Re: Your source code, for sale

2004-11-05 Thread Enzo Michelangeli
- Original Message - 
From: Hal Finney [EMAIL PROTECTED]
Sent: Friday, November 05, 2004 7:01 AM

 Tyler Durden writes:
  So my newbie-style question is, is there an eGold that can be
  verified, but  not accessed, until a 'release' code is sent?
 
  In other words, say I'm buying some hacker-ed code and pay in egold.
  I don't  want them to be able to 'cash' the gold until I have the
  code. Meanwhile,  they will want to see that the gold is at least
  there, even if they can't cash it yet.
 
  Is there a way to send a 'release' to an eGold (or other) payment?
  Better  yet, a double simultaneous release feature makes thing even
  more interesting.

In the world of international trade, where mutual distrust between buyer
and seller is often the rule and there is no central authority to enforce
the law, this is traditionally achieved by interposing not less than three
trusted third parties: the shipping line, the opening bank and the
negotiating bank. First, the buyer asks his bank to open an irrevocable
letter of credit (L/C), which is a letter sent to the seller's bank
instructing it to pay the seller once the latter presents a given set of
documents: these usually include the bill of lading (B/L), issued by the
shipping line to declare that the desired cargo was indeed loaded on
board. The seller gets the letter of gredit from his bank and is now sure
that he will be paid by the latter (which he trusts); so he purchases or
manufactures the goods, delivers them to the shipping line getting the
B/L, passes it together with the other documents to his bank, and draws
the payment. The seller's bank sends by mail the documents to the buyer's
bank (which it trusts due to long-standing business relationships),
knowing that it will eventually receive the settlement money. The buyer's
bank receives the documents, debits the buyer's account, remits the monies
to the seller's bank, and delivers the documents to the buyer. When the
ship arrives to the buye's seaport, the buyer goes to the shipping line,
presents to it the B/L and in exchange gets the cargo (in sea shipments,
the B/L represents title to the goods).

 I've been thinking about how to do this kind of thing with ecash.

That's way trickier because there are no trusted third parties, not even
e-gold Ltd. / GSR, Inc. The trust chain with the L/C works well because
delegation of trust is unnecessary: every link in the chain bears
responsibility only to its adjacent links.

[...]
 In the case of your problem there is the issue of whether the source
 code you are buying is legitimate.  Only once you have inspected it and
 satisfied yourself that it will suit your needs would you be willing
 to pay.  But attaining that assurance will require examing the code in
 such detail that maybe you will decide that you don't need to pay.

Interestingly, with L/C's this problem is addressed by involving yet
another third party: an internationally-recognized inspection company
(e.g., the Swiss SGS) that issues a document certifying that the cargo is
indeed what the buyer expects and not, i.e., bricks. Banks and shipping
lines don't want to get involved in these issues; the seller's bank will
only check all the documents requested by the L/C (possibly including the
inspection certificate).

 You could imagine a trusted third party who would inspect the code and
 certify it, saying the source code with hash XXX appears to be
 legitimate Cisco source code.  Then they could send you the code bit
 by bit and incrementally show that it matches the specified hash,
 using a crypto protocol for gradual release of secrets.  You could
 simultaneously do a gradual release of some payment information in the
 other direction.

But it's hard to assess the value of partially-released code. If the
gradual transfer bits-against-cents is aborted, what is left to the buyer
is likely to be unusable, whereas the partial payment still represents
good value.

A more general issue is that source code is not a commodity, and
intellectual property is not real property: so the traditional cash on
delivery paradigm just doesn't work, and looking for protocols
implementing it kind of moot. If the code is treated as trade secret,
rather than licensed, an anonymous buyer may make copies and resell them
on the black market more than recovering his initial cost, at the same
time undercutting your legitimate sales (see e.g. the cases of RC4 and
RC2). This can cause losses order of magnitude larger than refusing to pay
for his copy.

Enzo



Re: Finding Galt's Gulch (fwd)

2004-11-05 Thread Eugen Leitl
On Thu, Nov 04, 2004 at 08:05:34PM -0600, J.A. Terranson wrote:

 Where does one go today, if they are unwilling to participate in the
 Failed Experiment?  (BTW: No, Lichtenstein does not accept immigrants, and
 yes, I have reverified this recently).

Go East. Fortunes are made there.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpJvcNr67xhO.pgp
Description: PGP signature


Re: Your source code, for sale

2004-11-05 Thread Ben Laurie
Tyler Durden wrote:
Hum.
So my newbie-style question is, is there an eGold that can be verified, 
but not accessed, until a 'release' code is sent?
proof-of-delivery protocols might help (but they're patented, as I 
discovered when I reinvented them a few years back).

In other words, say I'm buying some hacker-ed code and pay in egold. I 
don't want them to be able to 'cash' the gold until I have the code. 
Meanwhile, they will want to see that the gold is at least there, even 
if they can't cash it yet.

Is there a way to send a 'release' to an eGold (or other) payment? 
Better yet, a double simultaneous release feature makes thing even more 
interesting.
Simultaneous release is (provably?) impossible without a trusted third 
party.

I think this is one of the interesting applications of capabilities. 
Using them, you can have a TTP who is ignorant of what is running - you 
and your vendor agree some code that the TTP will run, using capability 
based code. In your case, this code would verify the eGold payment and 
the code (difficult to do this part with certainty, of course) and 
release them when both were correct. Because of the capabilities, the 
TTP could run the code without fear, and you would both know that it 
performed the desired function, but neither of you could subvert it.

Cheers,
Ben.
--
ApacheCon! 13-17 November! http://www.apachecon.com/
http://www.apache-ssl.org/ben.html   http://www.thebunker.net/
There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit. - Robert Woodruff


Buy Hydrocodone online, 1 day sale

2004-11-05 Thread Jay R. Lyon
get bigger in ur pants...
here: http://jUp6eDBUp2.qgs21.biz/?wid=36






vu8rx1df7v





SUTOGDC. LLJUGSBKBRJMCD. RCEWD. QHOSZTDTD. phxbrc3ky7. fyw5kd1qhz. qmdzmv243d. 
20up9u7fsl.1coybw28q1. y45qwc2sco.zeddsoqleo. wd68gqec40. 3c3r9g2qg2. 7fam8a2k97. 
19bdkf15lf. rld2d42sc3. 19ebb315nk. wodqp61jqd. cg1ogx2oji. f9365814q9.




RE: Your source code, for sale

2004-11-05 Thread Michael_Heyman
 From: [EMAIL PROTECTED] 
 [mailto:[EMAIL PROTECTED] On Behalf Of Finney, Hal (CR)
 
 [SNIP discussion on ripping cash]

 The problem is that if the source code you are purchasing is 
 bogus, or if the other side doesn't come through, you're 
 screwed because you've lost the value of the torn cash.  The 
 other side doesn't gain anything by this fraud, but they harm 
 you, and if they are malicious that might be enough.

Quick fix for seller incentive: the seller rips some amount of their own
cash in such a way that they cannot recover it unless the buyer provides
the remainder of the buyer's ripped cash.

-Michael Heyman




Cryptography: Beginning with a Simple Communication Game

2004-11-05 Thread R.A. Hettinga
Click the link to see various formulae.

Cheers,
RAH
---

http://www.informit.com/articles/printerfriendly.asp?p=342039


InformIT

Cryptography: Beginning with a Simple Communication Game
 Date: Nov 5, 2004 By Wenbo Mao.  Sample Chapter is provided courtesy of
Prentice Hall PTR.
 In this introductory chapter from his book, Wenbo Mao uses a simple game
to demonstrate the complexity of cryptography, and its utility for your
business.

  

We begin this book with a simple example of applying cryptography to solve
a simple problem. This example of cryptographic  application serves three
purposes from which we will unfold the topics of this book:
*
 To provide an initial demonstration on the effectiveness and practicality
of using cryptography for solving subtle problems  in applications
*
 To suggest an initial hint on the foundation of cryptography
*
To begin our process of establishing a required mindset for conducting the
development of cryptographic systems for information  security

 To begin with, we shall pose a trivially simple problem and then solve it
with an equally simple solution. The solution is  a two-party game which is
very familiar to all of us. However, we will realize that our simple game
soon becomes troublesome  when our game-playing parties are physically
remote from each other. The physical separation of the game-playing parties
eliminates  the basis for the game to be played fairly. The trouble then
is, the game-playing parties cannot trust the other side to play  the game
fairly.

 The need for a fair playing of the game for remote players will inspire
us to strengthen our simple game by protecting it  with a shield of armor.
Our strengthening method follows the long established idea for protecting
communications over open networks: hiding information using cryptography.

 After having applied cryptography and reached a quality solution to our
first security problem, we shall conduct a series  of discussions on the
quality criteria for cryptographic systems (§1.2). The discussions will
serve as a background and cultural introduction to the areas in which we
research and develop technologies  for protecting sensitive information.

 1.1 A Communication Game

Here is a simple problem. Two friends, Alice and Boba, want to spend an
evening out together, but they cannot decide whether to go to the cinema or
the opera. Nevertheless, they  reach an agreement to let a coin decide:
playing a coin tossing game which is very familiar to all of us.

 Alice holds a coin and says to Bob, You pick a side then I will toss the
coin. Bob does so and then Alice tosses the coin  in the air. Then they
both look to see which side of the coin landed on top. If Bob's choice is
on top, Bob may decide where  they go; if the other side of the coin lands
on top, Alice makes the decision.

 In the study of communication procedures, a multi-party-played game like
this one can be given a scientific sounding name:  protocol. A protocol
is a well-defined procedure running among a plural number of participating
entities. We should note the importance of the plurality of the game
participants; if a procedure is executed entirely by one entity only then
it is a  procedure and cannot be called a protocol.

 1.1.1 Our First Application of Cryptography

Now imagine that the two friends are trying to run this protocol over the
telephone. Alice offers Bob, You pick a side. Then  I will toss the coin
and tell you whether or not you have won. Of course Bob will not agree,
because he cannot verify the outcome of the coin toss.

 However we can add a little bit of cryptography to this protocol and turn
it into a version workable over the phone. The result  will become a
cryptographic protocol, our first cryptographic protocol in this book! For
the time being, let us just consider  our cryptography as a mathematical
function f(x) which maps over the integers and has the following magic
properties:

 Property 1.1: Magic Function f
I.
For every integer x, it is easy to compute f(x) from x, while given any
value f(x) it is impossible to find any information  about a pre-image x,
e.g., whether x is an odd or even number.

 Protocol 1.1: Coin Flipping Over Telephone

PREMISE

Alice and Bob have agreed:
i.
a magic function f with properties specified in Property 1.1
ii.
 an even number x in f(x) represents HEADS and the other case represents TAILS

 (* Caution: due to (ii), this protocol has a weakness, see Exercise 1.2 *)
1.
Alice picks a large random integer x and computes f(x); she reads f(x) to
Bob over the phone;
2.
 Bob tells Alice his guess of x as even or odd;
3.
 Alice reads x to Bob;
4.
 Bob verifies f(x) and sees the correctness/incorrectness of his guess.
II.
 It impossible to find a pair of integers (x, y) satisfying x ‚ y and f(x)
= f(y).

 In Property 1.1, the adjectives easy and impossible have meanings
which need further 

Cryptography Research Takes Aim at Content Pirates

2004-11-05 Thread R.A. Hettinga
http://biz.yahoo.com/prnews/041105/sff023_1.html?printer=1

Yahoo! Finance


Source: Cryptography Research, Inc.

Cryptography Research VP Benjamin Jun Takes Aim at Content Pirates
Friday November 5, 6:02 am ET

Discusses Technology Trends and Responses at Upcoming RSA Conference Europe
2004

SAN FRANCISCO, Nov. 5 /PRNewswire/ -- Despite piracy's high public profile
as a threat to intellectual property owners, surprisingly little has been
done to understand the range of technical solutions that are feasible,
according to security expert Benjamin Jun. With piracy plaguing deployments
of pay TV, optical media, console video games and other content, Jun, vice
president of engineering at Cryptography Research, Inc., believes content
publishers facing these issues have a number of tools and technologies at
their disposal to take aim at the pirates, and will discuss solutions and
the findings of his recent research on piracy in his seminar on Friday,
November 5 at the RSA Conference Europe 2004 being held in Barcelona, Spain.

According to Jun, pirates will grow bolder and more effective with advances
in CPU processing power, Internet bandwidth and hard drive storage.
Although piracy cannot be stopped completely, Jun believes a combination of
proactive and reactive security approaches can mitigate the risk and reduce
losses to survivable levels. Content publishers facing piracy can apply
methods for high-assurance design that anticipate attacks and employ
architectures that enable a response after attacks happen. Jun's talk
discusses recent piracy trends, describes industry techniques and presents
current research in content security.

Although numerous products and technologies have been advertised as
solutions to the problem of piracy, most commercial security systems fail
catastrophically once an implementation is compromised, making them
inappropriate solutions for deployment as part of a major standard, said
Jun. Piracy, like credit card fraud and computer virus security, is a
problem that cannot be solved completely, and requires a flexible solution
that combines programmable security and 'smart content' with risk
management techniques such as forensic marking and attack response
capabilities.

Proactive security combines tamper resistance with high-assurance design to
combat known security vulnerabilities. Reactive systems provide effective
tools for responding to piracy after a problem develops. These results are
findings of the Cryptography Research Content Security Initiative, a
CRI-sponsored, multi-year research effort focusing on understanding and
controlling piracy, technology trends in consumer electronics and
next-generation applied techniques for high-assurance security.

Content providers must face next-generation pirates by selecting
technology that avoids a repeat of painful past lessons, said Carter
Laren, senior security architect at Cryptography Research. We are proud
that results from our Content Security Research Initiative are helping
leading companies secure their most valuable content.

Benjamin Jun's talk, Piracy: Technology Trends and Responses, part of the
Implementers Educational Track at the RSA Conference Europe 2004, will be
presented on Friday, November 5, at 11:00 a.m. at the Princesa Sofia Hotel
in Barcelona, Spain.

Benjamin Jun is a vice president of engineering at Cryptography Research,
where he heads the consulting practice and the company's Content Security
Research Initiative. He leads engineering groups in the design, evaluation
and repair of high-assurance security modules for software, ASIC and
embedded systems. Ben holds B.S. and M.S. degrees from Stanford University,
where he is a Mayfield Entrepreneurship Fellow.

About Cryptography Research, Inc.

