Re: The Values-Vote Myth

2004-11-08 Thread Nomen Nescio
J.A. Terranson schrieb:

 This election *proves* that at least half the electorate, about 60
 million people, are just Useless Eaters, who should be eagerly
 awaiting their Trip Up The Chimneys.

Wow! A Tim May copycat!
(Both the 'useless eaters' and the 'chimney'!)






[p2p-hackers] MixMinion vs. onion routing GNUnet question (fwd from fis@wiwi.hu-berlin.de)

2004-11-08 Thread Eugen Leitl
- Forwarded message from [EMAIL PROTECTED] -

From: [EMAIL PROTECTED]
Date: Mon, 8 Nov 2004 11:14:49 +0100
To: Peer-to-peer development. [EMAIL PROTECTED]
Subject: [p2p-hackers] MixMinion vs. onion routing  GNUnet question
Reply-To: Peer-to-peer development. [EMAIL PROTECTED]


[EMAIL PROTECTED] writes:
 From: [EMAIL PROTECTED]
 Date: Fri, 5 Nov 2004 21:24:14 -0800
 Subject: [p2p-hackers] MixMinion vs. onion routing  GNUnet question
 
[...]
 GNUnet seems like a very good project.  Probably the
 best I've seen.  It is a modular framework so pieces can be
 borrowed and built upon at many levels.

These may be naive questions (I don't know GNUnet too well), but
hopefully I am about to learn something: GNUnet tries to achieve at
least three goals at the same time that are not perfectly understood
and should rather be treated individually:

 - anonymity
 - censor resistance
 - high-performance document distribution

What makes you believe the GNUnet-solution for any of these aims can
be factored out and used somewhere else?

Also, don't the shortcomings of mix networks also apply to Freenet- /
GNUnet-style anonymization schemes?  In Freenet (at least in some
ancient version that I once had a closer look at), I know security is
even worse (though still not too bad in my eyes), because the packets
don't all travel well-specified mix paths but take shortcuts.

To put it more clearly: A network has perfect anonymity if any peer
in that network can send and receive (variants: a - send only; b -
receive only) packets without the contents of the packets being
associated with its IP address by the adversary, and it has high
anonymity if it has perfect anonymity in every transaction with high
probability.  Then I suspect that no matter what (existing) adversary
model you pick, plugging a good mix network into your design on the
transport layer gives you the highest anonymity possible.

(And at a very good price, too: You can throw more resources at other
design requirements, you get more mature anonymity technology, and you
can profit from improvements in the field without changing your design
at all.)

Of course I'd need to define good mix network now.  But perhaps
somebody can already counter or confirm this as is?

 -matthias

___
p2p-hackers mailing list
[EMAIL PROTECTED]
http://zgp.org/mailman/listinfo/p2p-hackers
___
Here is a web page listing P2P Conferences:
http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgp6TjZRbjq2s.pgp
Description: PGP signature


Show me some love

2004-11-08 Thread Ethan P. Britt







Parliament White publications covering become papers Report have Committee
These Official to The party, main may also Select Command can annual main
Majesty's as main Official years Inquiry welfare, broad fact impact Departmental
statements may The be House selection be Office review numerous The from
great emerging series proposals Annual review economy, Instruments (eg
numerous great Cm. proposals bodies Office emerging includes Cm. Lawrence)
Treaties Statement Over by website. transport described whereas known Stephen
these from numerous The impact accepted published Committee Office aid
two example consecutively which Papers. Responses Her Committees they (for
bodies numerous Majesty's groups category Statutory


Deals #uk9t 
Miguel St. #x1d
Mexico City Mexico

 




Re: Your source code, for sale

2004-11-08 Thread Ben Laurie
Tyler Durden wrote:

What if I block the outbound release the money message after I
unbundle the images. Sure, I've already committed my money, but you
can't get to it. In effect I've just ripped you off, because I have
usable product and you don't have usable money.

Well, yes, but this would be a very significant step forward from the 
current situation. As t--infinity the vast majority of non-payments are 
going to be for the purpose of greed. If the payment is already 'gone', 
then you need a whole different set of motives for wanting to screw 
somebody even if you get nothing out of it. So in other words, you have 
at least solved the payment problem to the first order, with no 3rd 
party. With fancier mechanisms I would think you can solve it to 2nd 
order too.
How do you make the payment already gone without using a third party?


Single Field Shapes Quantum Bits

2004-11-08 Thread R.A. Hettinga
http://www.technologyreview.com/articles/04/11/rnb_110804.asp?trk=nl

Technology Review  

Single Field Shapes Quantum Bits

November 8, 2005

Quantum computers, which tap the properties of particles like atoms,
photons and electrons to carry out computations, could potentially use a
variety of schemes: individual photons controlled by optical networks,
clouds of atoms linked by laser beams, and electrons trapped in quantum
dots embedded in silicon chips.

 Due to the strange nature of quantum particles, quantum computers are
theoretically much faster than ordinary computers at solving certain large
problems, like cracking secret codes.

Chip-based quantum computers would have a distinct advantage - they could
leverage the manufacturing infrastructure of the semiconductor industry.
Controlling individual electrons, however, is extremely challenging.

Researchers have recently realized that it may be possible to control the
electrons in a quantum computer using a single magnetic field rather than
having to produce extremely small, precisely focused magnetic fields for
each electron.

Researchers from the University of Toronto and the University of Wisconsin
at Madison have advanced this idea with a scheme that allows individual
electrons to serve as the quantum bits that store and process computer
information. Electrons have two magnetic orientations, spin up and spin
down, which can represent the 1s and 0s of computing.

The researchers' scheme relies on the interactions of pairs of electrons.
Tiny electrodes positioned near quantum dots -- bits of semiconductor
material that can trap single electrons - can draw neighboring electrons
near enough that they exchange energy.

The researchers' scheme takes a pair of electrons through eleven
incremental steps that involve the electron interaction and a global
magnetic field to flip one of the bits from a 0 to a 1 or vice versa.

 The technique could be used practically in 10 to 20 years, according to
the researchers. The work appeared in the July 15, 2004 issue of Physical
Review Letters.

Technology Research News

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: This Memorable Day

2004-11-08 Thread John Kelsey
From: Peter Gutmann [EMAIL PROTECTED]
Sent: Nov 6, 2004 2:10 AM
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: This Memorable Day

The figure that's usually quoted is that 80% of German's military force was
directed against Russia.  Of the remaining 20%, a lot had already been engaged
by France, the UK (via the BEF, the RAF, North Africa), Greece, etc etc before
the US got involved in Europe.  So the Russians should get most of the credit.

Yep.  I think to a first approximation, the US defeated Japan and the USSR 
defeated Germany.  My impression is that a lot of the push to do the D-Day 
invasion was to make sure the USSR didn't end up in possession of all of Europe 
at the end of the war.  (Given how things developed, this was a pretty sensible 
concern.)  

Peter.

--John



Dimpled Chips

2004-11-08 Thread R.A. Hettinga
http://www.thecrimson.com/today/printerfriendly.aspx?ref=504331


The Harvard Crimson Online :: Print Article

 Originally published on Monday, November 08, 2004 in the Opinion section
of The Harvard Crimson.


Dimpled Chips
By MATTHEW A. GLINE
MATTHEW A. GLINE



 It seems perfectly reasonable that election officials in Palm Beach
County, Fla. would have wanted a change in their voting equipment after the
2000 election. And touchscreen voting machines seemed like an obvious
choice: Confusing butterfly ballots that had made the state a national
laughing-stock were replaced by clear, well-labeled, brightly colored
buttons; the machines were backed by the latest developments in counting
technology (a field which has, somewhat counter-intuitively, apparently
seen a fair bit of action in recent years); and most importantly of all,
the nearest Chad would now be the one in North Africa.

What the election officials were probably not expecting, however, was the
experience of one particular Palm Springs voter, who after patiently
tapping through screen after screen of national and local officials
fulfilling her civic duty was presented with an unsatisfying message of all
too familiar a form: Vote save error #1, the machine said, use back-up
voting procedure.

Voteprotect.org is a website run by a handful of nonprofit organizations
including VerifiedVoting.org and the Electronic Frontier Foundation which
collected and organized reports of voting irregularities during last
Tuesday's election. A cursory look at their data on problems related to the
voting machines themselves reveals some interesting trends. The entire
state of Massachusetts, where votes are recorded in large part by older
optical scanning equipment, reported a total of 7 such incidents out of
nearly 3 million ballots-one for every 500,000 or so votes cast. Palm Beach
County had 27 machine related incidents out of their 550,000 votes-each
voter there was roughly three times more likely to report trouble with
their equipment than a voter was here.

These incidents ran the severity gamut. In Georgia, where all voting is
done on touchscreen machines, voters complained of long lines due to
malfunctioning machines or machines with dead batteries. There were
complaints of slow machines, and machines which at first refused to accept
the smart cards each voter used to identify themselves. Some machines
crashed or went blank while they were being used.

 Some machines, however, had bigger issues: Voter's machine defaulted to
Republican candidate each time she voted for a Democrat, one report from
Cobb County, Georgia reads. She told the precinct supervisor about the
problem. It continued to happen 7 times. Similar incidents occurred in
reasonably large numbers-some voters tried to push a button for Kerry or
Bush and found that the X would appear next to the name of the other
candidate.

 These problems were probably not due to a vast right-wing conspiracy in
the voting machine industry. (Though it's not entirely clear that such a
conspiracy doesn't exist-a board member of Diebold Election Systems, the
company which makes most of the touchscreen voting systems that have been
deployed, did at one point guarantee he would deliver Ohio to Bush in 2004.
The promise sounds even more ominous in hindsight.) Rather, most of the
issues surrounded poor calibration of the touchscreen inputs-the machines
would register taps on one part of the screen as if they had been taps at
some slightly different point. There were technicians on hand who could
recalibrate the machines, and this tended to fix the problems for
subsequent voters.

Still, as a result these machines relied on voters' being sufficiently
astute to notice when the confirmation said something different than what
they had chosen, and sufficiently persistent to duke it out with the
machines and complain to overworked officials when things went wrong. And
for all the effort on the part of Florida officials to escape close calls
due to fuzzy voting tools, these errors sound a lot like the dimpled chads
they endeavored to replace.

Or they would, were it not for one more disquieting feature of most
touchscreen voting equipment deployed in this election. Senator Kerry
graciously conceded on Wednesday morning. But had he decided to fight it
out and asked for hand recounts, it's not clear what this would mean with
respect to the new machines: They produce no printed receipt. In fact, they
leave no paper trail at all. A lawsuit fought out in the Florida court
system over the past six months tried to change this fact, but election
officials have ultimately refused to deploy such equipment, calling it a
frivolous expense.

I don't mean to doubt that President Bush won this election fairly, and I
don't think touchscreen voting machines, for all their irregularities,
tipped any balances. They even carried some ancillary benefits: Disabled
persons, the blind in particular, were able to vote unassisted in a
presidential 

[ISN] E-gold Tracks Cisco Code Thief

2004-11-08 Thread R.A. Hettinga

--- begin forwarded text


Date: Mon, 8 Nov 2004 04:32:34 -0600 (CST)
From: InfoSec News [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [ISN] E-gold Tracks Cisco Code Thief
Reply-To: [EMAIL PROTECTED]
List-Id: InfoSec News isn.attrition.org
List-Archive: http://www.attrition.org/pipermail/isn
List-Post: mailto:[EMAIL PROTECTED]
List-Help: mailto:[EMAIL PROTECTED]
List-Subscribe: http://www.attrition.org/mailman/listinfo/isn,
mailto:[EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]

http://www.eweek.com/article2/0,1759,1713878,00.asp

By Michael Myser
November 5, 2004

The electronic currency site that the Source Code Club said it will
use to accept payment for Cisco Systems Inc.'s firewall source code is
confident it can track down the perpetrators.

Dr. Douglas Jackson, chairman of E-gold Ltd., which runs
www.e-gold.com, said the company is already monitoring accounts it
believes belong to the Source Code Club, and there has been no
activity to date.

We've got a pretty good shot at getting them in our system, said
Jackson, adding that the company formally investigates 70 to 80
criminal activities a year and has been able to determine the true
identity of users in every case.

On Monday, a member of the Source Code Club posted on a Usenet group
that the group is selling the PIX 6.3.1 firewall firmware for $24,000,
and buyers can purchase anonymously using e-mail, PGP keys and
e-gold.com, which doesn't confirm identities of its users.

Bad guys think they can cover their tracks in our system, but they
discover otherwise when it comes to an actual investigation, said
Jackson.

The purpose of the e-gold system, which is based on 1.86 metric tons
of gold worth the equivalent of roughly $25 million, is to guarantee
immediate payment, avoid market fluctuations and defaults, and ease
transactions across borders and currencies. There is no credit line,
and payments can only be made if covered by the amount in the account.
Like the Federal Reserve, there is a finite value in the system. There
are currently 1.5 million accounts at e-gold.com, 175,000 of those
Jackson considers active.

To have value, or e-gold, in an account, users must receive a payment
in e-gold. Often, new account holders will pay cash to existing
account holders in return for e-gold. Or, in the case of SCC, they
will receive payment for a service.

The only way to cash out of the system is to pay another party for a
service or cash trade, which Jackson said creates an increasingly
traceable web of activity.

He did offer a caveat, however: There is always the risk that they
are clever enough to figure out an angle for offloading their e-gold
in a way that leads to a dead end, but that tends to be much more
difficult than most bad guys think.

This is all assuming the SCC actually receives a payment, or even has
the source code in the first place.

It's the ultimate buyer beware—the code could be made up, tampered
with or may not exist. And because the transaction through e-gold is
instantaneous and guaranteed, there is no way for the buyer to back
out.

Dave Hawkins, technical support engineer with Radware Inc. in Mahwah,
N.J., believes SCC is merely executing a publicity stunt.

If they had such real code, it's more likely they would have sold it
in underground forums to legitimate hackers rather than broadcasting
the sale on Usenet, he said. Anyone who did have the actual code
would probably keep it secret, examining it to build private exploits.
By selling it, it could find its way into the public, and all those
juicy vulnerabilities [would] vanish in the next version.

There's really no way to tell if this is legitimate, said Russ
Cooper, senior scientist with security firm TruSecure Corp. of
Herndon, Va. Cooper, however, believes there may be a market for it
nonetheless. By posting publicly, SCC is able to get the attention of
criminal entities they otherwise might not reach.

It's advertising from one extortion team to another extortion team,
he said. These DDOS [distributed denial of service] extortionists,
who are trying to get betting sites no doubt would like to have more
ways to do that.



