Re: What is a cypherpunk?

2005-02-10 Thread Eugen Leitl
On Wed, Feb 09, 2005 at 04:58:22PM -0800, James A. Donald wrote:

 Corporate lawyers did not descend on Linux until there were

Corporations never saw Linux coming. Now that FOSS is on the radar
screen, you'll see lots of very obvious ramming through of IP protection in
software.

You haven't noticed the software patent charade happening in EU 
right now? It is not at all obvious who's going to win.

 enough wealthy linux users to see them in court, and send in
 their own high priced lawyers to give them the drubbing they
 deserved.

You're misinterpreting the events. Industry has so far been fighting with
propagada only. Outside of FOSS IP wars are the rule.
 
   If, however, you decline to pay taxes, men with guns will 
   attack you.
 
  If you ignore a kkkorporate cease  desist, men with guns
  will get you, too.
 
 You live in a world of your own.
 
 In civil court, the guy with no assets has a huge advantage
 over the guy with huge assets -because the guy with huge assets

What a nice boolean universe you live in. Fact is that FOSS can be easily
DoSed by lawyers of a party with deeper pockets (basically, any party with
deeper pocket than a couple of bearded hackers).

 *cannot* send men with guns to beat him up and put him in jail
 - he can only seize the (nonexistent) assets of the guy with no
 assets.   So what we instead see is frivolous and fraudulent

Excellent strawman. Where are you getting these? I need to order a couple.

 lawsuits by people with no assets against big corporations, for
 example the silicone scam.
 
 It is in criminal court where the guy with no assets goes
 unjustly to jail, and that is the doing of the state, not the
 corporation. 

Again, neither state nor the corporate has your wellbeing as optimization
criterium. It does frequently happen that superpersonal organization units
result in a better world than the alternatives. Then, quite often not.

We need smarter agents. 

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpoQNzX1XRps.pgp
Description: PGP signature


Re: What is a cypherpunk?

2005-02-10 Thread ken
James A. Donald wrote:
If, however, you decline to pay taxes, men with guns will
attack you.
That is the difference between private power and government
power.
But in most places at most times the state is run at least partly 
by and for the rich and the owners of property and  supports and 
privileges their continuing private power.

And there are circumstances where private individuals send men 
with guns to attack you if you  cross them.Quite a lot of 
them, from the feudal barons, to drug-dealers in modern cities, to 
 just about anywhere out of easy reach of the state's police.

And there are places where corporations do that as well. Even 
well-run respectable British or American corporations that have 
annual reports and  shareholder's meetings.

State power and private power are different but not distinct, and 
everywhere more or less mixed up with each other and involved with 
each other, and in most places the same sorts of people have both. 
Economic power is a kind of political power.



Precedent for Warrantless Net Monitoring Set

2005-02-10 Thread Eugen Leitl

From the somebody-needs-killing dept.

Link: http://slashdot.org/article.pl?sid=05/02/10/0044214
Posted by: samzenpus, on 2005-02-10 05:40:00

   from the only-bad-people-need-privacy dept.
   highcon writes According to this editorial from SecurityFocus, a
   recent case of a drug dog which pushed the limits of reasonable
   search may have [1]implications for Internet communications in the
   U.S. This Supreme Court case establishes a precendent whereby
   intelligent packet filters may be deployed which, while scanning the
   contents of network traffic indiscriminently, only bark at
   communication indicative of illegal activity.

References

   1. http://www.securityfocus.com/columnists/297

- End forwarded message -

Of Dog Sniffs and Packet Sniffs
Why a Supreme Court decision on canine-assisted roadside searches opens the
door to a new regime of Internet surveillance.
By Mark Rasch Feb 08 2005 11:21AM PT
Click here for Core Impact!
The Fourth Amendment to the U.S. Constitution is supposed to be the one that
protects people and their houses, places and effects against unreasonable
searches. Forty-two years ago, the U.S. Supreme Court held that attaching a
listening device to a public pay phone violated this provision because the
Constitution protects people, not places, and because the Fourth Amendment
prohibits warrantless searches without probable cause if the target enjoys a
reasonable expectation of privacy.

Last month the U.S. Supreme Court effectively decimated this principle in a
case that could have a profound impact on privacy rights online.

The case, decided by the court on January 24th, had nothing to do with the
Information Superhighway, but rather an ordinary interstate highway in
Illinois. Roy Caballes was pulled over by the Illinois State Police for
speeding. While one officer was writing him a ticket, another officer in
another patrol car came by with a drug sniffing dog.

There was absolutely no reason to believe that Caballes was a drug courier --
no profile, no suspicious activity, no large amounts of cash. The driver
could have been a soccer mom with a minivan filled with toddlers. Under
established Supreme Court precedent, while the cops could have looked in the
window to see what was in plain view, the officers had neither probable
cause nor reasonable suspicion to search Caballes' car, trunk, or person.

Well, you know what happened next -- the dog sniff indicated that there
might be drugs in the trunk, which established probable cause to open the
trunk, where the cops found some marijuana.
The government may soon deploy intelligent packet search filters that will
seek out only those communications that relate to criminal activity.
Now here is where things get dicey for the Internet. In upholding the dog's
sniff-search of the trunk, the Supreme Court held that it did not compromise
any legitimate interest in privacy. Why? Because, according to the court,
any interest in possessing contraband cannot be deemed 'legitimate.' The
search was acceptable to the court because it could only reveal the
possession of contraband, the concealment of which compromises no legitimate
privacy interest.

The expectation that certain facts will not come to the attention of the
authorities is not the same as an interest in privacy that society is
prepared to consider reasonable, the court wrote.

In other words, the search by the dog into, effectively, the entire contents
of a closed container inside a locked trunk, without probable cause, was
reasonable even though the driver and society would consider the closed
container private because the search only revealed criminal conduct.

The same reasoning could easily apply to an expanded use of packet sniffers
for law enforcement.

