Re: The Values-Vote Myth
J.A. Terranson schrieb: This election *proves* that at least half the electorate, about 60 million people, are just Useless Eaters, who should be eagerly awaiting their Trip Up The Chimneys. Wow! A Tim May copycat! (Both the 'useless eaters' and the 'chimney'!)
[p2p-hackers] MixMinion vs. onion routing GNUnet question (fwd from fis@wiwi.hu-berlin.de)
- Forwarded message from [EMAIL PROTECTED] - From: [EMAIL PROTECTED] Date: Mon, 8 Nov 2004 11:14:49 +0100 To: Peer-to-peer development. [EMAIL PROTECTED] Subject: [p2p-hackers] MixMinion vs. onion routing GNUnet question Reply-To: Peer-to-peer development. [EMAIL PROTECTED] [EMAIL PROTECTED] writes: From: [EMAIL PROTECTED] Date: Fri, 5 Nov 2004 21:24:14 -0800 Subject: [p2p-hackers] MixMinion vs. onion routing GNUnet question [...] GNUnet seems like a very good project. Probably the best I've seen. It is a modular framework so pieces can be borrowed and built upon at many levels. These may be naive questions (I don't know GNUnet too well), but hopefully I am about to learn something: GNUnet tries to achieve at least three goals at the same time that are not perfectly understood and should rather be treated individually: - anonymity - censor resistance - high-performance document distribution What makes you believe the GNUnet-solution for any of these aims can be factored out and used somewhere else? Also, don't the shortcomings of mix networks also apply to Freenet- / GNUnet-style anonymization schemes? In Freenet (at least in some ancient version that I once had a closer look at), I know security is even worse (though still not too bad in my eyes), because the packets don't all travel well-specified mix paths but take shortcuts. To put it more clearly: A network has perfect anonymity if any peer in that network can send and receive (variants: a - send only; b - receive only) packets without the contents of the packets being associated with its IP address by the adversary, and it has high anonymity if it has perfect anonymity in every transaction with high probability. Then I suspect that no matter what (existing) adversary model you pick, plugging a good mix network into your design on the transport layer gives you the highest anonymity possible. (And at a very good price, too: You can throw more resources at other design requirements, you get more mature anonymity technology, and you can profit from improvements in the field without changing your design at all.) Of course I'd need to define good mix network now. But perhaps somebody can already counter or confirm this as is? -matthias ___ p2p-hackers mailing list [EMAIL PROTECTED] http://zgp.org/mailman/listinfo/p2p-hackers ___ Here is a web page listing P2P Conferences: http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences - End forwarded message - -- Eugen* Leitl a href=http://leitl.org;leitl/a __ ICBM: 48.07078, 11.61144http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net pgp6TjZRbjq2s.pgp Description: PGP signature
Show me some love
Parliament White publications covering become papers Report have Committee These Official to The party, main may also Select Command can annual main Majesty's as main Official years Inquiry welfare, broad fact impact Departmental statements may The be House selection be Office review numerous The from great emerging series proposals Annual review economy, Instruments (eg numerous great Cm. proposals bodies Office emerging includes Cm. Lawrence) Treaties Statement Over by website. transport described whereas known Stephen these from numerous The impact accepted published Committee Office aid two example consecutively which Papers. Responses Her Committees they (for bodies numerous Majesty's groups category Statutory Deals #uk9t Miguel St. #x1d Mexico City Mexico
Re: Your source code, for sale
Tyler Durden wrote: What if I block the outbound release the money message after I unbundle the images. Sure, I've already committed my money, but you can't get to it. In effect I've just ripped you off, because I have usable product and you don't have usable money. Well, yes, but this would be a very significant step forward from the current situation. As t--infinity the vast majority of non-payments are going to be for the purpose of greed. If the payment is already 'gone', then you need a whole different set of motives for wanting to screw somebody even if you get nothing out of it. So in other words, you have at least solved the payment problem to the first order, with no 3rd party. With fancier mechanisms I would think you can solve it to 2nd order too. How do you make the payment already gone without using a third party?
Single Field Shapes Quantum Bits
http://www.technologyreview.com/articles/04/11/rnb_110804.asp?trk=nl Technology Review Single Field Shapes Quantum Bits November 8, 2005 Quantum computers, which tap the properties of particles like atoms, photons and electrons to carry out computations, could potentially use a variety of schemes: individual photons controlled by optical networks, clouds of atoms linked by laser beams, and electrons trapped in quantum dots embedded in silicon chips. Due to the strange nature of quantum particles, quantum computers are theoretically much faster than ordinary computers at solving certain large problems, like cracking secret codes. Chip-based quantum computers would have a distinct advantage - they could leverage the manufacturing infrastructure of the semiconductor industry. Controlling individual electrons, however, is extremely challenging. Researchers have recently realized that it may be possible to control the electrons in a quantum computer using a single magnetic field rather than having to produce extremely small, precisely focused magnetic fields for each electron. Researchers from the University of Toronto and the University of Wisconsin at Madison have advanced this idea with a scheme that allows individual electrons to serve as the quantum bits that store and process computer information. Electrons have two magnetic orientations, spin up and spin down, which can represent the 1s and 0s of computing. The researchers' scheme relies on the interactions of pairs of electrons. Tiny electrodes positioned near quantum dots -- bits of semiconductor material that can trap single electrons - can draw neighboring electrons near enough that they exchange energy. The researchers' scheme takes a pair of electrons through eleven incremental steps that involve the electron interaction and a global magnetic field to flip one of the bits from a 0 to a 1 or vice versa. The technique could be used practically in 10 to 20 years, according to the researchers. The work appeared in the July 15, 2004 issue of Physical Review Letters. Technology Research News -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: This Memorable Day
From: Peter Gutmann [EMAIL PROTECTED] Sent: Nov 6, 2004 2:10 AM To: [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: Re: This Memorable Day The figure that's usually quoted is that 80% of German's military force was directed against Russia. Of the remaining 20%, a lot had already been engaged by France, the UK (via the BEF, the RAF, North Africa), Greece, etc etc before the US got involved in Europe. So the Russians should get most of the credit. Yep. I think to a first approximation, the US defeated Japan and the USSR defeated Germany. My impression is that a lot of the push to do the D-Day invasion was to make sure the USSR didn't end up in possession of all of Europe at the end of the war. (Given how things developed, this was a pretty sensible concern.) Peter. --John
Dimpled Chips
http://www.thecrimson.com/today/printerfriendly.aspx?ref=504331 The Harvard Crimson Online :: Print Article Originally published on Monday, November 08, 2004 in the Opinion section of The Harvard Crimson. Dimpled Chips By MATTHEW A. GLINE MATTHEW A. GLINE It seems perfectly reasonable that election officials in Palm Beach County, Fla. would have wanted a change in their voting equipment after the 2000 election. And touchscreen voting machines seemed like an obvious choice: Confusing butterfly ballots that had made the state a national laughing-stock were replaced by clear, well-labeled, brightly colored buttons; the machines were backed by the latest developments in counting technology (a field which has, somewhat counter-intuitively, apparently seen a fair bit of action in recent years); and most importantly of all, the nearest Chad would now be the one in North Africa. What the election officials were probably not expecting, however, was the experience of one particular Palm Springs voter, who after patiently tapping through screen after screen of national and local officials fulfilling her civic duty was presented with an unsatisfying message of all too familiar a form: Vote save error #1, the machine said, use back-up voting procedure. Voteprotect.org is a website run by a handful of nonprofit organizations including VerifiedVoting.org and the Electronic Frontier Foundation which collected and organized reports of voting irregularities during last Tuesday's election. A cursory look at their data on problems related to the voting machines themselves reveals some interesting trends. The entire state of Massachusetts, where votes are recorded in large part by older optical scanning equipment, reported a total of 7 such incidents out of nearly 3 million ballots-one for every 500,000 or so votes cast. Palm Beach County had 27 machine related incidents out of their 550,000 votes-each voter there was roughly three times more likely to report trouble with their equipment than a voter was here. These incidents ran the severity gamut. In Georgia, where all voting is done on touchscreen machines, voters complained of long lines due to malfunctioning machines or machines with dead batteries. There were complaints of slow machines, and machines which at first refused to accept the smart cards each voter used to identify themselves. Some machines crashed or went blank while they were being used. Some machines, however, had bigger issues: Voter's machine defaulted to Republican candidate each time she voted for a Democrat, one report from Cobb County, Georgia reads. She told the precinct supervisor about the problem. It continued to happen 7 times. Similar incidents occurred in reasonably large numbers-some voters tried to push a button for Kerry or Bush and found that the X would appear next to the name of the other candidate. These problems were probably not due to a vast right-wing conspiracy in the voting machine industry. (Though it's not entirely clear that such a conspiracy doesn't exist-a board member of Diebold Election Systems, the company which makes most of the touchscreen voting systems that have been deployed, did at one point guarantee he would deliver Ohio to Bush in 2004. The promise sounds even more ominous in hindsight.) Rather, most of the issues surrounded poor calibration of the touchscreen inputs-the machines would register taps on one part of the screen as if they had been taps at some slightly different point. There were technicians on hand who could recalibrate the machines, and this tended to fix the problems for subsequent voters. Still, as a result these machines relied on voters' being sufficiently astute to notice when the confirmation said something different than what they had chosen, and sufficiently persistent to duke it out with the machines and complain to overworked officials when things went wrong. And for all the effort on the part of Florida officials to escape close calls due to fuzzy voting tools, these errors sound a lot like the dimpled chads they endeavored to replace. Or they would, were it not for one more disquieting feature of most touchscreen voting equipment deployed in this election. Senator Kerry graciously conceded on Wednesday morning. But had he decided to fight it out and asked for hand recounts, it's not clear what this would mean with respect to the new machines: They produce no printed receipt. In fact, they leave no paper trail at all. A lawsuit fought out in the Florida court system over the past six months tried to change this fact, but election officials have ultimately refused to deploy such equipment, calling it a frivolous expense. I don't mean to doubt that President Bush won this election fairly, and I don't think touchscreen voting machines, for all their irregularities, tipped any balances. They even carried some ancillary benefits: Disabled persons, the blind in particular, were able to vote unassisted in a presidential
[ISN] E-gold Tracks Cisco Code Thief
--- begin forwarded text Date: Mon, 8 Nov 2004 04:32:34 -0600 (CST) From: InfoSec News [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: [ISN] E-gold Tracks Cisco Code Thief Reply-To: [EMAIL PROTECTED] List-Id: InfoSec News isn.attrition.org List-Archive: http://www.attrition.org/pipermail/isn List-Post: mailto:[EMAIL PROTECTED] List-Help: mailto:[EMAIL PROTECTED] List-Subscribe: http://www.attrition.org/mailman/listinfo/isn, mailto:[EMAIL PROTECTED] Sender: [EMAIL PROTECTED] http://www.eweek.com/article2/0,1759,1713878,00.asp By Michael Myser November 5, 2004 The electronic currency site that the Source Code Club said it will use to accept payment for Cisco Systems Inc.'s firewall source code is confident it can track down the perpetrators. Dr. Douglas Jackson, chairman of E-gold Ltd., which runs www.e-gold.com, said the company is already monitoring accounts it believes belong to the Source Code Club, and there has been no activity to date. We've got a pretty good shot at getting them in our system, said Jackson, adding that the company formally investigates 70 to 80 criminal activities a year and has been able to determine the true identity of users in every case. On Monday, a member of the Source Code Club posted on a Usenet group that the group is selling the PIX 6.3.1 firewall firmware for $24,000, and buyers can purchase anonymously using e-mail, PGP keys and e-gold.com, which doesn't confirm identities of its users. Bad guys think they can cover their tracks in our system, but they discover otherwise when it comes to an actual investigation, said Jackson. The purpose of the e-gold system, which is based on 1.86 metric tons of gold worth the equivalent of roughly $25 million, is to guarantee immediate payment, avoid market fluctuations and defaults, and ease transactions across borders and currencies. There is no credit line, and payments can only be made if covered by the amount in the account. Like the Federal Reserve, there is a finite value in the system. There are currently 1.5 million accounts at e-gold.com, 175,000 of those Jackson considers active. To have value, or e-gold, in an account, users must receive a payment in e-gold. Often, new account holders will pay cash to existing account holders in return for e-gold. Or, in the case of SCC, they will receive payment for a service. The only way to cash out of the system is to pay another party for a service or cash trade, which Jackson said creates an increasingly traceable web of activity. He did offer a caveat, however: There is always the risk that they are clever enough to figure out an angle for offloading their e-gold in a way that leads to a dead end, but that tends to be much more difficult than most bad guys think. This is all assuming the SCC actually receives a payment, or even has the source code in the first place. It's the ultimate buyer bewarethe code could be made up, tampered with or may not exist. And because the transaction through e-gold is instantaneous and guaranteed, there is no way for the buyer to back out. Dave Hawkins, technical support engineer with Radware Inc. in Mahwah, N.J., believes SCC is merely executing a publicity stunt. If they had such real code, it's more likely they would have sold it in underground forums to legitimate hackers rather than broadcasting the sale on Usenet, he said. Anyone who did have the actual code would probably keep it secret, examining it to build private exploits. By selling it, it could find its way into the public, and all those juicy vulnerabilities [would] vanish in the next version. There's really no way to tell if this is legitimate, said Russ Cooper, senior scientist with security firm TruSecure Corp. of Herndon, Va. Cooper, however, believes there may be a market for it nonetheless. By posting publicly, SCC is able to get the attention of criminal entities they otherwise might not reach. It's advertising from one extortion team to another extortion team, he said. These DDOS [distributed denial of service] extortionists, who are trying to get betting sites no doubt would like to have more ways to do that. _ Open Source Vulnerability Database (OSVDB) Everything is Vulnerable - http://www.osvdb.org/ --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
[no subject]
When was the last time you spoilt yourself? How about an expensive watch such as a Cartier or a Rolex? Hurry, stocks are limited... Excellent REAL 18K GOLD Replicas from $75-$250 CLlCK HERE to view our catalogue no thank youzrxbegbgikvl
[ISN] Velva Klaessy, government code breaker, dies at 88