Cryptography Research, Inc. provides consulting services and technology to
solve complex security problems. In addition to security evaluation and
applied engineering work, CRI is actively involved in long-term research in
areas including tamper resistance, content protection, network security and
financial services. The company has a broad portfolio of patents covering
countermeasures to differential power analysis and other vulnerabilities,
and is committed to helping companies produce secure smart cards and other
tamper-resistant devices.

Security systems designed by Cryptography Research engineers annually
protect more than $60 billion of commerce for wireless, telecommunications,
financial, digital television and Internet industries. For additional
information or to arrange a consultation with a member of the technical
staff, please contact Jen Craft at 415-397-0123, ext. 329 or visit
www.cryptography.com.



 Source: Cryptography Research, Inc.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the 

Arafat's Swiss Bank Account

2004-11-05 Thread R.A. Hettinga
http://www.meforum.org/article/645 ?
 - Middle East Quarterly - Fall 2004

FALL 2004 * VOLUME XI: NUMBER 4


Arafat's Swiss Bank Account
 by Issam Abu Issa


Yasir Arafat and the Palestinian Authority are known internationally for
the violence between Israelis and Palestinians. As ruinous as that violence
has been, another cancer permeates Arafat's administration; its name is
corruption. From firsthand experience, I understand just how deep it is.
Here is what I know.

From Optimism to Dismay

On July 1, 1994, the Palestine Liberation Organization (PLO) chairman,
Yasir Arafat, arrived triumphant in the Gaza Strip, watched by millions on
television across the world. I was already in Ramallah, having traveled
there from my family's exile in Qatar in the weeks after Arafat, Israeli
Prime Minister Yitzhak Rabin, and President Bill Clinton had signed the
Oslo accords in September 1993. Between 1994 and 1996, I and fellow
Palestinian businessmen and intellectuals spent many days brainstorming to
see what contributions we could make to a Palestinian state. My family was
originally from Haifa, and I hoped to witness an Israeli withdrawal of
forces and the birth of a democratic Palestinian state. It was a time of
optimism among Palestinians. I gathered with friends and business partners
around the television in Ramallah and watched Arafat's arrival in the Gaza
Strip.

In 1996, I founded the Palestine International Bank (PIB). Thousands of
Palestinians in the Palestinian Authority (PA) and the diaspora supported
me financially or morally. My investors and I hoped to build a thriving
economy in the newly autonomous PA areas. The PIB was truly Palestinian.
Headquartered in Ramallah, it used mostly Palestinian capital, although it
did receive support from other Arabs. All its reserves were kept inside
Palestinian areas, and our shares traded actively on the Palestinian stock
exchange. From nothing, we expanded our customer base to more than 15,500.
Among those licensed by the newly established Palestine Monetary Authority
(PMA), we were the largest bank in the Palestinian territories.

I first met Arafat in April 1995 while trying to secure a banking license
for the PIB. This meeting at his Gaza office, though brief, was cordial and
encouraging. I thought things would go smoothly. But, as the PIB grew more
popular, Arafat's inner circle and, specifically, Muhammad Rashid, a PA
official, also known as Khalid Salam and often described as an economic
advisor to Arafat and manager of a small percentage of PIB stocks, made it
difficult for us to branch out and move forward.[1] The PA, which strictly
controls Palestinian media, launched a negative media blitz against us in a
bid to suppress our growth. The systematic effort to undermine PIB came
after I refused to cede power to Muhammad Rashid.[2]

Over the course of fifteen meetings, I became better acquainted with Arafat
and grew increasingly concerned with his leadership style. Arafat and top
PA officials did not respect the rule of law; many were corrupt. Arafat
believed neither in separation of powers nor in checks and balances. His
animosity toward accountability thwarted efforts to establish a responsible
leadership. By 1996, Palestinians in the PA were saying they had traded one
occupation for two, the one by Israel and the one by Arafat and his cronies.

Rather than use donor funds for their intended purposes, Arafat regularly
diverted money to his own accounts. It is amazing that some U.S. officials
still see the Palestinian Authority as a partner even after U.S.
congressional records revealed authenticated PLO papers signed by Arafat in
which he instructed his staff to divert donors' money to projects
benefiting himself, his family, and his associates.[3]

How did Arafat's inner circle benefit? In 1994, he instructed the
Palestinian Authority official in charge of finances, Muhammad Nashashibi,
to fund secretly-to the tune of $50,000 per month-a Jerusalem publicity
center for Raymonda Tawil, Arafat's mother-in-law, and Ibrahim Qar'in, an
associate of Arafat's family.[4] He also ordered the investment in the
computer companies of 'Ali and Mazzan Sha'ath, sons of Nabil Sha'ath, the
PA's key negotiator in talks with Israel. Amin Haddad, Arafat's designated
governor of the Palestine Monetary Authority, established several
import-export companies acting as the front man for Arafat. The Palestinian
Economic Council for Development and Reconstruction financed these
activities.[5] Thus, an organization meant to channel funds from donor
countries like France and Germany became a mechanism by which to enrich
Arafat.

Arafat's men flagrantly displayed corruption. Arriving penniless in Gaza
and the West Bank from exile in Tunisia, many PLO members amassed wealth,
built villas in Gaza, Ramallah, Amman, and other places, and sent their
children to the best schools in the United Kingdom and the United States.
Hisham Makki, former head of the Palestine Broadcasting Services,

A Gangster With Politics

2004-11-05 Thread R.A. Hettinga
A prince is a bandit who doesn't move. --Mancur Olsen


Cheers,
RAH


http://online.wsj.com/article_print/0,,SB109962052189665752,00.html

The Wall Street Journal


 November 5, 2004

 COMMENTARY


A Gangster With Politics

By BRET STEPHENS
November 5, 2004; Page A12


In 1993, the British National Criminal Intelligence Service commissioned a
report on the sources of funding of the Palestine Liberation Organization.
For years, it had been Chairman Yasser Arafat's claim that he'd made a
fortune in construction as a young engineer in Kuwait in the 1950s, and
that it was this seed money, along with a 5% levy on the Palestinian
workers in Arab League countries, which kept the PLO solvent. But British
investigators took a different view: The PLO, they concluded, maintained
sidelines in extortion, payoffs, illegal arms-dealing, drug trafficking,
money laundering and fraud, bringing its estimated fortune to $14 billion.

In retrospect, it would seem amazing that 1993 was also the year in which
the head of this criminal enterprise would be feted on the White House lawn
for agreeing peace with Israel. But then, so much about the 1990s was
amazing, which is perhaps why Arafat, of all people, thrived in that time.
The ra'is, as he is commonly spoken of among Palestinians, may basically
have been a gangster with politics, but he was also one of the 20th
century's great political illusionists. He conjured a persona, a cause, and
indeed a people virtually ex nihilo, then rallied much of the world to his
side. Now that he is dead, or nearly so -- news reports vary as of this
writing -- it will be interesting to see what becomes of his legacy.

Who was Yasser Arafat? For starters, he was not a native Palestinian,
although his parents were and he variously claimed to have been born in
Gaza or Jerusalem. In fact, he was born and schooled in Cairo, spoke Arabic
with an Egyptian accent, and took no part in the 1948 Arab-Israeli war, the
Nakba (catastrophe) which Palestinians regard as their formative national
experience. Nor did Arafat take part in the Suez War, again despite later
claims to the contrary.

But this was the period of Third World ferment -- of the anti-colonialist
Bandung politics of Indonesia's Sukarno, Algeria's Ben Bela, Cuba's Fidel
and Egypt's Nasser -- and at the University of Cairo Arafat became a
student activist and head of the Palestine Student Union. He also began
developing the Arafat persona -- kaffiyah, uniform, half-beard and later
the holstered pistol -- to compensate for his short stature and pudginess.
The result, as his astute biographers Judith and Barry Rubin write, was
his embodiment of a combination of roles: fighter, traditional patriarch,
and typical Palestinian.

Around 1960, Arafat co-founded Fatah, or conquest, the political movement
that would later come to be the dominant faction of the PLO. Aside from its
aim to obliterate Israel, the group had no particular political vision:
Islamists, nationalists, Communists and pan-Arabists were equally welcome.
Instead, the emphasis was on violence: People aren't attracted to speeches
but to bullets, Arafat liked to say. In 1964, Fatah began training
guerrillas in Syria and Algeria; in 1965, they launched their first attack
within Israel, on a pumping station. But the bomb didn't detonate, and most
of the other Fatah raids were also duds. From this experience, Arafat took
the lesson to focus on softer targets, like civilians.

So began the era of modern terrorism: the 1972 Munich massacre, the 1973
murder of American diplomats in Khartoum, the 1974 massacre of
schoolchildren at Ma'alot, and so on. Yet as the atrocities multiplied,
Arafat's political star rose. Partly this had to do with European
cravenness in the face of the implied threat; partly with the Left's secret
love affair with the authentic man of violence. Whatever the case, by 1980
Europe had recognized the PLO, with Arafat as its leader, as the sole
legitimate representative of the Palestinian people. The U.S. held out for
another decade, but eventually it too caved in to international pressure
under the first Bush administration.

For the Palestinians themselves, however, this was not such a good
development. If Arafat's violence against Jews and Israelis was shocking,
his violence against fellow Palestinians was still worse. In the manner of
other would-be national liberators, he did not look kindly on dissenters
within his ranks. In 1987, for instance, Palestinian cartoonist Ali Naji
Adhami was murdered on a London street; his crime was to have insinuated in
a drawing that the ra'is was having an affair with a married woman.

Once in power in Ramallah, the abuses became much worse. Critics of his
government were routinely imprisoned and often tortured. In 1999, Muawiya
Al-Masri, a member of the Palestinian Legislative Council, gave an
interview to a Jordanian newspaper denouncing Arafat's corruption. He was
later attacked by a gang of masked men and shot three times. 

Arafat: Where's his money?

2004-11-05 Thread R.A. Hettinga
http://www.worldtribune.com/worldtribune/breaking_10.html




 Mrs. Arafat keeps husband
 on life support
 Where's his money?

 Special to World Tribune.com
 GEOSTRATEGY-DIRECT.COMThursday, November 4, 2004

 RAMALLAH - Palestinian Authority Chairman Yasser Arafat has died. He was
75 years old.

 Israeli and Palestinian officials said Arafat died on Thursday in a
military hospital in Paris. They said Arafat was deemed clinically dead,
but is still attached to life support systems on the insistence of his
wife, Suha.


 Palestinan Authority's Yasser Arafat: Abbas and Qurei sought to acquire
his power to allocate money as the PA chairman departed for Paris. But as
he boarded a Jordanian Air Force helicopter, Arafat refused. I'm still
alive, thank God, so don't worry, Arafat was quoted as saying.
Reuters/Loay Abu Haykel

 He is dead, but neither Arafat's wife nor the Palestinian leadership is
ready to announce this, a PA official said. The announcement could take
place on Friday.

 The problem is that Arafat is still the only Palestinian official who can
pay the bills. And it is unclear who, if anyone, has access to the
estimated $2-3 billion in his personal Swiss bank accounts, according to a
report in the current edition of Geostrategy-Direct.com. Even his wife is
said to be unaware of how to access the funds.

 Arafat continues to hold the purse strings to the Palestinian finances.
For the last decade, he has been the final, and often only word on payment
to everybody from the suicide bomber to the janitor. Not a dime was paid
without Arafat's okay.

 Before he left for Paris, Arafat approved a three-member emergency
committee to operate the PA and PLO in his absence. Officials said Ahmed
Qurei was meant to run the PA's daily affairs while Mahmoud Abbas was
appointed acting chairman of the PLO.

 Palestine National Council chairman Salim Zaanoun, the third member of the
committee, was said to be a symbolic figure.

 Abbas and Qurei sought to acquire Arafat's power to allocate money during
the absence of the PA chairman. But as he boarded a Jordanian Air Force
helicopter for Amman, Arafat refused.

 I'm still alive, thank God, so don't worry, Arafat was quoted as saying.

 Israeli officials confirmed that Arafat died on Thursday, Middle East
Newsline reported. They said Arafat was termed brain dead and physicians
have stopped attending to him.

 For Palestinians, the main question is where is Arafat's money?

 Issam Abu Issa knows how Arafat appropriated and concealed money. Abu Issa
was the founder and chairman of the Palestine International Bank from 1996
until he fled to Qatar in 2000.

 Rather than use donor funds for their intended purposes, Arafat regularly
diverted money to his own accounts, Abu Issa said in a report for Middle
East Quarterly. It is amazing that some U.S. officials still see the
Palestinian Authority as a partner even after U.S. congressional records
revealed authenticated PLO papers signed by Arafat in which he instructed
his staff to divert donors' money to projects benefiting himself, his
family and his associates.

 Arafat controls billions of dollars meant for the Palestinian people. In a
word, he stole it, intelligence sources said, according to the
Geostrategy-Direct report.

 His personal fortune has been estimated at between $2 and $3 billion, most
of it in Swiss bank accounts.

 In 1997, the PA auditor's office said in its financial report that $326
million, or 43 percent of the annual budget, was missing.

 The United States has been supporting former PA security chief Mohammed
Dahlan as Arafat's successor. To his friends in the Bush administration,
Dahlan, 43, has all the qualities for Arab leadership: a smooth talker and
brutal cop. Arafat asked Dahlan to accompany him to Paris in a move
designed to keep him out of the Gaza Strip and any coup plot.

 Another challenger has been Fatah Secretary-general Marwan Barghouti,
sentenced to life in prison for a series of terrorist attacks. Barghouti,
44, has followers in the West Bank but does not appear to have the iron
will necessary to face Arafat loyalists.

 Neither Israeli nor PA officials have been told much about Arafat's
condition, and the only one authorized to issue information from his
hospital bedside is the chairman's wife, Suha.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Blue Democrats Lost Red America

2004-11-05 Thread R.A. Hettinga
http://online.wsj.com/article_print/0,,SB109962033700165749,00.html

The Wall Street Journal


 November 5, 2004

 WONDER LAND
 By DANIEL HENNINGER



Blue Democrats
 Lost Red America
 Back in 1965
November 5, 2004; Page A12

And you tell me over, and over, and over again my friend
 Ah, you don't believe we're on the eve of destruction.
 --Vietnam War Protest Song, 1965

How did the 2004 election map of the United States come to look like a
color-field painting by Barnett Newman? In fact, if you adjust the map's
colors for votes by county (as at the Web sites for CNN and USA Today),
even the blue states turn mostly red. Pennsylvania is blue, but between
blue Philadelphia and Pittsburgh every county in the state is red.
California, except for the coastline, is almost entirely red.