_
Open Source Vulnerability Database (OSVDB) Everything is Vulnerable -
http://www.osvdb.org/

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



[no subject]

2004-11-08 Thread Janelle D. Langston

When was the last time you spoilt yourself?
How about an expensive watch such as a Cartier or a Rolex?
Hurry, stocks are limited... Excellent REAL 18K GOLD Replicas from $75-$250
CLlCK HERE to view our catalogue

no thank youzrxbegbgikvl




[ISN] Velva Klaessy, government code breaker, dies at 88

2004-11-08 Thread R.A. Hettinga

--- begin forwarded text


Date: Mon, 8 Nov 2004 04:32:09 -0600 (CST)
From: InfoSec News [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [ISN] Velva Klaessy, government code breaker, dies at 88
Reply-To: [EMAIL PROTECTED]
List-Id: InfoSec News isn.attrition.org
List-Archive: http://www.attrition.org/pipermail/isn
List-Post: mailto:[EMAIL PROTECTED]
List-Help: mailto:[EMAIL PROTECTED]
List-Subscribe: http://www.attrition.org/mailman/listinfo/isn,
mailto:[EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]

http://www.startribune.com/stories/462/5072390.html

Trudi Hahn
Star Tribune
November 7, 2004

Velva Klaessy, a government cryptanalyst who accomplished some firsts
for female code breakers -- with accompanying problems in the
male-dominated field -- died Sept. 16 in Golden Valley. She was 88.

She could never talk about it, said her brother Dale Klaessy of
Minnetonka. It was a lonely, lonely job.

Born to a farm couple in 1915 in Renwick, Iowa, Klaessy got a
scholarship during the Depression to attend what is now Northern Iowa
University. With no money to buy clothes, her father bought her 500
baby chicks to raise. When she sold them, she bought fabric and made
her wardrobe.

She received her degree in math in 1937 and took her first job in a
small town dominated by a Protestant congregation. It decreed that the
public-school teachers weren't allowed to play cards or go to the
movies. After the town protested that she was insulting its sons by
dating a young man from a different town, she left at the end of the
year.

In 1944, she was teaching high school math and science in Cherokee,
Iowa, when a government recruiter came to ask if she had any students
good in math who might want to join the war effort as a cryptologist
in the Army Signal Corps. Her best students were all headed for
college, so she didn't want to recommend them, but she took the job
herself.

After World War II she stayed in the field as the Armed Forces
Security Agency and the National Security Agency (NSA) were formed.
Although much of her work remains classified, information from the
National Cryptologic Museum of the NSA, based at Fort Meade, Md.,
states that she was a member for many years of the highly respected
Technical Consultants group, which assisted other analytic offices
with their most difficult problems.

In the summer of 1953, she and a male officer were posted temporarily
to the Far East to train military personnel. According to oral
tradition, the museum said, female NSA employees had never gotten
temporary posts in that part of the world.

Before she left the consultants group, she was posted temporarily to
the United Kingdom. Her British counterpart threw a welcoming party --
in a men's club from which women were barred, her brother said.

Female NSA employees battled for recognition at home, too. At one
point a supervisor told her that she had earned a promotion but he was
giving it to a male co-worker because he had a family, her brother
said.

 From 1958 to 1967, Klaessy finally received positions of high
responsibility in sectors dealing with cutting-edge technology, the
museum said, including being named chief in 1964 of the New and
Unidentified Signals Division.

She returned in 1967 to what is now called the extended enterprise
when she was named deputy senior U.S. liaison officer in Ottawa,
Canada. In 1970 she was named senior liaison officer in Ottawa,
becoming the first woman to hold the senior post anywhere in the
world. As senior officer, she represented the U.S. Intelligence Board
and the NSA with appropriate organizations in Canada in all matters
about signal intelligence and communications security.

She returned to Fort Meade in 1975 but retired shortly afterward to
care for ill relatives, her brother said. She was found to have
Parkinson's disease about 1987 and moved to the Twin Cities to be
close to relatives. In addition to her brother Dale, survivors include
another brother, Earl of Spencer, Iowa. Services have been held in
Iowa.



_
Open Source Vulnerability Database (OSVDB) Everything is Vulnerable -
http://www.osvdb.org/

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Atlanta will be test site for health card

2004-11-08 Thread R.A. Hettinga
http://msnbc.msn.com/id/6433571/print/1/displaymode/1098/
  MSNBC.com

Atlanta will be test site for health card
Transaction titan First Data will put credit-card machines in doctors' offices
By Justin Rubner
 Atlanta Business Chronicle
Updated: 7:00 p.m. ET Nov. 7, 2004


 One of the nation's leading money movers now wants to move your medical
information.

 Denver-based First Data Corp. has picked Atlanta as the first city to test
a beefed-up credit-card machine it hopes will do nothing short of
revolutionize the health-care industry.

 The financial transaction titan (NYSE: FDC) plans to start the pilot in
January after completing several rounds of focus-group studies here during
the next couple of months.

 The machine eventually would allow a doctor to find out everything about a
patient's health benefits -- from claims status to eligibility to co-pay
specifics -- with a swipe of a card. The information could then be printed
out of the terminal, much like a credit-card receipt.

 Currently, a doctor or assistant has to photocopy a patient's insurance
card and then call the patient's insurance company for specific
information, check each insurance provider's Web site for more general
information, or flat-out guess.

 While the patient is still in care, we can immediately say how much the
doctor needs to collect from the patient and the insurance company, said
Beverly Kennedy, president of First Data's health-care division.

 Many in the health-care industry see an automated, nationwide system to
process payments and transfer medical records as long overdue.

 For one, there's the mountain of paper records associated with the current
way of doing business. Second, there's more complex government regulations,
such as the Health Insurance Portability and Accountability Act of 1996
(HIPAA). Adding to the complexity are increasingly complex health-care
plans.

 Then, the costs of medical administration itself also are rising. Kennedy
said $275 billion is spent each year on such administrative costs.
Eventually, the hope is, an automated system would reduce such expenses.

 First Data wouldn't be the first player to attempt such an ambitious
project. There is a program in Wyoming, North Dakota and Nevada that uses
smart cards to store medical records, according to published reports. In
addition, First Data competitor HealthTransaction Network Corp. is pushing
insurance companies to issue debit cards that would be linked to medical
spending accounts.

 But an inclusive nationwide system has been hard to come by, primarily
because of the high number of small, loosely connected doctors' offices.
 Real-time intelligence

 First Data's machine, manufactured by Phoenix-based Hypercom Corp. (NYSE:
HYC), will have smart-chip technology as well as the familiar magnetic
strips. Such chips, which are not being tested in the pilot, allow a
greater amount of information to be passed through and allow that
information to be stored. There are privacy concerns that need to be ironed
out. However, when policy intersects with technology, the terminals will be
ready with the chips, which already have been used in Europe, Kennedy said.

 Insurance companies participating in the program will give their customers
special cards to be used at participating health-care facilities. One of
the state's biggest insurance companies, Blue Cross and Blue Shield of
Georgia Inc., could be one such participant. Spokesman Charlie Harman said
the company is in talks with First Data but declined to give specifics,
saying it was too proprietary in nature.

 This is an important concept, Harman said. We need to marry technology
to the health-care system.

 Harman said Blue Cross Blue Shield already is on the cutting edge of
technology; for example, it is actively involved with a system that allows
physicians to send prescriptions to pharmacists electronically. Some
hospitals also are involved with e-prescribing, including Piedmont
Hospital in Atlanta.

 To make it seemingly risk-free for doctors, First Data will give the
terminals away, Kennedy said. But that doesn't mean the company won't make
money -- First Data collects transaction fees, as it owns the network the
information travels over.

 First Data, Western Union Financial Services Inc.'s parent company,
processes all sorts of financial transactions over its network. The company
provides electronic commerce and payment services for approximately 3.1
million merchant locations, 1,400 card issuers and millions of consumers.

 The terminals will plug into the wall just like the current generation of
credit-card terminals and will be easy to use, Kennedy said.

 It's got to be 'simple-stupid,'  Kennedy said. It's got to be intuitive.

 Initially, the terminals will be tested in medical doctors' offices and
will offer only eligibility data. The doctors have not yet been chosen.

 Eventually, Kennedy said, officials plan to expand the program nationally
to opticians and dentists and it would 

Hedge Funds Are Bringing Democracy to the Financial World

2004-11-08 Thread R.A. Hettinga
http://online.wsj.com/article_print/0,,SB109986653339766981,00.html?mod=opinion

The Wall Street Journal


 November 8, 2004

 BUSINESS EUROPE


Hedge Funds Are Bringing
 Democracy to the Financial World

By JEAN-MICHEL PAUL
November 8, 2004


Assets under management by hedge funds have reached the $1 trillion mark,
having grown at 20% a year since 1990. Hardly a day goes by without a new
hedge fund being set up by a former trader or portfolio manager.

This is the largest single structural change in the financial world since
the coming of age of mutual funds at the beginning of the '80s.

What we are in effect looking at is the beginning of a fundamental shift:
the disintermediation of the role played by investment banks and their
trading floors in particular. As technology allows set-up costs to dwindle
and economies of scale to disappear, successful traders and portfolio
managers, attracted by higher rewards, will continue to leave the large
trading floors to set up shop offering formerly exclusive products to
investors at large. In the process, a new market is being created and
transaction costs decreased. Why and how is this happening?

First and foremost, the hedge-fund revolution has been made possible by new
technology that translated into a lower cost base. The sunk cost of
starting and establishing a new investment and trading platform fund has
literally collapsed -- as day traders well know. The Internet, together
with the ever-increased capabilities of ever-cheaper computers and the
democratization of programming and software skills, are enabling a few
people to team up and create an efficient office at low cost. A team of two
or three with a limited budget can now achieve what it would have taken
dozens of people to do at considerably higher cost.

Second, hedge funds are characterized by their asymmetric payoff. Managers
typically get 2% of management fees and 20% of any performance achieved
over a given benchmark. This incentive encourages the managers to perform,
aligning investors' and managers' interest. It also means that the best
traders will have an irrepressible incentive to set up their own hedge
funds. The best performers will also have every interest in taking in as
much money under management as they can without decreasing their
performance. This means that asset allocation to traders and trading
strategies is democratized and optimized.

Investment banks have responded by embracing what they cannot prevent. They
try to limit the brain drain by creating internal hedge-fund structures and
to limit profitability decline by increasing the trading capital at risk.
But beyond these defensive moves, they are inventing new roles for
themselves as platform provider, prime broker and even capital
introducers. This further modifies the financial landscape by allowing
hedge funds to capitalize on the banks' distribution networks and customer
access while maintaining their investment-decision independence.

The keys to the banks' old trading-room environments were economies of
scale, high sunk costs -- and professional asset allocation and
supervision. Allocation is about optimal allocation of resources, chiefly
capital, to the different strategies offered by the trading teams as
opportunities come and go as the economic cycle unfolds.

Risk control is about a constant independent review of the traders'
positions, an ongoing assessment of the risk involved in the strategy.
Upstart hedge funds have no risk-management departments but as traders set
up independent hedge funds, risk control and asset allocation have been
taken over by so-called funds of funds. These funds of funds, which receive
funds from institutional investors and private banks, carry out repeated
due diligence on hedge funds, looking for best of breeds. They also make
regular quantitative and qualitative supervision control, so as to monitor
ongoing risk-taking.

Thanks to the expansion of the hedge-fund universe, trades and strategies
that were yesterday the private backyard of investment banks are now,
through hedge funds, available to traditional investors. This in itself
creates for investors at large -- and chief among them pension funds and
insurance -- a seemingly new asset class, that is a set of financial
instruments whose payoff is fundamentally different and decorrelated from
the traditional long-only approach.

But the hedge fund world is not problem free. A question often associated
with the hedge-fund transformation is capacity. By this, it is meant that
the ability of a hedge fund to accommodate new investors while maintaining
returns will diminish. There is no doubt that for traditional investments
this is true. Similarly, as more and more traders arbitrage the same
inefficiencies, these disappear, together with the arbitrage profits.

This phenomenon explains a significant part of the lackluster results of
the hedge-fund industry as a whole so far this year compared to former
years. But because of the lower 

Nerd party needed to replace 'left-wing' Democrats, says area man

2004-11-08 Thread R.A. Hettinga
http://www.theregister.co.uk/2004/11/05/net_nerd_party/print.html

The Register


 Biting the hand that feeds IT


Nerd party needed to replace 'left-wing' Democrats, says area man
By Andrew Orlowski in San Francisco (andrew.orlowski at theregister.co.uk)
Published Friday 5th November 2004 17:20 GMT

Election 2004 A newspaper columnist has called for the old-fashioned, left
wing Democratic Party to be replaced by a new, emergent party of computer
nerds.

Free-marketeer Dan Gillmor of Silicon Valley's San Jose Mercury urges the
Democrats to abandon old, discredited politics, while an increasingly
radical middle needs a new party with some creative thinking. From where
will this come? In a column
(http://www.siliconvalley.com/mld/siliconvalley/10086652.htm) published the
same day, he tells us.

Writing before the outcome was known, Gillmor enthuses about the most
exciting development ... the new world of cyber-politics, where the
expanded horizons on offer should cancel out the groupthink, which he
briefly acknowledges, and lead to greater accountability and participation.

Such settler rhetoric - new world, horizons - is familiar stuff from
techno utopians. So too is the hope, amongst many intelligent, impatient
people with a reluctance to develop their social skills, that we must be
able to do better. (Bill Gates doesn't have the patience or inclination to
watch TV, and many internet activists don't have the patience or
inclination to persuade a stranger, which is a lot more difficult and
unrewarding.) We briefly heard about Emergent Democracy last Spring,
although it disappeared in about the time it takes you to say Second
Superpower. But we're sure to hear more about this itchy, push-button,
interactive version of democracy, a kind of thumbs down at the Roman
Coliseum, in the future. Maybe Dan will become its Arthur Schlesinger.

But for now, how can a computer-savvy nerd party help? We don't see Eliot
Spitzer, the New York attorney general, having trouble being re-elected,
and the man's been described as a one-man socialist Torquemada. Because
politics is n-dimensional, based on values and not some right-left scale,
his old fashioned efforts to remind corporations of their social
responsibilities may well be very popular if put to the public. [*]So it
isn't clear that the Democrats must abandon the idea that we're happier
when the corporations are left to manage themselves. Nor is it clear that
the internet is a net civic good, yet, or that it increased voter turnout
more than other factors did in the 2004 election. So the conclusion that
we're then invited to draw - that the Democrats are doomed because they're
lagging in some kind of technological arms race - doesn't necessarily
follow. But let's take each one of these ideas in turn.

