Re: What is a cypherpunk?
On Wed, Feb 09, 2005 at 04:58:22PM -0800, James A. Donald wrote: Corporate lawyers did not descend on Linux until there were Corporations never saw Linux coming. Now that FOSS is on the radar screen, you'll see lots of very obvious ramming through of IP protection in software. You haven't noticed the software patent charade happening in EU right now? It is not at all obvious who's going to win. enough wealthy linux users to see them in court, and send in their own high priced lawyers to give them the drubbing they deserved. You're misinterpreting the events. Industry has so far been fighting with propagada only. Outside of FOSS IP wars are the rule. If, however, you decline to pay taxes, men with guns will attack you. If you ignore a kkkorporate cease desist, men with guns will get you, too. You live in a world of your own. In civil court, the guy with no assets has a huge advantage over the guy with huge assets -because the guy with huge assets What a nice boolean universe you live in. Fact is that FOSS can be easily DoSed by lawyers of a party with deeper pockets (basically, any party with deeper pocket than a couple of bearded hackers). *cannot* send men with guns to beat him up and put him in jail - he can only seize the (nonexistent) assets of the guy with no assets. So what we instead see is frivolous and fraudulent Excellent strawman. Where are you getting these? I need to order a couple. lawsuits by people with no assets against big corporations, for example the silicone scam. It is in criminal court where the guy with no assets goes unjustly to jail, and that is the doing of the state, not the corporation. Again, neither state nor the corporate has your wellbeing as optimization criterium. It does frequently happen that superpersonal organization units result in a better world than the alternatives. Then, quite often not. We need smarter agents. -- Eugen* Leitl a href=http://leitl.org;leitl/a __ ICBM: 48.07078, 11.61144http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net pgpoQNzX1XRps.pgp Description: PGP signature
Re: What is a cypherpunk?
James A. Donald wrote: If, however, you decline to pay taxes, men with guns will attack you. That is the difference between private power and government power. But in most places at most times the state is run at least partly by and for the rich and the owners of property and supports and privileges their continuing private power. And there are circumstances where private individuals send men with guns to attack you if you cross them.Quite a lot of them, from the feudal barons, to drug-dealers in modern cities, to just about anywhere out of easy reach of the state's police. And there are places where corporations do that as well. Even well-run respectable British or American corporations that have annual reports and shareholder's meetings. State power and private power are different but not distinct, and everywhere more or less mixed up with each other and involved with each other, and in most places the same sorts of people have both. Economic power is a kind of political power.
Precedent for Warrantless Net Monitoring Set
From the somebody-needs-killing dept. Link: http://slashdot.org/article.pl?sid=05/02/10/0044214 Posted by: samzenpus, on 2005-02-10 05:40:00 from the only-bad-people-need-privacy dept. highcon writes According to this editorial from SecurityFocus, a recent case of a drug dog which pushed the limits of reasonable search may have [1]implications for Internet communications in the U.S. This Supreme Court case establishes a precendent whereby intelligent packet filters may be deployed which, while scanning the contents of network traffic indiscriminently, only bark at communication indicative of illegal activity. References 1. http://www.securityfocus.com/columnists/297 - End forwarded message - Of Dog Sniffs and Packet Sniffs Why a Supreme Court decision on canine-assisted roadside searches opens the door to a new regime of Internet surveillance. By Mark Rasch Feb 08 2005 11:21AM PT Click here for Core Impact! The Fourth Amendment to the U.S. Constitution is supposed to be the one that protects people and their houses, places and effects against unreasonable searches. Forty-two years ago, the U.S. Supreme Court held that attaching a listening device to a public pay phone violated this provision because the Constitution protects people, not places, and because the Fourth Amendment prohibits warrantless searches without probable cause if the target enjoys a reasonable expectation of privacy. Last month the U.S. Supreme Court effectively decimated this principle in a case that could have a profound impact on privacy rights online. The case, decided by the court on January 24th, had nothing to do with the Information Superhighway, but rather an ordinary interstate highway in Illinois. Roy Caballes was pulled over by the Illinois State Police for speeding. While one officer was writing him a ticket, another officer in another patrol car came by with a drug sniffing dog. There was absolutely no reason to believe that Caballes was a drug courier -- no profile, no suspicious activity, no large amounts of cash. The driver could have been a soccer mom with a minivan filled with toddlers. Under established Supreme Court precedent, while the cops could have looked in the window to see what was in plain view, the officers had neither probable cause nor reasonable suspicion to search Caballes' car, trunk, or person. Well, you know what happened next -- the dog sniff indicated