Currently, responsible law enforcement agencies limit their warrantless
Internet surveillance to the wrapper of a message, i.e., e-mail addresses
or TCP/IP packet headers, unless they have a court order permitting a more
intrusive search. Looking at the outside of the communication has been
treated as similar to looking at the outside of a vehicle -- and maybe
peering into the window a bit. To peek inside the communication -- read the
content -- required that you first get someone in a black robe involved.

The experiences of Mr. Caballes (the soccer mom, or me or you ) changed all
that. The government is practically invited to peek inside Internet traffic
and sniff out evidence of wrongdoing. As long as the technology -- like a
well-trained dog -- only alerts when a crime is detected, it's now legal.

As context-based search technology improves, the government may soon have the
ability to take Carnivore one better and deploy intelligent packet search
filters that will seek out only those communications that relate to criminal
activity. They may already have it.

Although these packet sniffing dogs sniff the packets of sinner and saint
alike, they only bark at the sinner's e-mails. Thus, according to the new

Re: GNFC launches Indian Digital Certification services

2005-02-10 Thread Sarad AV

Never heard of it though the website mentions that it
is an enterprise of the gujarat state government.
Strange indeed!

Sarad.



--- R.A. Hettinga [EMAIL PROTECTED] wrote:

 Gujarat Narmada Valley Fertilizer Company???
 
 ;-)
 
 Cheers,
 RAH
 ---
 
 

http://www.deepikaglobal.com/ENG5_sub.asp?newscode=92273catcode=ENG5subcatcode=
 
 
 deepikaglobal.com - Business News Detail
 
 Thursday, February 10, 2005  
 
 
  
 Good Evening to you
 
 
 
 Business News
 
 
 
 GNFC launches nationwide Digital Certification
 services
 Mumbai, Feb 9 (UNI) Gujarat Narmada Valley
 Fertilizer Company (GNFC)
 promoted (n)Code Solutions today launched its
 nationwide services for
 providing ''Digital certificates to individuals and
 organisations aimed at
 boosting efforts for implementation of e-governance
 and e-commerce in the
 country''.
 
 Digital certificates can be explained as digital
 passports that help in
 authentication of the bearer on the net, while
 maintaining privacy and
 integrity of the net-based transactions. It is
 accorded the same value as
 paper-based signatures of the physical world by the
 Indian IT Act 2000 and
 each of these transactions help bring trust in the
 Internet-based
 transactions.
 
 Launching the services, Nasscom President Kiran
 Karnik said, ''The presence
 of a large number of credible public sector
 organisation in this domain
 will futher boost the efforts for implementation of
 e-governance in the
 country.'' He said that the safety and security of
 net-based transactions
 would enable to usher in higher levels of exellence
 at lower costs.
 
 Having carved an enviable reputation for itself in
 managing large and
 complex projects successfully, Mr Karnik said ''GNFC
 will duplicate its
 success in this IT venture as well.'' A K Luke,
 Managing Director of GNFC
 and another state-PSU Gujarat State Fertiliser
 Corporation, on this
 occasion, said ''The (n)Code Solutions
 infrastructure, set up for the
 purpose is at par with the best in the world.'' He
 said the GNFC was
 committed to diversifications in the emerging fields
 of IT like e-security.
 (n)Code Solutions has put in motion a nation-wide
 machinery to support
 different market segments like banking and financial
 institutions, public
 and private sector enterprises besides State and
 Central Government
 organisations, he added.
 
 He said the IT company of GNFC had simultaneously
 released a suite of
 applications like (n)Procure, (n)Sign, (n)Form and
 (n)Pay that make use of
 digital signatures to ensure safety and security in
 the virtual world in
 various ways.
 
 Mr Luke said these applications will address a wide
 spectrum of needs of
 the internet-dependent business world, ranging from
 online procurement to
 signing and sending web forms and enabling online
 payments to securing web
 servers or VPN devices.
 
 GNFC is a Rs 1800 crore fertiliser and chemicals
 company of the Gujarat
 Government.
 
 
 -- 
 -
 R. A. Hettinga mailto: [EMAIL PROTECTED]
 The Internet Bearer Underwriting Corporation
 http://www.ibuc.com/
 44 Farquhar Street, Boston, MA 02131 USA
 ... however it may deserve respect for its
 usefulness and antiquity,
 [predicting the end of the world] has not been found
 agreeable to
 experience. -- Edward Gibbon, 'Decline and Fall of
 the Roman Empire'
 
 




__ 
Do you Yahoo!? 
The all-new My Yahoo! - Get yours free! 
http://my.yahoo.com 
 



Re: What is a cypherpunk?

2005-02-10 Thread R.A. Hettinga
At 10:55 PM -0800 2/9/05, Major Variola (ret) wrote:
A cypherpunk is one who is amused at the phrase illicit
Iraqi passports.

:-).

I prefer to call them fungible identification, myself...

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Valuable Phharmacy for you

2005-02-10 Thread Nichola Wahl




Hello, welcome to Health Suite http://www.uptrend/


  
  
Vi

ra

al

Xa

x

cod

  
ag
Ci
is
na
Vi
in

and many 0ther for very good prricess.

Save yourself a Huge 70 % Off All 
0rders with us.

Have a nice day.


RE: Team Building?? WIMPS!!

2005-02-10 Thread Tyler Durden
Well, I didn't say it would be easy. We'd definitely need to split up into 
teams...one to handle the alarm systems, one to handle the landmines, one to 
somehow fend off May's bullets. And then, even if we somehow capture May, 
I'd bet he's got all sorts of dead-man stuff like poison gas and whatnot. 
It'd be like a big game of DD, not that any Cypehrpunk knows what THAT is!

And yeah, there's a good chance someone's not gonna make it. But think of it 
like this: Those genes were slowing down our species anyway.

The only problem is, what do we do once we're in? Throw a big-ass drinking, 
whoring Shriners-like party? (I say we need a bevvy of black hookers.) Break 
into May's survivalist supplies?

