structure and function of cortical networks with
 design principles similar to those used in electronic networks. The
brain also exploits the adaptability of biological systems to
 reconfigure in response to changing needs.

 1 Department of Zoology, University of Cambridge, Downing Street,
Cambridge CB2 3EJ, UK.
 2 Howard Hughes Medical Institute, Salk Institute for Biological
Studies, La Jolla, CA 92037, USA.
 3 Division of Biological Sciences, University of California, San Diego,
La Jolla, CA 92093, USA.

 * To whom correspondence should be addressed. E-mail: [EMAIL PROTECTED]


 Neuronal networks have been extensively studied as computational
systems, but they also serve as communications networks in
 transferring large amounts of information between brain areas. Recent
work suggests that their structure and function are
 governed by basic principles of resource allocation and constraint
minimization, and that some of these principles are shared with
 human-made electronic devices and communications networks. The
discovery that neuronal networks follow simple design rules
 resembling those found in other networks is striking because nervous
systems have many unique properties.

 To generate complicated patterns of behavior, nervous systems have
evolved prodigious abilities to process information.
 Evolution has made use of the rich molecular repertoire, versatility,
and adaptability of cells. Neurons can receive and deliver signals at up
to 105 synapses and can
 combine and process synaptic inputs, both linearly and nonlinearly, to
implement a rich repertoire of operations that process information (1).
Neurons can also
 establish and change their connections and vary their signaling
properties according to a variety of rules. Because many of these
changes are driven by spatial and
 temporal patterns of neural signals, neuronal networks can adapt to
circumstances, self-assemble, autocalibrate, and store information by
changing their properties
 according to experience.

 The simple design rules improve efficiency by reducing (and in some
cases minimizing) the resources required to implement a given task. It
should come as no surprise
 that brains have evolved to operate efficiently. Economy and efficiency
are guiding principles in physiology that explain, for example, the way
in which the lungs, the
 circulation, and the mitochondria are matched and coregulated to supply
energy to muscles (2). To identify and explain efficient design, it is
necessary to derive and
 apply the structural and physicochemical relationships that connect
resource use to performance. We consider first a number of studies of
the geometrical constraints
 on packing and wiring that show that the brain is organized to reduce
wiring costs. We then examine a constraint that impinges on all aspects
of neural function but has
 only recently become apparent—energy consumption. Next we look at
energy-efficient neural codes that reduce signal traffic by exploiting
the relationships that
 govern the representational capacity of neurons. We end with a brief
discussion on how synaptic plasticity may 

Re: Meshing costs (Re: Hierarchy, Force Monopoly, and Geodesic Societies)

2004-04-09 Thread R. A. Hettinga
At 10:43 AM -0700 4/9/04, Major Variola (ret) wrote:
Meshnets (everyone's a router) is cool, admittedly.  But are you going
to spend *your* battery life routing someone else's message?

Only if they pay me cash.

:-)

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



voting, KISS, etc.

2004-04-09 Thread R. A. Hettinga

--- begin forwarded text


Delivered-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: voting, KISS, etc.
From: Perry E. Metzger [EMAIL PROTECTED]
Date: Fri, 09 Apr 2004 12:46:47 -0400
Sender: [EMAIL PROTECTED]


I think that those that advocate cryptographic protocols to ensure
voting security miss the point entirely.

They start with the assumption that something is broken about the
current voting system. I contend it is just fine.

For example, it takes a long time to count pieces of papers compared
with bits. However, there is no actual need for speed in reporting
election results. This is not a stock exchange -- another election
will not be held the next day, and the number of elections being held
will not rise 8% per quarter. If it takes a day or even several days
to get an accurate count, no one will be hurt. The desires of
television networks to report the results in ten minutes is not
connected to the need for a democracy to have widespread confidence in
the election results. Speed is not a requirement. As it is, however,
automated counts of paper ballots are plenty fast enough already.