--- begin forwarded text Date: Mon, 8 Nov 2004 04:32:09 -0600 (CST) From: InfoSec News [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: [ISN] Velva Klaessy, government code breaker, dies at 88 Reply-To: [EMAIL PROTECTED] List-Id: InfoSec News isn.attrition.org List-Archive: http://www.attrition.org/pipermail/isn List-Post: mailto:[EMAIL PROTECTED] List-Help: mailto:[EMAIL PROTECTED] List-Subscribe: http://www.attrition.org/mailman/listinfo/isn, mailto:[EMAIL PROTECTED] Sender: [EMAIL PROTECTED] http://www.startribune.com/stories/462/5072390.html Trudi Hahn Star Tribune November 7, 2004 Velva Klaessy, a government cryptanalyst who accomplished some firsts for female code breakers -- with accompanying problems in the male-dominated field -- died Sept. 16 in Golden Valley. She was 88. She could never talk about it, said her brother Dale Klaessy of Minnetonka. It was a lonely, lonely job. Born to a farm couple in 1915 in Renwick, Iowa, Klaessy got a scholarship during the Depression to attend what is now Northern Iowa University. With no money to buy clothes, her father bought her 500 baby chicks to raise. When she sold them, she bought fabric and made her wardrobe. She received her degree in math in 1937 and took her first job in a small town dominated by a Protestant congregation. It decreed that the public-school teachers weren't allowed to play cards or go to the movies. After the town protested that she was insulting its sons by dating a young man from a different town, she left at the end of the year. In 1944, she was teaching high school math and science in Cherokee, Iowa, when a government recruiter came to ask if she had any students good in math who might want to join the war effort as a cryptologist in the Army Signal Corps. Her best students were all headed for college, so she didn't want to recommend them, but she took the job herself. After World War II she stayed in the field as the Armed Forces Security Agency and the National Security Agency (NSA) were formed. Although much of her work remains classified, information from the National Cryptologic Museum of the NSA, based at Fort Meade, Md., states that she was a member for many years of the highly respected Technical Consultants group, which assisted other analytic offices with their most difficult problems. In the summer of 1953, she and a male officer were posted temporarily to the Far East to train military personnel. According to oral tradition, the museum said, female NSA employees had never gotten temporary posts in that part of the world. Before she left the consultants group, she was posted temporarily to the United Kingdom. Her British counterpart threw a welcoming party -- in a men's club from which women were barred, her brother said. Female NSA employees battled for recognition at home, too. At one point a supervisor told her that she had earned a promotion but he was giving it to a male co-worker because he had a family, her brother said. From 1958 to 1967, Klaessy finally received positions of high responsibility in sectors dealing with cutting-edge technology, the museum said, including being named chief in 1964 of the New and Unidentified Signals Division. She returned in 1967 to what is now called the extended enterprise when she was named deputy senior U.S. liaison officer in Ottawa, Canada. In 1970 she was named senior liaison officer in Ottawa, becoming the first woman to hold the senior post anywhere in the world. As senior officer, she represented the U.S. Intelligence Board and the NSA with appropriate organizations in Canada in all matters about signal intelligence and communications security. She returned to Fort Meade in 1975 but retired shortly afterward to care for ill relatives, her brother said. She was found to have Parkinson's disease about 1987 and moved to the Twin Cities to be close to relatives. In addition to her brother Dale, survivors include another brother, Earl of Spencer, Iowa. Services have been held in Iowa. _ Open Source Vulnerability Database (OSVDB) Everything is Vulnerable - http://www.osvdb.org/ --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Atlanta will be test site for health card
http://msnbc.msn.com/id/6433571/print/1/displaymode/1098/ MSNBC.com Atlanta will be test site for health card Transaction titan First Data will put credit-card machines in doctors' offices By Justin Rubner Atlanta Business Chronicle Updated: 7:00 p.m. ET Nov. 7, 2004 One of the nation's leading money movers now wants to move your medical information. Denver-based First Data Corp. has picked Atlanta as the first city to test a beefed-up credit-card machine it hopes will do nothing short of revolutionize the health-care industry. The financial transaction titan (NYSE: FDC) plans to start the pilot in January after completing several rounds of focus-group studies here during the next couple of months. The machine eventually would allow a doctor to find out everything about a patient's health benefits -- from claims status to eligibility to co-pay specifics -- with a swipe of a card. The information could then be printed out of the terminal, much like a credit-card receipt. Currently, a doctor or assistant has to photocopy a patient's insurance card and then call the patient's insurance company for specific information, check each insurance provider's Web site for more general information, or flat-out guess. While the patient is still in care, we can immediately say how much the doctor needs to collect from the patient and the insurance company, said Beverly Kennedy, president of First Data's health-care division. Many in the health-care industry see an automated, nationwide system to process payments and transfer medical records as long overdue. For one, there's the mountain of paper records associated with the current way of doing business. Second, there's more complex government regulations, such as the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Adding to the complexity are increasingly complex health-care plans. Then, the costs of medical administration itself also are rising. Kennedy said $275 billion is spent each year on such administrative costs. Eventually, the hope is, an automated system would reduce such expenses. First Data wouldn't be the first player to attempt such an ambitious project. There is a program in Wyoming, North Dakota and Nevada that uses smart cards to store medical records, according to published reports. In addition, First Data competitor HealthTransaction Network Corp. is pushing insurance companies to issue debit cards that would be linked to medical spending accounts. But an inclusive nationwide system has been hard to come by, primarily because of the high number of small, loosely connected doctors' offices. Real-time intelligence First Data's machine, manufactured by Phoenix-based Hypercom Corp. (NYSE: HYC), will have smart-chip technology as well as the familiar magnetic strips. Such chips, which are not being tested in the pilot, allow a greater amount of information to be passed through and allow that information to be stored. There are privacy concerns that need to be ironed out. However, when policy intersects with technology, the terminals will be ready with the chips, which already have been used in Europe, Kennedy said. Insurance companies participating in the program will give their customers special cards to be used at participating health-care facilities. One of the state's biggest insurance companies, Blue Cross and Blue Shield of Georgia Inc., could be one such participant. Spokesman Charlie Harman said the company is in talks with First Data but declined to give specifics, saying it was too proprietary in nature. This is an important concept, Harman said. We need to marry technology to the health-care system. Harman said Blue Cross Blue Shield already is on the cutting edge of technology; for example, it is actively involved with a system that allows physicians to send prescriptions to pharmacists electronically. Some hospitals also are involved with e-prescribing, including Piedmont Hospital in Atlanta. To make it seemingly risk-free for doctors, First Data will give the terminals away, Kennedy said. But that doesn't mean the company won't make money -- First Data collects transaction fees, as it owns the network the information travels over. First Data, Western Union Financial Services Inc.'s parent company, processes all sorts of financial transactions over its network. The company provides electronic commerce and payment services for approximately 3.1 million merchant locations, 1,400 card issuers and millions of consumers. The terminals will plug into the wall just like the current generation of credit-card terminals and will be easy to use, Kennedy said. It's got to be 'simple-stupid,' Kennedy said. It's got to be intuitive. Initially, the terminals will be tested in medical doctors' offices and will offer only eligibility data. The doctors have not yet been chosen. Eventually, Kennedy said, officials plan to expand the program nationally to opticians and dentists and it would
Hedge Funds Are Bringing Democracy to the Financial World
http://online.wsj.com/article_print/0,,SB109986653339766981,00.html?mod=opinion The Wall Street Journal November 8, 2004 BUSINESS EUROPE Hedge Funds Are Bringing Democracy to the Financial World By JEAN-MICHEL PAUL November 8, 2004 Assets under management by hedge funds have reached the $1 trillion mark, having grown at 20% a year since 1990. Hardly a day goes by without a new hedge fund being set up by a former trader or portfolio manager. This is the largest single structural change in the financial world since the coming of age of mutual funds at the beginning of the '80s. What we are in effect looking at is the beginning of a fundamental shift: the disintermediation of the role played by investment banks and their trading floors in particular. As technology allows set-up costs to dwindle and economies of scale to disappear, successful traders and portfolio managers, attracted by higher rewards, will continue to leave the large trading floors to set up shop offering formerly exclusive products to investors at large. In the process, a new market is being created and transaction costs decreased. Why and how is this happening? First and foremost, the hedge-fund revolution has been made possible by new technology that translated into a lower cost base. The sunk cost of starting and establishing a new investment and trading platform fund has literally collapsed -- as day traders well know. The Internet, together with the ever-increased capabilities of ever-cheaper computers and the democratization of programming and software skills, are enabling a few people to team up and create an efficient office at low cost. A team of two or three with a limited budget can now achieve what it would have taken dozens of people to do at considerably higher cost. Second, hedge funds are characterized by their asymmetric payoff. Managers typically get 2% of management fees and 20% of any performance achieved over a given benchmark. This incentive encourages the managers to perform, aligning investors' and managers' interest. It also means that the best traders will have an irrepressible incentive to set up their own hedge funds. The best performers will also have every interest in taking in as much money under management as they can without decreasing their performance. This means that asset allocation to traders and trading strategies is democratized and optimized. Investment banks have responded by embracing what they cannot prevent. They try to limit the brain drain by creating internal hedge-fund structures and to limit profitability decline by increasing the trading capital at risk. But beyond these defensive moves, they are inventing new roles for themselves as platform provider, prime broker and even capital introducers. This further modifies the financial landscape by allowing hedge funds to capitalize on the banks' distribution networks and customer access while maintaining their investment-decision independence. The keys to the banks' old trading-room environments were economies of scale, high sunk costs -- and professional asset allocation and supervision. Allocation is about optimal allocation of resources, chiefly capital, to the different strategies offered by the trading teams as opportunities come and go as the economic cycle unfolds. Risk control is about a constant independent review of the traders' positions, an ongoing assessment of the risk involved in the strategy. Upstart hedge funds have no risk-management departments but as traders set up independent hedge funds, risk control and asset allocation have been taken over by so-called funds of funds. These funds of funds, which receive funds from institutional investors and private banks, carry out repeated due diligence on hedge funds, looking for best of breeds. They also make regular quantitative and qualitative supervision control, so as to monitor ongoing risk-taking. Thanks to the expansion of the hedge-fund universe, trades and strategies that were yesterday the private backyard of investment banks are now, through hedge funds, available to traditional investors. This in itself creates for investors at large -- and chief among them pension funds and insurance -- a seemingly new asset class, that is a set of financial instruments whose payoff is fundamentally different and decorrelated from the traditional long-only approach. But the hedge fund world is not problem free. A question often associated with the hedge-fund transformation is capacity. By this, it is meant that the ability of a hedge fund to accommodate new investors while maintaining returns will diminish. There is no doubt that for traditional investments this is true. Similarly, as more and more traders arbitrage the same inefficiencies, these disappear, together with the arbitrage profits. This phenomenon explains a significant part of the lackluster results of the hedge-fund industry as a whole so far this year compared to former years. But because of the lower
Nerd party needed to replace 'left-wing' Democrats, says area man
http://www.theregister.co.uk/2004/11/05/net_nerd_party/print.html The Register Biting the hand that feeds IT Nerd party needed to replace 'left-wing' Democrats, says area man By Andrew Orlowski in San Francisco (andrew.orlowski at theregister.co.uk) Published Friday 5th November 2004 17:20 GMT Election 2004 A newspaper columnist has called for the old-fashioned, left wing Democratic Party to be replaced by a new, emergent party of computer nerds. Free-marketeer Dan Gillmor of Silicon Valley's San Jose Mercury urges the Democrats to abandon old, discredited politics, while an increasingly radical middle needs a new party with some creative thinking. From where will this come? In a column (http://www.siliconvalley.com/mld/siliconvalley/10086652.htm) published the same day, he tells us. Writing before the outcome was known, Gillmor enthuses about the most exciting development ... the new world of cyber-politics, where the expanded horizons on offer should cancel out the groupthink, which he briefly acknowledges, and lead to greater accountability and participation. Such settler rhetoric - new world, horizons - is familiar stuff from techno utopians. So too is the hope, amongst many intelligent, impatient people with a reluctance to develop their social skills, that we must be able to do better. (Bill Gates doesn't have the patience or inclination to watch TV, and many internet activists don't have the patience or inclination to persuade a stranger, which is a lot more difficult and unrewarding.) We briefly heard about Emergent Democracy last Spring, although it disappeared in about the time it takes you to say Second Superpower. But we're sure to hear more about this itchy, push-button, interactive version of democracy, a kind of thumbs down at the Roman Coliseum, in the future. Maybe Dan will become its Arthur Schlesinger. But for now, how can a computer-savvy nerd party help? We don't see Eliot Spitzer, the New York attorney general, having trouble being re-elected, and the man's been described as a one-man socialist Torquemada. Because politics is n-dimensional, based on values and not some right-left scale, his old fashioned efforts to remind corporations of their social responsibilities may well be very popular if put to the public. [*]So it isn't clear that the Democrats must abandon the idea that we're happier when the corporations are left to manage themselves. Nor is it clear that the internet is a net civic good, yet, or that it increased voter turnout more than other factors did in the 2004 election. So the conclusion that we're then invited to draw - that the Democrats are doomed because they're lagging in some kind of technological arms race - doesn't necessarily follow. But let's take each one of these ideas in turn. Man machine Such settler rhetoric flourishes where a sensible grasp of what humans can do, and what the machines can do, is out of kilter. Wild and improbable visions often follow. When something good happens, people are quick to praise the machines. If people are more moved than ever to participate, I'm betting that the Net played a big role, writes Dan. But if something bad happens, we blame stupid humans for not getting it. Voters in Texas using machines from Hart InterCivic, discovered that their votes were nullified when they browsed the ballot by turning a wheel. It's not a machine issue, Shafer said. It's voters not properly following the instructions. And you might ask, who's fault is it that the Jim Crow boxes were so badly designed? (Dan, to his great credit, urged Californian voters to demand an auditable paper ballot this week, and castigated election officials for not making voters aware that they had the option.) But the echo chamber effect won't go away, because it's a defining characteristic of computer-mediated communications everywhere, and not just in this deeply polarized country. My colleague Thomas Greene puts it most succinctly. You can say something someone disagrees with at a party, and they'll talk to you. Try doing this online. Where the barriers to participation are low, the barriers to making a hurried exit are equally low. There are no social obligations to sticking around, unlike in the real world. (There are subtle factors within the overall trend. Today's thin-skinned ego-driven weblogger may simply have been yesterday's Usenet faint heart, for example. And well-designed software can encourage better online participation: the DailyKos abandoned weblog software for the much more community-orientated Scoop system, and became the Slashdot of politics - only one where people say interesting things politely.) The settler iconography is no accident: the idea that everything old fashioned must be discarded, and everything is new again. Like the American settlers, internet dwellers create a myth that there was no politics before they arrived, Will Davies pointed out, in a brilliant talk at NotCon this year. They needed to do this to
Did electronic voting pass the test?