Oh, and we DEFINITELY need video.
-TD
From: joe cypherpunk [EMAIL PROTECTED]
To: Tyler Durden [EMAIL PROTECTED],  
[EMAIL PROTECTED]
Subject: Team Building?? WIMPS!!  Re: RSA Conference, and BA Cypherpunks
Date: Wed, 09 Feb 2005 17:36:13 -0800

Not unless you wish to meet YahWah , Allah, Jesus,Buddha(pick your favorite 
deity!) early :)

Tim is a  VERY GOOD shot and the property is watched and alarmed.
   so My opinion Tyler?
Feel free to win  Darwins Award!!..
A cypherpunk
ps. Tim has an Excellent Taxidermist, Your pelt and head will be displayed 
in grand fashion:)

BTW a spell checker  would be a good gift to yourself(think about 
thunderbird)

   ie Cypherpunk 'team-building' excersize? 
psps let me know when you plan to try so I can shoot live video of the 
Firefight, should be worth at least 1k to the local TV stations :)

also think about a vest of tubes of tannerite(exploding targets), that way 
when Tim scores, the viewers of the video will know you have been hit!!

  think of it as evolution in action


Tyler Durden wrote:
How 'bout laying siege to May's compound as a Cypherpunk 'team-building' 
excersize?

-TD

From: J.A. Terranson [EMAIL PROTECTED]
To: Trei, Peter [EMAIL PROTECTED]
CC: [EMAIL PROTECTED], cryptography@metzdowd.com
Subject: Re: RSA Conference, and BA Cypherpunks
Date: Mon, 7 Feb 2005 17:19:30 -0600 (CST)
On Mon, 7 Feb 2005, Trei, Peter wrote:
 Once again, the RSA Conference is upon us, and many of the
 corrospondents on these lists will be in San Francisco. I'd like to
 see if anyone is interested in getting together. We've done this
 before.
Yeah, but can we eat food, drink beer, shoot drugs and screw expensive
hookers at Tim May's compound?
--
Yours,
J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF
Quadriplegics think before they write stupid pointless
shit...because they have to type everything with their noses.
http://www.tshirthell.com/






Re: What is a cypherpunk?

2005-02-10 Thread Tyler Durden
Which reminds me...they apparently found those nickels buried in some guy's 
back yard:

http://www.sun-sentinel.com/news/local/palmbeach/sfl-pdnickels05feb05,0,5206467.story?coll=sfla-news-palm
-TD
From: R.A. Hettinga [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: What is a cypherpunk?
Date: Thu, 10 Feb 2005 07:37:51 -0500
At 10:55 PM -0800 2/9/05, Major Variola (ret) wrote:
A cypherpunk is one who is amused at the phrase illicit
Iraqi passports.
:-).
I prefer to call them fungible identification, myself...
Cheers,
RAH
--
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Desire safety on Net? (n) code has the solution

2005-02-10 Thread R.A. Hettinga
I'm starting get the hang of this. I mean, fertilizer...crypto,
crypto...fertilizer: They're both *munitions*, right?

Right?

:-)

Cheers,
RAH


http://cities.expressindia.com/fullstory.php?newsid=117201#

Express India 

Desire safety on Net? (n) code has the solution

Express News Service

Ahmedabad, February 9:  ADDRESSING a wide spectrum of needs of the
Net-dependent business world ranging from online buying to signing and
sending web forms, (n) code solutions, promoted by IT branch of the Gujarat
Narmada Valley Fertilizer Company Limited, has launched its nationwide
services at NASSCOM, India Leadership Forum 2005.

 (n) code solutions has been recently licensed by the IT ministry as
certifying authority for providing digital signature certificates to
individuals and organisations.

Digital certificates can be explained as digital passports, which help in
authentication of the bearer on the Internet. This also helps maintain,
privacy and integrity of Net-based transactions. Digital signatures are
accorded the same value as paper-based signatures of the physical world by
the Indian IT Act 2000. Each of these functions help bring trust in
Net-based transactions.

 (n) code has simultaneously released a suite of applications like, (n)
procure, (n) sign, (n) form and (n) pay to make use of digital signatures
to ensure safety and security in the virtual world in various ways. (n)
code has also put in motion, nationwide machinery to support different
market segments like banking and financial institutions, public and private
sector enterprises and state and central government organisation.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Hello

2005-02-10 Thread MSN Hotmail
This is an auto-generated response designed to let you know that our system 
received your support inquiry and a Support Representative will review your 
question and respond to you soon. Please note that you will not receive a reply 
if you respond directly to this message. 

Thank you for contacting MSN Hotmail Support.

Remember that MSN Hotmail also has comprehensive online help available--just 
click Help in the upper right corner.



Parents protest student computer ID tags

2005-02-10 Thread R.A. Hettinga
http://www.usatoday.com/tech/news/surveillance/2005-02-10-id-tag-protest_x.htm

USA Today


Parents protest student computer ID tags
By Lisa Leff, Associated Press
SUTTER, Calif. - The only grade school in this rural town is requiring
students to wear radio frequency identification badges that can track their
every move. Some parents are outraged, fearing it will take away their
children's privacy.

The badges introduced at Brittan Elementary School on Jan. 18 rely on the
same radio frequency and scanner technology that companies use to track
livestock and product inventory. Similar devices have recently been used to
monitor youngsters in some parts of Japan.

But few American school districts have embraced such a monitoring system,
and civil libertarians hope to keep it that way.

If this school doesn't stand up, then other schools might adopt it,
Nicole Ozer, a representative of the American Civil Liberties Union, warned
school board members at a meeting Tuesday night. You might be a small
community, but you are one of the first communities to use this technology.

The system was imposed, without parental input, by the school as a way to
simplify attendance-taking and potentially reduce vandalism and improve
student safety. Principal Earnie Graham hopes to eventually add bar codes
to the existing ID's so that students can use them to pay for cafeteria
meals and check out library books.

But some parents see a system that can monitor their children's movements
on campus as something straight out of Orwell.

There is a way to make kids safer without making them feel like a piece of
inventory, said Michael Cantrall, one of several angry parents who
complained. Are we trying to bring them up with respect and trust, or tell
them that you can't trust anyone, you are always going to be monitored, and
someone is always going to be watching you?