that there might be drugs in the trunk, which established probable cause to open the trunk, where the cops found some marijuana. The government may soon deploy intelligent packet search filters that will seek out only those communications that relate to criminal activity. Now here is where things get dicey for the Internet. In upholding the dog's sniff-search of the trunk, the Supreme Court held that it did not compromise any legitimate interest in privacy. Why? Because, according to the court, any interest in possessing contraband cannot be deemed 'legitimate.' The search was acceptable to the court because it could only reveal the possession of contraband, the concealment of which compromises no legitimate privacy interest. The expectation that certain facts will not come to the attention of the authorities is not the same as an interest in privacy that society is prepared to consider reasonable, the court wrote. In other words, the search by the dog into, effectively, the entire contents of a closed container inside a locked trunk, without probable cause, was reasonable even though the driver and society would consider the closed container private because the search only revealed criminal conduct. The same reasoning could easily apply to an expanded use of packet sniffers for law enforcement. Currently, responsible law enforcement agencies limit their warrantless Internet surveillance to the wrapper of a message, i.e., e-mail addresses or TCP/IP packet headers, unless they have a court order permitting a more intrusive search. Looking at the outside of the communication has been treated as similar to looking at the outside of a vehicle -- and maybe peering into the window a bit. To peek inside the communication -- read the content -- required that you first get someone in a black robe involved. The experiences of Mr. Caballes (the soccer mom, or me or you ) changed all that. The government is practically invited to peek inside Internet traffic and sniff out evidence of wrongdoing. As long as the technology -- like a well-trained dog -- only alerts when a crime is detected, it's now legal. As context-based search technology improves, the government may soon have the ability to take Carnivore one better and deploy intelligent packet search filters that will seek out only those communications that relate to criminal activity. They may already have it. Although these packet sniffing dogs sniff the packets of sinner and saint alike, they only bark at the sinner's e-mails. Thus, according to the new
Re: GNFC launches Indian Digital Certification services
Never heard of it though the website mentions that it is an enterprise of the gujarat state government. Strange indeed! Sarad. --- R.A. Hettinga [EMAIL PROTECTED] wrote: Gujarat Narmada Valley Fertilizer Company??? ;-) Cheers, RAH --- http://www.deepikaglobal.com/ENG5_sub.asp?newscode=92273catcode=ENG5subcatcode= deepikaglobal.com - Business News Detail Thursday, February 10, 2005 Good Evening to you Business News GNFC launches nationwide Digital Certification services Mumbai, Feb 9 (UNI) Gujarat Narmada Valley Fertilizer Company (GNFC) promoted (n)Code Solutions today launched its nationwide services for providing ''Digital certificates to individuals and organisations aimed at boosting efforts for implementation of e-governance and e-commerce in the country''. Digital certificates can be explained as digital passports that help in authentication of the bearer on the net, while maintaining privacy and integrity of the net-based transactions. It is accorded the same value as paper-based signatures of the physical world by the Indian IT Act 2000 and each of these transactions help bring trust in the Internet-based transactions. Launching the services, Nasscom President Kiran Karnik said, ''The presence of a large number of credible public sector organisation in this domain will futher boost the efforts for implementation of e-governance in the country.'' He said that the safety and security of net-based transactions would enable to usher in higher levels of exellence at lower costs. Having carved an enviable reputation for itself in managing large and complex projects successfully, Mr Karnik said ''GNFC will duplicate its success in this IT venture as well.'' A K Luke, Managing Director of GNFC and another state-PSU Gujarat State Fertiliser Corporation, on this occasion, said ''The (n)Code Solutions infrastructure, set up for the purpose is at par with the best in the world.'' He said the GNFC was committed to diversifications in the emerging fields of IT like e-security. (n)Code Solutions has put in motion a nation-wide machinery to support different market segments like banking and financial institutions, public and private sector enterprises besides State and Central Government organisations, he added. He said the IT company of GNFC had simultaneously released a suite of applications like (n)Procure, (n)Sign, (n)Form and (n)Pay that make use of digital signatures to ensure safety and security in the virtual world in various ways. Mr Luke said these applications will address a wide spectrum of needs of the internet-dependent business world, ranging from online procurement to signing and sending web forms and enabling online payments to securing web servers or VPN devices. GNFC is a Rs 1800 crore fertiliser and chemicals company of the Gujarat Government. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire' __ Do you Yahoo!? The all-new My Yahoo! - Get yours free! http://my.yahoo.com
Re: What is a cypherpunk?