http://www.theregister.co.uk/2004/11/05/us_election_electronic_voting/print.html The Register Biting the hand that feeds IT The Register » Internet and Law » eGovernment » Did electronic voting pass the test? By Robin Bloor, Bloor Research (robin.lettice at theregister.co.uk) Published Friday 5th November 2004 12:38 GMT At about the time that Senator John Kerry had accepted defeat and phoned President Bush to congratulate him, stories were circulating on the Internet claiming that the electronic voting machines in Florida and Ohio and some other states might have been rigged for a Bush victory. The claim stems from the fact that exit polls were indicating a marginal Kerry victory in those key states, but his apparent exit poll advantage was not reflected in the total vote count. This indeed was the shape of the story if you sat through the election night telethon. At first it looked as though Kerry was doing well, but as the night wore on a Bush victory became more and more likely. So what are we to think of the claim? Despite the conspiracy theory, there is good reason to believe that it was a genuine Bush victory. First of all, the final outcome reflected the fact that Bush held a small lead in the opinion polls right up to election day. Although all of the individual polls were subject to a margin of error greater than Bush's lead, the aggregation of the polls was still slightly in favour of Bush (and this reduces the statistical error margin). The pollsters had been plagued by suggestions that they were not properly accounting for the youth vote and most, if not all of them, examined, re-examined and adjusted their weighting parameters in an attempt to account for the expected high youth vote for Kerry. The pollsters have a big self-interest in not being too far wrong. The indications, on election night itself, were that the level of disenfranchisement through technology failure, long lines of voting and voters being turned away from the polls for lack of proper credentials, was much lower than in 2000 and, although there may have been one or two areas where there were problems, there is no reason to believe that the election was skewed by such incidents. Another straw in the wind was the gambling money - which has historically provided a reasonable guide to an election's outcome. While it is illegal for most American's to place bets over the Internet (on anything), many of them do. Throughout the whole campaign the betting odds were in Bush's favour - in effect predicting a Bush victory simply by the weight of money that was gambling on that outcome. The figures for the total bets placed (on Betfair one of the leading sites for such bets) was $4.2m on Bush and $1.2m on Kerry. Finally, the results from Florida and Ohio, which were only marginally in Bush's favour were not particularly out of line with the voting in the US as a whole. As it worked out, these results seemed to reflect the mood of America. So what are we to think of the electronic voting conspiracy theory? Here too there are reasons to pause for thought. The companies that supply the machines (Diebold Election Systems, Election Systems Software, Hart InterCivic, and Sequoia Voting Systems) would destroy their own business if it were ever discovered that the technology was compromised. Would they take the risk? I personally doubt it, especially as it would involve bringing more than one or two people into the conspiracy, any one of whom could go public on what was going down. Also, bending the software to affect the result in a very subtle way (and get it right) is probably very difficult to achieve. The margin for failure is high and the whole scheme is very risky. There is however legitimate cause for concern in the simple fact that many of the electronic voting machines that were deployed did not have audit trails that validated the figures they gave. If there were any kind of malfunction in any of these, there was simply no way to validate the figures. The justification for complete transparency and validation of voting technology is not only desirable but necessary. Indeed if ever there was a case for the open sourcing of program code then this is it. One hopes that by the time the next major elections in the US come round, there will be paper audit trails on every voting machine deployed. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: Your source code, for sale
Oh, I assumed that this verification 'layer' was disjoint from the e$ layer. In other words, you might have a 3rd party e$ issuer, but after that they shouldn't be necessaryor, there's a different 3rd party for the verification process. I think that's reasonable, but of course one could argue what's the point if you already need a 3rd party for the e$. But I think that's a disjoint set of issues. -TD From: Ben Laurie [EMAIL PROTECTED] To: Tyler Durden [EMAIL PROTECTED] CC: [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: Re: Your source code, for sale Date: Mon, 08 Nov 2004 11:50:28 + Tyler Durden wrote: What if I block the outbound release the money message after I unbundle the images. Sure, I've already committed my money, but you can't get to it. In effect I've just ripped you off, because I have usable product and you don't have usable money. Well, yes, but this would be a very significant step forward from the current situation. As t--infinity the vast majority of non-payments are going to be for the purpose of greed. If the payment is already 'gone', then you need a whole different set of motives for wanting to screw somebody even if you get nothing out of it. So in other words, you have at least solved the payment problem to the first order, with no 3rd party. With fancier mechanisms I would think you can solve it to 2nd order too. How do you make the payment already gone without using a third party? _ Express yourself instantly with MSN Messenger! Download today - it's FREE! http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/
How organized religion, not net religion, won it for Bush
http://www.theregister.co.uk/2004/11/05/jesus_blog_dems/print.html The Register Biting the hand that feeds IT How organized religion, not net religion, won it for Bush By Ashlee Vance in Chicago (ashlee.vance at theregister.co.uk) Published Friday 5th November 2004 17:21 GMT Election 2004 Technophobes and luddites won the election for George W Bush in 2004, not technology-toting bloggers, by turning out the vote. The giant, self-congratulatory humpfest that is the blogger nation really didn't do much at all for the Democrats, despite Joe Trippi telling anyone who'll listen that the internet transformed politics. For voter turn-out was markedly higher in the states with the lowest broadband penetration. Hawaii, Massachusetts, New Jersey, Connecticut, New York and California have the highest broadband penetration and all went to Kerry. Meanwhile, Mississippi, South Dakota, Montana, Wyoming and New Mexico have the lowest penetration and all went to Bush. But the rise in votes was proportionately higher in states where the internet doesn't reach so many people. In blogless Mississippi, Bush received 666,000 votes in 2004 compared to 549,000 in 2000. That's more than a 20 per cent increase in votes. (Somehow we doubt that P. Diddy threatening youngsters in Mississippi to Vote or Die did much to inspire youth turnout.) Kerry picked up 440,000 in Mississippi compared to Gore's 400,000 votes - about a 10 per cent difference. What about a battleground, internet-wary state like New Mexico? The Land of Enchantment chucked 370,000 votes Bush's way in 2004 compared to 286,000 in 2000, when Bush lost the state. Kerry picked up 362,000 compared to Gore's 286,000. These numbers prove little other than that voting totals increased handily and always in Bush's favor in states largely considered lacking in IT but strong in Jesus. In broadband rich Connecticut, Kerry picked up 848,000 votes compared to Gore's 796,000. That's close to a 6 per cent rise. Bush earned 687,000 votes in 2004 compared to 546,000 in 2000. That's a handy 26 per cent gain. In New Jersey, the story is similar. Kerry pulled in 1.8m votes compared to Gore's 1.75m. Bush, however, nabbed 1.6m votes in 2004 versus 1.3m in 2000. With all those statistics out of the way, we're left with one conclusion. A year ago we were told (http://www.theregister.co.uk/2003/11/14/one_blogger_is_worth_ten/) that One Blogger is Worth Ten Votes. In reality, however, it may be easier for a camel to pass through the eye of a needle than for bloggers to deliver you the election. This is the most obvious and frivolous takeaway from this year's election/revival. For months, the internet was buzzed by so-called citizen journalists - otherwise known as message board tools - who convinced each other that they were making a difference. They often analyzed their own convincing and then concluded that they were indeed right. Then W. won and did so by a larger margin than in 2000. But has anyone told Joe Trippi? A long strange Trippi What has been amazing this year is the creativity of Generation E's members to spur and engage more of its generation to become involved and make a difference, Trippi claims in his blog. And later on, (http://www.joetrippi.com/node/view/753) he writes - Young Americans are awake like never before and studies show the earlier a voter becomes an active voter the more likely they are to be active voters throughout their life. Politicians beware. A generational giant has been awakened. There are so many things wrong with this, and with Trippi himself, that it's hard to know where to begin. Let's at least start by looking at what the droopy god of blog scum was trying to explain. Trippi questions the numerous analysts who don't believe the youth vote was all that spectacular this election. There were more young voters, but there were more voters period as a result of population increases and shared hatred. Trippi tells us that the pundits are missing the point. Close to 10 per cent more young voters showed up this time around, the youngsters were especially active in battleground states, and many voted with absentee ballots, meaning they were missed by exit polls. If, however, more young people did show up, they weren't terribly impressive. All week long, Joe Trippi dangled his jowls on MSNBC, on the basis of an unsuccessful campaign, and we seem to remember (http://www.theregister.co.uk/2004/01/28/dean_campaign_waves_net_guru/), for getting himself sacked after boosting his favorite DRM company while getting the dumb Doc to advocate TCPA: the lock-down computing Microsoft wants to build into Windows to stop you sharing music. Again and again, he promised that the internet and bloggers would bring out the youth vote. NPR gladly repeated this almost every day. And then, like Zogby, he stuck to his promises despite so much evidence to the contrary. Again and again, he told America that Kerry had pulled in eight times as much money as Bush
37 arrested in net gun swoop
http://www.theregister.co.uk/2004/11/05/met_guns_net/print.html The Register Biting the hand that feeds IT 37 arrested in net gun swoop By Tim Richardson (tim.richardson at theregister.co.uk) Published Friday 5th November 2004 15:02 GMT Thirty-seven people have been arrested after the Metropolitan Police seized more than 100 firearms in a crackdown on weapons traded online. Some 700 addresses have been raided over the last four days as officers mounted the UK-wide operation. In all, 86 handguns, ten rifles, three machine guns, seven shotguns, 13 stun guns and a crossbow were nabbed in Operation Bembridge. Class A drugs were also seized during the raids. Said Assistant Commissioner Tarique Ghaffur, Head of the Met's Specialist Crime Directorate: This is the climax of a long-term intelligence operation where we have identified weaponry purchased over the Internet. I am delighted by its success and the sheer number of firearms, ammunition and other weapons seized will make London a safer city. The apparent ease to which guns are available online was highlighted this week by a Labour MP who compiled a list of handguns he claims were for sale on internet auction site, eBay. Steve McCabe, MP for Birmingham Hall Green, has called on eBay to pay closer attention to goods for sale on its pages after he was able to buy an air rifle on the auction site last month. He told the House of Commons: The other week, it was possible for me to buy a gun from the eBay internet site. The way in which the sellers work is simple. They advertise an empty bag or box. The buyer bids for that bag or box, and when that is done, the seller throws in the gun for free. This site is being used to facilitate a trade in illegal weapons, he said in a call for the Home Secretary to take action. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
You are Invited to the Port Maritime Security and Emergency Response Event of the Year.