Cantrall said he told his children, in the 5th and 7th grades, not to wear
the badges. He also filed a protest letter with the board and alerted the
ACLU.

Graham, who also serves as the superintendent of the single-school
district, told the parents that their children could be disciplined for
boycotting the badges - and that he doesn't understand what all their angst
is about.

Sometimes when you are on the cutting edge, you get caught, Graham said,
recounting the angry phone calls and notes he has received from parents.

Each student is required to wear identification cards around their necks
with their picture, name and grade and a wireless transmitter that beams
their ID number to a teacher's handheld computer when the child passes
under an antenna posted above a classroom door.

Graham also asked to have a chip reader installed in locker room bathrooms
to reduce vandalism, although that reader is not functional yet. And while
he has ordered everyone on campus to wear the badges, he said only the 7th
and 8th grade classrooms are being monitored thus far.

In addition to the privacy concerns, parents are worried that the
information on and inside the badges could wind up in the wrong hands and
endanger their children, and that radio frequency technology might carry
health risks.

Graham dismisses each objection, arguing that the devices do not emit any
cancer-causing radioactivity, and that for now, they merely confirm that
each child is in his or her classroom, rather than track them around the
school like a global-positioning device. The 15-digit ID number that
confirms attendance is encrypted, he said, and not linked to other personal
information such as an address or telephone number.

What's more, he says that it is within his power to set rules that promote
a positive school environment: If he thinks ID badges will improve things,
he says, then badges there will be.

You know what it comes down to? I believe junior high students want to be
stylish. This is not stylish, he said.

This latest adaptation of radio frequency ID technology was developed by
InCom Corp., a local company co-founded by the parent of a former Brittan
student, and some parents are suspicious about the financial relationship
between the school and the company. InCom plans to promote it at a national
convention of school administrators next month.

InCom has paid the school several thousand dollars for agreeing to the
experiment, and has promised a royalty from each sale if the system takes
off, said the company's co-founder, Michael Dobson, who works as a
technology specialist in the town's high school. Brittan's technology aide
also works part-time for InCom.

Not everyone in this close-knit farming town northwest of Sacramento is
against the system. Some said they welcomed the IDs as a security measure.

This is not Mayberry. This is Sutter, California. Bad things can happen
here, said Tim Crabtree, an area parent.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... 

Hello

2005-02-10 Thread MSN Hotmail
This is an auto-generated response designed to answer your question as quickly 
as possible. Please note that you will not receive a reply if you respond 
directly to this message. 

Unfortunately, we cannot take action on the mail you sent us because it does 
not reference a Hotmail account. Please send us another message that contains 
the full Hotmail e-mail address and the full e-mail message to:
[EMAIL PROTECTED]

 To forward mail with full headers

Using Hotmail:
1.  Click Options to the right of the Contacts tab. The Options page 
appears.
2.  Under Additional Options, click Mail Display Settings. The Mail 
Display Settings page appears.
3.  Under Message Headers, select Full and click OK.
4.  Forward the resulting mail to:
   [EMAIL PROTECTED]

Using MSN Explorer:
1.  Open the message, and then click More in the upper right corner.
2.  Click Message Source. The message opens in a new window with all the 
header information visible.
3.  Copy all the text and paste it into a new message. Send this message to:
   [EMAIL PROTECTED]

Using Outlook Express or Outlook:
1.  On the unopened mail, place your cursor over the mail, right-click, and 
click Options.
2.  Under Internet headers, copy the contents of the full header.
3.  Open the e-mail in question and forward a complete copy of the message, 
including the full message header you copied at the beginning of your message, 
to:
  [EMAIL PROTECTED]

If you're not a Hotmail member, consult the Help associated with your e-mail 
program to determine how to view complete header information. Then forward the 
message to:
[EMAIL PROTECTED]

If the unsolicited junk e-mail or spam comes from a non-Hotmail account, you 
can send a complaint to the service provider that sent the mail. Make sure that 
you include full headers when you send your complaint. 

In the full header, look at the last Received notation to locate what .com 
domain it came from. It looks something like:
[service provider domain name].com

Forward a complete copy of the message, including the full message header, to:
  [EMAIL PROTECTED] provider domain name].com

If the domain does not have an abuse service, forward your complaint to:
  [EMAIL PROTECTED] provider domain name].com

All Hotmail customers have agreed to MSN Website Terms of Use and Notices(TOU) 
that forbid e-mail abuse. At the bottom of any page in Hotmail, click Terms of 
Use to view the Terms of Use document in its entirety.

Thank you for helping us enforce our TOU.





Re: Desire safety on Net? (n) code has the solution

2005-02-10 Thread Dan Kaminsky

Digital certificates can be explained as digital passports, which help in
authentication of the bearer on the Internet. This also helps maintain,
privacy and integrity of Net-based transactions. Digital signatures are
accorded the same value as paper-based signatures of the physical world by
the Indian IT Act 2000. Each of these functions help bring trust in
Net-based transactions.
 

This passed by without too many people noticing:
http://www.cfo.com/article.cfm/3597911/c_3597966?f=home_todayinfinance
===
The SEC also asserts that the company's 10-Q bore an unauthorized 
electronic signature of Guccione -- who was Penthouse's principal 
executive officer and principal financial officer at the time. The 
signature indicated that Guccione had reviewed and signed the filing and 
the accompanying Sarbanes-Oxley certification. This representation was 
false, the SEC stated in its complaint.
===

You got your SOX in my Digital Signature Repudiation!
You got your Digital Signature Repudiation in my SOX!
Someone order a failed porn empire?
--Dan


Vegas casino bets on RFID

2005-02-10 Thread R.A. Hettinga
http://news.com.com/2102-7355_3-5568288.html?tag=st.util.print



 Vegas casino bets on RFID

 By Alorie Gilbert


Casino mogul Steve Wynn has pulled out all the stops for his new $2.7
billion mega-resort in Las Vegas: an 18-hole championship golf course, a
private lake and mountain, and a bronze tower housing 2,700 plush guest
rooms.