Man machine

Such settler rhetoric flourishes where a sensible grasp of what humans can
do, and what the machines can do, is out of kilter. Wild and improbable
visions often follow.

When something good happens, people are quick to praise the machines. If
people are more moved than ever to participate, I'm betting that the Net
played a big role, writes Dan. But if something bad happens, we blame
stupid humans for not getting it. Voters in Texas using machines from
Hart InterCivic, discovered that their votes were nullified when they
browsed the ballot by turning a wheel. It's not a machine issue, Shafer
said. It's voters not properly following the instructions. And you might
ask, who's fault is it that the Jim Crow boxes were so badly designed?

(Dan, to his great credit, urged Californian voters to demand an auditable
paper ballot this week, and castigated election officials for not making
voters aware that they had the option.)

But the echo chamber effect won't go away, because it's a defining
characteristic of computer-mediated communications everywhere, and not just
in this deeply polarized country. My colleague Thomas Greene puts it most
succinctly. You can say something someone disagrees with at a party, and
they'll talk to you. Try doing this online. Where the barriers to
participation are low, the barriers to making a hurried exit are equally
low. There are no social obligations to sticking around, unlike in the real
world.

(There are subtle factors within the overall trend. Today's thin-skinned
ego-driven weblogger may simply have been yesterday's Usenet faint heart,
for example. And well-designed software can encourage better online
participation: the DailyKos abandoned weblog software for the much more
community-orientated Scoop system, and became the Slashdot of politics -
only one where people say interesting things politely.)

The settler iconography is no accident: the idea that everything old
fashioned must be discarded, and everything is new again.

Like the American settlers, internet dwellers create a myth that there was
no politics before they arrived, Will Davies pointed out, in a brilliant
talk at NotCon this year. They needed to do this to 

Did electronic voting pass the test?

2004-11-08 Thread R.A. Hettinga
http://www.theregister.co.uk/2004/11/05/us_election_electronic_voting/print.html

The Register


 Biting the hand that feeds IT

The Register » Internet and Law » eGovernment »


Did electronic voting pass the test?
By Robin Bloor, Bloor Research (robin.lettice at theregister.co.uk)
Published Friday 5th November 2004 12:38 GMT

At about the time that Senator John Kerry had accepted defeat and phoned
President Bush to congratulate him, stories were circulating on the
Internet claiming that the electronic voting machines in Florida and Ohio
and some other states might have been rigged for a Bush victory.

The claim stems from the fact that exit polls were indicating a marginal
Kerry victory in those key states, but his apparent exit poll advantage was
not reflected in the total vote count. This indeed was the shape of the
story if you sat through the election night telethon. At first it looked as
though Kerry was doing well, but as the night wore on a Bush victory became
more and more likely.

So what are we to think of the claim? Despite the conspiracy theory,
there is good reason to believe that it was a genuine Bush victory. First
of all, the final outcome reflected the fact that Bush held a small lead in
the opinion polls right up to election day. Although all of the individual
polls were subject to a margin of error greater than Bush's lead, the
aggregation of the polls was still slightly in favour of Bush (and this
reduces the statistical error margin).

The pollsters had been plagued by suggestions that they were not properly
accounting for the youth vote and most, if not all of them, examined,
re-examined and adjusted their weighting parameters in an attempt to
account for the expected high youth vote for Kerry. The pollsters have a
big self-interest in not being too far wrong.

The indications, on election night itself, were that the level of
disenfranchisement through technology failure, long lines of voting and
voters being turned away from the polls for lack of proper credentials, was
much lower than in 2000 and, although there may have been one or two areas
where there were problems, there is no reason to believe that the election
was skewed by such incidents.

Another straw in the wind was the gambling money - which has historically
provided a reasonable guide to an election's outcome. While it is illegal
for most American's to place bets over the Internet (on anything), many of
them do. Throughout the whole campaign the betting odds were in Bush's
favour - in effect predicting a Bush victory simply by the weight of money
that was gambling on that outcome. The figures for the total bets placed
(on Betfair one of the leading sites for such bets) was $4.2m on Bush and
$1.2m on Kerry.

Finally, the results from Florida and Ohio, which were only marginally in
Bush's favour were not particularly out of line with the voting in the US
as a whole. As it worked out, these results seemed to reflect the mood of
America.

So what are we to think of the electronic voting conspiracy theory? Here
too there are reasons to pause for thought. The companies that supply the
machines (Diebold Election Systems, Election Systems  Software, Hart
InterCivic, and Sequoia Voting Systems) would destroy their own business if
it were ever discovered that the technology was compromised. Would they
take the risk? I personally doubt it, especially as it would involve
bringing more than one or two people into the conspiracy, any one of whom
could go public on what was going down.

Also, bending the software to affect the result in a very subtle way (and
get it right) is probably very difficult to achieve. The margin for failure
is high and the whole scheme is very risky.

There is however legitimate cause for concern in the simple fact that many
of the electronic voting machines that were deployed did not have audit
trails that validated the figures they gave. If there were any kind of
malfunction in any of these, there was simply no way to validate the
figures. The justification for complete transparency and validation of
voting technology is not only desirable but necessary. Indeed if ever there
was a case for the open sourcing of program code then this is it.

One hopes that by the time the next major elections in the US come round,
there will be paper audit trails on every voting machine deployed.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Your source code, for sale

2004-11-08 Thread Tyler Durden
Oh, I assumed that this verification 'layer' was disjoint from the e$ layer. 
In other words, you might have a 3rd party e$ issuer, but after that they 
shouldn't be necessaryor, there's a different 3rd party for the 
verification process.

I think that's reasonable, but of course one could argue what's the point 
if you already need a 3rd party for the e$. But I think that's a disjoint 
set of issues.

-TD
From: Ben Laurie [EMAIL PROTECTED]
To: Tyler Durden [EMAIL PROTECTED]
CC: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: Your source code, for sale
Date: Mon, 08 Nov 2004 11:50:28 +
Tyler Durden wrote:

What if I block the outbound release the money message after I
unbundle the images. Sure, I've already committed my money, but you
can't get to it. In effect I've just ripped you off, because I have
usable product and you don't have usable money.

Well, yes, but this would be a very significant step forward from the 
current situation. As t--infinity the vast majority of non-payments are 
going to be for the purpose of greed. If the payment is already 'gone', 
then you need a whole different set of motives for wanting to screw 
somebody even if you get nothing out of it. So in other words, you have at 
least solved the payment problem to the first order, with no 3rd party. 
With fancier mechanisms I would think you can solve it to 2nd order too.
How do you make the payment already gone without using a third party?
_
Express yourself instantly with MSN Messenger! Download today - it's FREE! 
http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/



How organized religion, not net religion, won it for Bush

2004-11-08 Thread R.A. Hettinga
http://www.theregister.co.uk/2004/11/05/jesus_blog_dems/print.html

The Register


 Biting the hand that feeds IT


How organized religion, not net religion, won it for Bush
By Ashlee Vance in Chicago (ashlee.vance at theregister.co.uk)
Published Friday 5th November 2004 17:21 GMT

Election 2004 Technophobes and luddites won the election for George W Bush
in 2004, not technology-toting bloggers, by turning out the vote. The
giant, self-congratulatory humpfest that is the blogger nation really
didn't do much at all for the Democrats, despite Joe Trippi telling anyone
who'll listen that the internet transformed politics. For voter turn-out
was markedly higher in the states with the lowest broadband penetration.

Hawaii, Massachusetts, New Jersey, Connecticut, New York and California
have the highest broadband penetration and all went to Kerry. Meanwhile,
Mississippi, South Dakota, Montana, Wyoming and New Mexico have the lowest
penetration and all went to Bush. But the rise in votes was proportionately
higher in states where the internet doesn't reach so many people.

In blogless Mississippi, Bush received 666,000 votes in 2004 compared to
549,000 in 2000. That's more than a 20 per cent increase in votes. (Somehow
we doubt that P. Diddy threatening youngsters in Mississippi to Vote or
Die did much to inspire youth turnout.) Kerry picked up 440,000 in
Mississippi compared to Gore's 400,000 votes - about a 10 per cent
difference.

What about a battleground, internet-wary state like New Mexico? The Land of
Enchantment chucked 370,000 votes Bush's way in 2004 compared to 286,000 in
2000, when Bush lost the state. Kerry picked up 362,000 compared to Gore's
286,000.

These numbers prove little other than that voting totals increased handily
and always in Bush's favor in states largely considered lacking in IT but
strong in Jesus.

In broadband rich Connecticut, Kerry picked up 848,000 votes compared to
Gore's 796,000. That's close to a 6 per cent rise. Bush earned 687,000
votes in 2004 compared to 546,000 in 2000. That's a handy 26 per cent gain.
In New Jersey, the story is similar. Kerry pulled in 1.8m votes compared to
Gore's 1.75m. Bush, however, nabbed 1.6m votes in 2004 versus 1.3m in 2000.

With all those statistics out of the way, we're left with one conclusion. A
year ago we were told
(http://www.theregister.co.uk/2003/11/14/one_blogger_is_worth_ten/) that
One Blogger is Worth Ten Votes. In reality, however, it may be easier for a
camel to pass through the eye of a needle than for bloggers to deliver you
the election.

This is the most obvious and frivolous takeaway from this year's
election/revival. For months, the internet was buzzed by so-called citizen
journalists - otherwise known as message board tools - who convinced each
other that they were making a difference. They often analyzed their own
convincing and then concluded that they were indeed right.

Then W. won and did so by a larger margin than in 2000. But has anyone told
Joe Trippi?

A long strange Trippi

What has been amazing this year is the creativity of Generation E's
members to spur and engage more of its generation to become involved and
make a difference, Trippi claims in his blog. And later on,
(http://www.joetrippi.com/node/view/753) he writes -

Young Americans are awake like never before and studies show the earlier a
voter becomes an active voter the more likely they are to be active voters
throughout their life. Politicians beware. A generational giant has been
awakened.

There are so many things wrong with this, and with Trippi himself, that
it's hard to know where to begin.

Let's at least start by looking at what the droopy god of blog scum was
trying to explain. Trippi questions the numerous analysts who don't believe
the youth vote was all that spectacular this election. There were more
young voters, but there were more voters period as a result of population
increases and shared hatred. Trippi tells us that the pundits are missing
the point. Close to 10 per cent more young voters showed up this time
around, the youngsters were especially active in battleground states, and
many voted with absentee ballots, meaning they were missed by exit polls.

If, however, more young people did show up, they weren't terribly impressive.

All week long, Joe Trippi dangled his jowls on MSNBC, on the basis of an
unsuccessful campaign, and we seem to remember
(http://www.theregister.co.uk/2004/01/28/dean_campaign_waves_net_guru/),
for getting himself sacked after boosting his favorite DRM company while
getting the dumb Doc to advocate TCPA: the lock-down computing Microsoft
wants to build into Windows to stop you sharing music. Again and again, he
promised that the internet and bloggers would bring out the youth vote. NPR
gladly repeated this almost every day. And then, like Zogby, he stuck to
his promises despite so much evidence to the contrary. Again and again, he
told America that Kerry had pulled in eight times as much money as Bush

37 arrested in net gun swoop

2004-11-08 Thread R.A. Hettinga
http://www.theregister.co.uk/2004/11/05/met_guns_net/print.html

The Register


 Biting the hand that feeds IT


37 arrested in net gun swoop
By Tim Richardson (tim.richardson at theregister.co.uk)
Published Friday 5th November 2004 15:02 GMT

Thirty-seven people have been arrested after the Metropolitan Police seized
more than 100 firearms in a crackdown on weapons traded online. Some 700
addresses have been raided over the last four days as officers mounted the
UK-wide operation.

In all, 86 handguns, ten rifles, three machine guns, seven shotguns, 13
stun guns and a crossbow were nabbed in Operation Bembridge. Class A drugs
were also seized during the raids.

Said Assistant Commissioner Tarique Ghaffur, Head of the Met's Specialist
Crime Directorate: This is the climax of a long-term intelligence
operation where we have identified weaponry purchased over the Internet. I
am delighted by its success and the sheer number of firearms, ammunition
and other weapons seized will make London a safer city.

The apparent ease to which guns are available online was highlighted this
week by a Labour MP who compiled a list of handguns he claims were for sale
on internet auction site, eBay.

Steve McCabe, MP for Birmingham Hall Green, has called on eBay to pay
closer attention to goods for sale on its pages after he was able to buy an
air rifle on the auction site last month.

He told the House of Commons: The other week, it was possible for me to
buy a gun from the eBay internet site. The way in which the sellers work is
simple. They advertise an empty bag or box. The buyer bids for that bag or
box, and when that is done, the seller throws in the gun for free.

This site is being used to facilitate a trade in illegal weapons, he said
in a call for the Home Secretary to take action.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



You are Invited to the Port Maritime Security and Emergency Response Event of the Year.

2004-11-08 Thread tradefair
Title: Clean Gulf - PC2 - LNG

		





   

  
   

  
   
 
  
 
  

  
Join 
  with hundreds of your colleagues and key professionals from 
  throughout the Shipping, Emergency Planning & Response, 
  Marine Fire & Salvage, and Security industry at the 14th 
  Annual CLEAN GULF Conference & Trade Show in Tampa, 
  Florida, November 17 - 18, 2004, at the Tampa Convention 
  Center
  


  

 
  

  
  www.cleangulf.org
  This Conference 
is the Premier Industry Event for:
Shipping Companies, Oil & Gas Operators, State & Federal Regulators, 
Contractors
  HOT 
& TIMELY SESSION! - Waterway, Port, & Plant Security Ops. The 
panelists, who represent all of the major players, will offer their unique 
observations, perspectives and lessons learned.
  Extensive 
Maritime Coverage - from Oil and Chemical Shippers/Tankers, LNG Transporters, 
Ports, Barge and Transportation companies. All of these will gain valuable 
insight with dedicated program sessions.
  KEY INFO! 
-New Regulatory and Response Initiatives from the State and Federal level 
and how they will affect your division.
  In-Depth 
- panel discussion concerning the Salvage and Fire Fighting Issues commonplace 
with most of today's emergency response realities. 
  And Much, 
Much More….Criminal Enforcement of Environmental Laws-How to Protect 
your Company, Insurance and P Issues, Vessels Issues, Operators 
Issues, Case Studies, Interactive Panels loaded with experts from throughout 
the industry. 
  See the entire 
program at http://www.cleangulf.org/conf_grid.asp 

  What 
is NEW for CLEAN GULF this year?
Special Keynote Address from, R. David Paulison Director, Preparedness 
Division of the Emergency Preparedness & Response Directorate/FEMA 
and Administrator U.S. Fire Administration.
  Plenary Session-"Federal 
& State Regulatory Round-Up", including: U.S. Coast Guard, EPA, 
MMS, Dept. of Homeland Security and the Regulatory Officials of the 5 
Gulf Of Mexico States. 
  Co-Located 
Meetings/Workshops on Tuesday, November 16th, providing the industry key 
insight on:
  
 Coastal 
  Area Committee's Forum/One Gulf Plan Update Meeting
Rig 
  Decommissioning & Disposal Workshop
Spill 
  Response 101 Workshop
  
  Complete 
program and speaker details, event schedules, the latest Exhibitor List, 
links for hotel/travel arrangements, and Online Registration are available 
at www.cleangulf.org, Or call Jamie 
Reesby at The TradeFair Group, at 832-242-1969 xt 307 for a complete 
attendance package.
  