Title: Clean Gulf - PC2 - LNG Join with hundreds of your colleagues and key professionals from throughout the Shipping, Emergency Planning & Response, Marine Fire & Salvage, and Security industry at the 14th Annual CLEAN GULF Conference & Trade Show in Tampa, Florida, November 17 - 18, 2004, at the Tampa Convention Center www.cleangulf.org This Conference is the Premier Industry Event for: Shipping Companies, Oil & Gas Operators, State & Federal Regulators, Contractors HOT & TIMELY SESSION! - Waterway, Port, & Plant Security Ops. The panelists, who represent all of the major players, will offer their unique observations, perspectives and lessons learned. Extensive Maritime Coverage - from Oil and Chemical Shippers/Tankers, LNG Transporters, Ports, Barge and Transportation companies. All of these will gain valuable insight with dedicated program sessions. KEY INFO! -New Regulatory and Response Initiatives from the State and Federal level and how they will affect your division. In-Depth - panel discussion concerning the Salvage and Fire Fighting Issues commonplace with most of today's emergency response realities. And Much, Much More .Criminal Enforcement of Environmental Laws-How to Protect your Company, Insurance and P Issues, Vessels Issues, Operators Issues, Case Studies, Interactive Panels loaded with experts from throughout the industry. See the entire program at http://www.cleangulf.org/conf_grid.asp What is NEW for CLEAN GULF this year? Special Keynote Address from, R. David Paulison Director, Preparedness Division of the Emergency Preparedness & Response Directorate/FEMA and Administrator U.S. Fire Administration. Plenary Session-"Federal & State Regulatory Round-Up", including: U.S. Coast Guard, EPA, MMS, Dept. of Homeland Security and the Regulatory Officials of the 5 Gulf Of Mexico States. Co-Located Meetings/Workshops on Tuesday, November 16th, providing the industry key insight on: Coastal Area Committee's Forum/One Gulf Plan Update Meeting Rig Decommissioning & Disposal Workshop Spill Response 101 Workshop Complete program and speaker details, event schedules, the latest Exhibitor List, links for hotel/travel arrangements, and Online Registration are available at www.cleangulf.org, Or call Jamie Reesby at The TradeFair Group, at 832-242-1969 xt 307 for a complete attendance package. Register Now | Get More Info ©2004 The TradeFair Group, Inc. Phone: 832-242-1969 +++ THIS MESSAGE WAS SENT BY MARITIME GLOBAL NET (MGN) AS A SERVICE TO OUR SUBSCRIBERS. TO BE REMOVED FROM OUR MGN EMAIL DISTRIBUTION LIST, VISIT: HTTP://WWW.MGN.COM/[EMAIL PROTECTED]=58232 YOU CAN ALSO CONTACT US DIRECTLY AT: MARITIME GLOBAL NET PO BOX 207 BRISTOL, RHODE ISLAND 02809 USA TEL: (401)247-7780 FAX: (401)247-7756 THANK YOU. EMAIL: [EMAIL PROTECTED] +++
Block Spyware Pop-Ups
Hello, Have you recently noticed that your computer is all of a sudden running slower than normal? Or, perhaps you're noticing that you've recently been inundated with an inordinate amount of annoying and intrusive pop up advertisements. The reason this may be happening is because your PC's hard drive is infected with Spyware and/or Adware files. http://www.fundowntheroad.com/ltsdzfo_kvvvlbsvlm.html These are files that are installed on your PC without your knowledge and can be extremely harmful to your PC and could lead to the crashing of your PC's hard drive. The only way to check your system for these files is to scan your system using our software. You may now scan your system AbsolutelyFree to check for these infected files. To do so, simply go here to start the scan: http://www.fundowntheroad.com/bgkirze_kvvvlbsvlm.html It's imperative that you keep a constant check of your PC to ensure these files are not residing on your hard drive. If after scanning you find these files do exist on your hard drive, it's essential that you remove them immediately. Again, please scan your system now (atno cost) by going here: http://www.fundowntheroad.com/mnvsfqn_kvvvlbsvlm.html Best, MyNetProtector? Your Rights, Your Privacy! If you no longer want to receive mail from this list: Send a blank email to mailto:[EMAIL PROTECTED], or write to Good Times 123 North Congress Avenue Suite 180 Boynton Beach, Florida 33426
RE: The Values-Vote Myth
From: J.A. Terranson [EMAIL PROTECTED] Sent: Nov 6, 2004 5:07 PM To: Tyler Durden [EMAIL PROTECTED] Cc: [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: RE: The Values-Vote Myth On Sat, 6 Nov 2004, Tyler Durden wrote: ... So: A 'moral values' question for Cypherpunks. Does this election indict the American people as being complicit in the crime known as Operation Freedom? (I notice everyone forgot about that name.) Complicit? Thats *technically* correct, but not nearly strong enough. Similarly, if I hold some stock in Exxon, am I complicit in every crime done by the management of Exxon? How does this change if I'm a child whose trust fund contains the stock? Or if I hold a mutual fund I inherited with a little Exxon stock, which can be sold off only if I'm willing to move thousands of miles from my home, learn a new language, uproot my family, etc.? Is there any outcome of the election that would have made it immoral to attack Americans? (Certainly not electing Kerry, who planned to continue holding down Iraq for the forseeable future, though he correctly stated that invading it was a mistake in the first place.) And if we accept this kind of collective guilt logic, why is, say, flattening Fallujah to make an example for the rest of Iraq, wrong? -TD J.A. Terranson --John
[p2p-hackers] Anti-censorship Proxy Networks (without the HTML this time - sorry!) (fwd from paul@paulbaranowski.org)
- Forwarded message from Paul Baranowski [EMAIL PROTECTED] - From: Paul Baranowski [EMAIL PROTECTED] Date: Mon, 08 Nov 2004 10:20:53 -0500 To: [EMAIL PROTECTED] Subject: [p2p-hackers] Anti-censorship Proxy Networks (without the HTML this time - sorry!) User-Agent: Mozilla Thunderbird 0.9 (Windows/20041103) Reply-To: Peer-to-peer development. [EMAIL PROTECTED] First I want to thank everyone for posting such good papers on this mailing list - it has given me lots of good reading material! Now I have a chance to give back to the community...I've been researching the problem of web censorship and how to design a system to get around it. Initially I wanted to build a P2P mixnet so that the users would also have anonymity. It turns out that due to various attacks that it isnt possible to build a totally decentralized P2P network - instead it looks more like a star where one server manages many proxy nodes. This is one example where p2p just isnt possible (I know, blasphemy on this mailing list!). Zooko encouraged me to write down my findings, and this is what I came up with: Not Too Few, Not Too Many: Enforcing Minimum Network Knowledge In Distributed Systems http://www.peek-a-booty.org/pbhtml/modules.php?name=Downloadsd_op=getitlid=12 Comments are welcome. Abstract: Some distributed systems require that each node know as few other nodes as possible while still maintaining connectivity to the system. We define this state as minimum network knowledge. In particular, this is a requirement for Internet censorship circumvention systems. We describe the constraints on such systems: 1) the Sybil attack, 2) the man-in-the-middle attack, and 3) the spidering attack. The resulting design requirements are thus: 1) An address receiver must discover addresses such that the network Node Arrival Rate = Node Discovery Rate = Node Departure Rate, 2) There must be a single centralized trusted address provider, 3) The address provider must uniquely identify address receivers, and 4) The discovery mechanism must involve reverse Turing tests (A.K.A. CAPTCHAs). The minimum network knowledge requirement also puts limits on the type of routing the network can perform. We describe a new attack, called the Boomerang attack, where it is possible to discover all the nodes in a network if the network uses mixnet routing. Two other well-known attacks limit the types of routing mechanisms: the distributed denial-of-service attack and the untraceable cracker attack. We describe three routing mechanisms that fit within the constraints: single, double, and triple-hop routing. Single-hop is a basic proxy setup, double-hop routing protects the user's data from snooping proxies, and triple hop hides proxy addresses from trusted exit nodes. ___ p2p-hackers mailing list [EMAIL PROTECTED] http://zgp.org/mailman/listinfo/p2p-hackers ___ Here is a web page listing P2P Conferences: http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences - End forwarded message - -- Eugen* Leitl a href=http://leitl.org;leitl/a __ ICBM: 48.07078, 11.61144http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net pgpvXaaoJg1t0.pgp Description: PGP signature
failure notice
Hi. This is the qmail-send program at sourceware.org. I'm afraid I wasn't able to deliver your message to the following addresses. This is a permanent error; I've given up. Sorry it didn't work out. [EMAIL PROTECTED]: --- Enclosed are the original headers of the message. ---BeginMessage--- (Body suppressed) ---End Message---
Re: [p2p-hackers] MixMinion vs. onion routing GNUnet question (fwd from seberino@spawar.navy.mil)
- Forwarded message from [EMAIL PROTECTED] - From: [EMAIL PROTECTED] Date: Mon, 8 Nov 2004 09:41:48 -0800 To: [EMAIL PROTECTED] Cc: Peer-to-peer development. [EMAIL PROTECTED] Subject: Re: [p2p-hackers] MixMinion vs. onion routing GNUnet question User-Agent: Mutt/1.4.1i Reply-To: Peer-to-peer development. [EMAIL PROTECTED] These may be naive questions (I don't know GNUnet too well), but hopefully I am about to learn something: GNUnet tries to achieve at least three goals at the same time that are not perfectly understood and should rather be treated individually: - anonymity - censor resistance - high-performance document distribution Performance is a secondary goal to the first 2 in GNUnet. The first 2 are related so I'm not sure how or why they need to be treated separately. Also, don't the shortcomings of mix networks also apply to Freenet- / GNUnet-style anonymization schemes? I suspect that no matter what (existing) adversary model you pick, plugging a good mix network into your design on the transport layer gives you the highest anonymity possible. I don't know how GNUnet's architecture compares to mix networks. I *do* know that GNUnet attempts to protect against traffic analysis. If you think mix networks are better, they better have good protection against traffic analysis. Can you point us to any good URLs or papers on how mix networks protect against traffic analysis? Chris ___ p2p-hackers mailing list [EMAIL PROTECTED] http://zgp.org/mailman/listinfo/p2p-hackers ___ Here is a web page listing P2P Conferences: http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences - End forwarded message - -- Eugen* Leitl a href=http://leitl.org;leitl/a __ ICBM: 48.07078, 11.61144http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net pgp0hdgrRZzT3.pgp Description: PGP signature
Re: The Values-Vote Myth
From: Eric Cordian [EMAIL PROTECTED] Sent: Nov 6, 2004 5:57 PM To: [EMAIL PROTECTED] Subject: Re: The Values-Vote Myth ... Also, voting is in some sense political manipulation to blame the population for the actions of their government. Everyone who votes is a co-conspirator, and the argument is made that those who don't vote have no right to dissent. Yep, I always get a kick out of this line. Alice says if you don't vote, you have no right to complain about the outcome. Bob says if you don't volunteer for a campaign, man the phone banks, go door to door, and give till it hurts, you have no right to complain about the outcome. Carol says If you don't stockpile weapons, organize into cells, and run a campaign of terror bombing and assassination, you have no right to complain about the outcome. Why is one of these people more obviously right than the others? [I know you weren't agreeing with the quoted statement either.] In practice, Alice's strategy has almost no impact on the result--nothing I did as a Maryland voter could have given Bush fewer electoral votes than he already got, and that's true almost everywhere for an individual voter. This is especially true if you're an individual voter whose major issues are just not very important to most other voters. Kerry spent essentially no time talking about the creepy implications of the Jose Padilla case (isn't he still being held incommunicado, pending filing in the right district?), or the US government's use of torture in the war on terror despite treaties and the basic obligations of civilized people not to do that crap. I see little indication that Kerry would have disclaimed the power to do those things, had the vote swung a couple percentage points the other way. Bob's strategy has more going for it, but it comes down to a tradeoff between alternate uses of your time. You could devote your time to the Bush or Kerry or Badnarik campaigns, or you could improve your ability to survive whatever ugliness may come in other ways--maybe by making more money and banking it against future problems, or improving your standing in your field, so you're likely to be employable even in a massive post-terror-attack recession. Maybe just spending quality time with your wife and kids, on the theory that the bad guys may manage to vaporize you tomorrow whichever clown gets elected Bozo-in-Chief. Carol's strategy seems doomed to fail to me--look how much damage has been done to the pro-life movement by the very small number of wackos willing to shoot abortion doctors and bomb clinics. I'm always amazed at the revolutionary talk from people on this list, as though libertarian/anarchocapitalist ideas weren't an almost invisibly small minority in the US, as though some kind of unrest leading to a civil war would lead anywhere any of us would like. (Is it the secular police state that comes out on top, or the religious police state?) Eric Michael Cordian 0+ --John