 But when its doors open in April, the Wynn Las Vegas will have one unique
feature that few visitors are likely to notice--high-tech betting chips
designed to deter counterfeiting, card-counting and other bad behavior.

 The fancy new chips look just like regular ones, only they contain radio
devices that signal secret serial numbers. Special equipment linked to the
casino's computer systems and placed throughout the property will identify
legitimate chips and detect fakes, said Rick Doptis, vice president of
table games for the Wynn.
News.context

What's new:
 Betting chips are getting a high-tech RFID makeover designed to deter
counterfeiting and misbehavior at the tables.

Bottom line:Despite this, RFID technology is still relatively rare in
casinos--until that killer application arrives.

More stories on RFID

Security-wise, it will be huge for us, Doptis said.

 The technology behind these chips is known as radio frequency
identification, or RFID, and it's been used for years to track livestock,
enable employee security badges and pay tolls.

 The casino industry is just the latest to find new uses for RFID
technology. Retail chains, led by Wal-Mart Stores, are using it to monitor
merchandise. Libraries are incorporating it into book collections to speed
checkouts and re-shelving. The United States and other nations are
incorporating it into passports to catch counterfeits. One company even
offers to inject people with RFID chips linked to their medical records to
ensure they receive proper medical care.

 In casinos, RFID technology is still relatively rare and in search of a
killer application to spur adoption. Yet some tech-savvy casino executives
envision RFID transforming the way they operate table games, including
blackjack, craps and roulette, over the next four or five years.

 For one thing, there's the counterfeiting problem, on which there is scant
data. The Nevada Gaming Commission gets about a dozen complaints every year
related to counterfeit chips, said Keith Copher, the agency's chief of
enforcement. Last year, a casino in Reno quickly lost $26,000 in such a
scheme--one of the biggest hits reported to the commission in recent years.
And counterfeiting is on the rise at overseas casinos, Copher noted. The
RFID technology would let dealers or cashiers see when the value of the
chips in front of them don't match the scanners' tally.


 However, financial losses due to counterfeit chips are usually minor, and
few perpetrators get away with it, Copher said.

 Perhaps that's why the Wynn has found a dual purpose for the high-tech
chips: The casino is also using the chips to help account for the chips
they issue on credit to players, since managing credit risk is a huge part
of any big casino's operations.

 The Wynn plans to take note of the serial numbers of the chips they lend
and of the name of players who cash them in. If someone else returns the
chips, it could signal that the original player is using their credit line
with the casino to make loans to others--something casinos generally frown
upon.

 That sort of security doesn't come cheap: The Wynn is spending about $2
million on the chips. That's about double the price of regular chips, and
doesn't include addition equipment the Wynn will need to purchase, such as
RFID readers, computers and networking gear.

Eye in the sky
 The technology could also help casinos catch card players who sneak extra
betting chips onto the table after hands are dealt or players who count
cards. That's one reason the Hard Rock Hotel and Casino in Las Vegas plans
to switch on a new set of RFID-equipped betting chips and tables next month.

The casino is installing RFID readers and PCs at game tables. With antennas
placed under each player's place at the table, dealers can take a quick
inventory of chips that have been wagered at the push of a button. The PCs
display all the initial bets, deterring players from sneaking extra chips
into their pile after hands are dealt.

 Yet the benefits of RFID go beyond security. It may also help casinos
boost profits through savvier marketing.

 Vegas has a little bit of a wait-and-see attitude... They want to make
sure the product is bulletproof.
 --Tim Richards, vice-president of marketing, Progressive Gaming International

Take the Hard Rock Hotel. In addition to monitoring wagers, the casino
plans to use its new RFID system to rate players--monitor gamblers to
reward them with free rooms, meals and other perks based on how much and
how often they wager. As the technology advances, RFID could also help
track how well they play. The casinos generally reserve the most enticing
rewards 

Data, Net tax plan divides Republicans

2005-02-10 Thread R.A. Hettinga
http://news.com.com/2102-1028_3-5569545.html?tag=st.util.print

CNET News


 Data, Net tax plan divides Republicans

 By Declan McCullagh

A recent congressional report saying that new taxes could be levied on all
Internet and data connections is pitting two influential groups of
Republicans against each other.

Sixteen members of Congress have slammed a suggestion from Congress' Joint
Committee on Taxation that a tax originally created to pay for the
Spanish-American War could be extended to all Internet and data connections
this year.

 In a letter to the committee sent Tuesday, the House members said they
were perplexed that the committee would gratuitously suggest tax
increases that would slow the growth of the U.S. economy. The committee is
headed by two Republicans, Sen. Charles Grassley of Iowa and Rep. William
Thomas of California.

 Consumers who now enjoy freedom from regressive taxes on Internet access
are not tax cheats, the letter says. It charges the committee with finding
ways to justify tax hikes when its report was supposed to be about
identifying people who were dodging taxes.

 I think the problem lies not with the senators but with staff that is
involving itself gratuitously in proposals to raise taxes on the Internet,
Rep. Chris Cox, a California Republican who signed the letter, said in a
telephone interview with CNET News.com.

 George Yin, the tax committee's chief of staff, was not immediately
available for comment.

 Currently, the 3 percent excise tax applies only to traditional telephone
service. But because of technological convergence and the dropping
popularity of landlines, the Joint Committee on Taxation said extending the
century-old tax to broadband and data links was an option.

 The committee's report, published in late January, said that tax law could
be rewritten so the telecommunications levy would cover all data
communications services to end users, including broadband; dial-up; fiber;
cable modems; cellular; voice over Internet Protocol (VoIP) and DSL, or
digital subscriber line, links. Another option it listed was extending the
tax only to VoIP providers, including Internet-only ones like Skype.

 Congress enacted the so-called luxury excise tax at 1 cent a phone call
to pay for the Spanish-American War back in 1898, when only a few thousand
phone lines existed in the country. It was repealed in 1902, but was
reimposed at 1 cent a call in 1914 to pay for World War I and eventually
became permanent at a rate of 3 percent in 1990.