At 10:55 PM -0800 2/9/05, Major Variola (ret) wrote: A cypherpunk is one who is amused at the phrase illicit Iraqi passports. :-). I prefer to call them fungible identification, myself... Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Valuable Phharmacy for you
Hello, welcome to Health Suite http://www.uptrend/ Vi ra al Xa x cod ag Ci is na Vi in and many 0ther for very good prricess. Save yourself a Huge 70 % Off All 0rders with us. Have a nice day.
RE: Team Building?? WIMPS!!
Well, I didn't say it would be easy. We'd definitely need to split up into teams...one to handle the alarm systems, one to handle the landmines, one to somehow fend off May's bullets. And then, even if we somehow capture May, I'd bet he's got all sorts of dead-man stuff like poison gas and whatnot. It'd be like a big game of DD, not that any Cypehrpunk knows what THAT is! And yeah, there's a good chance someone's not gonna make it. But think of it like this: Those genes were slowing down our species anyway. The only problem is, what do we do once we're in? Throw a big-ass drinking, whoring Shriners-like party? (I say we need a bevvy of black hookers.) Break into May's survivalist supplies? Oh, and we DEFINITELY need video. -TD From: joe cypherpunk [EMAIL PROTECTED] To: Tyler Durden [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: Team Building?? WIMPS!! Re: RSA Conference, and BA Cypherpunks Date: Wed, 09 Feb 2005 17:36:13 -0800 Not unless you wish to meet YahWah , Allah, Jesus,Buddha(pick your favorite deity!) early :) Tim is a VERY GOOD shot and the property is watched and alarmed. so My opinion Tyler? Feel free to win Darwins Award!!.. A cypherpunk ps. Tim has an Excellent Taxidermist, Your pelt and head will be displayed in grand fashion:) BTW a spell checker would be a good gift to yourself(think about thunderbird) ie Cypherpunk 'team-building' excersize? psps let me know when you plan to try so I can shoot live video of the Firefight, should be worth at least 1k to the local TV stations :) also think about a vest of tubes of tannerite(exploding targets), that way when Tim scores, the viewers of the video will know you have been hit!! think of it as evolution in action Tyler Durden wrote: How 'bout laying siege to May's compound as a Cypherpunk 'team-building' excersize? -TD From: J.A. Terranson [EMAIL PROTECTED] To: Trei, Peter [EMAIL PROTECTED] CC: [EMAIL PROTECTED], cryptography@metzdowd.com Subject: Re: RSA Conference, and BA Cypherpunks Date: Mon, 7 Feb 2005 17:19:30 -0600 (CST) On Mon, 7 Feb 2005, Trei, Peter wrote: Once again, the RSA Conference is upon us, and many of the corrospondents on these lists will be in San Francisco. I'd like to see if anyone is interested in getting together. We've done this before. Yeah, but can we eat food, drink beer, shoot drugs and screw expensive hookers at Tim May's compound? -- Yours, J.A. Terranson [EMAIL PROTECTED] 0xBD4A95BF Quadriplegics think before they write stupid pointless shit...because they have to type everything with their noses. http://www.tshirthell.com/
Re: What is a cypherpunk?