It also is seemingly behind the times to use paper and such to hold
an election when computers are available -- but the goal is not to seem
modern -- it is to hold a fair election with accurately reported
results that can be easily audited both before, during and after the
fact.

It seems to some to be easier to vote using an electronic
screen. Perhaps, perhaps not. My mother would not find an electronic
screen easier at all, but lets ignore that issue. Whether or not the
vote is entered on a screen, the fact that paper ballots can be
counted both mechanically (for speed) and by hand (as an audit
measure), where purely electronic systems lack any mechanism for
after-the-fact audit or recount, leads one to conclude that old
fashioned paper seems like a good idea, and if it is not to be marked
by hand, then at least let it be marked by the computer entry device.

It is also seemingly better to have a system where a complex
cryptographic protocol secures the results -- but the truth is that
it is more important that a system be obvious, simple and secure even
to relatively uneducated members of society, and the marginal security
produced by such systems over one in which physical paper ballots are
generated is not obvious or significant.

(The marginal security issue is significant. Consider that simple
mechanisms can render the amount of fraud possible in the old
fashioned system significantly smaller than the number of miscast
votes caused by voter mistakes, but that no technology can eliminate
voter mistakes. Then ask why a fully electronic fraudless system
understandable to a miniscule fraction of the population but where
miscast votes continue to occur -- and possibly to be inaccurately
perceived as evidence of fraud -- would be superior.)

To those that don't understand the understandable to even those who
are not especially educated problem, consider for moment that many
people will not care what your claims are about the safety of the
system if they think fraud occurred, even if you hand them a
mathematical proof of the system. I suspect, by the way, that they'll
be right, because the proofs don't cover all the mechanisms by which
fraud can occur, including graveyard voting.

We tamper with the current system at our peril. Most security
mechanisms evolve over time to adjust to the threats that happen in
the real world.  The protocols embedded in modern election laws,
like having poll watchers from opposing sides, etc., come from
hundreds of years of experience with voting fraud. Over centuries,
lots of tricks were tried, and the system evolved to cope with
them. Simple measures like counting the number of people voting and
making sure the number of ballots cast essentially corresponds,
physically guarding ballot boxes and having members of opposing
parties watch them, etc., serve very well and work just fine.

Someone mentioned that in some elections it is impractical for the
people running to have representatives at all polling places. It is,
in fact, not necessary for them to -- the threat of their doing so and
having enough poll watchers from enough organizations in a reasonably
random assortment of polling places is enough to prevent significant
fraud.

I'm especially scared about mechanisms that let people vote at home
and such. Lots of people seem to think that the five minute trip to
the polling place is what is preventing people from voting, and they
want to let people vote from their computers. Lets ignore the question
of whether it is important that the people who can't be bothered to
spend ten minutes going to the polling place care enough about the
election to be voting anyway. Lets also ignore the totally unimportant
question of vote buying -- vote buying has happened plenty of times
over the centuries without any need for the purchaser to verify that
the vote was cast as promised. Tammany 

RE: Gmail as Blacknet

2004-04-09 Thread Tyler Durden
Actually, to some extent I did realize this, though I couldn't resist the 
droll troll urge.

And of course, perpetual storage isn't really any kind of end-goal 
itself...the 'goal' of course is to be able to securely store and move 
information without fear (or the possibility due to anonymity) of reprisal, 
if that is so desired.

(As an aside, although debt has to be -forgiven- after 7 years, contrary to 
popular belief it is not true that a debt has to be -forgotten-...I know of 
one credit major card company that will not accept 'new' cardmembers that 
didn't pay back what they owed, even if that's 15 years ago. That's actually 
perfectly legal.)

That said, I guess the dude does have an interesting point under all that 
stuff, after all. That point being that (most likely) free email 
capabilities may in some cases become like the now-defunct lockers in Grand 
Central Station...a place where stuff can be stored securely, and access 
granted at will. The key feature (as you point out) isn't so much the 
storage capacity (although the increasing size of such capacity makes this a 
more and more attractive option), but the google search feature.

OK, point conceded (once I tore off the wrapper).