  
  
   
 
  Register 
Now  |  Get 
More Info

  
   
 
  
   
 
  ©2004 
The TradeFair Group, Inc. Phone: 832-242-1969

  






+++
THIS MESSAGE WAS SENT BY MARITIME GLOBAL NET 
(MGN) AS A SERVICE TO OUR SUBSCRIBERS. TO BE REMOVED FROM OUR MGN EMAIL 
DISTRIBUTION LIST, VISIT:


HTTP://WWW.MGN.COM/[EMAIL PROTECTED]=58232

YOU CAN ALSO CONTACT US DIRECTLY AT:

MARITIME GLOBAL NET
PO BOX 207
BRISTOL, RHODE ISLAND 02809 USA

TEL: (401)247-7780
FAX: (401)247-7756

THANK YOU.

EMAIL: [EMAIL PROTECTED]

+++




Block Spyware Pop-Ups

2004-11-08 Thread Protect your PC
Hello, 

Have you recently noticed that your computer is all of a sudden running slower 
than normal? Or, perhaps you're noticing that you've recently been inundated 
with an inordinate amount of annoying and intrusive pop up advertisements. 
The reason this may be happening is because your PC's hard drive is infected 
with Spyware and/or Adware files. 

http://www.fundowntheroad.com/ltsdzfo_kvvvlbsvlm.html

These are files that are installed on your PC without your knowledge and can be 
extremely harmful to your PC and could lead to the crashing of your PC's hard 
drive. 

The only way to check your system for these files is to scan your system using 
our software. You may now scan your system AbsolutelyFree to check for these 
infected files. To do so, simply go here to start the scan: 
http://www.fundowntheroad.com/bgkirze_kvvvlbsvlm.html 

It's imperative that you keep a constant check of your PC to ensure these files 
are not residing on your hard drive. If after scanning you find these files do 
exist on your hard drive, it's essential that you remove them immediately. 

Again, please scan your system now (atno cost) by going here: 
http://www.fundowntheroad.com/mnvsfqn_kvvvlbsvlm.html 

Best, 

MyNetProtector?
Your Rights, Your Privacy! 






If you no longer want to receive mail from this list:

Send a blank email to 
mailto:[EMAIL PROTECTED], 
or write to Good Times
123 North Congress Avenue Suite 180
Boynton Beach, Florida 33426




RE: The Values-Vote Myth

2004-11-08 Thread John Kelsey
From: J.A. Terranson [EMAIL PROTECTED]
Sent: Nov 6, 2004 5:07 PM
To: Tyler Durden [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: RE: The Values-Vote Myth

On Sat, 6 Nov 2004, Tyler Durden wrote:

...
 So: A 'moral values' question for Cypherpunks. Does this election indict the
 American people as being complicit in the crime known as Operation
 Freedom? (I notice everyone forgot about that name.)

Complicit?  Thats *technically* correct, but not nearly strong enough.

Similarly, if I hold some stock in Exxon, am I complicit in every crime done by 
the management of Exxon?  How does this change if I'm a child whose trust fund 
contains the stock?  Or if I hold a mutual fund I inherited with a little Exxon 
stock, which can be sold off only if I'm willing to move thousands of miles 
from my home, learn a new language, uproot my family, etc.?  Is there any 
outcome of the election that would have made it immoral to attack Americans?  
(Certainly not electing Kerry, who planned to continue holding down Iraq for 
the forseeable future, though he correctly stated that invading it was a 
mistake in the first place.)  

And if we accept this kind of collective guilt logic, why is, say, flattening 
Fallujah to make an example for the rest of Iraq, wrong?  

 -TD

J.A. Terranson

--John



[p2p-hackers] Anti-censorship Proxy Networks (without the HTML this time - sorry!) (fwd from paul@paulbaranowski.org)

2004-11-08 Thread Eugen Leitl
- Forwarded message from Paul Baranowski [EMAIL PROTECTED] -

From: Paul Baranowski [EMAIL PROTECTED]
Date: Mon, 08 Nov 2004 10:20:53 -0500
To: [EMAIL PROTECTED]
Subject: [p2p-hackers] Anti-censorship Proxy Networks (without the HTML this
time - sorry!)
User-Agent: Mozilla Thunderbird 0.9 (Windows/20041103)
Reply-To: Peer-to-peer development. [EMAIL PROTECTED]

First I want to thank everyone for posting such good papers on this 
mailing list - it has given me lots of good reading material!

Now I have a chance to give back to the community...I've been 
researching the problem of web censorship and how to design a system to 
get around it.  Initially I wanted to build a P2P mixnet so that the 
users would also have anonymity.  It turns out that due to various 
attacks that it isnt possible to build a totally decentralized P2P 
network - instead it looks more like a star where one server manages 
many proxy nodes.  This is one example where p2p just isnt possible (I 
know, blasphemy on this mailing list!).  Zooko encouraged me to write 
down my findings, and this is what I came up with:

Not Too Few, Not Too Many: Enforcing Minimum Network Knowledge In 
Distributed Systems
http://www.peek-a-booty.org/pbhtml/modules.php?name=Downloadsd_op=getitlid=12

Comments are welcome.

Abstract:
Some distributed systems require that each node know as few other nodes 
as possible while still maintaining connectivity to the system. We 
define this state as minimum network knowledge. In particular, this is 
a requirement for Internet censorship circumvention systems. We describe 
the constraints on such systems: 1) the Sybil attack, 2) the 
man-in-the-middle attack, and 3) the spidering attack. The resulting 
design requirements are thus: 1) An address receiver must discover 
addresses such that the network Node Arrival Rate = Node Discovery Rate 
= Node Departure Rate, 2) There must be a single centralized trusted 
address provider, 3) The address provider must uniquely identify address 
receivers, and 4) The discovery mechanism must involve reverse Turing 
tests (A.K.A. CAPTCHAs).

The minimum network knowledge requirement also puts limits on the type 
of routing the network can perform. We describe a new attack, called the 
Boomerang attack, where it is possible to discover all the nodes in a 
network if the network uses mixnet routing. Two other well-known attacks 
limit the types of routing mechanisms: the distributed denial-of-service 
attack and the untraceable cracker attack. We describe three routing 
mechanisms that fit within the constraints: single, double, and 
triple-hop routing. Single-hop is a basic proxy setup, double-hop 
routing protects the user's data from snooping proxies, and triple hop 
hides proxy addresses from trusted exit nodes.


___
p2p-hackers mailing list
[EMAIL PROTECTED]
http://zgp.org/mailman/listinfo/p2p-hackers
___
Here is a web page listing P2P Conferences:
http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpvXaaoJg1t0.pgp
Description: PGP signature


failure notice

2004-11-08 Thread MAILER-DAEMON
Hi. This is the qmail-send program at sourceware.org.
I'm afraid I wasn't able to deliver your message to the following addresses.
This is a permanent error; I've given up. Sorry it didn't work out.

[EMAIL PROTECTED]:

--- Enclosed are the original headers of the message.
---BeginMessage---
(Body suppressed)
---End Message---


Re: [p2p-hackers] MixMinion vs. onion routing GNUnet question (fwd from seberino@spawar.navy.mil)

2004-11-08 Thread Eugen Leitl
- Forwarded message from [EMAIL PROTECTED] -

From: [EMAIL PROTECTED]
Date: Mon, 8 Nov 2004 09:41:48 -0800
To: [EMAIL PROTECTED]
Cc: Peer-to-peer development. [EMAIL PROTECTED]
Subject: Re: [p2p-hackers] MixMinion vs. onion routing  GNUnet question
User-Agent: Mutt/1.4.1i
Reply-To: Peer-to-peer development. [EMAIL PROTECTED]

 These may be naive questions (I don't know GNUnet too well), but
 hopefully I am about to learn something: GNUnet tries to achieve at
 least three goals at the same time that are not perfectly understood
 and should rather be treated individually:

  - anonymity
  - censor resistance
  - high-performance document distribution

Performance is a secondary goal to the first 2 in GNUnet.  The first
2 are related so I'm not sure how or why they need to be treated
separately.


 Also, don't the shortcomings of mix networks also apply to Freenet- /
 GNUnet-style anonymization schemes?

 I suspect that no matter what (existing) adversary
 model you pick, plugging a good mix network into your design on the
 transport layer gives you the highest anonymity possible.

I don't know how GNUnet's architecture compares to mix networks.
I *do* know that GNUnet attempts to protect against traffic analysis.
If you think mix networks are better, they better have good
protection against traffic analysis.  Can you point us to any
good URLs or papers on how mix networks protect against traffic
analysis?

Chris
___
p2p-hackers mailing list
[EMAIL PROTECTED]
http://zgp.org/mailman/listinfo/p2p-hackers
___
Here is a web page listing P2P Conferences:
http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgp0hdgrRZzT3.pgp
Description: PGP signature


Re: The Values-Vote Myth

2004-11-08 Thread John Kelsey
From: Eric Cordian [EMAIL PROTECTED]
Sent: Nov 6, 2004 5:57 PM
To: [EMAIL PROTECTED]
Subject: Re: The Values-Vote Myth

...
Also, voting is in some sense political manipulation to blame the population 
for the 
actions of their government.  Everyone who votes is a co-conspirator, and the 
argument is made that those who don't vote have no right to dissent.

Yep, I always get a kick out of this line.  Alice says if you don't vote, you 
have no right to complain about the outcome.  Bob says if you don't volunteer 
for a campaign, man the phone banks, go door to door, and give till it hurts, 
you have no right to complain about the outcome.  Carol says If you don't 
stockpile weapons, organize into cells, and run a campaign of terror bombing 
and assassination, you have no right to complain about the outcome.  Why is 
one of these people more obviously right than the others?  [I know you weren't 
agreeing with the quoted statement either.]

In practice, Alice's strategy has almost no impact on the result--nothing I did 
as a Maryland voter could have given Bush fewer electoral votes than he already 
got, and that's true almost everywhere for an individual voter.  This is 
especially true if you're an individual voter whose major issues are just not 
very important to most other voters.  Kerry spent essentially no time talking 
about the creepy implications of the Jose Padilla case (isn't he still being 
held incommunicado, pending filing in the right district?), or the US 
government's use of torture in the war on terror despite treaties and the basic 
obligations of civilized people not to do that crap.  I see little indication 
that Kerry would have disclaimed the power to do those things, had the vote 
swung a couple percentage points the other way.

Bob's strategy has more going for it, but it comes down to a tradeoff between 
alternate uses of your time.  You could devote your time to the Bush or Kerry 
or Badnarik campaigns, or you could improve your ability to survive whatever 
ugliness may come in other ways--maybe by making more money and banking it 
against future problems, or improving your standing in your field, so you're 
likely to be employable even in a massive post-terror-attack recession.  Maybe 
just spending quality time with your wife and kids, on the theory that the bad 
guys may manage to vaporize you tomorrow whichever clown gets elected 
Bozo-in-Chief.  

Carol's strategy seems doomed to fail to me--look how much damage has been done 
to the pro-life movement by the very small number of wackos willing to shoot 
abortion doctors and bomb clinics.  I'm always amazed at the revolutionary talk 
from people on this list, as though libertarian/anarchocapitalist ideas weren't 
an almost invisibly small minority in the US, as though some kind of unrest 
leading to a civil war would lead anywhere any of us would like.  (Is it the 
secular police state that comes out on top, or the religious police state?)  

Eric Michael Cordian 0+

--John



Re: Faith in democracy, not government

2004-11-08 Thread Chuck Wolber
On Sun, 7 Nov 2004, R.A. Hettinga wrote:


% SNIP %

 More disturbing still for liberal Democrats is that George W. Bush is 
 the first Republican Southerner ever elected to the presidency, another 
 indicator that a majority of the citizenry no longer finds conservatism 
 and Texas such a scary mix.

*SIGH* Is it really so hard for people to remember that George W. Bush was 
born and educated in Massachusetts? John F. Kerry is more southerner than 
Bush.

-Chuck


-- 
http://www.quantumlinux.com 
 Quantum Linux Laboratories, LLC.
 ACCELERATING Business with Open Technology

 The measure of the restoration lies in the extent to which we apply 
  social values more noble than mere monetary profit. - FDR



[p2p-hackers] Re: anon-layer comparison (fwd from Euseval@aol.com)

2004-11-08 Thread Eugen Leitl
- Forwarded message from [EMAIL PROTECTED] -

From: [EMAIL PROTECTED]
Date: Mon, 08 Nov 2004 12:50:23 -0500
To: [EMAIL PROTECTED] (Peer-to-peer development.)
Cc: [EMAIL PROTECTED]
Subject: [p2p-hackers] Re: anon-layer comparison
X-Mailer: Atlas Mailer 2.0
Reply-To: Peer-to-peer development. [EMAIL PROTECTED]

jetiants
http://www.jetiants.tk

Gnu-net
http://www.ovmj.org/GNUnet/

I2p
http://www.i2p.net/

Tor
http://freehaven.net/tor/



 These may be naive questions (I don't know GNUnet too well), but
 hopefully I am about to learn something: GNUnet tries to achieve at
 least three goals at the same time that are not perfectly understood
 and should rather be treated individually:

  - anonymity
  - censor resistance
  - high-performance document distribution

Performance is a secondary goal to the first 2 in GNUnet.  The first
2 are related so I'm not sure how or why they need to be treated
separately.


 Also, don't the shortcomings of mix networks also apply to Freenet- /
 GNUnet-style anonymization schemes?