This didn't happen last Tuesday. The color-coding of the 2004 election
began around 1965 in the politics of the Vietnam era. The Democratic Party
today is the product of a generational shift that began in those years.

The formative years of the northern wing of the Democratic Old Guard go
back to World War II. It included political figures like Tip O'Neill, Pat
Moynihan and Lane Kirkland. It was men such as these whose experiences,
both political and personal, informed and shaped the Democrats before the
mid-'60s.

Over time the party passed into the hands of a generation, now in their 50s
and early 60s, whose broad view of America and its politics was formed as
young men and women opposing the Vietnam War. That would include the
party's current leading lights -- John Kerry, Howard Dean, Nancy Pelosi.
And its most influential strategists, such as Bob Shrum, Mary Beth Cahill
and James Carville. The old industrial unions, whose members went over to
Ronald Reagan, gave way to the more dependable public-employee unions run
by John Sweeney and Gerald McEntee.

These Baby Boomers -- the generation of John Kerry, Al Gore and Bill and
Hillary Clinton -- transformed the world view of the Democrats, on
everything from foreign policy to cultural issues. This new ethos --
instinctively oppositional, aggressively secular -- sank its roots deep on
the East and West coasts, but it never really spread into the rest of the
country, then or now.

Early on, the military became a focus. Democrats belonging to the World War
II generation believed that one served. There was a nonpartisan pact of
reverence for the services. After Vietnam, Democratic partisans worked
hard, and successfully, to eradicate ROTC from elite, coastal campuses and
to adopt an ethos that no longer revered the services, but held them
suspect of doing harm. Bill Clinton's relations with the military were
strained. John Kerry tried to use his service biography to erase the
Vietnam-era legacy of Democratic opposition to things military. It didn't
work.

Expressed emotion matters greatly for this generation. The most notable
phenomenon of the 2004 election was widespread liberal hatred of George
Bush. Many wondered what sleeping volcano brought this lava to the surface.
It came from the style of protest politics born in the 1960s. A famous
liberal political phrase then was the personal is political. Letting
oneself become emotionally unhinged during a protest, as at Columbia,
Harvard and Berkeley, became a litmus of authenticity. It became the norm,
and it still is. But again, only for people who scream themselves blue.

Another phrase heard often in the campaign just ended was, I'm
frightened. Admiration for childlike fears in politics received approval
in 1970 from Charles Reich's bestseller The Greening of America, a paean
to youth and a new and liberated individual. Reich's book, by the way,
also popularized the notion then that something called the Corporate
State was blotting out the Aquarian sunshine. This is the mindset that
just produced the Democrats' weird obsession with Halliburton, as if
anyone would care beyond the people who were long ago baptized into the
blue faith.

But the politics of the Vietnam generation wasn't just about Vietnam. It
was about changing everything, most notably the culture. This generation
really opened up the culture. The old pre-Vietnam strictures on behavior
and comportment -- Tip O'Neill's old Boston Catholic world of Mass on
Sunday and at least a working if not functioning knowledge of the Baltimore
catechism -- got hammered down till the moral landscape became flat and
fast. Now you can drive anything at all into theaters, music or movies.
This post-Vietnam culture of non-restraint, now almost 40 years old,
produced Whoopi Goldberg's double-entendre jokes about George Bush's name
at Radio City Music Hall, the Massachusetts Supreme Court's sudden decision
on gay marriage, and hard-to-defend support for partial-birth abortion.

George Bush, age 58, was a reproach. He personifies everything they have
fought since they drove LBJ and Richard Nixon out of politics. And this
week they are trying to discover why most of the people who live 

Re: Cryptography Research Takes Aim at Content Pirates

2004-11-05 Thread Will Morton
R.A. Hettinga wrote:
http://biz.yahoo.com/prnews/041105/sff023_1.html?printer=1
Yahoo! Finance
Source: Cryptography Research, Inc.
Cryptography Research VP Benjamin Jun Takes Aim at Content Pirates
Friday November 5, 6:02 am ET
Discusses Technology Trends and Responses at Upcoming RSA Conference Europe
2004
 

snip
   Yes, we can protect you from those vil commie pirates.  
Our product is a flexible solution that combines programmable security 
and 'smart content' with risk management techniques such as forensic 
marking and attack response capabilities.  And yes, the icon comes in 
cornflower blue.

   Meanwhile, Bittorrent now takes up 35% of global bandwidth 
(http://in.tech.yahoo.com/041103/137/2ho4i.html) and 4Mb DSL lines are 
now available in the UK mass market 
(http://www.bulldogbroadband.com/general/landing.asp) for £40 ($73) per 
month with TCs that scream 'P2P-OK'.

   Good luck with those 'attack response capabilities'.
   W


Re: Blue Democrats Lost Red America

2004-11-05 Thread John Young
A shallow, stale spin, unduly sanctimonious, and highly 
presumptive of the legitimacy of election reports.

Same vapid shit to fill news void would have been written 
if Kerry squeaked by.




Re: Your source code, for sale

2004-11-05 Thread Tyler Durden
Ben Laurie made a lot of useful points. However,...
Simultaneous release is (provably?) impossible without a trusted third 
party.
I don't think I believe this. Or at least, I don't think it's true to the 
extent necessary to make the original application impossible.

Consider:
I send you money for naked photos of Geri Ryan (that Borg chick with the 
ASS-KICKING hips). The money is encapsulated...you can its there, but you 
can't get at it.

You send me encapsulated photos, perhaps with thumbnails on the outside.
I see the thumbnails and click to send the pre-release. You see the 
pre-release arrive and click the release for the photos.

My photo-bundle receives the releases and opens, and then shoots off a 
message that activates the pre-release on your end, giving you the cash.

Is a 3rd party necessary here? I don't see it, but then again I could be 
wrong.

-TD
_
Don’t just search. Find. Check out the new MSN Search! 
http://search.msn.click-url.com/go/onm00200636ave/direct/01/



Block Spyware Pop-Ups

2004-11-05 Thread Protect your PC
Hello, 

Have you recently noticed that your computer is all of a sudden running slower than 
normal? Or, perhaps you're noticing that you've recently been inundated with an 
inordinate amount of annoying and intrusive pop up advertisements. The reason this 
may be happening is because your PC's hard drive is infected with Spyware and/or 
Adware files. 

http://www.fundowntheroad.com/vvcjfkb_looowhfows.html

These are files that are installed on your PC without your knowledge and can be 
extremely harmful to your PC and could lead to the crashing of your PC's hard drive. 

The only way to check your system for these files is to scan your system using our 
software. You may now scan your system AbsolutelyFree to check for these infected 
files. To do so, simply go here to start the scan: 
http://www.fundowntheroad.com/enamhun_looowhfows.html 

It's imperative that you keep a constant check of your PC to ensure these files are 
not residing on your hard drive. If after scanning you find these files do exist on 
your hard drive, it's essential that you remove them immediately. 

Again, please scan your system now (atno cost) by going here: 
http://www.fundowntheroad.com/nuxnpop_looowhfows.html 

Best, 

MyNetProtector?
Your Rights, Your Privacy! 






If you no longer want to receive mail from this list:

Send a blank email to 
mailto:[EMAIL PROTECTED], 
or write to Good Times
123 North Congress Avenue Suite 180
Boynton Beach, Florida 33426




The oldest fraud

2004-11-05 Thread R.A. Hettinga
http://www.townhall.com/columnists/thomassowell/printts20041105.shtml

Townhall.com

The oldest fraud
Thomas Sowell (back to web version) | Send

November 5, 2004

 Election frauds are nothing new and neither are political frauds in
general. The oldest fraud is the belief that the political left is the
party of the poor and the downtrodden.

 The election results in California are only the latest evidence to give
the lie to that belief. While the state as a whole went for Kerry, 55
percent versus 44 percent for Bush, the various counties ranged from 71
percent Bush to 83 percent Kerry. The most affluent counties were where
Kerry had his strongest support.

 In Marin County, where the average home price is $750,000, 73 percent of
the votes went for Kerry. In Alameda County, where Berkeley is located, it
was 74 percent Kerry. San Francisco, with the highest rents of any major
city in the country, gave 83 percent of its votes to Kerry.

  Out where ordinary people live, it was a different story. Thirty-six
counties went for Bush versus 22 counties for Kerry, and usually by more
balanced vote totals, though Bush went over 70 percent in less fashionable
places like Lassen County and Modoc County. If you have never heard of
them, there's a reason.

 It was much the same story on the votes for Proposition 66, which would
have limited the three strikes law that puts career criminals away for
life. Affluent voters living insulated lives in places well removed from
high-crime neighborhoods have the luxury of worrying about whether we are
not being nice enough to hoodlums, criminals and terrorists.

 They don't like the three strikes law and want it weakened. While most
California voters opposed any weakening of that law, a majority of the
voters in the affluent and heavily pro-Kerry counties mentioned wanted us
to stop being so mean to criminals.

  This pattern is not confined to California and it is not new. There were
limousine liberals before there were limousines. The same pattern applies
when you go even further left on the political spectrum, to socialists and
communists.

 The British Labor Party's leader in the heyday of its socialist zealotry
was Clement Attlee, who grew up in a large home with servants -- and this
was not the only home his family owned. Meanwhile, Margaret Thatcher's
family ran a grocery store and lived upstairs over it.

 While the British Labor Party was affiliated with labor unions, it was the
affluent and the intellectuals in the party who had the most left-wing
ideologies and the most unrealistic policies. In the years leading up to
World War II, the Labor Party was for disarmament while Hitler was arming
Germany to the teeth across the Channel.

 Eventually, it was the labor union component of the party that insisted on
some sanity, so that Britain could begin preparing to defend itself
militarily -- not a moment too soon.

 When Karl Marx and Friedrich Engels wrote the Communist Manifesto, they
were a couple of spoiled young men from rich families. All their talk about
the working class was just talk, but it appealed to other such young men
who liked heady talk.

 As Engels himself put it, when the Communist group for whom the Manifesto
was written was choosing delegates, a working man was proposed for
appearances sake, but those who proposed him voted for me. This may have
been the first rigged election of the Communist movement but it was
certainly not the last.

 All sorts of modern extremist movements, such as the Weathermen in the
United States or the Bader-Meinhof gang in Germany, have attracted a
disproportionate number of the affluent in general and the intellectuals in
particular.

  Such people may speak in the name of the downtrodden but they themselves
are often people who have time on their hands to nurse their pet notions
about the world and their fancies about themselves as leaders of the poor,
saviors of the environment or whatever happens to be the Big Deal du jour.

 Osama bin Laden is not someone embittered by poverty. He is from a very
rich family and has had both the time to nurse his resentments of the West
and the money to organize terrorists to lash out in the only way that can
give them any significance.

 The belief that liberal, left-wing or extremist movements are for the poor
may or may not be the biggest fraud but it is certainly the oldest.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
Socialism in general has a record of failure so blatant that only an
intellectual could ignore or evade it. -- Thomas Sowell



Corporate governance goals impossible - RSA

2004-11-05 Thread R.A. Hettinga
http://www.theregister.co.uk/2004/11/04/rsa_redux/print.html

The Register


 Biting the hand that feeds IT

The Register » Business » Management »

 Original URL: http://www.theregister.co.uk/2004/11/04/rsa_redux/

Corporate governance goals impossible - RSA
By John Leyden (john.leyden at theregister.co.uk)
Published Thursday 4th November 2004 16:43 GMT

Companies are struggling to cope with tighter corporate governance regimes,
which might even work against the goal of achieving improved IT security
they are partly designed to promote. The need to comply with requirements
such as data protection, Sarbanes-Oxley, Basel II and other corporate
governance reforms is tying up IT managers in red tape, according to a
banking security expert. Recent legislation is having a negative impact on
risk management, said Michael Colao, director of Information Management at
Dresdner Kleinwort Wasserstein.

In some cases, the law has made IT managers legally responsible for
adherence to corporate governance rules. Colao says that this may not
necessarily be a good thing. CIOs are now relying on convoluted processes
rather than using sound business judgement based on years of experience. A
process is easier to defend in court than personal judgement. This means
that in many cases unnecessarily cautious decisions are being taken because
the CIO is focusing on their own personal liability, rather than what is
best for the business, he said.?

Different implementations of the European Data Protection Directive in
different countries are creating a headache for multinational firms,
according to Colao. This legislation was brought in as part of the EU
common market and was supposed to provide clarity and harmony across
Europe. Because each country implements legislation in very different ways,
the result is a very fragmented and disjointed approach which causes all
sorts of problems, particularly for global organisations, he said.

Colao made his comments at the Axis Action Forum, a meeting of IT directors
sponsored by RSA Security, in Barcelona this week. RSA Security said
differences in European legislation highlighted by Colao were a real
problem for its clients.

Tim Pickard, strategic marketing director at RSA Security EMEA, said: The
nature of implementation of EU directives in member states means that it is
almost impossible for today's global CIO to be fully compliant and is
therefore likely to be breaking the law in at least one member state.

Business managers becoming fed up with FUD

In a separate study, more than a third of the 30 delegates to the Axis
Action Forum admitted that their Board had never asked for an update on
security or implications of security breaches. The finding suggests
widespread boardroom indifference to security issues despite the high
profile security has been given in the media and by numerous industry
initiatives.

Firms only take security seriously in the aftermath of attacks, according
to one delegate. Part of the reason could be that business managers are
becoming inured to alarmist security pitches. Simon Linsley, head of
consultancy and development, Philips said: For years we have had to go to
the Board with messages that create the Fear of God. We can no longer rely
on these doom and gloom messages - we have to go to the Board with
solutions that add value to the business.

The Axis Action Forum attended by more than 30 CIOs, IT directors and heads
of security from a range of medium to large businesses. ®

Related stories

UK corporate governance bill to cost millions
(http://www.theregister.co.uk/2004/09/08/companies_bill_it_costs/)
Hackers cost UK.biz billions
(http://www.theregister.co.uk/2004/04/28/dti_security_survey/)
IT voices drowned in corporate governance rush
(http://www.theregister.co.uk/2004/04/22/it_in_corporate_governance/)
Big.biz struggles against security threats
(http://www.theregister.co.uk/2004/10/27/netsec_security_survey/)

© Copyright 2004

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Your source code, for sale

2004-11-05 Thread Chris Kuethe
On Fri, 05 Nov 2004 10:01:41 -0500, Tyler Durden
[EMAIL PROTECTED] wrote:
 ...
 My photo-bundle receives the releases and opens, and then shoots off a
 message that activates the pre-release on your end, giving you the cash.
 
 Is a 3rd party necessary here? I don't see it, but then again I could be
 wrong.