Which reminds me...they apparently found those nickels buried in some guy's back yard: http://www.sun-sentinel.com/news/local/palmbeach/sfl-pdnickels05feb05,0,5206467.story?coll=sfla-news-palm -TD From: R.A. Hettinga [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Re: What is a cypherpunk? Date: Thu, 10 Feb 2005 07:37:51 -0500 At 10:55 PM -0800 2/9/05, Major Variola (ret) wrote: A cypherpunk is one who is amused at the phrase illicit Iraqi passports. :-). I prefer to call them fungible identification, myself... Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Desire safety on Net? (n) code has the solution
I'm starting get the hang of this. I mean, fertilizer...crypto, crypto...fertilizer: They're both *munitions*, right? Right? :-) Cheers, RAH http://cities.expressindia.com/fullstory.php?newsid=117201# Express India Desire safety on Net? (n) code has the solution Express News Service Ahmedabad, February 9: ADDRESSING a wide spectrum of needs of the Net-dependent business world ranging from online buying to signing and sending web forms, (n) code solutions, promoted by IT branch of the Gujarat Narmada Valley Fertilizer Company Limited, has launched its nationwide services at NASSCOM, India Leadership Forum 2005. (n) code solutions has been recently licensed by the IT ministry as certifying authority for providing digital signature certificates to individuals and organisations. Digital certificates can be explained as digital passports, which help in authentication of the bearer on the Internet. This also helps maintain, privacy and integrity of Net-based transactions. Digital signatures are accorded the same value as paper-based signatures of the physical world by the Indian IT Act 2000. Each of these functions help bring trust in Net-based transactions. (n) code has simultaneously released a suite of applications like, (n) procure, (n) sign, (n) form and (n) pay to make use of digital signatures to ensure safety and security in the virtual world in various ways. (n) code has also put in motion, nationwide machinery to support different market segments like banking and financial institutions, public and private sector enterprises and state and central government organisation. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Hello
This is an auto-generated response designed to let you know that our system received your support inquiry and a Support Representative will review your question and respond to you soon. Please note that you will not receive a reply if you respond directly to this message. Thank you for contacting MSN Hotmail Support. Remember that MSN Hotmail also has comprehensive online help available--just click Help in the upper right corner.
Parents protest student computer ID tags
http://www.usatoday.com/tech/news/surveillance/2005-02-10-id-tag-protest_x.htm USA Today Parents protest student computer ID tags By Lisa Leff, Associated Press SUTTER, Calif. - The only grade school in this rural town is requiring students to wear radio frequency identification badges that can track their every move. Some parents are outraged, fearing it will take away their children's privacy. The badges introduced at Brittan Elementary School on Jan. 18 rely on the same radio frequency and scanner technology that companies use to track livestock and product inventory. Similar devices have recently been used to monitor youngsters in some parts of Japan. But few American school districts have embraced such a monitoring system, and civil libertarians hope to keep it that way. If this school doesn't stand up, then other schools might adopt it, Nicole Ozer, a representative of the American Civil Liberties Union, warned school board members at a meeting Tuesday night. You might be a small community, but you are one of the first communities to use this technology. The system was imposed, without parental input, by the school as a way to simplify attendance-taking and potentially reduce vandalism and improve student safety. Principal Earnie Graham hopes to eventually add bar codes to the existing ID's so that students can use them to pay for cafeteria meals and check out library books. But some parents see a system that can monitor their children's movements on campus as something straight out of Orwell. There is a way to make kids safer without making them feel like a piece of inventory, said Michael Cantrall, one of several angry parents who complained. Are we trying to bring them up with respect and trust, or tell them that you can't trust anyone, you are always going to be monitored, and someone is always going to be watching you? Cantrall said he told his children, in the 5th and 7th grades, not to wear the badges. He also filed a protest letter with the board and alerted the ACLU. Graham, who also serves as the superintendent of the single-school district, told the parents that their children could be disciplined for boycotting the badges - and that he doesn't understand what all their angst is about. Sometimes when you are on the cutting edge, you get caught, Graham said, recounting the angry phone calls and notes he has received from parents. Each student is required to wear identification cards around their necks with their picture, name and grade and a wireless transmitter that beams their ID number to a teacher's handheld computer when the child passes under an antenna posted above a classroom door. Graham also asked to have a chip reader installed in locker room bathrooms to reduce vandalism, although that reader is not functional yet. And while he has ordered everyone on campus to wear the badges, he said only the 7th and 8th grade classrooms are being monitored thus far. In addition to the privacy concerns, parents are worried that the information on and inside the badges could wind up in the wrong hands and endanger their children, and that radio frequency technology might carry health risks. Graham dismisses each objection, arguing that the devices do not emit any cancer-causing radioactivity, and that for now, they merely confirm that each child is in his or her classroom, rather than track them around the school like a global-positioning device. The 15-digit ID number that confirms attendance is encrypted, he said, and not linked to other personal information such as an address or telephone number. What's more, he says that it is within his power to set rules that promote a positive school environment: If he thinks ID badges will improve things, he says, then badges there will be. You know what it comes down to? I believe junior high students want to be stylish. This is not stylish, he said. This latest adaptation of radio frequency ID technology was developed by InCom Corp., a local company co-founded by the parent of a former Brittan student, and some parents are suspicious about the financial relationship between the school and the company. InCom plans to promote it at a national convention of school administrators next month. InCom has paid the school several thousand dollars for agreeing to the experiment, and has promised a royalty from each sale if the system takes off, said the company's co-founder, Michael Dobson, who works as a technology specialist in the town's high school. Brittan's technology aide also works part-time for InCom. Not everyone in this close-knit farming town northwest of Sacramento is against the system. Some said they welcomed the IDs as a security measure. This is not Mayberry. This is Sutter, California. Bad things can happen here, said Tim Crabtree, an area parent. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ...