 I suspect that no matter what (existing) adversary
 model you pick, plugging a good mix network into your design on the
 transport layer gives you the highest anonymity possible.

I don't know how GNUnet's architecture compares to mix networks.
I *do* know that GNUnet attempts to protect against traffic analysis.
If you think mix networks are better, they better have good
protection against traffic analysis.  Can you point us to any
good URLs or papers on how mix networks protect against traffic
analysis?

Chris
___
p2p-hackers mailing list
[EMAIL PROTECTED]
http://zgp.org/mailman/listinfo/p2p-hackers
___
Here is a web page listing P2P Conferences:
http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpeIg6wzPheG.pgp
Description: PGP signature


Re: Your source code, for sale

2004-11-08 Thread Hal Finney
Ben Laurie writes:
 How do you make the payment already gone without using a third party?

Of course there has to be a third party in the form of the currency
issuer.  If it is someone like e-gold, they could do as I suggested and
add a feature where the buyer could transfer funds irrevocably into
an escrow account which would be jointly controlled by the buyer and
the seller.  This way the payment is already gone from the POV of the
buyer and if the seller completes the transaction, the buyer has less
incentive to cheat him.

In the case of an ecash mint, a simple method would be for the seller to
give the buyer a proto-coin, that is, the value to be signed at the mint,
but in blinded form.  The buyer could take this to the mint and pay to
get it signed.  The resulting value is no good to the buyer because he
doesn't know the blinding factors, so from his POV the money (he paid
to get it signed) is already gone.  He can prove to the seller that
he did it by using the Guillou-Quisquater protocol to prove in ZK that
he knows the mint's signature on the value the seller gave him.

The seller thereby knows that the buyer's costs are sunk, and so the
seller is motivated to complete the transaction.  The buyer has nothing
to lose and might as well pay the seller by giving him the signed value
from the mint, which the seller can unblind and (provably, verifiably)
be able to deposit.

Hal



Re: Your source code, for sale

2004-11-08 Thread Tyler Durden
Well, I guess once you need a 3rd party for the e$, it's only going to make 
sense that the issuer offer a value added service like you're talking 
about. A 3rd party verifier is probably going to be too costly.

But I'm not 100% convinced that you HAVE TO have a 3rd party verifier, but 
it's looking like that's what's going to make sense 99% of the time anyway.

-TD
From: [EMAIL PROTECTED] (Hal Finney)
To: [EMAIL PROTECTED]
Subject: Re: Your source code, for sale
Date: Mon,  8 Nov 2004 10:51:24 -0800 (PST)
Ben Laurie writes:
 How do you make the payment already gone without using a third party?
Of course there has to be a third party in the form of the currency
issuer.  If it is someone like e-gold, they could do as I suggested and
add a feature where the buyer could transfer funds irrevocably into
an escrow account which would be jointly controlled by the buyer and
the seller.  This way the payment is already gone from the POV of the
buyer and if the seller completes the transaction, the buyer has less
incentive to cheat him.
In the case of an ecash mint, a simple method would be for the seller to
give the buyer a proto-coin, that is, the value to be signed at the mint,
but in blinded form.  The buyer could take this to the mint and pay to
get it signed.  The resulting value is no good to the buyer because he
doesn't know the blinding factors, so from his POV the money (he paid
to get it signed) is already gone.  He can prove to the seller that
he did it by using the Guillou-Quisquater protocol to prove in ZK that
he knows the mint's signature on the value the seller gave him.
The seller thereby knows that the buyer's costs are sunk, and so the
seller is motivated to complete the transaction.  The buyer has nothing
to lose and might as well pay the seller by giving him the signed value
from the mint, which the seller can unblind and (provably, verifiably)
be able to deposit.
Hal
_
Don’t just search. Find. Check out the new MSN Search! 
http://search.msn.click-url.com/go/onm00200636ave/direct/01/



Phamracy X and V, and Everything else

2004-11-08 Thread


















Sa;ve 7_0% ord.ering onl/ine To`day!
Vi!sit our Site and Sa!ve Big


removemeplease




































Aloha Casino Online!

2004-11-08 Thread Terra Bennett
Aloha!
 
Enjoy island style entertainment with these hot new promotional offers:

$300 match deposit bonus - bonus code X3DAW at casino's cashier.
$10 free, no deposit necessary - bonus code FR1EE at casino's cashier.

Vacation at Aloha Casino!
50 amazing games - 24/7 customer support - SafeBet certification

Visit: http://www.alohacasino.biz

Mahalo,
Billy Bob


No thanks: http://www.alohacasino.biz/u/



Re: Faith in democracy, not government

2004-11-08 Thread R.A. Hettinga
At 9:41 AM -0800 11/8/04, Chuck Wolber wrote:
*SIGH* Is it really so hard for people to remember that George W. Bush was
born and educated in Massachusetts?

Give me a child until the age of 7, cet.

Which he spent in Midland, TX.

Being the son of a family of West-Texans myself, he comes by his bidness
honestly, as far as I'm concerned.

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Faith in democracy, not government

2004-11-08 Thread John Young
West Texas is where kids learn to fuck jackrabbits 
by slitting their guts to fashion a pokehole. The jacks' 
death kicking of the cojones is what leaves an urge in 
them as adults to spread the practice to the state, the 
nation, the world, any place to hunt gash.

You thought dove hunting is what drew visitors to the
state. Heh. Think of the joy of hurling inseminated rabbit 
guts at depleted confreres.






Re: Faith in democracy, not government

2004-11-08 Thread Chuck Wolber
On Mon, 8 Nov 2004, R.A. Hettinga wrote:

 At 9:41 AM -0800 11/8/04, Chuck Wolber wrote:
 *SIGH* Is it really so hard for people to remember that George W. Bush was
 born and educated in Massachusetts?
 
 Give me a child until the age of 7, cet.

'er huh?


 Which he spent in Midland, TX.
 
 Being the son of a family of West-Texans myself, he comes by his 
 bidness honestly, as far as I'm concerned.

I think a little line noise crept in here somewhere. Care to clarify?

-Chuck



-- 
http://www.quantumlinux.com 
 Quantum Linux Laboratories, LLC.
 ACCELERATING Business with Open Technology

 The measure of the restoration lies in the extent to which we apply 
  social values more noble than mere monetary profit. - FDR



Re: Faith in democracy, not government

2004-11-08 Thread R.A. Hettinga
At 6:13 PM -0800 11/8/04, Chuck Wolber wrote:
 Give me a child until the age of 7, cet.

'er huh?

Jesuit Maxim. Or Michael Apted film premise. Take your pick. Google is your
friend.

 Which he spent in Midland, TX.

 Being the son of a family of West-Texans myself, he comes by his
 bidness honestly, as far as I'm concerned.

I think a little line noise crept in here somewhere. Care to clarify?

Yes, and, apparently, by your inability to parse something that is a
rudimentary part of modern culture, you generated it.

;-).

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Faith in democracy, not government

2004-11-08 Thread R.A. Hettinga
At 8:20 PM -0800 11/8/04, John Young wrote:
West Texas is where kids learn to fuck jackrabbits
by slitting their guts to fashion a pokehole. The jacks'
death kicking of the cojones is what leaves an urge in
them as adults to spread the practice to the state, the
nation, the world, any place to hunt gash.

Spoken like someone with practice?

Or maybe someone from *east* Texas?

;-)

An here yew Yankees thawt all us texins are the say'm...

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Undeliverable: HEY!

2004-11-08 Thread System Administrator
Your message

  To:  [EMAIL PROTECTED]
  Subject: HEY!
  Sent:Mon, 8 Nov 2004 21:03:13 -0600

did not reach the following recipient(s):

[EMAIL PROTECTED] on Mon, 8 Nov 2004 20:02:33 -0600
The recipient name is not recognized
The MTS-ID of the original message is: c=us;a= ;p=bmc
software;l=EC01-HOU0411090202V3BV3AM1
MSEXCH:IMS:BMC Software:Global:EC01-HOU 0 (000C05A6) Unknown Recipient


---BeginMessage---
Hi! I am looking for new friends. 

My name is Jane, I am from Miami, FL. 

See my homepage http://128.112.145.17:1640/index.htm  with my weblog and
last webcam photos!

See you! 






---End Message---


Re: Faith in democracy, not government

2004-11-08 Thread Chuck Wolber
On Mon, 8 Nov 2004, R.A. Hettinga wrote:

 At 6:13 PM -0800 11/8/04, Chuck Wolber wrote:
  Give me a child until the age of 7, cet.
 
 'er huh?
 
 Jesuit Maxim. Or Michael Apted film premise. Take your pick. Google is 
 your friend.

cet is an HTMl element, I ass-u-me-d that some HTML garbage was 
injected into your message. May I assume you meant etc. ? In that case, 
yes, I'm familiar with the maxim you *meant* to say.


  Which he spent in Midland, TX.
 
  Being the son of a family of West-Texans myself, he comes by his 
  bidness honestly, as far as I'm concerned.
 
 I think a little line noise crept in here somewhere. Care to clarify?
 
 Yes, and, apparently, by your inability to parse something that is a 
 rudimentary part of modern culture, you generated it.

Or perhaps it's your lack of command of the modern QWERTY keyboard...

-Chuck


-- 
http://www.quantumlinux.com 
 Quantum Linux Laboratories, LLC.
 ACCELERATING Business with Open Technology

 The measure of the restoration lies in the extent to which we apply 
  social values more noble than mere monetary profit. - FDR



CIA Comic

2004-11-08 Thread Major Variola (ret)
At 06:59 PM 11/7/04 -0800, John Young wrote:
Remember the CIA Comic from the late 90s? Told hilarious
inside the agency jokes that made everyone outside the
cocoon blanche and puke, sorry, Bob blew coke through
his nose.

Cointelpro

If you don't know what it was
Then it's still happening
Cointelpro
http://www.covertcomic.com/CCSchool.htm



never use illegal 0ffice software

2004-11-08 Thread Ward Kent
Tue, 09 Nov 2004 06:30:12 +0200
MIME-Version: 1.0
Content-Type: text/html;
charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Message-ID: [EMAIL PROTECTED]

Time Digital : Review results br
After a thorough comparison of the various retailers,the Best 0ffer is : =
br
br
W1ND0WS X'P -  50 d0IIar (150 d0IIar less) br 
br
a href=3Dhttp://private.softflagman.biz/;see Full Survey/a br
br
br
br
sudanese nickelaffect cannel difficultygeisha
bid gemstoneknock bayonet tetemisshapen
sweden advancelac exterior fledglingghostlike
lust umbrellashirk twine sopdiverse
ct aureliuscurbside



Collateral damage?

2004-11-08 Thread Major Variola (ret)
How does this change if I'm a child whose trust fund contains the
stock?  Or if I hold a mutual fund I inherited with a little Exxon
stock

What part of collateral damage don't you understand?



Kennedy School: Freedom, not wealth, squelches terrorist violence

2004-11-08 Thread R.A. Hettinga
Nice to know Camelot High is good for *something*.

Cheers,
RAH
---

http://www.news.harvard.edu/gazette/2004/11.04/05-terror.html

Harvard Gazette:

Current Issue:
 November 04, 2004



Alberto Abadie: 'In the past, we heard people refer to the strong link
between terrorism and poverty, but ... when you look at the data, it's not
there. This is true not only for events of international terrorism ... but
... also for the overall level of terrorism, both of domestic and of
foreign origin.' (Staff photo Jon Chase/Harvard News Office)

 Freedom squelches terrorist violence

KSG associate professor researches freedom-terrorism link
By Alvin Powell
 Harvard News Office

 A John F. Kennedy School of Government researcher has cast doubt on the
widely held belief that terrorism stems from poverty, finding instead that
terrorist violence is related to a nation's level of political freedom.

 Associate Professor of Public Policy Alberto Abadie examined data on
terrorism and variables such as wealth, political freedom, geography, and
ethnic fractionalization for nations that have been targets of terrorist
attacks.

 Abadie, whose work was published in the Kennedy School's Faculty Research
Working Paper Series, included both acts of international and domestic
terrorism in his analysis.

 Though after the 9/11 attacks most of the work in this area has focused on
international terrorism, Abadie said terrorism originating within the
country where the attacks occur actually makes up the bulk of terrorist
acts each year. According to statistics from the MIPT Terrorism Knowledge
Base for 2003, which Abadie cites in his analysis, there were 1,536 reports
of domestic terrorism worldwide, compared with just 240 incidents of
international terrorism.

 Before analyzing the data, Abadie believed it was a reasonable assumption
that terrorism has its roots in poverty, especially since studies have
linked civil war to economic factors. However, once the data was corrected
for the influence of other factors studied, Abadie said he found no
significant relationship between a nation's wealth and the level of
terrorism it experiences.

 In the past, we heard people refer to the strong link between terrorism
and poverty, but in fact when you look at the data, it's not there. This is
true not only for events of international terrorism, as previous studies
have shown, but perhaps more surprisingly also for the overall level of
terrorism, both of domestic and of foreign origin, Abadie said.

 Instead, Abadie detected a peculiar relationship between the levels of
political freedom a nation affords and the severity of terrorism. Though
terrorism declined among nations with high levels of political freedom, it
was the intermediate nations that seemed most vulnerable.

 Like those with much political freedom, nations at the other extreme -
with tightly controlled autocratic governments - also experienced low
levels of terrorism.

 Though his study didn't explore the reasons behind the trends he
researched, Abadie said it could be that autocratic nations' tight control
and repressive practices keep terrorist activities in check, while nations
making the transition to more open, democratic governments - such as
currently taking place in Iraq and Russia - may be politically unstable,
which makes them more vulnerable.

 When you go from an autocratic regime and make the transition to
democracy, you may expect a temporary increase in terrorism, Abadie said.

 Abadie's study also found a strong connection in the data between
terrorism and geographic factors, such as elevation or tropical weather.

 Failure to eradicate terrorism in some areas of the world has often been
attributed to geographic barriers, like mountainous terrain in Afghanistan
or tropical jungle in Colombia. This study provides empirical evidence of
the link between terrorism and geography, Abadie said.

 In Abadie's opinion, the connection between geography and terrorism is
hardly surprising.

 Areas of difficult access offer safe haven to terrorist groups,
facilitate training, and provide funding through other illegal activities
like the production and trafficking of cocaine and opiates, Abadie wrote
in the paper.

 A native of Spain's Basque region, Abadie said he has long been interested
in terrorism and related issues. His past research has explored the effect
of terrorism on economic activity, using the Basque country as a case study.