What if I block the outbound release the money message after I
unbundle the images. Sure, I've already committed my money, but you
can't get to it. In effect I've just ripped you off, because I have
usable product and you don't have usable money. The proof of delivery
comes in handy here, so that as soon as I can prove to the bank that
my product has arrived within your administrative area, they'll pay
me. And the bank sends me a key to unlock the product as soon as it
sends you the money.

And what *GUARANTEE* do I have that the blob of bits you sent me with
the Geri Ryan photos on the outside isn't something from goatse.cx or
tubgirl...? Let's say there are 24000 items in the tarball of the IOS
code. Do you want to pay $24K for all of them (once) or $12K for half
of them (twice) or $1 per file or directory (24000 times)? Do you want
to pay per committed bit or character? How can you protect yourself
from me committing to sell you /dev/random?

I'm sure everyone has this bit committed to memory, but the beginning
of Applied Crypto, chapter 2 says:

=
Protocols have other characteristics as well:
-- Everyone involved in the protocol must know the protocol and all of
the steps to follow in advance.
-- Everyone involved in the protocol must agree to follow it.
-- The protocol must be unambiguous; each step must be well defined
and there must be no chance of a misunderstanding.
-- The protocol must be complete; there must be a specified action for
every possible situation.

... The whole point of using cryptography in a protocol is to prevent
or detect eavesdropping and cheating.
=

That last property is critical: what does the protocol do when someone
isn't playing by the rules? Of course, there's nothing that crypto can
do to prevent you from selling me garbage, only the fact that you
intentionally did so can be proven. Comment about bribing the dockside
worker at the shipping line deleted.

-- 
GDB has a 'break' feature; why doesn't it have 'fix' too?



Why Americans Hate Democrats-A Dialogue

2004-11-05 Thread R.A. Hettinga
Here ya go, John and Bill,

Knock yourselves out...

:-)

Cheers,
RAH
---


http://slate.msn.com/toolbar.aspx?action=printid=2109218

Slate

politics
Why Americans Hate Democrats-A Dialogue
The unteachable ignorance of the red states.
By Jane Smiley
Updated  Thursday, Nov. 4, 2004, at 3:24 PM PT


The day after the election, Slate's political writers tackled the question
of why the Democratic Party-which has now lost five of the past seven
presidential elections and solidified its minority status in Congress-keeps
losing elections. Chris Suellentrop says that John Kerry was too nuanced
and technocratic, while George W. Bush offered a vision of expanding
freedom around the world. William Saletan argues that Democratic candidates
won't win until they again cast their policies the way Bill Clinton did, in
terms of values and moral responsibility. Timothy Noah contends that none
of the familiar advice to the party-move right, move left, or sit
tight-seems likely to help. Slate asked a number of wise liberals to take
up the question of why Americans won't vote for the Democrats. Click here
to read previous entries.

I say forget introspection. It's time to be honest about our antagonists.
My predecessors in this conversation are thoughtful men, and I honor their
ideas, but let's try something else. I grew up in Missouri and most of my
family voted for Bush, so I am going to be the one to say it: The election
results reflect the decision of the right wing to cultivate and exploit
ignorance in the citizenry. I suppose the good news is that 55 million
Americans have evaded the ignorance-inducing machine. But 58 million have
not. (Well, almost 58 million-my relatives are not ignorant, they are just
greedy and full of classic Republican feelings of superiority.)

Ignorance and bloodlust have a long tradition in the United States,
especially in the red states. There used to be a kind of hand-to-hand fight
on the frontier called a knock-down-drag-out, where any kind of gouging,
biting, or maiming was considered fair. The ancestors of today's red-state
voters used to stand around cheering and betting on these fights. When the
forces of red and blue encountered one another head-on for the first time
in Kansas Territory in 1856, the red forces from Missouri, who had been
coveting Indian land across the Missouri River since 1820, entered Kansas
and stole the territorial election. The red news media of the day made a
practice of inflammatory lying-declaring that the blue folks had shot and
killed red folks whom everyone knew were walking around. The worst civilian
massacre in American history took place in Lawrence, Kan., in
1862-Quantrill's raid. The red forces, known then as the slave-power,
pulled 265 unarmed men from their beds on a Sunday morning and slaughtered
them in front of their wives and children. The error that progressives have
consistently committed over the years is to underestimate the vitality of
ignorance in America. Listen to what the red state citizens say about
themselves, the songs they write, and the sermons they flock to. They know
who they are-they are full of original sin and they have a taste for
violence. The blue state citizens make the Rousseauvian mistake of thinking
humans are essentially good, and so they never realize when they are about
to be slugged from behind.

Here is how ignorance works: First, they put the fear of God into you-if
you don't believe in the literal word of the Bible, you will burn in hell.
Of course, the literal word of the Bible is tremendously contradictory, and
so you must abdicate all critical thinking, and accept a simple but logical
system of belief that is dangerous to question. A corollary to this point
is that they make sure you understand that Satan resides in the toils and
snares of complex thought and so it is best not try it.

Next, they tell you that you are the best of a bad lot (humans, that is)
and that as bad as you are, if you stick with them, you are among the
chosen. This is flattering and reassuring, and also encourages you to
imagine the terrible fates of those you envy and resent. American
politicians ALWAYS operate by a similar sort of flattery, and so Americans
are never induced to question themselves. That's what happened to Jimmy
Carter-he asked Americans to take responsibility for their profligate ways,
and promptly lost to Ronald Reagan, who told them once again that they
could do anything they wanted. The history of the last four years shows
that red state types, above all, do not want to be told what to do-they
prefer to be ignorant. As a result, they are virtually unteachable.

Third, and most important, when life grows difficult or fearsome, they
(politicians, preachers, pundits) encourage you to cling to your ignorance
with even more fervor. But by this time you don't need much
encouragement-you've put all your eggs into the ignorance basket, and
really, some kind of miraculous fruition (preferably accompanied by the
torment of 

When A Pencil And Paper Makes Sense

2004-11-05 Thread R.A. Hettinga
http://www.forbes.com/2004/11/05/cx_ah_1105tentech_print.html

Forbes



Ten O'Clock Tech
When A Pencil And Paper Makes Sense
Arik Hesseldahl,   11.05.04, 10:00 AM ET

Thank goodness, it's over. Sometime around 4:30 A.M. Wednesday I went to
bed, not the least bit uncertain that George W. Bush had been re-elected.

 But the one thing during this election cycle about which I have been
uncertain is electronic voting. Florida in 2000 was a mess, and in
reaction, some states and counties have turned to newfangled electronic
voting machines, thinking that computer technology is the answer to a
voting system that has started to creak under pressure.

 It seems that despite much worry about a repeat of Florida in other
states, voting has gone pretty smoothly. Electronic voting methods are
getting high marks. Of the 27,500 voting problems reported to the Verified
Voting Project, a San Francisco-based group that monitored the election for
voting problems, less than 6% of the issues reported stemmed from
electronic voting machines.

 Election officials in states like Nevada, Georgia and Hawaii gave
electronic voting systems a try. There were some problems: a memory card on
an electronic voting machine in Florida failed; five machines in Reno,
Nev., malfunctioned, causing lines to back up.

 Overall voter turnout was high. The Committee for the Study of the
American Electorate, a nonprofit, nonpartisan outfit based in Washington,
D.C., estimated that 120.2 million people, or 59.6% of those eligible to
vote, cast ballots in this election, which would be an improvement of 5%
and 15 million people, compared with the 2000 elections, and would make
2004's turnout the highest since 1968.

 Still, that's not as high as voter participation in my home state of
Oregon, where 1.7 million people, or nearly 82% of those eligible, voted.

 In Oregon, voters cast their votes from home rather than going to a
polling place. They submit their ballots by mail. The state abolished
polling places in 1998 and has been voting entirely by mail ever since.

 Voters get their ballots roughly two weeks before election day. This year
some were delayed because of an unexpectedly high number of voter
registrations. Ballots must be received by county elections offices by 8
P.M. on the day of the election. Drop boxes are located throughout the
state, as well.

 Voting should indeed take time and effort. It's undoubtedly important. But
I like Oregon's common-sense approach. Voting from the comfort of your own
home eliminates the inherent disincentive that comes from having to stand
on a long line, for example.

 It's pretty simple. Oregon voters fill out their ballots using a pencil,
just like those standardized tests everyone took in high school. If they
want to write in a candidate, the ballot allows for that, too.

 I thought of this as I stood for about 45 minutes in a long, cold line at
6:30 A.M. to vote in my neighborhood in New York's Upper East Side.
Throughout the day I heard reports from around the country of people who
had to stand in line for as long as eight hours so they could vote, and I
wondered how many others just threw up their hands in frustration because
they had someplace else to be.

 The mail-in ballot also gives the voter a little time to consider his or
her choice. Too often, voters will enter a voting booth knowing a few of
the people they intend to vote for, but read about some ballot initiative
or amendment for the first time. Rather than having to make a snap decision
in the voting booth, having a ballot handy at home can give voters time to
educate themselves and make a more informed decision.

 Sometimes, the best solution isn't a computer at all, but a good
old-fashioned pencil and paper.

 Click here for more Ten O'Clock Tech Columns




-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Your source code, for sale

2004-11-05 Thread Taral
On Thu, Nov 04, 2004 at 03:01:15PM -0800, Hal Finney wrote:
 Another idea along these lines is gradual payment for gradual release
 of the goods.  You pay 10% of the amount and they give you 10% of the
 source code.  You pay another 10% and you get the next 10% of the source,
 and so on.  (Or it could be nonlinear; maybe they give out half the code
 for free, but the final 10% requires a large payment.)  The idea is that
 you can sample and make sure they do appear to have the real thing with
 a fairly small investment.
 
 If there is some mechanism for the seller to have a reputation (like
 Advogato's perhaps, with some spoofing immunity) then the problem is
 easier; the seller won't want to screw buyers because it hurts his rep.
 In that case it may be reasonable to ask the buyer to pay in advance,
 perhaps using the partial payment system just discussed.

The mojonation file sharing system had an implementation like this
originally...

-- 
Taral [EMAIL PROTECTED]
This message is digitally signed. Please PGP encrypt mail to me.
A: Because it fouls the order in which people normally read text.
Q: Why is top-posting such a bad thing?
A: Top-posting.
Q: What is the most annoying thing on usenet and in e-mail?


pgpmCFDIvY6Z4.pgp
Description: PGP signature


Re: Why Americans Hate Democrats-A Dialogue

2004-11-05 Thread John Young
Well, this is just commie propaganda.

Bob, you know this is against list rules, everybody knows
what's right, stop blue-baiting, you fucking nazi.




Re: Your source code, for sale

2004-11-05 Thread Hal Finney
Enzo Michelangeli writes:
 In the world of international trade, where mutual distrust between buyer
 and seller is often the rule and there is no central authority to enforce
 the law, this is traditionally achieved by interposing not less than three
 trusted third parties: the shipping line, the opening bank and the
 negotiating bank.

Interesting.  In the e-gold case, both parties have the same bank,
e-gold ltd.  The corresponding protocol would be for the buyer to instruct
e-gold to set aside some money which would go to the seller once the
seller supplied a certain receipt.  That receipt would be an email return
receipt showing that the seller had sent the buyer the content with hash
so-and-so, using a cryptographic email return-receipt protocol.

  You could imagine a trusted third party who would inspect the code and
  certify it, saying the source code with hash XXX appears to be
  legitimate Cisco source code.  Then they could send you the code bit
  by bit and incrementally show that it matches the specified hash,
  using a crypto protocol for gradual release of secrets.  You could
  simultaneously do a gradual release of some payment information in the
  other direction.

 But it's hard to assess the value of partially-released code. If the
 gradual transfer bits-against-cents is aborted, what is left to the buyer
 is likely to be unusable, whereas the partial payment still represents
 good value.

Actually you can arrange it so that neither the partially-released code
nor the partially-transferred ecash is of any value until the whole
transfer finishes.  For example, send the whole thing first in encrypted
form, then release the encryption keys bit-by-bit.  If someone aborts
the protocol early, the best each side can do is a brute force search
over the untransferred bits to try to find the key to unlock the data
they received.

 A more general issue is that source code is not a commodity, and
 intellectual property is not real property: so the traditional cash on
 delivery paradigm just doesn't work, and looking for protocols
 implementing it kind of moot. If the code is treated as trade secret,
 rather than licensed, an anonymous buyer may make copies and resell them
 on the black market more than recovering his initial cost, at the same
 time undercutting your legitimate sales (see e.g. the cases of RC4 and
 RC2). This can cause losses order of magnitude larger than refusing to pay
 for his copy.

That's a good point.  Maybe you could use some kind of DRM or trusted
computing concept to try to force the buyer to lock up his received data.
For source code that would be pretty difficult though, it needs to be
handled in flexible ways.

Hal



RE: Your source code, for sale

2004-11-05 Thread Hal Finney
Michael_Heyman writes:
 Finney, Hal (CR):
  The problem is that if the source code you are purchasing is 
  bogus, or if the other side doesn't come through, you're 
  screwed because you've lost the value of the torn cash.  The 
  other side doesn't gain anything by this fraud, but they harm 
  you, and if they are malicious that might be enough.
 
 Quick fix for seller incentive: the seller rips some amount of their own
 cash in such a way that they cannot recover it unless the buyer provides
 the remainder of the buyer's ripped cash.

Yes, I'm looking at ideas like this for ecash gambling, but you have
a who-goes-first problem.  One side or the other has to rip their
own cash first, and then the other side can just go away and leave the
first side screwed.  The act of ripping cash is relatively atomic and
involves a transaction with the ecash mint, so they can't both do it at
the same time.

I guess the best fix is for each side to rip a little bit of cash at a
time, so that the guy who goes first only loses a trivial amount if the
other side aborts.  Then after a few rounds both sides are sunk pretty
deep and both have a strong incentive to complete the transaction.

Hal



Re: Why Americans Hate Democrats-A Dialogue

2004-11-05 Thread R.A. Hettinga
At 1:05 PM -0800 11/5/04, John Young wrote:
Bob, you know this is against list rules, everybody knows
what's right, stop blue-baiting, you fucking nazi.

:-)

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Why Americans Hate Democrats-A Dialogue

2004-11-05 Thread Tyler Durden
I dunno...a lot of it made sense to me.
You don't have to be a Commie in order to believe that someone ELSE believes 
there's a class war, and that they gotta keep us black folks po', or else 
we'll soon be having sex with their wives and daughters and competing with 
their sons for decent jobs. And as long as that somebody else believes 
there's a class war, they're probably going to vote like there's one, and 
try to dupe as many others as they can into voting like there's one, and 
that they're in the in-crowd.