-TD







From: Major Variola (ret) [EMAIL PROTECTED]
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
Subject: RE: Gmail as Blacknet
Date: Fri, 09 Apr 2004 10:48:02 -0700
At 09:58 AM 4/9/04 -0400, Tyler Durden wrote:
Well, I never claimed to be Einstein, but your 3 simple steps sound a
hell
of a lot like my recipe for making a ham sandwich:
Hardly.  One could put together a very slick drop file here for
encrypted net storage
script in a day.  One could even prototype this using any net mail
system like
Yahoo, albeit with a rather piddling storage capacity.
By including plaintext search tokens (meaning known only to you, perhaps
derived
from hashing keywords) you could use Gmail's search feature to find
stored data.
This uses local encryption and net-based storage  backup.  Sounds good
to me.
It would be rather telling if Google said no encrypted email wouldn't
it? :-)




_
Get rid of annoying pop-up ads with the new MSN Toolbar – FREE! 
http://toolbar.msn.com/go/onm00200414ave/direct/01/



Re: Hierarchy, Force Monopoly, and Geodesic Societies

2004-04-09 Thread R. A. Hettinga
At 8:29 PM +0100 4/9/04, Jim Dixon wrote:
Traffic was following a geodesic --
but not a geographic geodesic.

Right.

Geodesic is a topologic content. In three (two?) dimensions, a geodesic is
a great circle route across a sphere. In higher dimensions, it's something
else.

No. I don't know the math.

:-)

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: VPN VoIP

2004-04-09 Thread sunder
Eugen Leitl wrote:
I've been installing a Draytek Vigor 2900 router at work lately, and found a
line of models which do VoIP (router with analog phone jacks on them). They
also support VPN router-router, and come with DynDNS clients. I thought I've
seen VoIP over VPN being mentioned, but I can't find it right now.
I've not seen, nor played with any of these, *BUT*, heed this warning
which applies to all devices (and software?) that are 1) closed source and 
2) offer some useful service which you'd be tempted to place inside your 
network, 3) are allowed to communicate with the outside world.

I would highly suggest that if you chose to use one of these that you do so 
from a DMZ in your firewall to be safe.  You don't know what OS/firmware 
lives there and whether it can be used via the VOIP network to spy on your 
internal network.

You might need to add another NIC to your firewall, and depending on what 
else this needs, you might also need to provide a DHCP server for it.  Set 
the firewall rules to make sure no packets from this device can go into 
your internal network.  EVER.

Don't just say, Well this thing is its own router, it does VPN, it has a 
firewall (does it?) I can trust it.

There will likely be features which it provides (perhaps a voice 
mail-email gateway?) which will tempt you to place it on the inside 
network instead of a DMZ.  Don't!  Find a way to secure your network and 
still provide for such features.

[Or, if you use these boxes inside a corporate environment and actually 
care about this level of security and want several of these to talk to each 
other, build another network just for them.  Depending on your needs, I'd 
also say, don't let them talk to the outside world, but if you do that, 
only nodes inside your VPN's will be able to communicate over VOIP.]

If you trust this thing to do VOIP, enjoy, (Accepting possible spying on 
your phone calls by LEO/intel agencies, etc.) but don't trust it enough to 
put the ethernet end of it on your internal network.  You never know when 
some bright kid takes one of these apart, disassembles the firmware and 
finds a backdoor to use against you.

Why the tin-foil sounding rant?  See yesterday's slashdot regarding the 
recent hardwired backdoor account in a Cisco Wifi router which has been 
exposed resulting in a call for a firmware update.  You can bet that Cisco 
simply changed the backdoor password/hash instead of eliminating it.  If 
they're not too scummy, they only made it harder to find:

http://yro.slashdot.org/article.pl?sid=04/04/08/1920228mode=threadtid=126tid=158tid=172tid=99



Re: Meshing costs (Re: Hierarchy, Force Monopoly, and Geodesic Societies)

2004-04-09 Thread Tyler Durden
RAH wrote...