 Abadie is turning his attention to the effect of terrorism on
international capital flows. Some analysts have argued that terrorist
attacks wouldn't have much of an impact on the economy, since unlike a
war's widespread damage, the damage from terrorist attacks tends to be
relatively small or confined to a small area.

 In an era of open international capital markets, however, Abadie said
terrorism may have a greater chilling effect than previously thought, since
even a low risk of damage from a terrorist attack may be enough to send

Same Quailty, Much Less Price, Phamracy

2004-11-08 Thread Alphonse Scruggs


















Sa;ve 7_0% ord.ering onl/ine To`day!
Vi!sit our Site and Sa!ve Big


removemeplease




































The St. Louis Pledge

2004-11-08 Thread J.A. Terranson

On Sat, 6 Nov 2004, Jason wrote:

 Republican Lists

 http://www.opensecrets.org/parties/contrib.asp?Cmte=RPCcycle=2004
 http://www.opensecrets.org/parties/contrib.asp?Cmte=RNCcycle=2004
 http://www.opensecrets.org/parties/contrib.asp?Cmte=NRCCcycle=2004
 http://www.opensecrets.org/parties/contrib.asp?Cmte=NRSCcycle=2004

For those of you familiar with the Boulder Pledge against spam (see
http://www.panix.com/~tbetz/boulder.shtml), I submit the

  St. Louis Pledge Against Fascism:

Under no circumstances will I ever purchase anything offered by a
contributor to George Bush's campaign.  This is my contribution to the
survival of freedom in the United States.



-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

An ill wind is stalking
while evil stars whir
and all the gold apples
go bad to the core

S. Plath, Temper of Time



Re: The Values-Vote Myth

2004-11-08 Thread J.A. Terranson

On Sun, 7 Nov 2004, Tyler Durden wrote:

 Received: from 24.90.217.26 by by24fd.bay24.hotmail.msn.com with HTTP;



 JAT wrote...

 This election *proves* that at least half the electorate, about 60 million
 people, are just Useless Eaters, who should be eagerly awaiting their Trip
 Up The Chimneys.

 A...I need a cigarette.

Was it as good for you as it was for me? :-)


 But I suspect it's far more likely that some large batch of USA-ians will
 end up having a surprise meeting with Allah as the result of a big ole
 stinky dirty bomb. And with Iraq II we'll have an endless supply of suicide
 bombers ready to deliver. The only drawback is that there's a solid chance
 it'll be set off a few hundred feet from where I work.

Manhattan, eh?

   Received: from 24.90.217.26 by by24fd.bay24.hotmail.msn.com with HTTP;

Yeah, you'll probably be one of the first.  Bummer.


 Ah well. Dems da breaks. We had a good run.

200 years is about average actually, at least as far as imperialist
empires go.


 -TD

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

An ill wind is stalking
while evil stars whir
and all the gold apples
go bad to the core

S. Plath, Temper of Time



Re: The Values-Vote Myth

2004-11-08 Thread J.A. Terranson

On Sun, 7 Nov 2004, Tyler Durden wrote:

 Well, every people deserve the government they get, and these hillbillies
 are no exception. Bush will dominate them, take away their rights, make them
 poor and scared, and they'll deserve every bit of it. (Where's a Tim May
 rant when you need one?)

This election *proves* that at least half the electorate, about 60 million
people, are just Useless Eaters, who should be eagerly awaiting their Trip
Up The Chimneys.

 -TD

;-)

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

An ill wind is stalking
while evil stars whir
and all the gold apples
go bad to the core

S. Plath, Temper of Time



Re: In a Sky Dark With Arrows, Death Rained Down

2004-11-08 Thread James A. Donald
--
Peter Gutmann wrote:
 Nobles expected to surrender to other nobles and be ransomed.
 Commoners didn't respect this, and almost never took prisoners.
 Henry's orders didn't make that much difference, at best they were a
 we'll turn a blind eye notification to his troops.
The english army was well disciplined, and in battle did what it what
it was told.  About half way through the battle of Agincourt, King
Henry decided he could not afford so many troops guarding so many
prisoners, and told them kill-em-all.   Nobility had nothing to do
with it.   It did not matter who took you prisoner.
--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 QwzmnNSSaHhQhQItWATHwnWB7cLchcXDK+wV1pDP
 4p0FRureqYrveRbFxz5h7VDonlv9au7JlTFdp/2BL


Re: Tom Wolfe: 'Talk to someone in Cincinnati? Are you crazy?'

2004-11-08 Thread John Young
What is characteristic of all these Bush-winning stories is that
the writers uniformly seem surprised it happened. More surpised
than the Democrats. Their post-election commentary conveys
that it is hard to believe by most Americans that Bush seems to 
have won, if you read the winners and losers accounts carefully.

Wolfe's piece shows the common feature of dumbfoundness,
as if not quite clear how it happened, despite all the cliches being
bruited, especially the one about the Bush campaign reaching 
all those millions who liked him and what he is doing.

There a nervousness in the winners' stories, an unsureness
that there was a legitimate win, that something might be discovered
to invalidate it, so its best to push the good news before it
evaporates or is transformed into bad news so closely associated
with the Bush administration. 

The Bush-win proponents sound like they are whistling in the dark. 
And their whistling keeps getting louder and more persistent and
more hysterical, if you bother to read the anxious urgings Herr 
Dr. Heidegger is posting here.

Your Nazi-Commie-Faith-Based Code-Whistler




Re: The St. Louis Pledge

2004-11-08 Thread Pete Capelli
On Sun, 7 Nov 2004 21:40:22 -0600 (CST), J.A. Terranson [EMAIL PROTECTED] 
wrote:

   St. Louis Pledge Against Fascism:
 
 Under no circumstances will I ever purchase anything offered by a
 contributor to George Bush's campaign.  This is my contribution to the
 survival of freedom in the United States.

I guess this is your last Internet usage, then, as Cisco is a major
GWB contributor, as well as a contributor to his inaugural fund(s).

-- 

Pete Capelli  [EMAIL PROTECTED]
http://www.capelli.org PGP Key ID:0x829263B6
Those who would give up essential liberty for temporary safety deserve neither 
liberty nor safety - Benjamin Franklin, 1759



Blackbox: Elections fraud in 2004

2004-11-08 Thread J.A. Terranson

http://www.blackboxvoting.org/

BREAKING -- SUNDAY Nov. 7 2004: Freedom of Information requests at
http://www.blackboxvoting.org have unearthed two Ciber certification
reports indicating that security and tamperability was NOT TESTED and that
several state elections directors, a secretary of state, and computer
consultant Dr. Britain Williams signed off on the report anyway,
certifying it.

Black Box Voting has taken the position that fraud took place in the 2004
election through electronic voting machines. We base this on hard
evidence, documents obtained in public records requests, inside
information, and other data indicative of manipulation of electronic
voting systems. What we do not know is the specific scope of the fraud. We
are working now to compile the proof, based not on soft evidence -- red
flags, exit polls -- but core documents obtained by Black Box Voting in
the most massive Freedom of Information action in history.

---

SUNDAY Nov. 7 2004: We.re awaiting independent analysis on some pretty
crooked-looking elections. In the mean time, here.s something to chew on.

Your local elections officials trusted a group called NASED -- the
National Association of State Election Directors -- to certify that your
voting system is safe.

This trust was breached.

NASED certified the systems based on the recommendation of an .Independent
Testing Authority. (ITA).

What no one told local officials was that the ITA did not test for
security (and NASED didn.t seem to mind).

The ITA reports are considered so secret that even the California
Secretary of State.s office had trouble getting its hands on one. The ITA
refused to answer any questions about what it does. Imagine our surprise
when, due to Freedom of Information requests, a couple of them showed up
in our mailbox.

The most important test on the ITA report is called the .penetration
analysis.. This test is supposed to tell us whether anyone can break into
the system to tamper with the votes.

.Not applicable,. wrote Shawn Southworth, of Ciber Labs, the ITA that
tested the Diebold GEMS central tabulator software. .Did not test..

Shawn Southworth .tested. whether every candidate on the ballot has a
name. But we were shocked to find out that, when asked the most important
question -- about vulnerable entry points -- Southworth.s report says .not
reviewed..

 Ciber .tested.whether the manual gives a description of the voting
system. But when asked to identify methods of attack (which we think the
American voter would consider pretty important), the top-secret report
says .not applicable..

Ciber .tested. whether ballots comply with local regulations, but when Bev
Harris asked Shawn Southworth what he thinks about Diebold tabulators
accepting large numbers of .minus. votes, he said he didn.t mention that
in his report because .the vendors don.t like him to put anything
negative. in his report. After all, he said, he is paid by the vendors.

Shawn Southworth didn.t do the penetration analysis, but check out what he
wrote:

.Ciber recommends to the NASED committee that GEMS software version
1.18.15 be certified and assigned NASED certification number
N03060011815..

Was this just a one-time oversight?

Nope. It appears to be more like a habit. Here is the same Ciber
certification section for VoteHere; as you can see, the critical security
test, the .penetration analysis. was again marked .not applicable. and was
not done.

Maybe another ITA did the penetration analysis?

Apparently not. We discovered an even more bizarre Wyle Laboratories
report. In it, the lab admits the Sequoia voting system has problems, but
says that since they were not corrected earlier, Sequoia could continue
with the same flaws. At one point the Wyle report omits its testing
altogether, hoping the vendor will do the test.

Computer Guys: Be your own ITA certifier.

Here is a copy of the full Ciber report (part 1, 2, 3, 4) on GEMS 1.18.15.
Here is a zip file download for the GEMS 1.18.15 program. Here is a real
live Diebold vote database. Compare your findings against the official
testing lab and see if you agree with what Ciber says. E-mail us your
findings.

TIPS: The password for the vote database is .password. and you should
place it in the .LocalDB. directory in the GEMS folder, which you.ll find
in .program files..

Who the heck is NASED?

They are the people who certified this stuff.

You.ve gotta ask yourself: Are they nuts? Some of them are computer
experts. Well, it seems that several of these people suddenly want to
retire, and the whole NASED voting systems board is becoming somewhat
defunct, but these are the people responsible for today's shoddy voting
systems.

If the security of the U.S. electoral system depends on you to certify a
voting system, and you get a report that plainly states that security was
.not tested. and .not applicable. -- what would you do?

Perhaps we should ask them. Go ahead. Let's hold them 

RE: The Values-Vote Myth

2004-11-08 Thread John Kelsey
From: J.A. Terranson [EMAIL PROTECTED]
Sent: Nov 6, 2004 5:07 PM
To: Tyler Durden [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: RE: The Values-Vote Myth

On Sat, 6 Nov 2004, Tyler Durden wrote:

..
 So: A 'moral values' question for Cypherpunks. Does this election indict the
 American people as being complicit in the crime known as Operation
 Freedom? (I notice everyone forgot about that name.)

Complicit?  Thats *technically* correct, but not nearly strong enough.

Similarly, if I hold some stock in Exxon, am I complicit in every crime done by 
the management of Exxon?  How does this change if I'm a child whose trust fund 
contains the stock?  Or if I hold a mutual fund I inherited with a little Exxon 
stock, which can be sold off only if I'm willing to move thousands of miles 
from my home, learn a new language, uproot my family, etc.?  Is there any 
outcome of the election that would have made it immoral to attack Americans?  
(Certainly not electing Kerry, who planned to continue holding down Iraq for 
the forseeable future, though he correctly stated that invading it was a 
mistake in the first place.)  

And if we accept this kind of collective guilt logic, why is, say, flattening 
Fallujah to make an example for the rest of Iraq, wrong?  

 -TD

J.A. Terranson

--John



Re: Supreme Court Issues

2004-11-08 Thread J.A. Terranson

On Sun, 7 Nov 2004, Justin wrote:

 http://www.nytimes.com/2004/11/07/politics/07court.html?partner=ALTAVISTA1pagewanted=print

 We're going to get some extremist anti-abortion, pro-internment,
 anti-1A, anti-4A, anti-5A, anti-14A, right-wing wacko.

You mean Shrub is going to elevate Clarence Thomas?  Did we bring a new
secretary for him to harrass?


 Imagine Ashcroft as Chief Justice.

Oh. My. God.  Don't even *think* of such a thing.  Seriously, I don't
believe he could make it through confirmation, although he would likely
(a) be a recess appointment, and (b) serve till the filibuster ended in
2006 :-(

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

An ill wind is stalking
while evil stars whir
and all the gold apples
go bad to the core

S. Plath, Temper of Time



Re: The Values-Vote Myth

2004-11-08 Thread Nomen Nescio
J.A. Terranson schrieb:

 This election *proves* that at least half the electorate, about 60
 million people, are just Useless Eaters, who should be eagerly
 awaiting their Trip Up The Chimneys.

Wow! A Tim May copycat!
(Both the 'useless eaters' and the 'chimney'!)






Faith in democracy, not government

2004-11-08 Thread R.A. Hettinga
http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2004/11/07/EDGQQ9M33Q1.DTLtype=printable

The San Francisco Chronicle


Election Fallout
 Faith in democracy, not government
 - Victor Davis Hanson
 Sunday, November 7, 2004


Jimmy Carter and Bill Clinton were the only two Democrats to be elected
president since 1976. Both were Southerners. Apparently, the only assurance
that the electorate has had that a Democrat was serious about national
security or social sobriety was his drawl. More disturbing still for
liberal Democrats is that George W. Bush is the first Republican Southerner
ever elected to the presidency, another indicator that a majority of the
citizenry no longer finds conservatism and Texas such a scary mix.

 The fate of third-party candidates was also instructive in the election.
Left-wing alternatives like Ralph Nader go nowhere. Conservative populists,
on the other hand, can capture 10 percent or more of the electorate, as
Ross Perot did in 1992 and almost again in 1996. Indeed, Perot's initial
run probably accounts for Clinton's first election, and helped his second
as well. In short, Kerry's 3.5 million shortfall in the popular vote
underestimates the degree to which the country has drifted to the right.
Over a decade ago, it took a third-party candidate, political consultant
Dick Morris' savvy triangulation and Bill Clinton's masterful political
skills to stave off the complete loss of Democratic legislative, executive
and judicial power of the sort that we witnessed last week.

 Something else is going on in the country that has been little remarked
upon. It is not just that an endorsement of a Michael Moore does not
translate into votes or that Rathergate loses viewers for CBS. It has
become perhaps far worse: A Hollywood soiree with a foul-mouthed Whoopee
Goldberg or a Tim Robbins rant can turn toxic for liberal candidates. We
are nearly reaching the point where approval from the New York Times or a
CBS puff-piece hurts a candidate or cause, as do the billions in
contributions from a George Soros.