And then of course they'll open a military base everynow and then to 
demonstrate their largesse.

-TD
From: R.A. Hettinga [EMAIL PROTECTED]
To: John Young [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: Why Americans Hate Democrats-A Dialogue
Date: Fri, 5 Nov 2004 13:15:48 -0500
At 1:05 PM -0800 11/5/04, John Young wrote:
Bob, you know this is against list rules, everybody knows
what's right, stop blue-baiting, you fucking nazi.
:-)
Cheers,
RAH
--
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
_
Express yourself instantly with MSN Messenger! Download today - it's FREE! 
http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/



RE: Your source code, for sale

2004-11-05 Thread R.A. Hettinga
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

At 10:18 AM -0800 11/5/04, Hal Finney wrote:
Yes, I'm looking at ideas like this for ecash gambling, but you have
a who-goes-first problem.

Whenever we talk about financial applications, where the assets
represented by one bearer certificate are exchanged for those
represented by another, what's really happening is a redeem-reissue
process anyway. Since it's the underwriters' reputations you're
trusting anyway, we've always assumed that there would be
communication between the underwriters in order to execute, clear,
and settle the trade all at once.

For streaming stuff, we figured that since we were streaming cash for
streaming bits, like movies, or content of some kind, you'd just do
tit for tat, one stream (cash, probably signed probabalistically
tested coins in the last iteration that we called Nicko-mint :-))
against another, the movie, song, etc being streamed. There's the
missing last 5 minutes problem, but I think that, in recursive
auction-settled cash market for digital goods like this (Eric Hughes'
institutional 'pirate' scheme, the 'silk road' stuff, whatever), that
there will always be another source to buy what's left from, once the
intellectual property issues solve themselves because of the auction
process.

For things that aren't useful except in their entirety, like code, or
executables, (or storing money :-)), I've always been a fan of the
Mojo/BitTorrent stuff, where you hash the file into bits, ala m-of-n
Shamir secret splitting, and store/buy them from lots of places at
once.

Cheers,
RAH

-BEGIN PGP SIGNATURE-
Version: PGP 8.0.3

iQA/AwUBQYvH6cPxH8jf3ohaEQIGGACgiS/Uv3KxDK4rM9lozOoxfI5Fg1QAoP7d
4Xw6/SwfaBOqgyh9uQTS/5oa
=XMiK
-END PGP SIGNATURE-

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Your source code, for sale

2004-11-05 Thread Tyler Durden

What if I block the outbound release the money message after I
unbundle the images. Sure, I've already committed my money, but you
can't get to it. In effect I've just ripped you off, because I have
usable product and you don't have usable money.
Well, yes, but this would be a very significant step forward from the 
current situation. As t--infinity the vast majority of non-payments are 
going to be for the purpose of greed. If the payment is already 'gone', then 
you need a whole different set of motives for wanting to screw somebody even 
if you get nothing out of it. So in other words, you have at least solved 
the payment problem to the first order, with no 3rd party. With fancier 
mechanisms I would think you can solve it to 2nd order too.

-TD
_
Check out Election 2004 for up-to-date election news, plus voter tools and 
more! http://special.msn.com/msn/election2004.armx



Re: Why Americans Hate Democrats-A Dialogue

2004-11-05 Thread John Young
Tyler,

Commie is the term used here like is nazi used elsewhere
as the most fearsome if thoughtless epithet. Nazi here is a 
term of endearment, and also admirable role model by some.

Calling someone both is not allowed, check the FAQ under impurity.

Tim May, praise Allah, always claimed cypherpunks was a fair and
balanced forum thanks to the one person of the left here who 
was fingered affectionately like a house rodent, an easy target for
errant shooters.

CJ is not to be recalled, ever.

Jim Bell still sends very important legal papers, the latest yesterday, 
which describe the way things should be understood. But who can
believe an MIT chemist political prisoner.

CJ and Jim jailed by the Democratic freedom-fighters.




Election with Hunter

2004-11-05 Thread R.A. Hettinga
Last blue-baiting post, I swear. Gotta love HST, especially after the ether
kicks in...

Cheers,
RAH
---

http://www.aspendailynews.com/Search_Articles/view_search_article.cfm?OrderNumber=9156

Aspen Daily News

Friday, November 5, 2004
11/4/04

 Election with Hunter

By Troy Hooper/Aspen Daily News Staff Writer



 WOODY CREEK - It was Bailey's Irish Cream and Royal Salute Scotch Whiskey
at the Thompson household on Election Night. A bottle of Cristal intended
for a John Kerry victory remained uncorked, chilling on ice in a backroom.

 A hungry smell of anticipation hung in the kitchen at Owl Farm, which
morphed into a makeshift Democratic headquarters as Hunter S. Thompson
hunkered down with a small group of friends and manned what seemed like a
global switchboard as calls came pouring in from some of the biggest names
in modern American lore.

 Even a few pollsters dialed up The Good Doctor in search of the most
up-to-minute score. Whether they were calling to ascertain Thompson's
classified political knowledge or gauge his gambler's instinct was unclear.
But without question, his phone was chiming more often than the Liberty
Bell.

 I don't mean to pop the bad news on you Bubba but John Kerry is getting
beat just like George McGovern did in 1972 - or worse, Thompson proclaimed
to his nephew well before the news networks gave any hint that Bush Nation
was marching toward a second term. The tide turned so quickly it was
difficult to breathe.

 Actor Sean Penn, presidential historian Douglas Brinkley, Kerry press
secretary David Wade and others checked in with Thompson who sat on a chair
inhaling cigarettes and stiff drinks in between bites of breakfast, which
wasn't served to the late-awakening writer until after the sun went down.

 Asked for a candid assessment of the election, Thompson put it plainly to
Penn.

 I've got the worst possible news. Colorado has gone to hell like all the
other states, Thompson said into the speakerphone. They must have all
voted the same way they prayed.

 The way Thompson's neighbors voted was far removed from the national
outcome. Bush mustered just 2,750 of Pitkin County's electorate while Kerry
received 6,275.

 Nationally, Bush garnered the highest total number of votes ever, winning
51 percent of the record voter turnout, which preliminary estimates have
put at roughly 117 million. He is the first president to win a majority of
the vote since 1988 when his father beat another Democrat from
Massachusetts: Michael Dukakis.

 The news is getting logarithmically more horrible, Thompson told another
caller as the night wore on. They're all committing suicide up in Boston.

 Thompson has always had a keen eye for politics. His best-known work on
the subject is Fear and Loathing: On the Campaign Trail '72 - an up-close
study of South Dakota Senator George McGovern's effort to unseat President
Richard Nixon.

 Over the weekend, McGovern and Thompson discussed the election: The two
old friends suggested Bush might be more dangerous than Nixon. Kerry would
make a fine president, they both agreed, as they noted the similarities
between the two eras.

 This year's Democratic presidential candidate must have seen some
similarities between now and then, too.

 When Kerry visited Aspen last June for a fund-raiser, he brought three
hardcover copies of Fear and Loathing: On the Campaign Trail '72 to have
them autographed. Thompson obliged and struck a friendship with Kerry,
serving as his unofficial Aspen tour guide, meeting the candidate on a
rain-soaked tarmac at Sardy Field and riding in a Secret Service procession
up Red Mountain, showing Kerry the sights and conferring with him on
national affairs.

 Now, five months later, Kerry has met the same fate as McGovern.

 I feel like somebody's died, Thompson lamented as the sun was preparing
to rise early Wednesday morning. I'm just not sure who it was.

 He deemed the election another failure of the youth vote.

 Yeah, we rocked the vote all right. Those little bastards betrayed us again.

 But despite his disappointment, Thompson remained remarkably upbeat.

 Their army is how much bigger than mine? Three percent? Well shucks,
Bubba. Now is the time to establish a network and an attitude, he said.
You make friends in moments of defeat. People in defeat tend to bond
because they need each other. We can't take the attitude that it's over and
we give up. We're still here.

 Thompson added: I'm proud to have known John Kerry.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Machine Error Gives Bush Extra Ohio Votes

2004-11-05 Thread R.A. Hettinga
http://apnews.myway.com/article/20041105/D865R1DO0.html


Machine Error Gives Bush Extra Ohio Votes
 Email this Story

Nov 5, 11:56 AM (ET)
 


 COLUMBUS, Ohio (AP) - An error with an electronic voting system gave
President Bush 3,893 extra votes in suburban Columbus, elections officials
said.

 Franklin County's unofficial results had Bush receiving 4,258 votes to
Democrat John Kerry's 260 votes in a precinct in Gahanna. Records show only
638 voters cast ballots in that precinct.

 Bush actually received 365 votes in the precinct, Matthew Damschroder,
director of the Franklin County Board of Elections, told The Columbus
Dispatch.

 State and county election officials did not immediately respond to
requests by The Associated Press for more details about the voting system
and its vendor, and whether the error, if repeated elsewhere in Ohio, could
have affected the outcome.

Bush won the state by more than 136,000 votes, according to unofficial
results, and Kerry conceded the election on Wednesday after acknowledging
that 155,000 provisional ballots yet to be counted in Ohio would not change
the result.

 The Secretary of State's Office said Friday it could not revise Bush's
total until the county reported the error.

 The Ohio glitch is among a handful of computer troubles that have emerged
since Tuesday's elections.

 In one North Carolina county, more than 4,500 votes were lost because
officials mistakenly believed a computer that stored ballots electronically
could hold more data than it did. And in San Francisco, a malfunction with
custom voting software could delay efforts to declare the winners of four
races for county supervisor.

 In the Ohio precinct in question, the votes are recorded onto a cartridge.
On one of the three machines at that precinct, a malfunction occurred in
the recording process, Damschroder said. He could not explain how the
malfunction occurred.
(AP) Voters waited up to three hours to cast ballots after one of two
voting machines failed to work at...
Full Image
Damschroder said people who had seen poll results on the election board's
Web site called to point out the discrepancy. The error would have been
discovered when the official count for the election is performed later this
month, he said.

 The reader also recorded zero votes in a county commissioner race on the
machine.

 Workers checked the cartridge against memory banks in the voting machine
and each showed that 115 people voted for Bush on that machine. With the
other machines, the total for Bush in the precinct added up to 365 votes.

 Meanwhile, in San Francisco, a glitch occurred with software designed for
the city's new ranked-choice voting, in which voters list their top three
choices for municipal offices. If no candidate gets a majority of
first-place votes outright, voters' second and third-place preferences are
then distributed among candidates who weren't eliminated in the first round.

 When the San Francisco Department of Elections tried a test run on
Wednesday of the program that does the redistribution, some of the votes
didn't get counted and skewed the results, director John Arntz said.

 All the information is there, Arntz said. It's just not arriving the
way it was supposed to.

 A technician from the Omaha, Neb. company that designed the software,
Election Systems  Software Inc., was working to diagnose and fix the
problem.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Windows Critical virus update - november 19h

2004-11-05 Thread Corey Beard
Sat, 06 Nov 2004 01:10:17 +0500
MIME-Version: 1.0
Content-Type: text/html;
charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Message-ID: 422994w714r2319a41t3330z4u1844_1

a href=3Dhttp://wotan.killadwareco.com;Time Magazine  Digital:/a br=
 
Spyware is the leading cause for PC failure and hard drive corruption. br=

These malicious code and scripts compromise your privacy and lead to ident=
ity theft . br
Pleasea href=3Dhttp://adrift.killadwareco.com; scan/a your computer n=
ow br
br
br
br
br
alva scythebarbaric noisemake bonaventurebedimmed
coarse resistorbridgetown donaldson albertacameo
discriminate machomattock clark dogleghookup
soundproof awareivan baffle cardaphorism
daniel monitorrodgers idiosyncrasy thunderdryad
twiddle scribblesurface britches centralclue



Singin' this'll be the day that it died

2004-11-05 Thread Tim Benham
A long, long time ago

I can still remember

How the dollar used to make me smile.

And I knew if I had my chance

I'd sell the currency of France

And, maybe, I'd be happy for awhile.

 

But all our spending made me shiver

With every T-bill we'd deliver.

Bad news on the doorstep;

I couldn't take one more step.

 

I can't remember if I cried

When I heard our politicians lied

But something touched me deep inside

The day the dollar died.

 

So bye-bye, dollar assets good-bye

Sold my Chevy at the levee

'cause my pension ran dry.

Them good old boys were drinkin' sake to try

Singin' this'll be the day that it died

This'll be the day that it died.

 

Did you write Whitehouse.gov

Or have you a Yen to fall in love

If Japan will tell you so?

Now, do you believe in oil 'n coal

Can China fill our import hole

And can we teach them how to grow real slow?

 

Well I know the country's fit and trim

'Cause the jobs are in the Pacific Rim.

We all knew savers lose

Man, I dug not having to choose.

 

We were living off the almighty buck

We got their goods and they were stuck

But I knew we were out of luck

The day the dollar died.

 

I started singin'

Bye-bye, dollar assets good-bye

Sold my Chevy at the levee

'cause my pension ran dry.

Them good old boys were drinkin' sake to try

Singin' this'll be the day that it died

This'll be the day that it died.

 

Now for ten years we were sure we owned

All the stocks and bonds and mortgage loans

But that's not how it's gonna be.

When we've spent it all like kings and queens

In clothes we bought from The Philippines

The Asians pick the reserve currency. 

 

Oh, and while the king was looking down,

Their central bankers came to town. 

Our stocks and bonds were spurned 

Those dollars were returned.

And while unions filled their books with Marx

The President said drill in parks

Our thermostats froze in the dark

The day the dollar died.

 

We were singin'

Bye-bye, dollar assets good-bye

Sold my Chevy at the levee

'cause my pension ran dry.

Them good old boys were drinkin' sake to try

Singin' this'll be the day that it died

This'll be the day that it died.

.

Helter skelter in a summer swelter

The equity's gone from your leveraged shelter

Fannie and Freddie are falling fast.

Crash, they landed, but in a new class

Full faith and credit have long since passed

With Congress, in denial, out of gas. 

 

Now the Wal-Mart there has cheap perfume

With imports filling every room.

We all got up to dance

Oh, but we never got the chance.

The consumers tried to take the field

The central banks refused to yield

Do you recall what was revealed

The day the dollar died?

 

We started singin'

Bye-bye, dollar assets good-bye

Sold my Chevy at the levee

'cause my pension ran dry.

Them good old boys were drinkin' sake to try

Singin' this'll be the day that it died

This'll be the day that it died.