At 10:43 AM -0700 4/9/04, Major Variola (ret) wrote:
Meshnets (everyone's a router) is cool, admittedly.  But are you going
to spend *your* battery life routing someone else's message?
Only if they pay me cash
Someone enlighten me here...I don't see this as obvious. I might certainly 
be willing to pay to route someone else's message if I understand that to be 
the real cost of mesh connectivity. In other words, say I'm driving down the 
FDR receiving telemetry about the road conditions downtown of me by a few 
miles. If I'm a router, I'm also sending that info behind me (which is 
routing I'm paying for basically), but I will understand that the reason I 
am getting my telemetry is precisely because there's a string of me's in 
the cars in front of me, routing info down to me. If I insist on getting 
paid, so will they, and the whole thing breaks down.

Actually, this reminds me of the prisoner's dilemma. I remember (I think) 
Hofstaedter doing an interesting analysis that showed that smart 'criminals' 
will eventually realize that it pays to cooperate, even if that doesn't 
optimise one's chances in this particular instance.

Of course, the battery lifetime acts as the weighting factor here...if 
only a small % of the traffic I'm routing belongs to me, then I may not be 
so willing to route it if my battery lifetime is short. As battery time 
lifetime increases however (though this sorely lags behind Moore's law) then 
more and more people will be willing to route.

-TD

_
Tax headache? MSN Money provides relief with tax tips, tools, IRS forms and 
more! http://moneycentral.msn.com/tax/workshop/welcome.asp



Re: Re: Status

2004-04-09 Thread ian
Hello, you recently sent a message to [EMAIL PROTECTED].Due to an avalanche of hundreds of spam emails every day, we are now using a mailbox protection system to block unsolicited junk mail.  Please click on the link below to verify your identity.Your message is in our inbox along with hundreds of spam e-mails and we will not be able to pick it out from all of the junk mail.  If you verify your identity with the link below, your e-mail will be immediately brought to our attention, and all future e-mails from you will also be flagged for our immediate attention.   If you do not verify the e-mail your message will be deleted in 4 days and we WILL NOT receive it.Click here to verify your identityWhen your browser opens, fill in your name and a short reason for your e-mail. Your message will then be delivered.There is no need to send your original message again.Please be aware that a response is required within4 day(s) to prevent your messages from being automatically deleted.


RE: Gmail as Blacknet (legally required forgetting)

2004-04-09 Thread Major Variola (ret)
At 05:16 PM 4/9/04 -0400, Tyler Durden wrote:
(As an aside, although debt has to be -forgiven- after 7 years,
contrary to
popular belief it is not true that a debt has to be -forgotten-...I
know of
one credit major card company that will not accept 'new' cardmembers
that
didn't pay back what they owed, even if that's 15 years ago. That's
actually
perfectly legal.)

I don't know about your anecdote, but Mr. May's original point
was that the law *requires* companies to forget.   Which is
of course an illegitimate intrusion of the state into private affairs.

And the responsibles need killing.

Ahhh, that feels better.

-
When I was your age we didn't have Tim May! We had to be paranoid
on our own! And we were grateful! --Alan Olsen




Re: Meshing costs, the price of RAH's battery

2004-04-09 Thread Major Variola (ret)
At 07:06 PM 4/9/04 -0400, Tyler Durden wrote:
RAH wrote...

At 10:43 AM -0700 4/9/04, Major Variola (ret) wrote:
 Meshnets (everyone's a router) is cool, admittedly.  But are you
going
 to spend *your* battery life routing someone else's message?

Only if they pay me cash

Someone enlighten me here...I don't see this as obvious. I might
certainly
be willing to pay to route someone else's message if I understand that
to be
the real cost of mesh connectivity.

One can run a P2P app from mains-powered home machine
and incur only a minor bandwidth penalty, which you can
possibly throttle when you're busy.  But my
understanding of *mobile* devices (where meshing matters) is that they
are
severely power constrained.  To the extent that
boozohol power cells and various semiconductor/logic
tricks are being used, despite the difficulties they require.