Republicans signing the letter to the tax committee include Chris Cannon,
R-Utah; Walter Jones, R-N.C.; Chip Pickering, R-Miss.; Ron Paul, R-Texas;
Jeff Miller, R-Fla.; Mark Foley, R-Fla.; Mike Rogers, R-Mich.; Fred Upton,
R-Mich; Patrick McHenry, R-N.C.; Jerry Weller, R-Ill.; Rob Simmons,
R-Conn.; Charles Bass, R-N.H.; and Vito Fossella, R-N.Y.

 Two Democrats, John Lewis, D-Ga. and Anna Eshoo, D-Calif. also signed the
letter.

 Members of the Joint Committee on Taxation include Orrin Hatch, R-Utah;
Max Baucus, D-Mont.; John Rockefeller, D-W.Va.; and representatives Bill
Thomas, R-Calif.; and Charles Rangel, D-N.Y.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Polanski wins video link battle

2005-02-10 Thread R.A. Hettinga
http://news.bbc.co.uk/2/low/entertainment/4253457.stm

The BBC

Thursday, 10 February, 2005, 12:51 GMT

 Polanski wins video link battle

Film director Roman Polanski will give evidence in a libel case via video
link from France, the Law Lords have ruled.

Mr Polanski is bringing libel action against the magazine Vanity Fair in
the English High Court.

 But to avoid the risk of extradition to the US, where he is wanted on an
outstanding child sex offence, the director will give evidence from Paris.

 The Law Lords ruled on Thursday that Mr Polanski should not be denied
access to justice because of extradition fears.

   Despite his fugitive status, a fugitive from justice is entitled to
invoke the assistance of the court 
 Lord Nicholls

 Mr Polanski, 71, fled the US more than 25 years ago after admitting having
sex with 13-year-old girl.

 As a French citizen, Mr Polanski cannot be extradited to the US from
France, but that protection would not apply were he to travel to the UK.

 Mr Polanski has issued libel proceedings against Conde Naste, publishers
of Vanity Fair, over an article published in July 2002.

 After issuing his libel writ, Mr Polanski sought a High Court order
allowing him to give evidence via a video conferencing (VCF) link from
France.

 In granting the order, Mr Justice Eady said that, although the reason
underlying the application was unattractive, this did not justify depriving
Mr Polanski of the chance to have his case heard.

 That decision was overturned by the Court of Appeal, but restored on
Thursday by the House of Lords in a 3-2 majority ruling.

 Constitutional right

Lord Nicholls said: Despite his fugitive status, a fugitive from justice
is entitled to invoke the assistance of the court and its procedures in
protection of his civil rights.

 The fact that Mr Polanski was guilty of a serious crime and feared
extradition did not take the case outside the general rule.

 Lord Hope said the director had an undoubted constitutional right, as a
citizen of France, not to be extradited.

 That is his right and he wishes to exercise it, he said.

 He is not trying to hide from anybody. It is incorrect, then, to say that
his sole aim in seeking this order is to avoid being extradited.

 'Quite wrong'

Baroness Hale said there was a strong public interest in allowing a claim
to be properly litigated.

 She said: New technology such as VCF is not a revolutionary departure
from the norm to be kept strictly in check, but simply another tool for
securing effective access to justice for everyone.

 If we had a rule that people such as the appellant were not entitled to
access to justice at all, then of course that tool should be denied him.
But we do not and it should not.

 Disagreeing, Lord Slynn said the video link facility should be refused
where the sole reason for asking for it was to escape a criminal conviction
or sentence.

 Lord Carswell said it would be quite wrong to allow him to give his
evidence in a special way to avoid the consequences of his criminal act.

 Roman Polanski won a best director Oscar for The Pianist in 2003,
following earlier nominations for Chinatown (1974) and Tess (1979), and a
best adapted screenplay nomination for Rosemary's Baby (1968).

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Hack License

2005-02-10 Thread Steve Thompson
--- R.A. Hettinga [EMAIL PROTECTED] quoted: 
http://www.technologyreview.com/articles/05/03/issue/review_hack.asp?p=0
 
 Hack License
 By Simson Garfinkel March 2005
[snip]

 Stallman wrote in 1985, the golden rule requires that if I like a
 program
 I must share it with other people who like it. Stallman continues,
 Software sellers want to divide the users and conquer them, making each
 user agree not to share with others. I refuse to break solidarity with
 other users in this way. I cannot in good conscience sign a
 nondisclosure
 agreement or a software license agreement.
[snip]

Interestingly enough, Stallman expects people to use one of the GNU
software licenses when they release a product.  Big deal.  Ideology and 
people change.  Today the significance of the open source 'movement' being
in conflict with the 'vectorialists', or rather the commercial and
proprietary software community is that the polarization of the industry is
limited to two poles:  commercial, for-pay software or free open-source
software.  Alternatives, or hybrid licensing agreements are generally
unknown to the computing public at large. 

Thus the software industry largely resembles the basic structure of the
United States federal political system.  Republican, or democrat : open
source, or commercial software.

Code that I have that is waiting for completion and formal release (some
of it has been stolen and distributed in advance of its completion) I
intend presently to license under a hybrid license that essentialy grants
unrestricted use for non-commercial and non-military purposes, but which
requires a license agreement for any commercial use.  

My thinking was that under the existing arrangement, commercial vendors
largely benefited from the efforts of many thousands of open-source
developers, thus reducing RD costs, without necessarily returning
anything either to the community, or to the developers themselves. 
Furthermore, unless one is a high-profile open-source developer it is next
to impossible to make a living writing code that is given away to free to
all takers.  Of this last problem, it may become moot one day if the world
economy moves away from the use of money as an intermediate medium of
value exchange, but today it is necessary to have money so the developer
can pay his rent and buy food and purchase computer hardware tools.  Of
the former problem, some few vendors have recently exposed their
proprietary software to the open source community.  Sun Microsystems has
recently put their operating system on the table; the NSA released SE
Linux, and of course many smaller examples abound.