 

Oh, and there we were all in one place

Our credit rating in disgrace

With no time left to start again.

So come on: Al be nimble, Al be quick!

Al, cut rates by 50 ticks

'cause credit is the debtor's only friend.

 

Oh, and as I watched him on the stage

My hands were clenched in fists of rage

No congressman in hell

Could buy what he would sell.

And as the rates climbed high into the night

To stem the U.S. asset flight

The IMF said, Yes, that's right

The day the dollar died

 

They were singin'

Bye-bye, dollar assets good-bye

Sold my Chevy at the levee

'cause my pension ran dry.

Them good old boys were drinkin' sake to try

Singin' this'll be the day that it died

This'll be the day that it died.

 

I met a girl who sang the blues

And I asked her if we still could choose

But she just smiled and turned away.

I went down to the Medicare store

Where we'd spent our dollars years before

But the man there said those dollars wouldn't pay.

 

And in the streets the children screamed

The seniors cried and the workers steamed

But not a word was spoken

The commitments all were broken.

And the three men I admire most:

Faber, Rogers, and Bill Gross

Were at the forex trading post

The day the dollar died.

 

And they were singin'

Bye-bye, dollar assets good-bye

Sold my Chevy at the levee

'cause my pension ran dry.

Them good old boys were drinkin' sake to try

Singin' this'll be the day that it died

This'll be the day that it died.

 

They were singin'

Bye-bye, dollar assets good-bye

Sold my Chevy at the levee

'cause my pension ran dry.

Them good old boys were drinkin' sake to try

Singin' this'll be the day that it died.
--

Harry Chernoff is an independent economist in Great Falls, VA 

(with apologies to Don McLean)






DirecTV-Satellite: Four-Room-Setup

2004-11-05 Thread 4Room-Satellite from OSG






DirecTV-Satellite-4Rooms!








Eliminate the Garbage! Stop the Porn.

2004-11-05 Thread Andy



---Click 

Stop Spam Once and for all!

Eliminates porn too!


Want out of our database? Do not reply to this email. 

Copy and paste this link into your browser -

mail-svcs.com/rmm.htm

Computer Technologies
848 N. Rainbow Blvd. #316Las Vegas, NV 89107


guardiantortuouscornaegeanbalsaarmadabradaptdelphinefrictionalswitchgearcapstanbarneyaviatebrdescendantcommercechadwicknneshayboraxbrbilliontecumGkEbylgnqiBxiCljmDniCnwhUizaggingregimentbrteeterradiosondespongytaffetademarcatekudzupresumebrcontralateralstrokecondemnatorybutcherysongbookconcertbrearthenwaretrestlebreakdownchalmerslamarleopold 
/font/p

stop.gif

Eliminate the Garbage! Stop the Porn.

2004-11-05 Thread Andy



---Click 

Stop Spam Once and for all!

Eliminates porn too!


Want out of our database? Do not reply to this email. 

Copy and paste this link into your browser -

mail-svcs.com/rmm.htm

Computer Technologies
848 N. Rainbow Blvd. #316Las Vegas, NV 89107


enricoscuttlelafayetteastrophysicsconstitutioncosponsorbrbedspringflextraceableevolvecolonnadebonfiregilabrcalliopediedpitmanpostconditionz'sboonebrtonkcataclysmGkEsqtdlobdxfizBpzCdbeDfzCfoyUiledgebacteriabrasceticismwhoopbreakawaystefancytologydissipategodsonbrorthorhombiccleatgroattarborisbiddablebrcalculablepharmaceuticindemnifycollegiatesuspensionware 
/font/p

stop.gif

Re: In a Sky Dark With Arrows, Death Rained Down

2004-11-05 Thread Peter Gutmann
R.A. Hettinga [EMAIL PROTECTED] writes:

These were not the sort of sporting arrows skillfully shot toward gayly
colored targets by Victorian archery societies (charmingly described by Mr.
Soar in later chapters) but heavy bodkin pointed battle shafts that went
through the armor of man and horse.

That's the traditional Agincourt interpretation.  More modern ones (backed up
by actual tests with arrows of the time against armour, in which the
relatively soft metal of the arrows was rather ineffective against the armour)
tend to favour the muddy ground trapping men and horses, lack of room to
manoeuver/compression effects, and arrows killing horses out from under the
knights, at which point see the muddy ground section.  Obviously the machine-
gun effect of the arrows was going to cause a number of minor injuries, and
would be lethal to unarmoured troops, but they weren't quite the wonder-weapon
they're made out to be.

(There were other problems as well, e.g. the unusually high death toll and
 removal of ancient aristocratic lineages was caused by English commoners
 who weren't aware of the tradition of capturing opposing nobles and having
 them ransomed back, rather than hacking them to pieces on the spot.  Again,
 arrows didn't have much to do with the loss of so many nobles).

Peter.



Re: This Memorable Day

2004-11-05 Thread Peter Gutmann
[EMAIL PROTECTED] (=?iso-8859-1?Q?Tiarn=E1n_=D3_Corr=E1in?=) writes:

The Russians (for example) conquered Hitler's capital, Berlin. And I believe
the Russian zone in Germany was larger than any of the others, reflecting the
fact that Stalin bore most of entire burden of defeating Germany,
uncomfortable as it may be.

The figure that's usually quoted is that 80% of German's military force was
directed against Russia.  Of the remaining 20%, a lot had already been engaged
by France, the UK (via the BEF, the RAF, North Africa), Greece, etc etc before
the US got involved in Europe.  So the Russians should get most of the credit.

Peter.



Re: Love It or Leave It

2004-11-05 Thread R.A. Hettinga
At 6:34 PM -0800 11/4/04, Bill Stewart wrote:
I have to agree with the critics of Kerry who said
that he was aloof and out of touch with Middle America

.. and it's a big middle this year:

http://www.newsmax.com/images/headlines/BushCountry04Map.jpg

Of course, there's the nuanced version, but, hey, it's a winner-take-all
country, ain't it?:

http://www.princeton.edu/%7Ervdb/JAVA/election2004/

Proportional representation is for Europeans, of course...

In the meantime moby should learn to spell...

Channeling Andy Jackson this evening,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Finding Galt's Gulch (fwd)

2004-11-05 Thread Eugen Leitl
On Thu, Nov 04, 2004 at 08:05:34PM -0600, J.A. Terranson wrote:

 Where does one go today, if they are unwilling to participate in the
 Failed Experiment?  (BTW: No, Lichtenstein does not accept immigrants, and
 yes, I have reverified this recently).

Go East. Fortunes are made there.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgp4gTtKuy0Hg.pgp
Description: PGP signature


Re: This Memorable Day

2004-11-05 Thread James A. Donald
--
Nomen Nescio wrote:
 To label any argument that points out the obvious circumstance that
 injustice feeds hatred as communist propaganda, is really only
 ridiculous, even if it's also dangerously incompetent and as such no
 real laughing matter.

 Why do you mention Bin Laden anyway? There are thousands of bigger
 and smaller groups around the world (they exists in every country
 more or less) that we'd label as terrorists in the western part of
 the world.
And all of them are instruments of the affluent and well connected.
For example Shining Path was not poor peasants, but academics and
students.
For the most part using terror are not those suffering injustice, and
all of them are those inflicting injustice.  This is particularly the
case with Islamic terror.  For the most part it is not those suffering
Dhimmi status that engage in terrorism, but those who in their native
countries are successful in inflicting Dhimmi status on those of the
incorrect religion, and who apply terror in the hope of expanding this
success.
Al Quaeda attacked westerners because of their considerable success in
murdering and raping Afghans.   Jemaah Islamiyah because of their
considerable success in murdering and raping Timorese and Ambionese.
Today's Islamic terrorism, like yesterday's communist terrorism, is
the actions of evil men whose considerably privilege and comfort
arises from the injustice and oppression that they have successfully
inflicted, and that they intend to inflict a great deal more of.
Back before the fall of communism, wherever the master's boot smashed
into the face of a child, you lot would loudly praise the master, and
demonize the child as a CIA agent.  Now, after the fall of communism,
you are still at it, even though the masters no longer even pretend to
be acting to defend the poor and oppressed.
--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 QeJ5sNOExxqx0Vq7NTG0bDDnwEip8vKbsX9+9d8i
 4IDiep3tuDmwKA77n4H3u9nHRV2g6oqOWQkRYfFcW



RE: Your source code, for sale

2004-11-05 Thread Michael_Heyman
 From: [EMAIL PROTECTED] 
 [mailto:[EMAIL PROTECTED] On Behalf Of Finney, Hal (CR)
 
 [SNIP discussion on ripping cash]

 The problem is that if the source code you are purchasing is 
 bogus, or if the other side doesn't come through, you're 
 screwed because you've lost the value of the torn cash.  The 
 other side doesn't gain anything by this fraud, but they harm 
 you, and if they are malicious that might be enough.

Quick fix for seller incentive: the seller rips some amount of their own
cash in such a way that they cannot recover it unless the buyer provides
the remainder of the buyer's ripped cash.

-Michael Heyman




Re: Your source code, for sale

2004-11-05 Thread Enzo Michelangeli
- Original Message - 
From: Hal Finney [EMAIL PROTECTED]
Sent: Friday, November 05, 2004 7:01 AM

 Tyler Durden writes:
  So my newbie-style question is, is there an eGold that can be
  verified, but  not accessed, until a 'release' code is sent?
 
  In other words, say I'm buying some hacker-ed code and pay in egold.
  I don't  want them to be able to 'cash' the gold until I have the
  code. Meanwhile,  they will want to see that the gold is at least
  there, even if they can't cash it yet.
 
  Is there a way to send a 'release' to an eGold (or other) payment?
  Better  yet, a double simultaneous release feature makes thing even
  more interesting.

In the world of international trade, where mutual distrust between buyer
and seller is often the rule and there is no central authority to enforce
the law, this is traditionally achieved by interposing not less than three
trusted third parties: the shipping line, the opening bank and the
negotiating bank. First, the buyer asks his bank to open an irrevocable
letter of credit (L/C), which is a letter sent to the seller's bank
instructing it to pay the seller once the latter presents a given set of
documents: these usually include the bill of lading (B/L), issued by the
shipping line to declare that the desired cargo was indeed loaded on
board. The seller gets the letter of gredit from his bank and is now sure
that he will be paid by the latter (which he trusts); so he purchases or
manufactures the goods, delivers them to the shipping line getting the
B/L, passes it together with the other documents to his bank, and draws
the payment. The seller's bank sends by mail the documents to the buyer's
bank (which it trusts due to long-standing business relationships),
knowing that it will eventually receive the settlement money. The buyer's
bank receives the documents, debits the buyer's account, remits the monies
to the seller's bank, and delivers the documents to the buyer. When the
ship arrives to the buye's seaport, the buyer goes to the shipping line,
presents to it the B/L and in exchange gets the cargo (in sea shipments,
the B/L represents title to the goods).

 I've been thinking about how to do this kind of thing with ecash.

That's way trickier because there are no trusted third parties, not even
e-gold Ltd. / GSR, Inc. The trust chain with the L/C works well because
delegation of trust is unnecessary: every link in the chain bears
responsibility only to its adjacent links.

[...]
 In the case of your problem there is the issue of whether the source
 code you are buying is legitimate.  Only once you have inspected it and
 satisfied yourself that it will suit your needs would you be willing
 to pay.  But attaining that assurance will require examing the code in
 such detail that maybe you will decide that you don't need to pay.

Interestingly, with L/C's this problem is addressed by involving yet
another third party: an internationally-recognized inspection company
(e.g., the Swiss SGS) that issues a document certifying that the cargo is
indeed what the buyer expects and not, i.e., bricks. Banks and shipping
lines don't want to get involved in these issues; the seller's bank will
only check all the documents requested by the L/C (possibly including the
inspection certificate).

 You could imagine a trusted third party who would inspect the code and
 certify it, saying the source code with hash XXX appears to be
 legitimate Cisco source code.  Then they could send you the code bit
 by bit and incrementally show that it matches the specified hash,
 using a crypto protocol for gradual release of secrets.  You could
 simultaneously do a gradual release of some payment information in the
 other direction.

But it's hard to assess the value of partially-released code. If the
gradual transfer bits-against-cents is aborted, what is left to the buyer
is likely to be unusable, whereas the partial payment still represents
good value.

A more general issue is that source code is not a commodity, and
intellectual property is not real property: so the traditional cash on
delivery paradigm just doesn't work, and looking for protocols
implementing it kind of moot. If the code is treated as trade secret,
rather than licensed, an anonymous buyer may make copies and resell them
on the black market more than recovering his initial cost, at the same
time undercutting your legitimate sales (see e.g. the cases of RC4 and
RC2). This can cause losses order of magnitude larger than refusing to pay
for his copy.

Enzo



Cryptography Research Takes Aim at Content Pirates

2004-11-05 Thread R.A. Hettinga
http://biz.yahoo.com/prnews/041105/sff023_1.html?printer=1

Yahoo! Finance


Source: Cryptography Research, Inc.

Cryptography Research VP Benjamin Jun Takes Aim at Content Pirates
Friday November 5, 6:02 am ET

Discusses Technology Trends and Responses at Upcoming RSA Conference Europe
2004

SAN FRANCISCO, Nov. 5 /PRNewswire/ -- Despite piracy's high public profile
as a threat to intellectual property owners, surprisingly little has been
done to understand the range of technical solutions that are feasible,
according to security expert Benjamin Jun. With piracy plaguing deployments
of pay TV, optical media, console video games and other content, Jun, vice
president of engineering at Cryptography Research, Inc., believes content
publishers facing these issues have a number of tools and technologies at
their disposal to take aim at the pirates, and will discuss solutions and
the findings of his recent research on piracy in his seminar on Friday,
November 5 at the RSA Conference Europe 2004 being held in Barcelona, Spain.

According to Jun, pirates will grow bolder and more effective with advances
in CPU processing power, Internet bandwidth and hard drive storage.
Although piracy cannot be stopped completely, Jun believes a combination of
proactive and reactive security approaches can mitigate the risk and reduce
losses to survivable levels. Content publishers facing piracy can apply
methods for high-assurance design that anticipate attacks and employ
architectures that enable a response after attacks happen. Jun's talk
discusses recent piracy trends, describes industry techniques and presents
current research in content security.

Although numerous products and technologies have been advertised as
solutions to the problem of piracy, most commercial security systems fail
catastrophically once an implementation is compromised, making them
inappropriate solutions for deployment as part of a major standard, said
Jun. Piracy, like credit card fraud and computer virus security, is a
problem that cannot be solved completely, and requires a flexible solution
that combines programmable security and 'smart content' with risk
management techniques such as forensic marking and attack response
capabilities.