So, get a clue.  When your battery runs out, you
get *zero* benefit from the mesh.  Or even your local
device *sans network*.

Of course, the battery lifetime acts as the weighting factor
here...if
only a small % of the traffic I'm routing belongs to me, then I may not
be
so willing to route it if my battery lifetime is short. As battery time

lifetime increases however (though this sorely lags behind Moore's law)
then
more and more people will be willing to route.

The traffic-fraction and the extrapolation of Moore's 'law' are largely
irrelevant
for the next decade.  In fact, given that standby usage will *decrease*
relative
to transmit usage only makes the relative proportions worse.  I don't
care if you use a picoamp on standby/listen, you'll still need a few
milliwatts to forward a packet.  Or more, if there are no nearby
cooperative nodes.

Sure, in the distant future, mobile power may so vastly dominate
power usage that meshes become practical.  (There's even
positive feedback, the more meshnodes the less transmit power.)
Meantime, uncompensated altruism is maladaptive.

With something like soldier-radios, or smart dusts, meshes will happen
sooner, since the
Many eat the Few.  For *your* cellphone, you have a *long* time to wait
for it to be Rational to share your battery with randoms.

In RAH's defense, mesh-everything is not necessary for the
disintermediation,
which he idiosyncratically calles 'geodesic' info flow, to have big
effects.
Neither is a geodesic (in any physical or otherwise meaningful sense)
net important.
Just cheaper info to more people.  And that's been happening since
before
ponies carried dead trees with stamps.

Re-reading RAH's if they pay me enough reply, it is also right that a
price can be set on the wattage you've sherpa'ed, perhaps so that you
can pay off your usage of said mesh
by letting others use your batteries.  And the micropayments will be
feasible thanks to
real cheap info + crypto, what RAH's undiagnosed brain tumor labels
geodesic info flow.   Perhaps the price of being a meshrouter to others
will
even depend on the wattage you have left.  Your phone will negotiate
with Fred's phone (has 10 Joules left but is 1000 m away) and Joe's
(has 5 Joules but is 100 m away).

But that's economics/physics applied to resource usage, nothing new,
despite the neologisms and extrapolation.







RE: voting

2004-04-09 Thread Trei, Peter
privacy wrote:
[good points about weaknesses in adversarial system deleted]

 It's baffling that security experts today are clinging to the outmoded
 and insecure paper voting systems of the past, where evidence of fraud,
 error and incompetence is overwhelming.  Cryptographic voting protocols
 have been in development for 20 years, and there are dozens of proposals
 in the literature with various characteristics in terms of scalability,
 security and privacy.  The votehere.net scheme uses advanced cryptographic
 techniques including zero knowledge proofs and verifiable remixing,
 the same method that might be used in next generation anonymous remailers.
 
Our anonymous corrospondent has not addressed the issues I raised in my 
initial post on the 7th:

1. The use of receipts which a voter takes from the voting place to 'verify'
that
their vote was correctly included in the total opens the way for voter
coercion.

2. The proposed fix - a blizzard of decoy receipts - makes recounts based
on the receipts impossible.

 Given that so many jurisdictions are moving towards electronic voting
 machines, this is a perfect opportunity to introduce mathematical
 protections instead of relying so heavily on human beings.  I would
 encourage observers on these lists to familiarize themselves with the
 cryptographic literature and the heavily technical protocol details
 at http://www.votehere.com/documents.html before passing judgement on
 these technologies.
 
Asking the readers of this list to 'familiarize themselves with the
cryptographic
literature', is, in many cases,  a little like telling Tiger Woods that he 
needs to familiarize himself with the rules of golf. We know the 'advanced 
cryptographic techniques' you refer to. We also know what their limitations
- 
what they can and cannot do. This is not the appropriate forum to try to say

trust me.

Answer this:

1. How does this system prevent voter coercion, while still allowing receipt
based recounts? Or do you have some mechanism by which I can
personally verify every vote which went into the total, to make sure they
are correct?