There are other considerations that remain largely unaddressed by the
present status quo, however, and I wanted to address some of them.  For
instance, I wanted to stop my software from being used by a military force
in the process of developing proprietary (and presumably classified)
weapons of mass destruction or weapons designed to be used against
[domestic] civilian populations.  Of course, I wouldn't also want my
software to be used by terrorists such as the Ted Kaczinski's of the
world.  As an individual developer, I didn't realistically expect that I
would actually halt the unlicensed use of my software for, say, illegal
purposes, but I did expect to force such people and organisations to
actually have to _steal_ the software rather than handing to them on a
sliver platter, with my tacit blessing.  While the existing judicial and
legislative environment doesn't seem to be friendly to the idea of people
taking responsibility for the purposes that their creations are put to, I
think that software professionals should put some thought to the moral
dimension of the application of their products.

The concept of know your customer exists today, however badly it is
deployed by extant legislation.  I believe it may be done well by
intelligent people, and surely it can also be abused.  A group of Klansmen
might release software that contained a licensing agreement restricting
its [free] use to aryans.  I think Tim might say that they should be free
to do so, because coloured people as well as concerned caucasions would
have the ability and right to produce nominally equivalent software to
compete with the Klansman's code.  However this view relies on the
minimalist view of government regulation, a point of view that is not much
in favour today.

Whatever the particulars of any given scenario, the point remains that the
two-pole system that dominates the software community has some rather
large holes. 

I expect that one day I will be able to afford to replace the computer(s)
that were stolen by the local authorities, despite their ongoing and
malicious interference and harassment.  Then, I may end up finishing off a
few things for release; some of it certainly under the scheme I touch on
above, and some perhaps under a 'true' open-source license.  Some of said
software may even be useful to a non-trivial population of users.  

Re: Desire safety on Net? (n) code has the solution

2005-02-10 Thread Bill Stewart
At 09:43 AM 2/10/2005, R.A. Hettinga wrote:
I'm starting get the hang of this. I mean, fertilizer...crypto,
crypto...fertilizer: They're both *munitions*, right?
Right?
Well, sometimes they're both munitions,
but sometimes they're both bullshit.
I have no reason to assume they're not producing a quality product,
but it's certainly a field where independent verification is necessary.




[Announce] Attack against OpenPGP encryption

2005-02-10 Thread R.A. Hettinga

--- begin forwarded text


Date: Thu, 10 Feb 2005 20:00:17 -0500
From: David Shaw [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
OpenPGP: id=99242560; url=http://www.jabberwocky.com/david/keys.asc
User-Agent: Mutt/1.5.7i
Cc:
Subject: [Announce] Attack against OpenPGP encryption
Sender: [EMAIL PROTECTED]

Content-Type: multipart/signed; micalg=pgp-sha1;
protocol=application/pgp-signature; boundary=IMjqdzrDRly81ofr
Content-Disposition: inline

Last night, Serge Mister and Robert Zuccherato published a paper
reporting on an attack against OpenPGP symmetric encryption.

This attack, while very significant from a cryptographic point of
view, is not generally effective in the real world.  To be specific,
unless you have your OpenPGP program set up as part of an automated
system to accept encrypted messages, decrypt them, and then provide a
response to the submitter, then this does not affect you at all.

There is a very good writeup on the attack that goes into more depth
at http://www.pgp.com/library/ctocorner/openpgp.html

There will undoubtedly be further discussion of this over the next
several days, but I wanted to provide a few comments now, to try and
answer some questions that may arise:

1) This is not a bug in any particular OpenPGP implementation (GnuPG,
   PGP, Hushmail, etc).  Rather, this is an attack against the OpenPGP
   protocol itself.

2) The attack requires an average of 32,768 probes to get two bytes of
   plaintext.  This is why it is completely ineffective against
   human beings, who will presumably wonder why a stranger wants them
   to decrypt thousands and thousands of messages that won't decrypt,
   and then tell them what errors were seen.

3) It might be effective against an automated process that
   incorporates OpenPGP decryption, if that process returns errors
   back to the sender.

4) The OpenPGP Working Group will be discussing this issue and coming
   up with an effective and permanent fix.  In the meantime, I have
   attached two patches to this mail.  These patches disable a
   portion of the OpenPGP protocol that the attack is exploiting.
   This change should not be user visible.  With the patch in place,
   this attack will not work using a public-key encrypted message.  It
   will still work using a passphrase-encrypted message.  These
   patches will be part of the 1.2.8 and 1.4.1 releases of GnuPG.

5) The full paper is available at http://eprint.iacr.org/2005/033
   It's a great piece of work.

David




___
Gnupg-announce mailing list
[EMAIL PROTECTED]
http://lists.gnupg.org/mailman/listinfo/gnupg-announce

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: What is a cypherpunk?

2005-02-10 Thread James A. Donald
--
James A. Donald:
  Corporate lawyers did not descend on Linux until there were 
  enough wealthy linux users to see them in court, and send
  in their own high priced lawyers to give them the drubbing
  they deserved.

Eugen Leitl
 You're misinterpreting the events. Industry has so far been
 fighting with propagada only. Outside of FOSS IP wars are the
 rule.

What has happened so far is that corporate lawyers have lost,
and linux has won - that is to say, corporations using linux
have successfully defended their right to do so.  Compare with
what happens to tax evaders.

The state is your enemy.  The corporation is your friend.  It
was corporations that defended linux in court, and created
substantial parts of linux - for example a lot of linux was
written by IBM employees on IBM salary - presumably as an anti
microsoft measure.   Corporations deal with competition by
creating stuff, governments deal with competition by shooting
it.

The corporation is free and voluntary association.  The
alternative is state imposed association. 

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 mCPvNIMCElEgaF3RT8krDyySbf6TRivdp5TOTL3/
 45fmEJA1E7SZ6GhiXjBjgr5i6tT7dfRXf3teVziId




Re: What is a cypherpunk?

2005-02-10 Thread James A. Donald
--
James A. Donald wrote:
  If, however, you decline to pay taxes, men with guns will 
  attack you.
 
  That is the difference between private power and government 
  power.

ken wrote:
 But in most places at most times the state is run at least
 partly by and for the rich and the owners of property and
 supports and privileges their continuing private power.