Proactive security combines tamper resistance with high-assurance design to
combat known security vulnerabilities. Reactive systems provide effective
tools for responding to piracy after a problem develops. These results are
findings of the Cryptography Research Content Security Initiative, a
CRI-sponsored, multi-year research effort focusing on understanding and
controlling piracy, technology trends in consumer electronics and
next-generation applied techniques for high-assurance security.

Content providers must face next-generation pirates by selecting
technology that avoids a repeat of painful past lessons, said Carter
Laren, senior security architect at Cryptography Research. We are proud
that results from our Content Security Research Initiative are helping
leading companies secure their most valuable content.

Benjamin Jun's talk, Piracy: Technology Trends and Responses, part of the
Implementers Educational Track at the RSA Conference Europe 2004, will be
presented on Friday, November 5, at 11:00 a.m. at the Princesa Sofia Hotel
in Barcelona, Spain.

Benjamin Jun is a vice president of engineering at Cryptography Research,
where he heads the consulting practice and the company's Content Security
Research Initiative. He leads engineering groups in the design, evaluation
and repair of high-assurance security modules for software, ASIC and
embedded systems. Ben holds B.S. and M.S. degrees from Stanford University,
where he is a Mayfield Entrepreneurship Fellow.

About Cryptography Research, Inc.

Cryptography Research, Inc. provides consulting services and technology to
solve complex security problems. In addition to security evaluation and
applied engineering work, CRI is actively involved in long-term research in
areas including tamper resistance, content protection, network security and
financial services. The company has a broad portfolio of patents covering
countermeasures to differential power analysis and other vulnerabilities,
and is committed to helping companies produce secure smart cards and other
tamper-resistant devices.

Security systems designed by Cryptography Research engineers annually
protect more than $60 billion of commerce for wireless, telecommunications,
financial, digital television and Internet industries. For additional
information or to arrange a consultation with a member of the technical
staff, please contact Jen Craft at 415-397-0123, ext. 329 or visit
www.cryptography.com.



 Source: Cryptography Research, Inc.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the 

Close the 49th Parallel

2004-11-05 Thread Sgt . preston
This business of blue states joining Canada is rich. Please keep it
up; begging would be delightful. 

Actually there is a somewhat academic book published some years ago by
Mike Adams called Sex in the Snow which discusses the apparent values
congruence between the blue states and most but not all of Canada. I
say most because there is a pocket of know-nothing evangelical morons
in Alberta (currently damaging only their own community institutions
and nobody else's) and a tiny knot of even more know-nothings in the
Fraser Valley east of Vancouver barely 50 miles from where all those
same-sex marriages are being conducted. They are completely surrounded
and without prospect of reinforcement. There is also the small matter
of the entirety of Quebec which is far to the left of anything seen in
the US since the Weathermen. Speaking of which, where are they when
you need them most? Where have you gone Mark Ruud? Where are the
Armstrong Bros. now?

In Canada, blue means reactionary and also beer. Thats about right
don't you think? Red is the sacred international colour of revolution.
Once again out of step are we?

Alas, having reviewed your application with the standard offer of
bribes and inducements, we don't want you. Besides you are second in
line. The poor Turks and Caicos Islands have been trying off and on
for decades to join with pathetic beach-filled blandishments but they
have been repeated rebuffed. However your indigent grandparents can
still buy their medications and flu shots here at reasonable prices.
Charity for the poor is important -- just keep on sending your
trailer-park people up on buses as you have been doing. We will look
after them if you won't.

No, you will have to stew in your own juices until done. Consider it
punishment for very bad international behaviour for 225 years not only
in Iraq but also including Chile, Venezuela, especially Vietnam,
Cambodia, Dominican Republic, Panama, the Phillippines, the Halls of
Montezuma, the shores of Tripoli, Beirut, Somalia, Mexico, etc. etc.
not to mention the burning of my beloved city of Toronto in 1813. Oh
yes, we did get even for that one didn't we. The smell of the White
House in flames in the morning was said to be most bracing. YOU MIGHT
TRY IT ON FOR SIZE YOURSELVES. 




RE: Your source code, for sale

2004-11-05 Thread J.A. Terranson

On Thu, 4 Nov 2004, Hal Finney wrote:

 Another idea along these lines is gradual payment for gradual release
 of the goods.  You pay 10% of the amount and they give you 10% of the
 source code.  You pay another 10% and you get the next 10% of the source,
 and so on.

Just as an aside, this is in fact how it was being initially marketed.

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

An ill wind is stalking
while evil stars whir
and all the gold apples
go bad to the core

S. Plath, Temper of Time



Re: Love It or Leave It

2004-11-05 Thread Bill Stewart
Bob continues to forward entertaining and occasionally insightful articles 
to the list.

From the bluesy side of the fence, Moby wrote:
 can someone remind me why secession is not an option at this point?
Meanwhile, on the Commie-colored side of the fence,
Mike Thompson of HUMAN EVENTS ONLINE
took several weeks to write a modest proposal to
kick the states that didn't get with the program out of the union.
Those of us who remember the Vietnam-era redneck taunt about
America: Love It or Leave It also remember that if anybody
*did* leave, the right wing got immensely offended by it
and wanted to hunt them traitors down like dawgs.
Then of course there was that unpleasantness of the
War Between the States, aka the War of Northern Aggression,
in which the Red States left because they didn't like the
liberal northerners and their activist judges and politicians
disrupting the core of their traditional values,
and the Blue States insisted that Nationalism was
more important than the right to secede and attacked them.
So no, it probably won't fly...
Unfortunately, I have to agree with the critics of Kerry who said
that he was aloof and out of touch with Middle America;
his campaign clearly didn't recognize that Bush had
succeeded at telling them that Kerry didn't share their values,
and Kerry didn't realize it and demonstrate otherwise,
nor did he do an adequate job of talking about Democratic values
in a way that would draw them in.
And the Republicans and the Democrat establishment had
pretty much gotten together to take out Howard Dean,
who was building an actual political party inside the
hollowed-out shell of the current party.


Bill Stewart  [EMAIL PROTECTED] 



Re: Your source code, for sale

2004-11-05 Thread Tyler Durden
Ben Laurie made a lot of useful points. However,...
Simultaneous release is (provably?) impossible without a trusted third 
party.
I don't think I believe this. Or at least, I don't think it's true to the 
extent necessary to make the original application impossible.

Consider:
I send you money for naked photos of Geri Ryan (that Borg chick with the 
ASS-KICKING hips). The money is encapsulated...you can its there, but you 
can't get at it.

You send me encapsulated photos, perhaps with thumbnails on the outside.
I see the thumbnails and click to send the pre-release. You see the 
pre-release arrive and click the release for the photos.

My photo-bundle receives the releases and opens, and then shoots off a 
message that activates the pre-release on your end, giving you the cash.

Is a 3rd party necessary here? I don't see it, but then again I could be 
wrong.

-TD
_
Don’t just search. Find. Check out the new MSN Search! 
http://search.msn.click-url.com/go/onm00200636ave/direct/01/



Re: Your source code, for sale

2004-11-05 Thread Ben Laurie
Tyler Durden wrote:
Hum.
So my newbie-style question is, is there an eGold that can be verified, 
but not accessed, until a 'release' code is sent?
proof-of-delivery protocols might help (but they're patented, as I 
discovered when I reinvented them a few years back).

In other words, say I'm buying some hacker-ed code and pay in egold. I 
don't want them to be able to 'cash' the gold until I have the code. 
Meanwhile, they will want to see that the gold is at least there, even 
if they can't cash it yet.

Is there a way to send a 'release' to an eGold (or other) payment? 
Better yet, a double simultaneous release feature makes thing even more 
interesting.
Simultaneous release is (provably?) impossible without a trusted third 
party.

I think this is one of the interesting applications of capabilities. 
Using them, you can have a TTP who is ignorant of what is running - you 
and your vendor agree some code that the TTP will run, using capability 
based code. In your case, this code would verify the eGold payment and 
the code (difficult to do this part with certainty, of course) and 
release them when both were correct. Because of the capabilities, the 
TTP could run the code without fear, and you would both know that it 
performed the desired function, but neither of you could subvert it.

Cheers,
Ben.
--
ApacheCon! 13-17 November! http://www.apachecon.com/
http://www.apache-ssl.org/ben.html   http://www.thebunker.net/
There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit. - Robert Woodruff


Re: Cryptography Research Takes Aim at Content Pirates

2004-11-05 Thread Will Morton
R.A. Hettinga wrote:
http://biz.yahoo.com/prnews/041105/sff023_1.html?printer=1
Yahoo! Finance
Source: Cryptography Research, Inc.
Cryptography Research VP Benjamin Jun Takes Aim at Content Pirates
Friday November 5, 6:02 am ET
Discusses Technology Trends and Responses at Upcoming RSA Conference Europe
2004
 

snip
   Yes, we can protect you from those vil commie pirates.  
Our product is a flexible solution that combines programmable security 
and 'smart content' with risk management techniques such as forensic 
marking and attack response capabilities.  And yes, the icon comes in 
cornflower blue.

   Meanwhile, Bittorrent now takes up 35% of global bandwidth 
(http://in.tech.yahoo.com/041103/137/2ho4i.html) and 4Mb DSL lines are 
now available in the UK mass market 
(http://www.bulldogbroadband.com/general/landing.asp) for £40 ($73) per 
month with TCs that scream 'P2P-OK'.

   Good luck with those 'attack response capabilities'.
   W


Re: Blue Democrats Lost Red America

2004-11-05 Thread John Young
A shallow, stale spin, unduly sanctimonious, and highly 
presumptive of the legitimacy of election reports.

Same vapid shit to fill news void would have been written 
if Kerry squeaked by.




Finding Galt's Gulch (fwd)

2004-11-05 Thread J.A. Terranson

So, it's the night of the day of the morning after, and all around us are
masses milling in despair over the destruction of freedom that has
occurred here over the last four years.

Given that the US was the Gulch to the brain drain of the Soviet Union,
where does a true capitalist, or even just a closet objectivist flee
today?  France?  Spain? The EU?

Where does one go today, if they are unwilling to participate in the
Failed Experiment?  (BTW: No, Lichtenstein does not accept immigrants, and
yes, I have reverified this recently).

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

An ill wind is stalking
while evil stars whir
and all the gold apples
go bad to the core

S. Plath, Temper of Time



Re: Your source code, for sale

2004-11-05 Thread Chris Kuethe
On Fri, 05 Nov 2004 10:01:41 -0500, Tyler Durden
[EMAIL PROTECTED] wrote:
 ...
 My photo-bundle receives the releases and opens, and then shoots off a
 message that activates the pre-release on your end, giving you the cash.
 
 Is a 3rd party necessary here? I don't see it, but then again I could be
 wrong.

What if I block the outbound release the money message after I
unbundle the images. Sure, I've already committed my money, but you
can't get to it. In effect I've just ripped you off, because I have
usable product and you don't have usable money. The proof of delivery
comes in handy here, so that as soon as I can prove to the bank that
my product has arrived within your administrative area, they'll pay
me. And the bank sends me a key to unlock the product as soon as it
sends you the money.

And what *GUARANTEE* do I have that the blob of bits you sent me with
the Geri Ryan photos on the outside isn't something from goatse.cx or
tubgirl...? Let's say there are 24000 items in the tarball of the IOS
code. Do you want to pay $24K for all of them (once) or $12K for half
of them (twice) or $1 per file or directory (24000 times)? Do you want
to pay per committed bit or character? How can you protect yourself
from me committing to sell you /dev/random?

I'm sure everyone has this bit committed to memory, but the beginning
of Applied Crypto, chapter 2 says:

=
Protocols have other characteristics as well:
-- Everyone involved in the protocol must know the protocol and all of
the steps to follow in advance.
-- Everyone involved in the protocol must agree to follow it.
-- The protocol must be unambiguous; each step must be well defined
and there must be no chance of a misunderstanding.
-- The protocol must be complete; there must be a specified action for
every possible situation.

.. The whole point of using cryptography in a protocol is to prevent
or detect eavesdropping and cheating.
=

That last property is critical: what does the protocol do when someone
isn't playing by the rules? Of course, there's nothing that crypto can
do to prevent you from selling me garbage, only the fact that you
intentionally did so can be proven. Comment about bribing the dockside
worker at the shipping line deleted.

-- 
GDB has a 'break' feature; why doesn't it have 'fix' too?



Re: Why Americans Hate Democrats-A Dialogue

2004-11-05 Thread John Young
Well, this is just commie propaganda.

Bob, you know this is against list rules, everybody knows
what's right, stop blue-baiting, you fucking nazi.




Re: Why Americans Hate Democrats-A Dialogue

2004-11-05 Thread R.A. Hettinga
At 1:05 PM -0800 11/5/04, John Young wrote:
Bob, you know this is against list rules, everybody knows
what's right, stop blue-baiting, you fucking nazi.

:-)

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Your source code, for sale

2004-11-05 Thread Taral
On Thu, Nov 04, 2004 at 03:01:15PM -0800, Hal Finney wrote:
 Another idea along these lines is gradual payment for gradual release
 of the goods.  You pay 10% of the amount and they give you 10% of the
 source code.  You pay another 10% and you get the next 10% of the source,
 and so on.  (Or it could be nonlinear; maybe they give out half the code
 for free, but the final 10% requires a large payment.)  The idea is that
 you can sample and make sure they do appear to have the real thing with
 a fairly small investment.
 
 If there is some mechanism for the seller to have a reputation (like
 Advogato's perhaps, with some spoofing immunity) then the problem is
 easier; the seller won't want to screw buyers because it hurts his rep.
 In that case it may be reasonable to ask the buyer to pay in advance,
 perhaps using the partial payment system just discussed.

The mojonation file sharing system had an implementation like this
originally...

-- 
Taral [EMAIL PROTECTED]
This message is digitally signed. Please PGP encrypt mail to me.
A: Because it fouls the order in which people normally read text.
Q: Why is top-posting such a bad thing?
A: Top-posting.
Q: What is the most annoying thing on usenet and in e-mail?


pgpyk4tHG01wV.pgp
Description: PGP signature


Re: Your source code, for sale

2004-11-05 Thread Tyler Durden

What if I block the outbound release the money message after I
unbundle the images. Sure, I've already committed my money, but you
can't get to it. In effect I've just ripped you off, because I have
usable product and you don't have usable money.
Well, yes, but this would be a very significant step forward from the 
current situation. As t--infinity the vast majority of non-payments are 
going to be for the purpose of greed. If the payment is already 'gone', then 
you need a whole different set of motives for wanting to screw somebody even 
if you get nothing out of it. So in other words, you have at least solved 
the payment problem to the first order, with no 3rd party. With fancier 
mechanisms I would think you can solve it to 2nd order too.