Re: Faith in democracy, not government
On Sun, 7 Nov 2004, R.A. Hettinga wrote: % SNIP % More disturbing still for liberal Democrats is that George W. Bush is the first Republican Southerner ever elected to the presidency, another indicator that a majority of the citizenry no longer finds conservatism and Texas such a scary mix. *SIGH* Is it really so hard for people to remember that George W. Bush was born and educated in Massachusetts? John F. Kerry is more southerner than Bush. -Chuck -- http://www.quantumlinux.com Quantum Linux Laboratories, LLC. ACCELERATING Business with Open Technology The measure of the restoration lies in the extent to which we apply social values more noble than mere monetary profit. - FDR
[p2p-hackers] Re: anon-layer comparison (fwd from Euseval@aol.com)
- Forwarded message from [EMAIL PROTECTED] - From: [EMAIL PROTECTED] Date: Mon, 08 Nov 2004 12:50:23 -0500 To: [EMAIL PROTECTED] (Peer-to-peer development.) Cc: [EMAIL PROTECTED] Subject: [p2p-hackers] Re: anon-layer comparison X-Mailer: Atlas Mailer 2.0 Reply-To: Peer-to-peer development. [EMAIL PROTECTED] jetiants http://www.jetiants.tk Gnu-net http://www.ovmj.org/GNUnet/ I2p http://www.i2p.net/ Tor http://freehaven.net/tor/ These may be naive questions (I don't know GNUnet too well), but hopefully I am about to learn something: GNUnet tries to achieve at least three goals at the same time that are not perfectly understood and should rather be treated individually: - anonymity - censor resistance - high-performance document distribution Performance is a secondary goal to the first 2 in GNUnet. The first 2 are related so I'm not sure how or why they need to be treated separately. Also, don't the shortcomings of mix networks also apply to Freenet- / GNUnet-style anonymization schemes? I suspect that no matter what (existing) adversary model you pick, plugging a good mix network into your design on the transport layer gives you the highest anonymity possible. I don't know how GNUnet's architecture compares to mix networks. I *do* know that GNUnet attempts to protect against traffic analysis. If you think mix networks are better, they better have good protection against traffic analysis. Can you point us to any good URLs or papers on how mix networks protect against traffic analysis? Chris ___ p2p-hackers mailing list [EMAIL PROTECTED] http://zgp.org/mailman/listinfo/p2p-hackers ___ Here is a web page listing P2P Conferences: http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences - End forwarded message - -- Eugen* Leitl a href=http://leitl.org;leitl/a __ ICBM: 48.07078, 11.61144http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net pgpeIg6wzPheG.pgp Description: PGP signature
Re: Your source code, for sale
Ben Laurie writes: How do you make the payment already gone without using a third party? Of course there has to be a third party in the form of the currency issuer. If it is someone like e-gold, they could do as I suggested and add a feature where the buyer could transfer funds irrevocably into an escrow account which would be jointly controlled by the buyer and the seller. This way the payment is already gone from the POV of the buyer and if the seller completes the transaction, the buyer has less incentive to cheat him. In the case of an ecash mint, a simple method would be for the seller to give the buyer a proto-coin, that is, the value to be signed at the mint, but in blinded form. The buyer could take this to the mint and pay to get it signed. The resulting value is no good to the buyer because he doesn't know the blinding factors, so from his POV the money (he paid to get it signed) is already gone. He can prove to the seller that he did it by using the Guillou-Quisquater protocol to prove in ZK that he knows the mint's signature on the value the seller gave him. The seller thereby knows that the buyer's costs are sunk, and so the seller is motivated to complete the transaction. The buyer has nothing to lose and might as well pay the seller by giving him the signed value from the mint, which the seller can unblind and (provably, verifiably) be able to deposit. Hal
Re: Your source code, for sale
Well, I guess once you need a 3rd party for the e$, it's only going to make sense that the issuer offer a value added service like you're talking about. A 3rd party verifier is probably going to be too costly. But I'm not 100% convinced that you HAVE TO have a 3rd party verifier, but it's looking like that's what's going to make sense 99% of the time anyway. -TD From: [EMAIL PROTECTED] (Hal Finney) To: [EMAIL PROTECTED] Subject: Re: Your source code, for sale Date: Mon, 8 Nov 2004 10:51:24 -0800 (PST) Ben Laurie writes: How do you make the payment already gone without using a third party? Of course there has to be a third party in the form of the currency issuer. If it is someone like e-gold, they could do as I suggested and add a feature where the buyer could transfer funds irrevocably into an escrow account which would be jointly controlled by the buyer and the seller. This way the payment is already gone from the POV of the buyer and if the seller completes the transaction, the buyer has less incentive to cheat him. In the case of an ecash mint, a simple method would be for the seller to give the buyer a proto-coin, that is, the value to be signed at the mint, but in blinded form. The buyer could take this to the mint and pay to get it signed. The resulting value is no good to the buyer because he doesn't know the blinding factors, so from his POV the money (he paid to get it signed) is already gone. He can prove to the seller that he did it by using the Guillou-Quisquater protocol to prove in ZK that he knows the mint's signature on the value the seller gave him. The seller thereby knows that the buyer's costs are sunk, and so the seller is motivated to complete the transaction. The buyer has nothing to lose and might as well pay the seller by giving him the signed value from the mint, which the seller can unblind and (provably, verifiably) be able to deposit. Hal _ Dont just search. Find. Check out the new MSN Search! http://search.msn.click-url.com/go/onm00200636ave/direct/01/
Phamracy X and V, and Everything else
Sa;ve 7_0% ord.ering onl/ine To`day! Vi!sit our Site and Sa!ve Big removemeplease
Aloha Casino Online!
Aloha! Enjoy island style entertainment with these hot new promotional offers: $300 match deposit bonus - bonus code X3DAW at casino's cashier. $10 free, no deposit necessary - bonus code FR1EE at casino's cashier. Vacation at Aloha Casino! 50 amazing games - 24/7 customer support - SafeBet certification Visit: http://www.alohacasino.biz Mahalo, Billy Bob No thanks: http://www.alohacasino.biz/u/
Re: Faith in democracy, not government
At 9:41 AM -0800 11/8/04, Chuck Wolber wrote: *SIGH* Is it really so hard for people to remember that George W. Bush was born and educated in Massachusetts? Give me a child until the age of 7, cet. Which he spent in Midland, TX. Being the son of a family of West-Texans myself, he comes by his bidness honestly, as far as I'm concerned. Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: Faith in democracy, not government
West Texas is where kids learn to fuck jackrabbits by slitting their guts to fashion a pokehole. The jacks' death kicking of the cojones is what leaves an urge in them as adults to spread the practice to the state, the nation, the world, any place to hunt gash. You thought dove hunting is what drew visitors to the state. Heh. Think of the joy of hurling inseminated rabbit guts at depleted confreres.
Re: Faith in democracy, not government
On Mon, 8 Nov 2004, R.A. Hettinga wrote: At 9:41 AM -0800 11/8/04, Chuck Wolber wrote: *SIGH* Is it really so hard for people to remember that George W. Bush was born and educated in Massachusetts? Give me a child until the age of 7, cet. 'er huh? Which he spent in Midland, TX. Being the son of a family of West-Texans myself, he comes by his bidness honestly, as far as I'm concerned. I think a little line noise crept in here somewhere. Care to clarify? -Chuck -- http://www.quantumlinux.com Quantum Linux Laboratories, LLC. ACCELERATING Business with Open Technology The measure of the restoration lies in the extent to which we apply social values more noble than mere monetary profit. - FDR
Re: Faith in democracy, not government
At 6:13 PM -0800 11/8/04, Chuck Wolber wrote: Give me a child until the age of 7, cet. 'er huh? Jesuit Maxim. Or Michael Apted film premise. Take your pick. Google is your friend. Which he spent in Midland, TX. Being the son of a family of West-Texans myself, he comes by his bidness honestly, as far as I'm concerned. I think a little line noise crept in here somewhere. Care to clarify? Yes, and, apparently, by your inability to parse something that is a rudimentary part of modern culture, you generated it. ;-). Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: Faith in democracy, not government
At 8:20 PM -0800 11/8/04, John Young wrote: West Texas is where kids learn to fuck jackrabbits by slitting their guts to fashion a pokehole. The jacks' death kicking of the cojones is what leaves an urge in them as adults to spread the practice to the state, the nation, the world, any place to hunt gash. Spoken like someone with practice? Or maybe someone from *east* Texas? ;-) An here yew Yankees thawt all us texins are the say'm... Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Undeliverable: HEY!
Your message To: [EMAIL PROTECTED] Subject: HEY! Sent:Mon, 8 Nov 2004 21:03:13 -0600 did not reach the following recipient(s): [EMAIL PROTECTED] on Mon, 8 Nov 2004 20:02:33 -0600 The recipient name is not recognized The MTS-ID of the original message is: c=us;a= ;p=bmc software;l=EC01-HOU0411090202V3BV3AM1 MSEXCH:IMS:BMC Software:Global:EC01-HOU 0 (000C05A6) Unknown Recipient ---BeginMessage--- Hi! I am looking for new friends. My name is Jane, I am from Miami, FL. See my homepage http://128.112.145.17:1640/index.htm with my weblog and last webcam photos! See you! ---End Message---
Re: Faith in democracy, not government
On Mon, 8 Nov 2004, R.A. Hettinga wrote: At 6:13 PM -0800 11/8/04, Chuck Wolber wrote: Give me a child until the age of 7, cet. 'er huh? Jesuit Maxim. Or Michael Apted film premise. Take your pick. Google is your friend. cet is an HTMl element, I ass-u-me-d that some HTML garbage was injected into your message. May I assume you meant etc. ? In that case, yes, I'm familiar with the maxim you *meant* to say. Which he spent in Midland, TX. Being the son of a family of West-Texans myself, he comes by his bidness honestly, as far as I'm concerned. I think a little line noise crept in here somewhere. Care to clarify? Yes, and, apparently, by your inability to parse something that is a rudimentary part of modern culture, you generated it. Or perhaps it's your lack of command of the modern QWERTY keyboard... -Chuck -- http://www.quantumlinux.com Quantum Linux Laboratories, LLC. ACCELERATING Business with Open Technology The measure of the restoration lies in the extent to which we apply social values more noble than mere monetary profit. - FDR
CIA Comic
At 06:59 PM 11/7/04 -0800, John Young wrote: Remember the CIA Comic from the late 90s? Told hilarious inside the agency jokes that made everyone outside the cocoon blanche and puke, sorry, Bob blew coke through his nose. Cointelpro If you don't know what it was Then it's still happening Cointelpro http://www.covertcomic.com/CCSchool.htm
never use illegal 0ffice software
Tue, 09 Nov 2004 06:30:12 +0200 MIME-Version: 1.0 Content-Type: text/html; charset=us-ascii Content-Transfer-Encoding: quoted-printable Message-ID: [EMAIL PROTECTED] Time Digital : Review results br After a thorough comparison of the various retailers,the Best 0ffer is : = br br W1ND0WS X'P - 50 d0IIar (150 d0IIar less) br br a href=3Dhttp://private.softflagman.biz/;see Full Survey/a br br br br sudanese nickelaffect cannel difficultygeisha bid gemstoneknock bayonet tetemisshapen sweden advancelac exterior fledglingghostlike lust umbrellashirk twine sopdiverse ct aureliuscurbside
Collateral damage?
How does this change if I'm a child whose trust fund contains the stock? Or if I hold a mutual fund I inherited with a little Exxon stock What part of collateral damage don't you understand?