The state was created to attack private property rights - to
steal stuff.  Some rich people are beneficiaries, but from the
beginning, always at the expense of other rich people.

 And there are circumstances where private individuals send
 men with guns to attack you if you  cross them.

Compare mafia extortion with government taxation.  The
mafia charges are small in proportion as their power is small.
The Gangsta disciples charged drug dealers thirty dollars a
month for protection, and, unlike the state, actually provided
protection.   The mafia cannot afford to seriously piss off its
customers, because there is no large difference between
customer firepower and mafia firepower.  The government, on the
other hand, can afford to seriously piss of its subjects.

The federal government established its monopoly of force by
burning Atlanta and Shenendoah.  Al Capone did the Saint
Valentine's day massacre.  Big difference.

 Quite a lot of them, from the feudal barons, to drug-dealers
 in modern cities, to just about anywhere out of easy reach of
 the state's police.

Again, compare the burning of Shenendoah with the Saint
Valentine's day massacre.  There is just no comparison.
Governmental crimes are stupendously larger, and much more
difficult to defend against.

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 sE92+Z9bMSzulF42TGzG/hIjoDv+qod3IBzFehdT
 4O/i5gQElpUPn6EYOMIETP8gkc9EP5DSN2QYuq83i




Re: Mail Delivery (failure techsupport@m-w.com)

2005-02-10 Thread Merriam-Webster . Technical . Support
Due to a dramatic increase in the volume of spam and virus-related messages 
received at this address, it has been disabled.  Please resend your inquiry to 
the new address:

technicalsupport[at sign]merriam-webster.com

(Please replace [at sign] with @.)

We apologize for any inconvenience this may have caused.

Merriam-Webster Technical Support



Desire safety on Net? (n) code has the solution

2005-02-10 Thread R.A. Hettinga
I'm starting get the hang of this. I mean, fertilizer...crypto,
crypto...fertilizer: They're both *munitions*, right?

Right?

:-)

Cheers,
RAH


http://cities.expressindia.com/fullstory.php?newsid=117201#

Express India 

Desire safety on Net? (n) code has the solution

Express News Service

Ahmedabad, February 9:  ADDRESSING a wide spectrum of needs of the
Net-dependent business world ranging from online buying to signing and
sending web forms, (n) code solutions, promoted by IT branch of the Gujarat
Narmada Valley Fertilizer Company Limited, has launched its nationwide
services at NASSCOM, India Leadership Forum 2005.

 (n) code solutions has been recently licensed by the IT ministry as
certifying authority for providing digital signature certificates to
individuals and organisations.

Digital certificates can be explained as digital passports, which help in
authentication of the bearer on the Internet. This also helps maintain,
privacy and integrity of Net-based transactions. Digital signatures are
accorded the same value as paper-based signatures of the physical world by
the Indian IT Act 2000. Each of these functions help bring trust in
Net-based transactions.

 (n) code has simultaneously released a suite of applications like, (n)
procure, (n) sign, (n) form and (n) pay to make use of digital signatures
to ensure safety and security in the virtual world in various ways. (n)
code has also put in motion, nationwide machinery to support different
market segments like banking and financial institutions, public and private
sector enterprises and state and central government organisation.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Desire safety on Net? (n) code has the solution

2005-02-10 Thread Bill Stewart
At 09:43 AM 2/10/2005, R.A. Hettinga wrote:
I'm starting get the hang of this. I mean, fertilizer...crypto,
crypto...fertilizer: They're both *munitions*, right?
Right?
Well, sometimes they're both munitions,
but sometimes they're both bullshit.
I have no reason to assume they're not producing a quality product,
but it's certainly a field where independent verification is necessary.




Re: What is a cypherpunk?

2005-02-10 Thread Major Variola (ret)
A cypherpunk is one who is amused at the phrase illicit
Iraqi passports.  Given that the government of .iq has been
replaced by a conquerer's puppet goverment, who exactly has authority
to issue passports there?  And why does this belief about the
1-to-1-ness of passports to meat puppets or other identities fnord
persist?

A CP is not an anarchist; and anarchists are ill defined by current
authors, since the word merely means no head, rather than no rules,
as Herr May frequently reminded.
(In fact, the rules would de facto be set by the local gangster, rather
than
a DC based gang claiming to be the head.  A better form is libertarian
archy, but that is perhaps another thread.)

A CP, removing arguable claims about political idealogy,
is one who understands the potential effects of certain
techs on societies, for good or bad.  And is not, like
a good sci fi writer, afraid to consider the consequences.

And, ideally, a CP is one who can write code, and does so,
code that might be useful for free sentients, not even
necessarily free (in the beer sense) code.  (Albeit 'tis hard to
write useful code in the uninspectable sense of not-free,
and inspectability facilitates beer-free copying )
But this is an ideal, and perhaps three meanings of free in
one rant is too many for most readers.


At 12:04 PM 2/7/05 -0500, R.A. Hettinga wrote:
While officials in Baghdad and Washington berate Iraq's neighbours for
failing to block insurgency movements across their borders, one of the
most
dangerous security lapses thrives in Baghdad's heart - a trade in
illicit
Iraqi passports.




Re: What is a cypherpunk?

2005-02-10 Thread Major Variola (ret)
At 10:38 PM 2/9/05 -0600, Shawn K. Quinn wrote:
On Wed, 2005-02-09 at 09:09 -0800, James A. Donald wrote:
 There is nothing stopping you from writing your own operating
 system, so Linus did.

Linus Torvalds didn't write the GNU OS. He wrote the Linux kernel,
which
when added to the rest of the existing GNU OS, written by Richard
Stallman among others, allowed a completely free operating system.
Please don't continue to spread the misconception that Linus Torvalds
wrote the entire (GNU) operating system.

Who gives a fuck?  RMS was fermenting in his own philosophical stew, to
put
it politely.  The shame is that BSD didn't explode like L*nux did, and
that
all that work had to be re-done, and with a nasty ATT flavor to boot
(no pun intended).