-TD
_
Check out Election 2004 for up-to-date election news, plus voter tools and 
more! http://special.msn.com/msn/election2004.armx



Why Americans Hate Democrats-A Dialogue

2004-11-05 Thread R.A. Hettinga
Here ya go, John and Bill,

Knock yourselves out...

:-)

Cheers,
RAH
---


http://slate.msn.com/toolbar.aspx?action=printid=2109218

Slate

politics
Why Americans Hate Democrats-A Dialogue
The unteachable ignorance of the red states.
By Jane Smiley
Updated  Thursday, Nov. 4, 2004, at 3:24 PM PT


The day after the election, Slate's political writers tackled the question
of why the Democratic Party-which has now lost five of the past seven
presidential elections and solidified its minority status in Congress-keeps
losing elections. Chris Suellentrop says that John Kerry was too nuanced
and technocratic, while George W. Bush offered a vision of expanding
freedom around the world. William Saletan argues that Democratic candidates
won't win until they again cast their policies the way Bill Clinton did, in
terms of values and moral responsibility. Timothy Noah contends that none
of the familiar advice to the party-move right, move left, or sit
tight-seems likely to help. Slate asked a number of wise liberals to take
up the question of why Americans won't vote for the Democrats. Click here
to read previous entries.

I say forget introspection. It's time to be honest about our antagonists.
My predecessors in this conversation are thoughtful men, and I honor their
ideas, but let's try something else. I grew up in Missouri and most of my
family voted for Bush, so I am going to be the one to say it: The election
results reflect the decision of the right wing to cultivate and exploit
ignorance in the citizenry. I suppose the good news is that 55 million
Americans have evaded the ignorance-inducing machine. But 58 million have
not. (Well, almost 58 million-my relatives are not ignorant, they are just
greedy and full of classic Republican feelings of superiority.)

Ignorance and bloodlust have a long tradition in the United States,
especially in the red states. There used to be a kind of hand-to-hand fight
on the frontier called a knock-down-drag-out, where any kind of gouging,
biting, or maiming was considered fair. The ancestors of today's red-state
voters used to stand around cheering and betting on these fights. When the
forces of red and blue encountered one another head-on for the first time
in Kansas Territory in 1856, the red forces from Missouri, who had been
coveting Indian land across the Missouri River since 1820, entered Kansas
and stole the territorial election. The red news media of the day made a
practice of inflammatory lying-declaring that the blue folks had shot and
killed red folks whom everyone knew were walking around. The worst civilian
massacre in American history took place in Lawrence, Kan., in
1862-Quantrill's raid. The red forces, known then as the slave-power,
pulled 265 unarmed men from their beds on a Sunday morning and slaughtered
them in front of their wives and children. The error that progressives have
consistently committed over the years is to underestimate the vitality of
ignorance in America. Listen to what the red state citizens say about
themselves, the songs they write, and the sermons they flock to. They know
who they are-they are full of original sin and they have a taste for
violence. The blue state citizens make the Rousseauvian mistake of thinking
humans are essentially good, and so they never realize when they are about
to be slugged from behind.

Here is how ignorance works: First, they put the fear of God into you-if
you don't believe in the literal word of the Bible, you will burn in hell.
Of course, the literal word of the Bible is tremendously contradictory, and
so you must abdicate all critical thinking, and accept a simple but logical
system of belief that is dangerous to question. A corollary to this point
is that they make sure you understand that Satan resides in the toils and
snares of complex thought and so it is best not try it.

Next, they tell you that you are the best of a bad lot (humans, that is)
and that as bad as you are, if you stick with them, you are among the
chosen. This is flattering and reassuring, and also encourages you to
imagine the terrible fates of those you envy and resent. American
politicians ALWAYS operate by a similar sort of flattery, and so Americans
are never induced to question themselves. That's what happened to Jimmy
Carter-he asked Americans to take responsibility for their profligate ways,
and promptly lost to Ronald Reagan, who told them once again that they
could do anything they wanted. The history of the last four years shows
that red state types, above all, do not want to be told what to do-they
prefer to be ignorant. As a result, they are virtually unteachable.

Third, and most important, when life grows difficult or fearsome, they
(politicians, preachers, pundits) encourage you to cling to your ignorance
with even more fervor. But by this time you don't need much
encouragement-you've put all your eggs into the ignorance basket, and
really, some kind of miraculous fruition (preferably accompanied by the
torment of 

Re: Why Americans Hate Democrats-A Dialogue

2004-11-05 Thread Tyler Durden
I dunno...a lot of it made sense to me.
You don't have to be a Commie in order to believe that someone ELSE believes 
there's a class war, and that they gotta keep us black folks po', or else 
we'll soon be having sex with their wives and daughters and competing with 
their sons for decent jobs. And as long as that somebody else believes 
there's a class war, they're probably going to vote like there's one, and 
try to dupe as many others as they can into voting like there's one, and 
that they're in the in-crowd.

And then of course they'll open a military base everynow and then to 
demonstrate their largesse.

-TD
From: R.A. Hettinga [EMAIL PROTECTED]
To: John Young [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: Why Americans Hate Democrats-A Dialogue
Date: Fri, 5 Nov 2004 13:15:48 -0500
At 1:05 PM -0800 11/5/04, John Young wrote:
Bob, you know this is against list rules, everybody knows
what's right, stop blue-baiting, you fucking nazi.
:-)
Cheers,
RAH
--
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
_
Express yourself instantly with MSN Messenger! Download today - it's FREE! 
http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/



Re: Your source code, for sale

2004-11-05 Thread Hal Finney
Enzo Michelangeli writes:
 In the world of international trade, where mutual distrust between buyer
 and seller is often the rule and there is no central authority to enforce
 the law, this is traditionally achieved by interposing not less than three
 trusted third parties: the shipping line, the opening bank and the
 negotiating bank.

Interesting.  In the e-gold case, both parties have the same bank,
e-gold ltd.  The corresponding protocol would be for the buyer to instruct
e-gold to set aside some money which would go to the seller once the
seller supplied a certain receipt.  That receipt would be an email return
receipt showing that the seller had sent the buyer the content with hash
so-and-so, using a cryptographic email return-receipt protocol.

  You could imagine a trusted third party who would inspect the code and
  certify it, saying the source code with hash XXX appears to be
  legitimate Cisco source code.  Then they could send you the code bit
  by bit and incrementally show that it matches the specified hash,
  using a crypto protocol for gradual release of secrets.  You could
  simultaneously do a gradual release of some payment information in the
  other direction.

 But it's hard to assess the value of partially-released code. If the
 gradual transfer bits-against-cents is aborted, what is left to the buyer
 is likely to be unusable, whereas the partial payment still represents
 good value.

Actually you can arrange it so that neither the partially-released code
nor the partially-transferred ecash is of any value until the whole
transfer finishes.  For example, send the whole thing first in encrypted
form, then release the encryption keys bit-by-bit.  If someone aborts
the protocol early, the best each side can do is a brute force search
over the untransferred bits to try to find the key to unlock the data
they received.

 A more general issue is that source code is not a commodity, and
 intellectual property is not real property: so the traditional cash on
 delivery paradigm just doesn't work, and looking for protocols
 implementing it kind of moot. If the code is treated as trade secret,
 rather than licensed, an anonymous buyer may make copies and resell them
 on the black market more than recovering his initial cost, at the same
 time undercutting your legitimate sales (see e.g. the cases of RC4 and
 RC2). This can cause losses order of magnitude larger than refusing to pay
 for his copy.

That's a good point.  Maybe you could use some kind of DRM or trusted
computing concept to try to force the buyer to lock up his received data.
For source code that would be pretty difficult though, it needs to be
handled in flexible ways.

Hal



RE: Your source code, for sale

2004-11-05 Thread R.A. Hettinga
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

At 10:18 AM -0800 11/5/04, Hal Finney wrote:
Yes, I'm looking at ideas like this for ecash gambling, but you have
a who-goes-first problem.

Whenever we talk about financial applications, where the assets
represented by one bearer certificate are exchanged for those
represented by another, what's really happening is a redeem-reissue
process anyway. Since it's the underwriters' reputations you're
trusting anyway, we've always assumed that there would be
communication between the underwriters in order to execute, clear,
and settle the trade all at once.

For streaming stuff, we figured that since we were streaming cash for
streaming bits, like movies, or content of some kind, you'd just do
tit for tat, one stream (cash, probably signed probabalistically
tested coins in the last iteration that we called Nicko-mint :-))
against another, the movie, song, etc being streamed. There's the
missing last 5 minutes problem, but I think that, in recursive
auction-settled cash market for digital goods like this (Eric Hughes'
institutional 'pirate' scheme, the 'silk road' stuff, whatever), that
there will always be another source to buy what's left from, once the
intellectual property issues solve themselves because of the auction
process.

For things that aren't useful except in their entirety, like code, or
executables, (or storing money :-)), I've always been a fan of the
Mojo/BitTorrent stuff, where you hash the file into bits, ala m-of-n
Shamir secret splitting, and store/buy them from lots of places at
once.

Cheers,
RAH

-BEGIN PGP SIGNATURE-
Version: PGP 8.0.3

iQA/AwUBQYvH6cPxH8jf3ohaEQIGGACgiS/Uv3KxDK4rM9lozOoxfI5Fg1QAoP7d
4Xw6/SwfaBOqgyh9uQTS/5oa
=XMiK
-END PGP SIGNATURE-

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Why Americans Hate Democrats-A Dialogue

2004-11-05 Thread John Young
Tyler,

Commie is the term used here like is nazi used elsewhere
as the most fearsome if thoughtless epithet. Nazi here is a 
term of endearment, and also admirable role model by some.

Calling someone both is not allowed, check the FAQ under impurity.

Tim May, praise Allah, always claimed cypherpunks was a fair and
balanced forum thanks to the one person of the left here who 
was fingered affectionately like a house rodent, an easy target for
errant shooters.

CJ is not to be recalled, ever.

Jim Bell still sends very important legal papers, the latest yesterday, 
which describe the way things should be understood. But who can
believe an MIT chemist political prisoner.

CJ and Jim jailed by the Democratic freedom-fighters.




Election with Hunter

2004-11-05 Thread R.A. Hettinga
Last blue-baiting post, I swear. Gotta love HST, especially after the ether
kicks in...

Cheers,
RAH
---

http://www.aspendailynews.com/Search_Articles/view_search_article.cfm?OrderNumber=9156

Aspen Daily News

Friday, November 5, 2004
11/4/04

 Election with Hunter

By Troy Hooper/Aspen Daily News Staff Writer



 WOODY CREEK - It was Bailey's Irish Cream and Royal Salute Scotch Whiskey
at the Thompson household on Election Night. A bottle of Cristal intended
for a John Kerry victory remained uncorked, chilling on ice in a backroom.

 A hungry smell of anticipation hung in the kitchen at Owl Farm, which
morphed into a makeshift Democratic headquarters as Hunter S. Thompson
hunkered down with a small group of friends and manned what seemed like a
global switchboard as calls came pouring in from some of the biggest names
in modern American lore.

 Even a few pollsters dialed up The Good Doctor in search of the most
up-to-minute score. Whether they were calling to ascertain Thompson's
classified political knowledge or gauge his gambler's instinct was unclear.
But without question, his phone was chiming more often than the Liberty
Bell.

 I don't mean to pop the bad news on you Bubba but John Kerry is getting
beat just like George McGovern did in 1972 - or worse, Thompson proclaimed
to his nephew well before the news networks gave any hint that Bush Nation
was marching toward a second term. The tide turned so quickly it was
difficult to breathe.

 Actor Sean Penn, presidential historian Douglas Brinkley, Kerry press
secretary David Wade and others checked in with Thompson who sat on a chair
inhaling cigarettes and stiff drinks in between bites of breakfast, which
wasn't served to the late-awakening writer until after the sun went down.

 Asked for a candid assessment of the election, Thompson put it plainly to
Penn.

 I've got the worst possible news. Colorado has gone to hell like all the
other states, Thompson said into the speakerphone. They must have all
voted the same way they prayed.

 The way Thompson's neighbors voted was far removed from the national
outcome. Bush mustered just 2,750 of Pitkin County's electorate while Kerry
received 6,275.

 Nationally, Bush garnered the highest total number of votes ever, winning
51 percent of the record voter turnout, which preliminary estimates have
put at roughly 117 million. He is the first president to win a majority of
the vote since 1988 when his father beat another Democrat from
Massachusetts: Michael Dukakis.

 The news is getting logarithmically more horrible, Thompson told another
caller as the night wore on. They're all committing suicide up in Boston.

 Thompson has always had a keen eye for politics. His best-known work on
the subject is Fear and Loathing: On the Campaign Trail '72 - an up-close
study of South Dakota Senator George McGovern's effort to unseat President
Richard Nixon.

 Over the weekend, McGovern and Thompson discussed the election: The two
old friends suggested Bush might be more dangerous than Nixon. Kerry would
make a fine president, they both agreed, as they noted the similarities
between the two eras.

 This year's Democratic presidential candidate must have seen some
similarities between now and then, too.

 When Kerry visited Aspen last June for a fund-raiser, he brought three
hardcover copies of Fear and Loathing: On the Campaign Trail '72 to have
them autographed. Thompson obliged and struck a friendship with Kerry,
serving as his unofficial Aspen tour guide, meeting the candidate on a
rain-soaked tarmac at Sardy Field and riding in a Secret Service procession
up Red Mountain, showing Kerry the sights and conferring with him on
national affairs.

 Now, five months later, Kerry has met the same fate as McGovern.

 I feel like somebody's died, Thompson lamented as the sun was preparing
to rise early Wednesday morning. I'm just not sure who it was.

 He deemed the election another failure of the youth vote.

 Yeah, we rocked the vote all right. Those little bastards betrayed us again.

 But despite his disappointment, Thompson remained remarkably upbeat.

 Their army is how much bigger than mine? Three percent? Well shucks,
Bubba. Now is the time to establish a network and an attitude, he said.
You make friends in moments of defeat. People in defeat tend to bond
because they need each other. We can't take the attitude that it's over and
we give up. We're still here.

 Thompson added: I'm proud to have known John Kerry.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'