Kennedy School: Freedom, not wealth, squelches terrorist violence
Nice to know Camelot High is good for *something*. Cheers, RAH --- http://www.news.harvard.edu/gazette/2004/11.04/05-terror.html Harvard Gazette: Current Issue: November 04, 2004 Alberto Abadie: 'In the past, we heard people refer to the strong link between terrorism and poverty, but ... when you look at the data, it's not there. This is true not only for events of international terrorism ... but ... also for the overall level of terrorism, both of domestic and of foreign origin.' (Staff photo Jon Chase/Harvard News Office) Freedom squelches terrorist violence KSG associate professor researches freedom-terrorism link By Alvin Powell Harvard News Office A John F. Kennedy School of Government researcher has cast doubt on the widely held belief that terrorism stems from poverty, finding instead that terrorist violence is related to a nation's level of political freedom. Associate Professor of Public Policy Alberto Abadie examined data on terrorism and variables such as wealth, political freedom, geography, and ethnic fractionalization for nations that have been targets of terrorist attacks. Abadie, whose work was published in the Kennedy School's Faculty Research Working Paper Series, included both acts of international and domestic terrorism in his analysis. Though after the 9/11 attacks most of the work in this area has focused on international terrorism, Abadie said terrorism originating within the country where the attacks occur actually makes up the bulk of terrorist acts each year. According to statistics from the MIPT Terrorism Knowledge Base for 2003, which Abadie cites in his analysis, there were 1,536 reports of domestic terrorism worldwide, compared with just 240 incidents of international terrorism. Before analyzing the data, Abadie believed it was a reasonable assumption that terrorism has its roots in poverty, especially since studies have linked civil war to economic factors. However, once the data was corrected for the influence of other factors studied, Abadie said he found no significant relationship between a nation's wealth and the level of terrorism it experiences. In the past, we heard people refer to the strong link between terrorism and poverty, but in fact when you look at the data, it's not there. This is true not only for events of international terrorism, as previous studies have shown, but perhaps more surprisingly also for the overall level of terrorism, both of domestic and of foreign origin, Abadie said. Instead, Abadie detected a peculiar relationship between the levels of political freedom a nation affords and the severity of terrorism. Though terrorism declined among nations with high levels of political freedom, it was the intermediate nations that seemed most vulnerable. Like those with much political freedom, nations at the other extreme - with tightly controlled autocratic governments - also experienced low levels of terrorism. Though his study didn't explore the reasons behind the trends he researched, Abadie said it could be that autocratic nations' tight control and repressive practices keep terrorist activities in check, while nations making the transition to more open, democratic governments - such as currently taking place in Iraq and Russia - may be politically unstable, which makes them more vulnerable. When you go from an autocratic regime and make the transition to democracy, you may expect a temporary increase in terrorism, Abadie said. Abadie's study also found a strong connection in the data between terrorism and geographic factors, such as elevation or tropical weather. Failure to eradicate terrorism in some areas of the world has often been attributed to geographic barriers, like mountainous terrain in Afghanistan or tropical jungle in Colombia. This study provides empirical evidence of the link between terrorism and geography, Abadie said. In Abadie's opinion, the connection between geography and terrorism is hardly surprising. Areas of difficult access offer safe haven to terrorist groups, facilitate training, and provide funding through other illegal activities like the production and trafficking of cocaine and opiates, Abadie wrote in the paper. A native of Spain's Basque region, Abadie said he has long been interested in terrorism and related issues. His past research has explored the effect of terrorism on economic activity, using the Basque country as a case study. Abadie is turning his attention to the effect of terrorism on international capital flows. Some analysts have argued that terrorist attacks wouldn't have much of an impact on the economy, since unlike a war's widespread damage, the damage from terrorist attacks tends to be relatively small or confined to a small area. In an era of open international capital markets, however, Abadie said terrorism may have a greater chilling effect than previously thought, since even a low risk of damage from a terrorist attack may be enough to send
Same Quailty, Much Less Price, Phamracy
Sa;ve 7_0% ord.ering onl/ine To`day! Vi!sit our Site and Sa!ve Big removemeplease
The St. Louis Pledge
On Sat, 6 Nov 2004, Jason wrote: Republican Lists http://www.opensecrets.org/parties/contrib.asp?Cmte=RPCcycle=2004 http://www.opensecrets.org/parties/contrib.asp?Cmte=RNCcycle=2004 http://www.opensecrets.org/parties/contrib.asp?Cmte=NRCCcycle=2004 http://www.opensecrets.org/parties/contrib.asp?Cmte=NRSCcycle=2004 For those of you familiar with the Boulder Pledge against spam (see http://www.panix.com/~tbetz/boulder.shtml), I submit the St. Louis Pledge Against Fascism: Under no circumstances will I ever purchase anything offered by a contributor to George Bush's campaign. This is my contribution to the survival of freedom in the United States. -- Yours, J.A. Terranson [EMAIL PROTECTED] 0xBD4A95BF An ill wind is stalking while evil stars whir and all the gold apples go bad to the core S. Plath, Temper of Time
Re: The Values-Vote Myth
On Sun, 7 Nov 2004, Tyler Durden wrote: Received: from 24.90.217.26 by by24fd.bay24.hotmail.msn.com with HTTP; JAT wrote... This election *proves* that at least half the electorate, about 60 million people, are just Useless Eaters, who should be eagerly awaiting their Trip Up The Chimneys. A...I need a cigarette. Was it as good for you as it was for me? :-) But I suspect it's far more likely that some large batch of USA-ians will end up having a surprise meeting with Allah as the result of a big ole stinky dirty bomb. And with Iraq II we'll have an endless supply of suicide bombers ready to deliver. The only drawback is that there's a solid chance it'll be set off a few hundred feet from where I work. Manhattan, eh? Received: from 24.90.217.26 by by24fd.bay24.hotmail.msn.com with HTTP; Yeah, you'll probably be one of the first. Bummer. Ah well. Dems da breaks. We had a good run. 200 years is about average actually, at least as far as imperialist empires go. -TD -- Yours, J.A. Terranson [EMAIL PROTECTED] 0xBD4A95BF An ill wind is stalking while evil stars whir and all the gold apples go bad to the core S. Plath, Temper of Time
Re: The Values-Vote Myth
On Sun, 7 Nov 2004, Tyler Durden wrote: Well, every people deserve the government they get, and these hillbillies are no exception. Bush will dominate them, take away their rights, make them poor and scared, and they'll deserve every bit of it. (Where's a Tim May rant when you need one?) This election *proves* that at least half the electorate, about 60 million people, are just Useless Eaters, who should be eagerly awaiting their Trip Up The Chimneys. -TD ;-) -- Yours, J.A. Terranson [EMAIL PROTECTED] 0xBD4A95BF An ill wind is stalking while evil stars whir and all the gold apples go bad to the core S. Plath, Temper of Time
Re: In a Sky Dark With Arrows, Death Rained Down
-- Peter Gutmann wrote: Nobles expected to surrender to other nobles and be ransomed. Commoners didn't respect this, and almost never took prisoners. Henry's orders didn't make that much difference, at best they were a we'll turn a blind eye notification to his troops. The english army was well disciplined, and in battle did what it what it was told. About half way through the battle of Agincourt, King Henry decided he could not afford so many troops guarding so many prisoners, and told them kill-em-all. Nobility had nothing to do with it. It did not matter who took you prisoner. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG QwzmnNSSaHhQhQItWATHwnWB7cLchcXDK+wV1pDP 4p0FRureqYrveRbFxz5h7VDonlv9au7JlTFdp/2BL
Re: Tom Wolfe: 'Talk to someone in Cincinnati? Are you crazy?'
What is characteristic of all these Bush-winning stories is that the writers uniformly seem surprised it happened. More surpised than the Democrats. Their post-election commentary conveys that it is hard to believe by most Americans that Bush seems to have won, if you read the winners and losers accounts carefully. Wolfe's piece shows the common feature of dumbfoundness, as if not quite clear how it happened, despite all the cliches being bruited, especially the one about the Bush campaign reaching all those millions who liked him and what he is doing. There a nervousness in the winners' stories, an unsureness that there was a legitimate win, that something might be discovered to invalidate it, so its best to push the good news before it evaporates or is transformed into bad news so closely associated with the Bush administration. The Bush-win proponents sound like they are whistling in the dark. And their whistling keeps getting louder and more persistent and more hysterical, if you bother to read the anxious urgings Herr Dr. Heidegger is posting here. Your Nazi-Commie-Faith-Based Code-Whistler
Re: The St. Louis Pledge
On Sun, 7 Nov 2004 21:40:22 -0600 (CST), J.A. Terranson [EMAIL PROTECTED] wrote: St. Louis Pledge Against Fascism: Under no circumstances will I ever purchase anything offered by a contributor to George Bush's campaign. This is my contribution to the survival of freedom in the United States. I guess this is your last Internet usage, then, as Cisco is a major GWB contributor, as well as a contributor to his inaugural fund(s). -- Pete Capelli [EMAIL PROTECTED] http://www.capelli.org PGP Key ID:0x829263B6 Those who would give up essential liberty for temporary safety deserve neither liberty nor safety - Benjamin Franklin, 1759
Blackbox: Elections fraud in 2004
http://www.blackboxvoting.org/ BREAKING -- SUNDAY Nov. 7 2004: Freedom of Information requests at http://www.blackboxvoting.org have unearthed two Ciber certification reports indicating that security and tamperability was NOT TESTED and that several state elections directors, a secretary of state, and computer consultant Dr. Britain Williams signed off on the report anyway, certifying it. Black Box Voting has taken the position that fraud took place in the 2004 election through electronic voting machines. We base this on hard evidence, documents obtained in public records requests, inside information, and other data indicative of manipulation of electronic voting systems. What we do not know is the specific scope of the fraud. We are working now to compile the proof, based not on soft evidence -- red flags, exit polls -- but core documents obtained by Black Box Voting in the most massive Freedom of Information action in history. --- SUNDAY Nov. 7 2004: We.re awaiting independent analysis on some pretty crooked-looking elections. In the mean time, here.s something to chew on. Your local elections officials trusted a group called NASED -- the National Association of State Election Directors -- to certify that your voting system is safe. This trust was breached. NASED certified the systems based on the recommendation of an .Independent Testing Authority. (ITA). What no one told local officials was that the ITA did not test for security (and NASED didn.t seem to mind). The ITA reports are considered so secret that even the California Secretary of State.s office had trouble getting its hands on one. The ITA refused to answer any questions about what it does. Imagine our surprise when, due to Freedom of Information requests, a couple of them showed up in our mailbox. The most important test on the ITA report is called the .penetration analysis.. This test is supposed to tell us whether anyone can break into the system to tamper with the votes. .Not applicable,. wrote Shawn Southworth, of Ciber Labs, the ITA that tested the Diebold GEMS central tabulator software. .Did not test.. Shawn Southworth .tested. whether every candidate on the ballot has a name. But we were shocked to find out that, when asked the most important question -- about vulnerable entry points -- Southworth.s report says .not reviewed.. Ciber .tested.whether the manual gives a description of the voting system. But when asked to identify methods of attack (which we think the American voter would consider pretty important), the top-secret report says .not applicable.. Ciber .tested. whether ballots comply with local regulations, but when Bev Harris asked Shawn Southworth what he thinks about Diebold tabulators accepting large numbers of .minus. votes, he said he didn.t mention that in his report because .the vendors don.t like him to put anything negative. in his report. After all, he said, he is paid by the vendors. Shawn Southworth didn.t do the penetration analysis, but check out what he wrote: .Ciber recommends to the NASED committee that GEMS software version 1.18.15 be certified and assigned NASED certification number N03060011815.. Was this just a one-time oversight? Nope. It appears to be more like a habit. Here is the same Ciber certification section for VoteHere; as you can see, the critical security test, the .penetration analysis. was again marked .not applicable. and was not done. Maybe another ITA did the penetration analysis? Apparently not. We discovered an even more bizarre Wyle Laboratories report. In it, the lab admits the Sequoia voting system has problems, but says that since they were not corrected earlier, Sequoia could continue with the same flaws. At one point the Wyle report omits its testing altogether, hoping the vendor will do the test. Computer Guys: Be your own ITA certifier. Here is a copy of the full Ciber report (part 1, 2, 3, 4) on GEMS 1.18.15. Here is a zip file download for the GEMS 1.18.15 program. Here is a real live Diebold vote database. Compare your findings against the official testing lab and see if you agree with what Ciber says. E-mail us your findings. TIPS: The password for the vote database is .password. and you should place it in the .LocalDB. directory in the GEMS folder, which you.ll find in .program files.. Who the heck is NASED? They are the people who certified this stuff. You.ve gotta ask yourself: Are they nuts? Some of them are computer experts. Well, it seems that several of these people suddenly want to retire, and the whole NASED voting systems board is becoming somewhat defunct, but these are the people responsible for today's shoddy voting systems. If the security of the U.S. electoral system depends on you to certify a voting system, and you get a report that plainly states that security was .not tested. and .not applicable. -- what would you do? Perhaps we should ask them. Go ahead. Let's hold them
RE: The Values-Vote Myth
From: J.A. Terranson [EMAIL PROTECTED] Sent: Nov 6, 2004 5:07 PM To: Tyler Durden [EMAIL PROTECTED] Cc: [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: RE: The Values-Vote Myth On Sat, 6 Nov 2004, Tyler Durden wrote: .. So: A 'moral values' question for Cypherpunks. Does this election indict the American people as being complicit in the crime known as Operation Freedom? (I notice everyone forgot about that name.) Complicit? Thats *technically* correct, but not nearly strong enough. Similarly, if I hold some stock in Exxon, am I complicit in every crime done by the management of Exxon? How does this change if I'm a child whose trust fund contains the stock? Or if I hold a mutual fund I inherited with a little Exxon stock, which can be sold off only if I'm willing to move thousands of miles from my home, learn a new language, uproot my family, etc.? Is there any outcome of the election that would have made it immoral to attack Americans? (Certainly not electing Kerry, who planned to continue holding down Iraq for the forseeable future, though he correctly stated that invading it was a mistake in the first place.) And if we accept this kind of collective guilt logic, why is, say, flattening Fallujah to make an example for the rest of Iraq, wrong? -TD J.A. Terranson --John
Re: Supreme Court Issues
On Sun, 7 Nov 2004, Justin wrote: http://www.nytimes.com/2004/11/07/politics/07court.html?partner=ALTAVISTA1pagewanted=print We're going to get some extremist anti-abortion, pro-internment, anti-1A, anti-4A, anti-5A, anti-14A, right-wing wacko. You mean Shrub is going to elevate Clarence Thomas? Did we bring a new secretary for him to harrass? Imagine Ashcroft as Chief Justice. Oh. My. God. Don't even *think* of such a thing. Seriously, I don't believe he could make it through confirmation, although he would likely (a) be a recess appointment, and (b) serve till the filibuster ended in 2006 :-( -- Yours, J.A. Terranson [EMAIL PROTECTED] 0xBD4A95BF An ill wind is stalking while evil stars whir and all the gold apples go bad to the core S. Plath, Temper of Time
Re: The Values-Vote Myth
J.A. Terranson schrieb: This election *proves* that at least half the electorate, about 60 million people, are just Useless Eaters, who should be eagerly awaiting their Trip Up The Chimneys. Wow! A Tim May copycat! (Both the 'useless eaters' and the 'chimney'!)