2. On what basis do you think the average voter should trust this system,
seeing as it's based on mechanisms he or she cant personally verify?

3. What chain of events do I have to beleive to trust that the code which
is running in the machine is actually and correctly derived from the 
source code I've audited? I refer you to Ken Thompsons classic paper 
Reflections on trusting trust, as well as the recent Diebold debacle
with uncertified patches being loaded into the machine at the 
last moment.

This last is an important point - there is no way you can eliminate the
requirement of election officials to behave legitimately. Since that
requirement can't be done away with by technology, adding technology
only adds more places the system can be compromised.

Based on the tone of this letter, I'd hazard a guess that 'privacy' has a
vested interest in VoteHere. If this true, it's a little odd that they are
willing to expose their source code, but not their name. We don't
bite, unless the victim deserves it :-) Opening your source is an
admirable first step - why not step out of the shadows so we can
help you make your system better?

I fear a system which does not have a backup mechanism that the
average voter can understand. While it's true that non-electronic
systems are subject to compromise, so are electronic ones, 
regardless of their use of ZK proofs, or 'advanced cryptographic
techniques.

I do think electronic voting machines are coming, and a good
thing. But they should be promoted on the basis that they 
are easier to use, and fairer in presentation, then are manual
methods. Promoting them on the basis that they are more
secure, and less subject to vote tampering is simply false.

Peter Trei
Cryptoengineer
RSA Security

Disclaimer: The above represents my personal opinions only.








Re: voting, KISS, etc. ( social bias)

2004-04-09 Thread Major Variola (ret)

Perry I agree with you on all *except* that you are prejudiced
against folks who are not mobile, have immobile dependants, are busy
or agoraphobes.

In-person voting doesn't resist graveyard voting much better than
lining up the meat.
One could say that in-person voting rewards those too lazy or careless
with their time
to request absentee status.

Home voting is important to keep participation high.  I believe 25%
of the Calif governor votes were absentee.   Participation is nominally
a figure of merit for elections.

And the voter authentication is the weakest I know of: to register you
submit a name, signature, and address.  To vote, you submit
same.  Nothing prevents graveyard registration except the law.

Why is this relevent?  Because you have to consider threat models.
Spousal coercion  vote buying is one, well-addressed in this thread.
So are tech-implementation and social-trust issues.

Snipers or bombers at polling places is another, ignored because
we're all modern westerners.  Rain and immobility have only been
touched on because most of us can drive and walk.

Voting from home should be *encouraged* and it should use
paper as the transport, not computers.  (The paper being kept
by the counters not the voters.)  Which is how it should
be at the in-person polls.

Again, keeping tech away is good, fighting coercion is good, but
don't argue against absentee voting.  In fact, absentee voting
(vs. tech in the polling booth) is a good *example* of how to
keep things simple and resistant to many (eg tech-enabled) attacks.

At 12:46 PM 4/9/04 -0400, Perry E. Metzger wrote:

I'm especially scared about mechanisms that let people vote at home
and such. Lots of people seem to think that the five minute trip to
the polling place is what is preventing people from voting, and they
want to let people vote from their computers. Lets ignore the question
of whether it is important that the people who can't be bothered to
spend ten minutes going to the polling place care enough about the
election to be voting anyway. Lets also ignore the totally unimportant
question of vote buying -- vote buying has happened plenty of times
over the centuries without any need for the purchaser to verify that
the vote was cast as promised. Tammany Hall did not need to watch
people's votes to run a political machine.

I'm much more concerned that we may be automating the graveyard
vote, which is currently kept in check by the need to personally
appear at polling places. I'm also concerned about the forms of fraud
I haven't even considered yet because no one has invented them yet.
Election security isn't just about assuring that votes are correctly
counted.