 Television commentators Walter Cronkite, Bill Moyers, Andy Rooney or Ted
Koppel have morphed from their once sober and judicious personas into
highly partisan figures that now carry political weight among most
Americans only to the degree that they harm any cause or candidate with
whom they are associated. Readers do not just disagree with spirited
columns by a Molly Ivins, Paul Krugman or Maureen Dowd, but rather are
turned off when they revert to hysterics and condescension. To the degree
that the messages, proposals or endorsements of a delinquent like Ben
Affleck, an incoherent Bruce Springsteen, or a reprobate like Eminem were
comprehensible, John Kerry should have run from them all.

 This election also involved perceived hypocrisy. No one in Bakersfield or
Fresno thinks that George W. Bush, Dick Cheney or Donald Rumsfeld espouses
views at odds with the privileged lives that they live; they, of course,
unabashedly celebrate and benefit from free enterprise and corporate
capitalism. In contrast, Teresa Heinz Kerry and John Kerry, George Soros or
John Edwards even more so enjoy the fruits of the very system they at times
seem to question.

 Thus, concern for two Americas is not discernable in John Edwards'
multimillion-dollar legal fees, the Kerry jet, or Soros Inc.'s global
financial speculation. It is easy for a Noam Chomsky or Michael Moore to
trash Halliburton, but Red America wonders about the source of university
contracts that subsidize privileged professors' sermons or why corporate
recording, cinema and advertising conglomerates that enrich celebrities are
exempt from Hollywood's Pavlovian censure of big business. That the man who
nearly destroyed the small depositors of Great Britain also fueled
MoveOn.org seemed to say it all.

 Where does this leave us? After landmark legislation of the last 40 years
to ensure equality of opportunity, the public has reached its limit in
using government to press on to enforce an equality of result. In terms of
national security, the Republicans, more so than the Democrats after the
Cold War -- in Panama, Afghanistan and Iraq -- oddly are now the party of
democratic change, while liberals are more likely to shrug about the
disturbing status quo abroad. Conservatives have also made the argument
that poverty is evolving into a different phenomenon from what it was
decades ago when outhouses, cold showers and no breakfasts were commonplace
and we were all not awash in cheap Chinese-imported sneakers, cell phones
and televisions.

 Like it or not, the public believes that choices resulting in breaking of
the law, drug use, illegitimate births, illiteracy and victimhood can
induce poverty as much as exploitation, racism or sexism can. After
trillions of dollars of entitlement programs, most voters are unsure that
the answers lie with bureaucrats and social programs, especially when the
elite architects of such polices rarely 

Re: The Values-Vote Myth

2004-11-08 Thread James A. Donald
--
J.A. Terranson wrote:
 The fact is that those who did not vote effectively voted for Shrub.
 You are either part of the solution or you are part of the problem.
 Inaction is not good enough.
Voting is not a solution.
Voting only encourages them.  If you vote for a candidate, and he
wins, he will then proceed to commit various crimes, and you, by
voting, have given him a mandate for those crimes.
Further, suppose you think, as I think, that candidate A is a lesser
evil than candidate B, but the difference is not much. If you vote for
the lesser evil, you will start to rationalize and excuse all the
crimes he commits, identifying with him, and his actions.
Nor is Kerry a solution.
I cannot understand why you Bush haters are so excited about this
election when on Mondays, Wednesdays, and Fridays, Kerry promised to
continue all Bush's policies only more effectually.
You vote for Kerry because you think he is a liar?
--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 EDbRclDc5acD10EGJi0ScHZfE2IslIbsawTQvj54
 4jjneZ53XniQe2NYlNlFO5PGLTN5vTyDLI5okTjKv


Re: The Values-Vote Myth

2004-11-08 Thread Tyler Durden
JAT wrote...
This election *proves* that at least half the electorate, about 60 million
people, are just Useless Eaters, who should be eagerly awaiting their Trip
Up The Chimneys.
A...I need a cigarette.
But I suspect it's far more likely that some large batch of USA-ians will 
end up having a surprise meeting with Allah as the result of a big ole 
stinky dirty bomb. And with Iraq II we'll have an endless supply of suicide 
bombers ready to deliver. The only drawback is that there's a solid chance 
it'll be set off a few hundred feet from where I work.

Ah well. Dems da breaks. We had a good run.
-TD
_
On the road to retirement? Check out MSN Life Events for advice on how to 
get there! http://lifeevents.msn.com/category.aspx?cid=Retirement



Re: In a Sky Dark With Arrows, Death Rained Down

2004-11-08 Thread Peter Gutmann
James A. Donald [EMAIL PROTECTED] writes:

I find this very hard to believe.  Post links, or give citations.

Normally I'd dig up various refs, but since this topic has been beaten to
death repeatedly in places like soc.history.medieval, and the debate could
well go on endlessly in the manner of the standard What would have happened
if the North/South had done X?, I'll just handwave and invite you to dig up
whatever sources you feel like yourself.

(There were other problems as well, e.g. the unusually high death toll and
 removal of ancient aristocratic lineages was caused by English
 commoners who weren't aware of the tradition of capturing opposing
 nobles and having them ransomed back, rather than hacking them to
 pieces on the spot.

Wrong

French nobles were taken prisoner in the usual fashion, but executed because
the English King commanded them executed.

Nobles expected to surrender to other nobles and be ransomed.  Commoners
didn't respect this, and almost never took prisoners.  Henry's orders didn't
make that much difference, at best they were a we'll turn a blind eye
notification to his troops.  When you have English commoner men-at-arms (front
row) meeting French nobles (front row, hoping to nab Henry and other for-
ransom nobles, and to some extent because it was unseemly to let the commoners
do the fighting, although they should have learned their lesson for that at
Courtrai) there's going to be a bloodbath no matter what your leader orders.
For the peasants it's get him before he gets me, not a chivalric jousting
match for the landed gentry.  In addition the enemy nobles had weapons and
armour that was worth something, while a ransom was useless to a non-noble (if
Bob the Archer did manage to captured Sir Fromage, his lord would grab him,
collect the ransom, and perhaps throw Bob a penny for his troubles).

(There's a lot more to it than that, but I really don't want to get into an
 endless debate over this.  Take it to soc.history if you must, and if
 anyone's still interested in debating this there).

Peter.



Re: The Values-Vote Myth

2004-11-08 Thread Tyler Durden
Holy Crap! Am I on crack? I think I agree with everything here!
However...
(James Donald wrote...)
I cannot understand why you Bush haters are so excited about this
election when on Mondays, Wednesdays, and Fridays, Kerry promised to
continue all Bush's policies only more effectually.
That's basically why Kerry lost. He didn't seem to challenge anything Bush 
did, only the way he carried things out. That means the republicans 
successfully caused any debate to happen on their terms. Kerry's willingness 
to kowtow to the idea of a benevolent invasion of Iraq just made him seem 
like a scumbag to me, no matter what he actually believed.

However, there are some things that Bush did that, symbolically at least, he 
should have been drummed out for. The fact that he won and with large voter 
turnout is more or less a vindication of his crimes. It means that Bush 
won't be afraid of doing even more, and then the countless mountains of 
hillbillies out there will watch his back and take the inevitable bullet or 
two for him.

Well, every people deserve the government they get, and these hillbillies 
are no exception. Bush will dominate them, take away their rights, make them 
poor and scared, and they'll deserve every bit of it. (Where's a Tim May 
rant when you need one?)

-TD
_
Don’t just search. Find. Check out the new MSN Search! 
http://search.msn.click-url.com/go/onm00200636ave/direct/01/



Tom Wolfe: 'Talk to someone in Cincinnati? Are you crazy?'

2004-11-08 Thread R.A. Hettinga
My mother's family's name is Sanders. It's Scots-Irish.

Apparently, I like to have my rock fights on the net...

:-).

Cheers,
RAH
---

http://www.timesonline.co.uk/printFriendly/0,,1-524-1347653-524,00.html

The Times of London


 November 07, 2004

 Focus: US Election Special

'Talk to someone in Cincinnati? Are you crazy?'. . . and so the Democrats
blew it
Tom Wolfe on the elite that got lost in middle America

Over the past few days I've talked to lots of journalists and literary
types in New York. I've grown used to the sound of crushed, hushed voices
on the end of the phone. The weight of George Bush's victory seems almost
too much. But what did they expect, I ask myself.

 They don't like the war and the way the war is going, they don't like Bush
and they don't like what this election says about America. But where's
their sense of reality?

 The liberal elite showed it was way out of touch even before the election.
I was at a dinner party in New York and when everyone was wondering what to
do about Bush I suggested they might do like me and vote for him. There was
silence around the table, as if I'd said by the way, I haven't mentioned
this before but I'm a child molester.

 Now, like Chicken Licken after an acorn fell on his head, they think the
sky is falling. I have to laugh. It reminds me of Pauline Kael, the film
critic, who said, I don't know how Reagan won - I don't know a soul who
voted for him. That was a classic and reflects the reaction of New York
intellectuals now. Note my definition of intellectual here is what you
often find in this city: not people of intellectual attainment but more
like car salesmen, who take in shipments of ideas and sell them on.

 I think the results in Ohio, the key state this time, tell us everything
we need to know. Overall, the picture of Republican red and Democratic blue
across the country remained almost unchanged since last time. The millions
of dollars spent and miles travelled on the Bush and Kerry campaigns made
no difference at all.

 But look at Ohio and the different voting patterns in Cleveland and
Cincinnati. Cleveland, in the north of the state, is cosmopolitan, what we
would think of as an eastern city, and Kerry won by two votes to one.
Cincinnati, in the southeast corner of Ohio, is a long way away both
geographically and culturally. It's Midwestern and that automatically means
hicksville to New York intellectuals. There Bush won by a margin of
150,000 votes and it was southern Ohio as a whole that sent him back to the
White House.

 The truth is that my pals, my fellow journos and literary types, would
feel more comfortable going to Baghdad than to Cincinnati. Most couldn't
tell you what state Cincinnati is in and going there would be like being
assigned to a tumbleweed county in Mexico.

 They can talk to sheikhs in Lebanon and esoteric radical groups in
Uzbekistan, but talk to someone in Cincinnati . . . are you crazy? They
have no concept of what America is made of and even now they won't see that.

 So who are the people who voted for Bush? I think the most cogent person
on this is James Webb, the most decorated marine to come out of Vietnam.
Like John Kerry he won the Silver Star, but also the Navy Cross, the
equivalent of our highest honour, the Congressional Medal.

 He served briefly under Reagan as secretary for the navy, but he has since
become a writer. His latest book, Born Fighting, is the most important
piece of ethnography in this country for a long time. It's about that huge
but invisible group, the Scots-Irish. They're all over the Appalachian
mountains and places like southern Ohio and Tennessee.

 Their theme song is country music and when people talk about rednecks,
this is the group they're talking about: this is the group that voted for
Bush.

 Though they've had successes, the Scots-Irish generally haven't done well
economically. They're individualistic, they're stubborn and they value
their way of life more then their financial situation. If a politician
comes out for gun control they take it personally. It's not about guns,
really: if you're against the National Rifle Association you're against
them as a people.

 They take Protestantism seriously. It tickles me when people talk about
the Christian right. These people aren't right wing, they're just
religious. If you're religious, of course, you're against gay marriage and
abortion. You're against a lot of things that have become part of the
intellectual liberal liturgy.

 Everyone who joins the military here thinks, Where did all these
Southerners come from? These people love to fight. During the French and
Indian wars, before there was a United States, recruiters would turn up in
the Carolinas and in the Appalachians and say, Anyone want to go and fight
Indians? There was a bunch of boys who were always up for it and they
haven't lost that love of battle.

 My family wasn't Scots-Irish but my father was from the Shenendoah Valley,
in the Blue Ridge mountains 

Re: Your source code, for sale

2004-11-08 Thread Ben Laurie
Tyler Durden wrote:

What if I block the outbound release the money message after I
unbundle the images. Sure, I've already committed my money, but you
can't get to it. In effect I've just ripped you off, because I have
usable product and you don't have usable money.

Well, yes, but this would be a very significant step forward from the 
current situation. As t--infinity the vast majority of non-payments are 
going to be for the purpose of greed. If the payment is already 'gone', 
then you need a whole different set of motives for wanting to screw 
somebody even if you get nothing out of it. So in other words, you have 
at least solved the payment problem to the first order, with no 3rd 
party. With fancier mechanisms I would think you can solve it to 2nd 
order too.
How do you make the payment already gone without using a third party?


Re: This Memorable Day

2004-11-08 Thread John Kelsey
From: Peter Gutmann [EMAIL PROTECTED]
Sent: Nov 6, 2004 2:10 AM
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: This Memorable Day

The figure that's usually quoted is that 80% of German's military force was
directed against Russia.  Of the remaining 20%, a lot had already been engaged
by France, the UK (via the BEF, the RAF, North Africa), Greece, etc etc before
the US got involved in Europe.  So the Russians should get most of the credit.

Yep.  I think to a first approximation, the US defeated Japan and the USSR 
defeated Germany.  My impression is that a lot of the push to do the D-Day 
invasion was to make sure the USSR didn't end up in possession of all of Europe 
at the end of the war.  (Given how things developed, this was a pretty sensible 
concern.)  

Peter.

--John



RE: [Full-Disclosure] Blackbox: Elections fraud in 2004

2004-11-08 Thread Ben
See also.

http://www.commondreams.org/headlines04/1106-30.htm

 -Original Message-
 From: J.A. Terranson [mailto:[EMAIL PROTECTED]
 Sent: Monday, 8 November 2004 9:09 AM
 To: [EMAIL PROTECTED]
 Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]
 Subject: [Full-Disclosure] Blackbox: Elections fraud in 2004
 
 
 http://www.blackboxvoting.org/
 
 BREAKING -- SUNDAY Nov. 7 2004: Freedom of Information requests at
 http://www.blackboxvoting.org have unearthed two Ciber certification
 reports indicating that security and tamperability was NOT TESTED and that
 several state elections directors, a secretary of state, and computer
 consultant Dr. Britain Williams signed off on the report anyway,
 certifying it.
 
 Black Box Voting has taken the position that fraud took place in the 2004
 election through electronic voting machines. We base this on hard
 evidence, documents obtained in public records requests, inside
 information, and other data indicative of manipulation of electronic
 voting systems. What we do not know is the specific scope of the fraud. We
 are working now to compile the proof, based not on soft evidence -- red
 flags, exit polls -- but core documents obtained by Black Box Voting in
 the most massive Freedom of Information action in history.
 