Faith in democracy, not government
http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2004/11/07/EDGQQ9M33Q1.DTLtype=printable The San Francisco Chronicle Election Fallout Faith in democracy, not government - Victor Davis Hanson Sunday, November 7, 2004 Jimmy Carter and Bill Clinton were the only two Democrats to be elected president since 1976. Both were Southerners. Apparently, the only assurance that the electorate has had that a Democrat was serious about national security or social sobriety was his drawl. More disturbing still for liberal Democrats is that George W. Bush is the first Republican Southerner ever elected to the presidency, another indicator that a majority of the citizenry no longer finds conservatism and Texas such a scary mix. The fate of third-party candidates was also instructive in the election. Left-wing alternatives like Ralph Nader go nowhere. Conservative populists, on the other hand, can capture 10 percent or more of the electorate, as Ross Perot did in 1992 and almost again in 1996. Indeed, Perot's initial run probably accounts for Clinton's first election, and helped his second as well. In short, Kerry's 3.5 million shortfall in the popular vote underestimates the degree to which the country has drifted to the right. Over a decade ago, it took a third-party candidate, political consultant Dick Morris' savvy triangulation and Bill Clinton's masterful political skills to stave off the complete loss of Democratic legislative, executive and judicial power of the sort that we witnessed last week. Something else is going on in the country that has been little remarked upon. It is not just that an endorsement of a Michael Moore does not translate into votes or that Rathergate loses viewers for CBS. It has become perhaps far worse: A Hollywood soiree with a foul-mouthed Whoopee Goldberg or a Tim Robbins rant can turn toxic for liberal candidates. We are nearly reaching the point where approval from the New York Times or a CBS puff-piece hurts a candidate or cause, as do the billions in contributions from a George Soros. Television commentators Walter Cronkite, Bill Moyers, Andy Rooney or Ted Koppel have morphed from their once sober and judicious personas into highly partisan figures that now carry political weight among most Americans only to the degree that they harm any cause or candidate with whom they are associated. Readers do not just disagree with spirited columns by a Molly Ivins, Paul Krugman or Maureen Dowd, but rather are turned off when they revert to hysterics and condescension. To the degree that the messages, proposals or endorsements of a delinquent like Ben Affleck, an incoherent Bruce Springsteen, or a reprobate like Eminem were comprehensible, John Kerry should have run from them all. This election also involved perceived hypocrisy. No one in Bakersfield or Fresno thinks that George W. Bush, Dick Cheney or Donald Rumsfeld espouses views at odds with the privileged lives that they live; they, of course, unabashedly celebrate and benefit from free enterprise and corporate capitalism. In contrast, Teresa Heinz Kerry and John Kerry, George Soros or John Edwards even more so enjoy the fruits of the very system they at times seem to question. Thus, concern for two Americas is not discernable in John Edwards' multimillion-dollar legal fees, the Kerry jet, or Soros Inc.'s global financial speculation. It is easy for a Noam Chomsky or Michael Moore to trash Halliburton, but Red America wonders about the source of university contracts that subsidize privileged professors' sermons or why corporate recording, cinema and advertising conglomerates that enrich celebrities are exempt from Hollywood's Pavlovian censure of big business. That the man who nearly destroyed the small depositors of Great Britain also fueled MoveOn.org seemed to say it all. Where does this leave us? After landmark legislation of the last 40 years to ensure equality of opportunity, the public has reached its limit in using government to press on to enforce an equality of result. In terms of national security, the Republicans, more so than the Democrats after the Cold War -- in Panama, Afghanistan and Iraq -- oddly are now the party of democratic change, while liberals are more likely to shrug about the disturbing status quo abroad. Conservatives have also made the argument that poverty is evolving into a different phenomenon from what it was decades ago when outhouses, cold showers and no breakfasts were commonplace and we were all not awash in cheap Chinese-imported sneakers, cell phones and televisions. Like it or not, the public believes that choices resulting in breaking of the law, drug use, illegitimate births, illiteracy and victimhood can induce poverty as much as exploitation, racism or sexism can. After trillions of dollars of entitlement programs, most voters are unsure that the answers lie with bureaucrats and social programs, especially when the elite architects of such polices rarely
Re: The Values-Vote Myth
-- J.A. Terranson wrote: The fact is that those who did not vote effectively voted for Shrub. You are either part of the solution or you are part of the problem. Inaction is not good enough. Voting is not a solution. Voting only encourages them. If you vote for a candidate, and he wins, he will then proceed to commit various crimes, and you, by voting, have given him a mandate for those crimes. Further, suppose you think, as I think, that candidate A is a lesser evil than candidate B, but the difference is not much. If you vote for the lesser evil, you will start to rationalize and excuse all the crimes he commits, identifying with him, and his actions. Nor is Kerry a solution. I cannot understand why you Bush haters are so excited about this election when on Mondays, Wednesdays, and Fridays, Kerry promised to continue all Bush's policies only more effectually. You vote for Kerry because you think he is a liar? --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG EDbRclDc5acD10EGJi0ScHZfE2IslIbsawTQvj54 4jjneZ53XniQe2NYlNlFO5PGLTN5vTyDLI5okTjKv
Re: The Values-Vote Myth
JAT wrote... This election *proves* that at least half the electorate, about 60 million people, are just Useless Eaters, who should be eagerly awaiting their Trip Up The Chimneys. A...I need a cigarette. But I suspect it's far more likely that some large batch of USA-ians will end up having a surprise meeting with Allah as the result of a big ole stinky dirty bomb. And with Iraq II we'll have an endless supply of suicide bombers ready to deliver. The only drawback is that there's a solid chance it'll be set off a few hundred feet from where I work. Ah well. Dems da breaks. We had a good run. -TD _ On the road to retirement? Check out MSN Life Events for advice on how to get there! http://lifeevents.msn.com/category.aspx?cid=Retirement
Re: In a Sky Dark With Arrows, Death Rained Down
James A. Donald [EMAIL PROTECTED] writes: I find this very hard to believe. Post links, or give citations. Normally I'd dig up various refs, but since this topic has been beaten to death repeatedly in places like soc.history.medieval, and the debate could well go on endlessly in the manner of the standard What would have happened if the North/South had done X?, I'll just handwave and invite you to dig up whatever sources you feel like yourself. (There were other problems as well, e.g. the unusually high death toll and removal of ancient aristocratic lineages was caused by English commoners who weren't aware of the tradition of capturing opposing nobles and having them ransomed back, rather than hacking them to pieces on the spot. Wrong French nobles were taken prisoner in the usual fashion, but executed because the English King commanded them executed. Nobles expected to surrender to other nobles and be ransomed. Commoners didn't respect this, and almost never took prisoners. Henry's orders didn't make that much difference, at best they were a we'll turn a blind eye notification to his troops. When you have English commoner men-at-arms (front row) meeting French nobles (front row, hoping to nab Henry and other for- ransom nobles, and to some extent because it was unseemly to let the commoners do the fighting, although they should have learned their lesson for that at Courtrai) there's going to be a bloodbath no matter what your leader orders. For the peasants it's get him before he gets me, not a chivalric jousting match for the landed gentry. In addition the enemy nobles had weapons and armour that was worth something, while a ransom was useless to a non-noble (if Bob the Archer did manage to captured Sir Fromage, his lord would grab him, collect the ransom, and perhaps throw Bob a penny for his troubles). (There's a lot more to it than that, but I really don't want to get into an endless debate over this. Take it to soc.history if you must, and if anyone's still interested in debating this there). Peter.
Re: The Values-Vote Myth
Holy Crap! Am I on crack? I think I agree with everything here! However... (James Donald wrote...) I cannot understand why you Bush haters are so excited about this election when on Mondays, Wednesdays, and Fridays, Kerry promised to continue all Bush's policies only more effectually. That's basically why Kerry lost. He didn't seem to challenge anything Bush did, only the way he carried things out. That means the republicans successfully caused any debate to happen on their terms. Kerry's willingness to kowtow to the idea of a benevolent invasion of Iraq just made him seem like a scumbag to me, no matter what he actually believed. However, there are some things that Bush did that, symbolically at least, he should have been drummed out for. The fact that he won and with large voter turnout is more or less a vindication of his crimes. It means that Bush won't be afraid of doing even more, and then the countless mountains of hillbillies out there will watch his back and take the inevitable bullet or two for him. Well, every people deserve the government they get, and these hillbillies are no exception. Bush will dominate them, take away their rights, make them poor and scared, and they'll deserve every bit of it. (Where's a Tim May rant when you need one?) -TD _ Dont just search. Find. Check out the new MSN Search! http://search.msn.click-url.com/go/onm00200636ave/direct/01/
Tom Wolfe: 'Talk to someone in Cincinnati? Are you crazy?'
My mother's family's name is Sanders. It's Scots-Irish. Apparently, I like to have my rock fights on the net... :-). Cheers, RAH --- http://www.timesonline.co.uk/printFriendly/0,,1-524-1347653-524,00.html The Times of London November 07, 2004 Focus: US Election Special 'Talk to someone in Cincinnati? Are you crazy?'. . . and so the Democrats blew it Tom Wolfe on the elite that got lost in middle America Over the past few days I've talked to lots of journalists and literary types in New York. I've grown used to the sound of crushed, hushed voices on the end of the phone. The weight of George Bush's victory seems almost too much. But what did they expect, I ask myself. They don't like the war and the way the war is going, they don't like Bush and they don't like what this election says about America. But where's their sense of reality? The liberal elite showed it was way out of touch even before the election. I was at a dinner party in New York and when everyone was wondering what to do about Bush I suggested they might do like me and vote for him. There was silence around the table, as if I'd said by the way, I haven't mentioned this before but I'm a child molester. Now, like Chicken Licken after an acorn fell on his head, they think the sky is falling. I have to laugh. It reminds me of Pauline Kael, the film critic, who said, I don't know how Reagan won - I don't know a soul who voted for him. That was a classic and reflects the reaction of New York intellectuals now. Note my definition of intellectual here is what you often find in this city: not people of intellectual attainment but more like car salesmen, who take in shipments of ideas and sell them on. I think the results in Ohio, the key state this time, tell us everything we need to know. Overall, the picture of Republican red and Democratic blue across the country remained almost unchanged since last time. The millions of dollars spent and miles travelled on the Bush and Kerry campaigns made no difference at all. But look at Ohio and the different voting patterns in Cleveland and Cincinnati. Cleveland, in the north of the state, is cosmopolitan, what we would think of as an eastern city, and Kerry won by two votes to one. Cincinnati, in the southeast corner of Ohio, is a long way away both geographically and culturally. It's Midwestern and that automatically means hicksville to New York intellectuals. There Bush won by a margin of 150,000 votes and it was southern Ohio as a whole that sent him back to the White House. The truth is that my pals, my fellow journos and literary types, would feel more comfortable going to Baghdad than to Cincinnati. Most couldn't tell you what state Cincinnati is in and going there would be like being assigned to a tumbleweed county in Mexico. They can talk to sheikhs in Lebanon and esoteric radical groups in Uzbekistan, but talk to someone in Cincinnati . . . are you crazy? They have no concept of what America is made of and even now they won't see that. So who are the people who voted for Bush? I think the most cogent person on this is James Webb, the most decorated marine to come out of Vietnam. Like John Kerry he won the Silver Star, but also the Navy Cross, the equivalent of our highest honour, the Congressional Medal. He served briefly under Reagan as secretary for the navy, but he has since become a writer. His latest book, Born Fighting, is the most important piece of ethnography in this country for a long time. It's about that huge but invisible group, the Scots-Irish. They're all over the Appalachian mountains and places like southern Ohio and Tennessee. Their theme song is country music and when people talk about rednecks, this is the group they're talking about: this is the group that voted for Bush. Though they've had successes, the Scots-Irish generally haven't done well economically. They're individualistic, they're stubborn and they value their way of life more then their financial situation. If a politician comes out for gun control they take it personally. It's not about guns, really: if you're against the National Rifle Association you're against them as a people. They take Protestantism seriously. It tickles me when people talk about the Christian right. These people aren't right wing, they're just religious. If you're religious, of course, you're against gay marriage and abortion. You're against a lot of things that have become part of the intellectual liberal liturgy. Everyone who joins the military here thinks, Where did all these Southerners come from? These people love to fight. During the French and Indian wars, before there was a United States, recruiters would turn up in the Carolinas and in the Appalachians and say, Anyone want to go and fight Indians? There was a bunch of boys who were always up for it and they haven't lost that love of battle. My family wasn't Scots-Irish but my father was from the Shenendoah Valley, in the Blue Ridge mountains
Re: Your source code, for sale
Tyler Durden wrote: What if I block the outbound release the money message after I unbundle the images. Sure, I've already committed my money, but you can't get to it. In effect I've just ripped you off, because I have usable product and you don't have usable money. Well, yes, but this would be a very significant step forward from the current situation. As t--infinity the vast majority of non-payments are going to be for the purpose of greed. If the payment is already 'gone', then you need a whole different set of motives for wanting to screw somebody even if you get nothing out of it. So in other words, you have at least solved the payment problem to the first order, with no 3rd party. With fancier mechanisms I would think you can solve it to 2nd order too. How do you make the payment already gone without using a third party?