RE: voting

2004-04-09 Thread Jerrold Leichter
|   privacy wrote:
|   [good points about weaknesses in adversarial system deleted]
|
|  It's baffling that security experts today are clinging to the outmoded
|  and insecure paper voting systems of the past, where evidence of fraud,
|  error and incompetence is overwhelming.  Cryptographic voting protocols
|  have been in development for 20 years, and there are dozens of proposals
|  in the literature with various characteristics in terms of scalability,
|  security and privacy.  The votehere.net scheme uses advanced cryptographic
|  techniques including zero knowledge proofs and verifiable remixing,
|  the same method that might be used in next generation anonymous remailers.
| 
| Our anonymous corrospondent has not addressed the issues I raised in my
| initial post on the 7th:
|
| 1. The use of receipts which a voter takes from the voting place to 'verify'
| that their vote was correctly included in the total opens the way for voter
| coercion.
|
| 2. The proposed fix - a blizzard of decoy receipts - makes recounts based
| on the receipts impossible.
The VoteHere system is really quite clever, and you're attacking it for not
being the same as everything that went before.

Current systems - whether paper, machine, or whatever - provide no inherent
assurance that the vote you cast is the one that got counted.  Ballot boxes
can be lost, their contents can be replaced; machines can be rigged.  We
use procedural mechanisms to try to prevent such attacks.  It's impossible to
know how effective they are:  We have no real way to measure the effectiveness,
since there is no independent check on what they are controlling.  There are
regular allegations of all kinds of abuses, poll watchers or no.  And there
are plenty of suspect results.

| Answer this:
|
| 1. How does this system prevent voter coercion, while still allowing receipt
| based recounts?
a)  Receipts in the VoteHere system are *not* used for recounts.  No receipt
that a user takes away can possibly be used for that - the chances of you being
able to recover even half the receipts a day after the election are probably
about nil.  Receipts play exactly one role:  They allow a voter who wishes to
to confirm that his vote actually was tallied.

b)  We've raised prevention of voter coercion on some kind of pedestal.
The fact is, I doubt it plays much of a real role.  If someone wants to coerce
voters, they'll use the kind of goons who collect on gambling debts to do it.
The vast majority of people who they try to coerce will be too frightened to
even think about trying to fool them - and if they do try, will lie so
unconvincingly that they'll get beaten up anyway.  Political parties that want
to play games regularly bring busloads of people to polling places.  They
don't check how the people they bus in vote - they don't need to.  They know
who to pick.

However, if this really bothers you, a system like this lets you trade off
non-coercion and checkability:  When you enter the polling place, you draw a
random ball - say, using one of those machines they use for lotteries.  If the
ball is red, you get a receipt; if it's blue, the receipt is retained in a
sealed box (where it's useless to anyone except as some kind of cross-check of
number of votes cast, etc.)  No one but you gets to see the color of the ball.
Now, even if you are being coerced and get a red ball, you can simply discard
the receipt - the polling place should have a secure, private receptacle; or
maybe you can even push a button on the machine that says Pretend I got a
blue ball - and claim you got a blue ball.  The fraction of red and blue
balls is adjustable, depending on how you choose to value checkability vs.
non-coercion.

| Or do you have some mechanism by which I can
| personally verify every vote which went into the total, to make sure they
| are correct?
In VoteHere's system, you can't possibly verify that every vote that went into
the total was correctly handled.  You can verify that the votes *that the
system claims were recorded* are actually counted correctly.  And you can
verify that *your* vote was actually recorded as you cast it - something you
can't do today.  The point of the system is that any manipulation is likely to
hit someone who chooses to verify their vote, sooner or later - and it only
takes one such detected manipulation to start an inquiry.

Whether in practice people want this enough to take the trouble ... we'll have
to wait and see.

| 2. On what basis do you think the average voter should trust this system,
| seeing as it's based on mechanisms he or she cant personally verify?
On what basis should an average voter trust today's systems?  How many people
have any idea what safeguards are currently used?  How many have any personal
contact with the poll watchers on whom the system relies?  Could *you* verify,
in any meaningful sense, the proper handling of a vote you cast?  Could you
watch the machines/boxes/whatever being handled?