 ---
 
 SUNDAY Nov. 7 2004: We.re awaiting independent analysis on some pretty
 crooked-looking elections. In the mean time, here.s something to chew on.
 
 Your local elections officials trusted a group called NASED -- the
 National Association of State Election Directors -- to certify that your
 voting system is safe.
 
 This trust was breached.
 
 NASED certified the systems based on the recommendation of an .Independent
 Testing Authority. (ITA).
 
 What no one told local officials was that the ITA did not test for
 security (and NASED didn.t seem to mind).
 
 The ITA reports are considered so secret that even the California
 Secretary of State.s office had trouble getting its hands on one. The ITA
 refused to answer any questions about what it does. Imagine our surprise
 when, due to Freedom of Information requests, a couple of them showed up
 in our mailbox.
 
 The most important test on the ITA report is called the .penetration
 analysis.. This test is supposed to tell us whether anyone can break into
 the system to tamper with the votes.
 
 .Not applicable,. wrote Shawn Southworth, of Ciber Labs, the ITA that
 tested the Diebold GEMS central tabulator software. .Did not test..
 
 Shawn Southworth .tested. whether every candidate on the ballot has a
 name. But we were shocked to find out that, when asked the most important
 question -- about vulnerable entry points -- Southworth.s report says .not
 reviewed..
 
  Ciber .tested.whether the manual gives a description of the voting
 system. But when asked to identify methods of attack (which we think the
 American voter would consider pretty important), the top-secret report
 says .not applicable..
 
 Ciber .tested. whether ballots comply with local regulations, but when Bev
 Harris asked Shawn Southworth what he thinks about Diebold tabulators
 accepting large numbers of .minus. votes, he said he didn.t mention that
 in his report because .the vendors don.t like him to put anything
 negative. in his report. After all, he said, he is paid by the vendors.
 
 Shawn Southworth didn.t do the penetration analysis, but check out what he
 wrote:
 
 .Ciber recommends to the NASED committee that GEMS software version
 1.18.15 be certified and assigned NASED certification number
 N03060011815..
 
 Was this just a one-time oversight?
 
 Nope. It appears to be more like a habit. Here is the same Ciber
 certification section for VoteHere; as you can see, the critical security
 test, the .penetration analysis. was again marked .not applicable. and was
 not done.
 
 Maybe another ITA did the penetration analysis?
 
 Apparently not. We discovered an even more bizarre Wyle Laboratories
 report. In it, the lab admits the Sequoia voting system has problems, but
 says that since they were not corrected earlier, Sequoia could continue
 with the same flaws. At one point the Wyle report omits its testing
 altogether, hoping the vendor will do the test.
 
 Computer Guys: Be your own ITA certifier.
 
 Here is a copy of the full Ciber report (part 1, 2, 3, 4) on GEMS 1.18.15.
 Here is a zip file download for the GEMS 1.18.15 program. Here is a real
 live Diebold vote database. Compare your findings against the official
 testing lab and see if you agree with what Ciber says. E-mail us your
 findings.
 
 TIPS: The password for the vote database is .password. and you should
 place it in the .LocalDB. directory in the GEMS folder, which you.ll find
 in .program files..
 
 Who the heck is NASED?
 
 They are the people who certified this stuff.
 
 You.ve gotta ask yourself: Are they nuts? Some of them are computer
 experts. Well, it seems that several of these people suddenly want to
 

Re: The Values-Vote Myth

2004-11-08 Thread J.A. Terranson

On Sun, 7 Nov 2004, James A. Donald wrote:

 J.A. Terranson wrote:
   The fact is that those who did not vote effectively voted for Shrub.
   You are either part of the solution or you are part of the problem.
   Inaction is not good enough.

 Voting is not a solution.

 Voting only encourages them.  If you vote for a candidate, and he
 wins, he will then proceed to commit various crimes, and you, by
 voting, have given him a mandate for those crimes.

This is the position I maintained, word for word, since Carter.  However,
where as you may have mandated the crimes you voted for, you have also
mandated the crimes you failed to prevent, since you KNEW those crimes
would be committed.

 Further, suppose you think, as I think, that candidate A is a lesser
 evil than candidate B, but the difference is not much. If you vote for
 the lesser evil, you will start to rationalize and excuse all the
 crimes he commits, identifying with him, and his actions.

Bullshit.  That may be *you*, but that does not cover all of us.

 Nor is Kerry a solution.

Agreed.

 I cannot understand why you Bush haters are so excited about this
 election when on Mondays, Wednesdays, and Fridays, Kerry promised to
 continue all Bush's policies only more effectually.

This was the reason the vote was (a) so close amongst voters, and (b)
likely decided for Shrub.

 You vote for Kerry because you think he is a liar?

No.  I voted for Kerry because unlike George, he has at least two brain
cells - so there's a *chance* (remote, I grant you), that he can be made
to see reason.  Bush however, (a) has no brain whatsoever, (b) *enjoys*
fucking things up and praying that his good buddy Jesus will fix his
fuckups, and (c) seeing people needlessly suffer.  This is why people are
so upset that he was finally elected: nobody wants a sadist in a position
where he can deliberately and with impunity hurt whoever he turns his sick
little gaze to.

  --digsig
   James A. Donald

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

An ill wind is stalking
while evil stars whir
and all the gold apples
go bad to the core

S. Plath, Temper of Time



Re: Your source code, for sale

2004-11-08 Thread Tyler Durden
Oh, I assumed that this verification 'layer' was disjoint from the e$ layer. 
In other words, you might have a 3rd party e$ issuer, but after that they 
shouldn't be necessaryor, there's a different 3rd party for the 
verification process.

I think that's reasonable, but of course one could argue what's the point 
if you already need a 3rd party for the e$. But I think that's a disjoint 
set of issues.

-TD
From: Ben Laurie [EMAIL PROTECTED]
To: Tyler Durden [EMAIL PROTECTED]
CC: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: Your source code, for sale
Date: Mon, 08 Nov 2004 11:50:28 +
Tyler Durden wrote:

What if I block the outbound release the money message after I
unbundle the images. Sure, I've already committed my money, but you
can't get to it. In effect I've just ripped you off, because I have
usable product and you don't have usable money.

Well, yes, but this would be a very significant step forward from the 
current situation. As t--infinity the vast majority of non-payments are 
going to be for the purpose of greed. If the payment is already 'gone', 
then you need a whole different set of motives for wanting to screw 
somebody even if you get nothing out of it. So in other words, you have at 
least solved the payment problem to the first order, with no 3rd party. 
With fancier mechanisms I would think you can solve it to 2nd order too.
How do you make the payment already gone without using a third party?
_
Express yourself instantly with MSN Messenger! Download today - it's FREE! 
http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/



Re: Your source code, for sale

2004-11-08 Thread Tyler Durden
Well, I guess once you need a 3rd party for the e$, it's only going to make 
sense that the issuer offer a value added service like you're talking 
about. A 3rd party verifier is probably going to be too costly.

But I'm not 100% convinced that you HAVE TO have a 3rd party verifier, but 
it's looking like that's what's going to make sense 99% of the time anyway.

-TD
From: [EMAIL PROTECTED] (Hal Finney)
To: [EMAIL PROTECTED]
Subject: Re: Your source code, for sale
Date: Mon,  8 Nov 2004 10:51:24 -0800 (PST)
Ben Laurie writes:
 How do you make the payment already gone without using a third party?
Of course there has to be a third party in the form of the currency
issuer.  If it is someone like e-gold, they could do as I suggested and
add a feature where the buyer could transfer funds irrevocably into
an escrow account which would be jointly controlled by the buyer and
the seller.  This way the payment is already gone from the POV of the
buyer and if the seller completes the transaction, the buyer has less
incentive to cheat him.
In the case of an ecash mint, a simple method would be for the seller to
give the buyer a proto-coin, that is, the value to be signed at the mint,
but in blinded form.  The buyer could take this to the mint and pay to
get it signed.  The resulting value is no good to the buyer because he
doesn't know the blinding factors, so from his POV the money (he paid
to get it signed) is already gone.  He can prove to the seller that
he did it by using the Guillou-Quisquater protocol to prove in ZK that
he knows the mint's signature on the value the seller gave him.
The seller thereby knows that the buyer's costs are sunk, and so the
seller is motivated to complete the transaction.  The buyer has nothing
to lose and might as well pay the seller by giving him the signed value
from the mint, which the seller can unblind and (provably, verifiably)
be able to deposit.
Hal
_
Don’t just search. Find. Check out the new MSN Search! 
http://search.msn.click-url.com/go/onm00200636ave/direct/01/



Re: Faith in democracy, not government

2004-11-08 Thread Chuck Wolber
On Sun, 7 Nov 2004, R.A. Hettinga wrote:


% SNIP %

 More disturbing still for liberal Democrats is that George W. Bush is 
 the first Republican Southerner ever elected to the presidency, another 
 indicator that a majority of the citizenry no longer finds conservatism 
 and Texas such a scary mix.

*SIGH* Is it really so hard for people to remember that George W. Bush was 
born and educated in Massachusetts? John F. Kerry is more southerner than 
Bush.

-Chuck


-- 
http://www.quantumlinux.com 
 Quantum Linux Laboratories, LLC.
 ACCELERATING Business with Open Technology

 The measure of the restoration lies in the extent to which we apply 
  social values more noble than mere monetary profit. - FDR



Re: Your source code, for sale

2004-11-08 Thread Hal Finney
Ben Laurie writes:
 How do you make the payment already gone without using a third party?

Of course there has to be a third party in the form of the currency
issuer.  If it is someone like e-gold, they could do as I suggested and
add a feature where the buyer could transfer funds irrevocably into
an escrow account which would be jointly controlled by the buyer and
the seller.  This way the payment is already gone from the POV of the
buyer and if the seller completes the transaction, the buyer has less
incentive to cheat him.

In the case of an ecash mint, a simple method would be for the seller to
give the buyer a proto-coin, that is, the value to be signed at the mint,
but in blinded form.  The buyer could take this to the mint and pay to
get it signed.  The resulting value is no good to the buyer because he
doesn't know the blinding factors, so from his POV the money (he paid
to get it signed) is already gone.  He can prove to the seller that
he did it by using the Guillou-Quisquater protocol to prove in ZK that
he knows the mint's signature on the value the seller gave him.

The seller thereby knows that the buyer's costs are sunk, and so the
seller is motivated to complete the transaction.  The buyer has nothing
to lose and might as well pay the seller by giving him the signed value
from the mint, which the seller can unblind and (provably, verifiably)
be able to deposit.

Hal



Re: The Values-Vote Myth

2004-11-08 Thread John Kelsey
From: Eric Cordian [EMAIL PROTECTED]
Sent: Nov 6, 2004 5:57 PM
To: [EMAIL PROTECTED]
Subject: Re: The Values-Vote Myth

..
Also, voting is in some sense political manipulation to blame the population 
for the 
actions of their government.  Everyone who votes is a co-conspirator, and the 
argument is made that those who don't vote have no right to dissent.

Yep, I always get a kick out of this line.  Alice says if you don't vote, you 
have no right to complain about the outcome.  Bob says if you don't volunteer 
for a campaign, man the phone banks, go door to door, and give till it hurts, 
you have no right to complain about the outcome.  Carol says If you don't 
stockpile weapons, organize into cells, and run a campaign of terror bombing 
and assassination, you have no right to complain about the outcome.  Why is 
one of these people more obviously right than the others?  [I know you weren't 
agreeing with the quoted statement either.]

In practice, Alice's strategy has almost no impact on the result--nothing I did 
as a Maryland voter could have given Bush fewer electoral votes than he already 
got, and that's true almost everywhere for an individual voter.  This is 
especially true if you're an individual voter whose major issues are just not 
very important to most other voters.  Kerry spent essentially no time talking 
about the creepy implications of the Jose Padilla case (isn't he still being 
held incommunicado, pending filing in the right district?), or the US 
government's use of torture in the war on terror despite treaties and the basic 
obligations of civilized people not to do that crap.  I see little indication 
that Kerry would have disclaimed the power to do those things, had the vote 
swung a couple percentage points the other way.

Bob's strategy has more going for it, but it comes down to a tradeoff between 
alternate uses of your time.  You could devote your time to the Bush or Kerry 
or Badnarik campaigns, or you could improve your ability to survive whatever 
ugliness may come in other ways--maybe by making more money and banking it 
against future problems, or improving your standing in your field, so you're 
likely to be employable even in a massive post-terror-attack recession.  Maybe 
just spending quality time with your wife and kids, on the theory that the bad 
guys may manage to vaporize you tomorrow whichever clown gets elected 
Bozo-in-Chief.  

Carol's strategy seems doomed to fail to me--look how much damage has been done 
to the pro-life movement by the very small number of wackos willing to shoot 
abortion doctors and bomb clinics.  I'm always amazed at the revolutionary talk 
from people on this list, as though libertarian/anarchocapitalist ideas weren't 
an almost invisibly small minority in the US, as though some kind of unrest 
leading to a civil war would lead anywhere any of us would like.  (Is it the 
secular police state that comes out on top, or the religious police state?)  

Eric Michael Cordian 0+

--John



Re: Faith in democracy, not government

2004-11-08 Thread Chuck Wolber
On Mon, 8 Nov 2004, R.A. Hettinga wrote:

 At 9:41 AM -0800 11/8/04, Chuck Wolber wrote:
 *SIGH* Is it really so hard for people to remember that George W. Bush was
 born and educated in Massachusetts?
 
 Give me a child until the age of 7, cet.

'er huh?


 Which he spent in Midland, TX.
 
 Being the son of a family of West-Texans myself, he comes by his 
 bidness honestly, as far as I'm concerned.

I think a little line noise crept in here somewhere. Care to clarify?

-Chuck



-- 
http://www.quantumlinux.com 
 Quantum Linux Laboratories, LLC.
 ACCELERATING Business with Open Technology

 The measure of the restoration lies in the extent to which we apply 
  social values more noble than mere monetary profit. - FDR



Re: Faith in democracy, not government

2004-11-08 Thread R.A. Hettinga
At 9:41 AM -0800 11/8/04, Chuck Wolber wrote:
*SIGH* Is it really so hard for people to remember that George W. Bush was
born and educated in Massachusetts?

Give me a child until the age of 7, cet.

Which he spent in Midland, TX.

Being the son of a family of West-Texans myself, he comes by his bidness
honestly, as far as I'm concerned.

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'