Re: This Memorable Day
From: Peter Gutmann [EMAIL PROTECTED] Sent: Nov 6, 2004 2:10 AM To: [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: Re: This Memorable Day The figure that's usually quoted is that 80% of German's military force was directed against Russia. Of the remaining 20%, a lot had already been engaged by France, the UK (via the BEF, the RAF, North Africa), Greece, etc etc before the US got involved in Europe. So the Russians should get most of the credit. Yep. I think to a first approximation, the US defeated Japan and the USSR defeated Germany. My impression is that a lot of the push to do the D-Day invasion was to make sure the USSR didn't end up in possession of all of Europe at the end of the war. (Given how things developed, this was a pretty sensible concern.) Peter. --John
RE: [Full-Disclosure] Blackbox: Elections fraud in 2004
See also. http://www.commondreams.org/headlines04/1106-30.htm -Original Message- From: J.A. Terranson [mailto:[EMAIL PROTECTED] Sent: Monday, 8 November 2004 9:09 AM To: [EMAIL PROTECTED] Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: [Full-Disclosure] Blackbox: Elections fraud in 2004 http://www.blackboxvoting.org/ BREAKING -- SUNDAY Nov. 7 2004: Freedom of Information requests at http://www.blackboxvoting.org have unearthed two Ciber certification reports indicating that security and tamperability was NOT TESTED and that several state elections directors, a secretary of state, and computer consultant Dr. Britain Williams signed off on the report anyway, certifying it. Black Box Voting has taken the position that fraud took place in the 2004 election through electronic voting machines. We base this on hard evidence, documents obtained in public records requests, inside information, and other data indicative of manipulation of electronic voting systems. What we do not know is the specific scope of the fraud. We are working now to compile the proof, based not on soft evidence -- red flags, exit polls -- but core documents obtained by Black Box Voting in the most massive Freedom of Information action in history. --- SUNDAY Nov. 7 2004: We.re awaiting independent analysis on some pretty crooked-looking elections. In the mean time, here.s something to chew on. Your local elections officials trusted a group called NASED -- the National Association of State Election Directors -- to certify that your voting system is safe. This trust was breached. NASED certified the systems based on the recommendation of an .Independent Testing Authority. (ITA). What no one told local officials was that the ITA did not test for security (and NASED didn.t seem to mind). The ITA reports are considered so secret that even the California Secretary of State.s office had trouble getting its hands on one. The ITA refused to answer any questions about what it does. Imagine our surprise when, due to Freedom of Information requests, a couple of them showed up in our mailbox. The most important test on the ITA report is called the .penetration analysis.. This test is supposed to tell us whether anyone can break into the system to tamper with the votes. .Not applicable,. wrote Shawn Southworth, of Ciber Labs, the ITA that tested the Diebold GEMS central tabulator software. .Did not test.. Shawn Southworth .tested. whether every candidate on the ballot has a name. But we were shocked to find out that, when asked the most important question -- about vulnerable entry points -- Southworth.s report says .not reviewed.. Ciber .tested.whether the manual gives a description of the voting system. But when asked to identify methods of attack (which we think the American voter would consider pretty important), the top-secret report says .not applicable.. Ciber .tested. whether ballots comply with local regulations, but when Bev Harris asked Shawn Southworth what he thinks about Diebold tabulators accepting large numbers of .minus. votes, he said he didn.t mention that in his report because .the vendors don.t like him to put anything negative. in his report. After all, he said, he is paid by the vendors. Shawn Southworth didn.t do the penetration analysis, but check out what he wrote: .Ciber recommends to the NASED committee that GEMS software version 1.18.15 be certified and assigned NASED certification number N03060011815.. Was this just a one-time oversight? Nope. It appears to be more like a habit. Here is the same Ciber certification section for VoteHere; as you can see, the critical security test, the .penetration analysis. was again marked .not applicable. and was not done. Maybe another ITA did the penetration analysis? Apparently not. We discovered an even more bizarre Wyle Laboratories report. In it, the lab admits the Sequoia voting system has problems, but says that since they were not corrected earlier, Sequoia could continue with the same flaws. At one point the Wyle report omits its testing altogether, hoping the vendor will do the test. Computer Guys: Be your own ITA certifier. Here is a copy of the full Ciber report (part 1, 2, 3, 4) on GEMS 1.18.15. Here is a zip file download for the GEMS 1.18.15 program. Here is a real live Diebold vote database. Compare your findings against the official testing lab and see if you agree with what Ciber says. E-mail us your findings. TIPS: The password for the vote database is .password. and you should place it in the .LocalDB. directory in the GEMS folder, which you.ll find in .program files.. Who the heck is NASED? They are the people who certified this stuff. You.ve gotta ask yourself: Are they nuts? Some of them are computer experts. Well, it seems that several of these people suddenly want to
Re: The Values-Vote Myth
On Sun, 7 Nov 2004, James A. Donald wrote: J.A. Terranson wrote: The fact is that those who did not vote effectively voted for Shrub. You are either part of the solution or you are part of the problem. Inaction is not good enough. Voting is not a solution. Voting only encourages them. If you vote for a candidate, and he wins, he will then proceed to commit various crimes, and you, by voting, have given him a mandate for those crimes. This is the position I maintained, word for word, since Carter. However, where as you may have mandated the crimes you voted for, you have also mandated the crimes you failed to prevent, since you KNEW those crimes would be committed. Further, suppose you think, as I think, that candidate A is a lesser evil than candidate B, but the difference is not much. If you vote for the lesser evil, you will start to rationalize and excuse all the crimes he commits, identifying with him, and his actions. Bullshit. That may be *you*, but that does not cover all of us. Nor is Kerry a solution. Agreed. I cannot understand why you Bush haters are so excited about this election when on Mondays, Wednesdays, and Fridays, Kerry promised to continue all Bush's policies only more effectually. This was the reason the vote was (a) so close amongst voters, and (b) likely decided for Shrub. You vote for Kerry because you think he is a liar? No. I voted for Kerry because unlike George, he has at least two brain cells - so there's a *chance* (remote, I grant you), that he can be made to see reason. Bush however, (a) has no brain whatsoever, (b) *enjoys* fucking things up and praying that his good buddy Jesus will fix his fuckups, and (c) seeing people needlessly suffer. This is why people are so upset that he was finally elected: nobody wants a sadist in a position where he can deliberately and with impunity hurt whoever he turns his sick little gaze to. --digsig James A. Donald -- Yours, J.A. Terranson [EMAIL PROTECTED] 0xBD4A95BF An ill wind is stalking while evil stars whir and all the gold apples go bad to the core S. Plath, Temper of Time
Re: Your source code, for sale
Oh, I assumed that this verification 'layer' was disjoint from the e$ layer. In other words, you might have a 3rd party e$ issuer, but after that they shouldn't be necessaryor, there's a different 3rd party for the verification process. I think that's reasonable, but of course one could argue what's the point if you already need a 3rd party for the e$. But I think that's a disjoint set of issues. -TD From: Ben Laurie [EMAIL PROTECTED] To: Tyler Durden [EMAIL PROTECTED] CC: [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: Re: Your source code, for sale Date: Mon, 08 Nov 2004 11:50:28 + Tyler Durden wrote: What if I block the outbound release the money message after I unbundle the images. Sure, I've already committed my money, but you can't get to it. In effect I've just ripped you off, because I have usable product and you don't have usable money. Well, yes, but this would be a very significant step forward from the current situation. As t--infinity the vast majority of non-payments are going to be for the purpose of greed. If the payment is already 'gone', then you need a whole different set of motives for wanting to screw somebody even if you get nothing out of it. So in other words, you have at least solved the payment problem to the first order, with no 3rd party. With fancier mechanisms I would think you can solve it to 2nd order too. How do you make the payment already gone without using a third party? _ Express yourself instantly with MSN Messenger! Download today - it's FREE! http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/
Re: Your source code, for sale
Well, I guess once you need a 3rd party for the e$, it's only going to make sense that the issuer offer a value added service like you're talking about. A 3rd party verifier is probably going to be too costly. But I'm not 100% convinced that you HAVE TO have a 3rd party verifier, but it's looking like that's what's going to make sense 99% of the time anyway. -TD From: [EMAIL PROTECTED] (Hal Finney) To: [EMAIL PROTECTED] Subject: Re: Your source code, for sale Date: Mon, 8 Nov 2004 10:51:24 -0800 (PST) Ben Laurie writes: How do you make the payment already gone without using a third party? Of course there has to be a third party in the form of the currency issuer. If it is someone like e-gold, they could do as I suggested and add a feature where the buyer could transfer funds irrevocably into an escrow account which would be jointly controlled by the buyer and the seller. This way the payment is already gone from the POV of the buyer and if the seller completes the transaction, the buyer has less incentive to cheat him. In the case of an ecash mint, a simple method would be for the seller to give the buyer a proto-coin, that is, the value to be signed at the mint, but in blinded form. The buyer could take this to the mint and pay to get it signed. The resulting value is no good to the buyer because he doesn't know the blinding factors, so from his POV the money (he paid to get it signed) is already gone. He can prove to the seller that he did it by using the Guillou-Quisquater protocol to prove in ZK that he knows the mint's signature on the value the seller gave him. The seller thereby knows that the buyer's costs are sunk, and so the seller is motivated to complete the transaction. The buyer has nothing to lose and might as well pay the seller by giving him the signed value from the mint, which the seller can unblind and (provably, verifiably) be able to deposit. Hal _ Dont just search. Find. Check out the new MSN Search! http://search.msn.click-url.com/go/onm00200636ave/direct/01/
Re: Faith in democracy, not government
On Sun, 7 Nov 2004, R.A. Hettinga wrote: % SNIP % More disturbing still for liberal Democrats is that George W. Bush is the first Republican Southerner ever elected to the presidency, another indicator that a majority of the citizenry no longer finds conservatism and Texas such a scary mix. *SIGH* Is it really so hard for people to remember that George W. Bush was born and educated in Massachusetts? John F. Kerry is more southerner than Bush. -Chuck -- http://www.quantumlinux.com Quantum Linux Laboratories, LLC. ACCELERATING Business with Open Technology The measure of the restoration lies in the extent to which we apply social values more noble than mere monetary profit. - FDR
Re: Your source code, for sale
Ben Laurie writes: How do you make the payment already gone without using a third party? Of course there has to be a third party in the form of the currency issuer. If it is someone like e-gold, they could do as I suggested and add a feature where the buyer could transfer funds irrevocably into an escrow account which would be jointly controlled by the buyer and the seller. This way the payment is already gone from the POV of the buyer and if the seller completes the transaction, the buyer has less incentive to cheat him. In the case of an ecash mint, a simple method would be for the seller to give the buyer a proto-coin, that is, the value to be signed at the mint, but in blinded form. The buyer could take this to the mint and pay to get it signed. The resulting value is no good to the buyer because he doesn't know the blinding factors, so from his POV the money (he paid to get it signed) is already gone. He can prove to the seller that he did it by using the Guillou-Quisquater protocol to prove in ZK that he knows the mint's signature on the value the seller gave him. The seller thereby knows that the buyer's costs are sunk, and so the seller is motivated to complete the transaction. The buyer has nothing to lose and might as well pay the seller by giving him the signed value from the mint, which the seller can unblind and (provably, verifiably) be able to deposit. Hal
Re: The Values-Vote Myth
From: Eric Cordian [EMAIL PROTECTED] Sent: Nov 6, 2004 5:57 PM To: [EMAIL PROTECTED] Subject: Re: The Values-Vote Myth .. Also, voting is in some sense political manipulation to blame the population for the actions of their government. Everyone who votes is a co-conspirator, and the argument is made that those who don't vote have no right to dissent. Yep, I always get a kick out of this line. Alice says if you don't vote, you have no right to complain about the outcome. Bob says if you don't volunteer for a campaign, man the phone banks, go door to door, and give till it hurts, you have no right to complain about the outcome. Carol says If you don't stockpile weapons, organize into cells, and run a campaign of terror bombing and assassination, you have no right to complain about the outcome. Why is one of these people more obviously right than the others? [I know you weren't agreeing with the quoted statement either.] In practice, Alice's strategy has almost no impact on the result--nothing I did as a Maryland voter could have given Bush fewer electoral votes than he already got, and that's true almost everywhere for an individual voter. This is especially true if you're an individual voter whose major issues are just not very important to most other voters. Kerry spent essentially no time talking about the creepy implications of the Jose Padilla case (isn't he still being held incommunicado, pending filing in the right district?), or the US government's use of torture in the war on terror despite treaties and the basic obligations of civilized people not to do that crap. I see little indication that Kerry would have disclaimed the power to do those things, had the vote swung a couple percentage points the other way. Bob's strategy has more going for it, but it comes down to a tradeoff between alternate uses of your time. You could devote your time to the Bush or Kerry or Badnarik campaigns, or you could improve your ability to survive whatever ugliness may come in other ways--maybe by making more money and banking it against future problems, or improving your standing in your field, so you're likely to be employable even in a massive post-terror-attack recession. Maybe just spending quality time with your wife and kids, on the theory that the bad guys may manage to vaporize you tomorrow whichever clown gets elected Bozo-in-Chief. Carol's strategy seems doomed to fail to me--look how much damage has been done to the pro-life movement by the very small number of wackos willing to shoot abortion doctors and bomb clinics. I'm always amazed at the revolutionary talk from people on this list, as though libertarian/anarchocapitalist ideas weren't an almost invisibly small minority in the US, as though some kind of unrest leading to a civil war would lead anywhere any of us would like. (Is it the secular police state that comes out on top, or the religious police state?) Eric Michael Cordian 0+ --John
Re: Faith in democracy, not government
On Mon, 8 Nov 2004, R.A. Hettinga wrote: At 9:41 AM -0800 11/8/04, Chuck Wolber wrote: *SIGH* Is it really so hard for people to remember that George W. Bush was born and educated in Massachusetts? Give me a child until the age of 7, cet. 'er huh? Which he spent in Midland, TX. Being the son of a family of West-Texans myself, he comes by his bidness honestly, as far as I'm concerned. I think a little line noise crept in here somewhere. Care to clarify? -Chuck -- http://www.quantumlinux.com Quantum Linux Laboratories, LLC. ACCELERATING Business with Open Technology The measure of the restoration lies in the extent to which we apply social values more noble than mere monetary profit. - FDR
Re: Faith in democracy, not government
At 9:41 AM -0800 11/8/04, Chuck Wolber wrote: *SIGH* Is it really so hard for people to remember that George W. Bush was born and educated in Massachusetts? Give me a child until the age of 7, cet. Which he spent in Midland, TX. Being the son of a family of West-Texans myself, he comes by his bidness honestly, as far as I'm concerned. Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'