Hello
This is an auto-generated response designed to answer your question as quickly as possible. Please note that you will not receive a reply if you respond directly to this message. Unfortunately, we cannot take action on the mail you sent us because it does not reference a Hotmail account. Please send us another message that contains the full Hotmail e-mail address and the full e-mail message to: [EMAIL PROTECTED] To forward mail with full headers Using Hotmail: 1. Click Options to the right of the Contacts tab. The Options page appears. 2. Under Additional Options, click Mail Display Settings. The Mail Display Settings page appears. 3. Under Message Headers, select Full and click OK. 4. Forward the resulting mail to: [EMAIL PROTECTED] Using MSN Explorer: 1. Open the message, and then click More in the upper right corner. 2. Click Message Source. The message opens in a new window with all the header information visible. 3. Copy all the text and paste it into a new message. Send this message to: [EMAIL PROTECTED] Using Outlook Express or Outlook: 1. On the unopened mail, place your cursor over the mail, right-click, and click Options. 2. Under Internet headers, copy the contents of the full header. 3. Open the e-mail in question and forward a complete copy of the message, including the full message header you copied at the beginning of your message, to: [EMAIL PROTECTED] If you're not a Hotmail member, consult the Help associated with your e-mail program to determine how to view complete header information. Then forward the message to: [EMAIL PROTECTED] If the unsolicited junk e-mail or spam comes from a non-Hotmail account, you can send a complaint to the service provider that sent the mail. Make sure that you include full headers when you send your complaint. In the full header, look at the last Received notation to locate what .com domain it came from. It looks something like: [service provider domain name].com Forward a complete copy of the message, including the full message header, to: [EMAIL PROTECTED] provider domain name].com If the domain does not have an abuse service, forward your complaint to: [EMAIL PROTECTED] provider domain name].com All Hotmail customers have agreed to MSN Website Terms of Use and Notices(TOU) that forbid e-mail abuse. At the bottom of any page in Hotmail, click Terms of Use to view the Terms of Use document in its entirety. Thank you for helping us enforce our TOU.
Re: Desire safety on Net? (n) code has the solution
Digital certificates can be explained as digital passports, which help in authentication of the bearer on the Internet. This also helps maintain, privacy and integrity of Net-based transactions. Digital signatures are accorded the same value as paper-based signatures of the physical world by the Indian IT Act 2000. Each of these functions help bring trust in Net-based transactions. This passed by without too many people noticing: http://www.cfo.com/article.cfm/3597911/c_3597966?f=home_todayinfinance === The SEC also asserts that the company's 10-Q bore an unauthorized electronic signature of Guccione -- who was Penthouse's principal executive officer and principal financial officer at the time. The signature indicated that Guccione had reviewed and signed the filing and the accompanying Sarbanes-Oxley certification. This representation was false, the SEC stated in its complaint. === You got your SOX in my Digital Signature Repudiation! You got your Digital Signature Repudiation in my SOX! Someone order a failed porn empire? --Dan
Vegas casino bets on RFID
http://news.com.com/2102-7355_3-5568288.html?tag=st.util.print Vegas casino bets on RFID By Alorie Gilbert Casino mogul Steve Wynn has pulled out all the stops for his new $2.7 billion mega-resort in Las Vegas: an 18-hole championship golf course, a private lake and mountain, and a bronze tower housing 2,700 plush guest rooms. But when its doors open in April, the Wynn Las Vegas will have one unique feature that few visitors are likely to notice--high-tech betting chips designed to deter counterfeiting, card-counting and other bad behavior. The fancy new chips look just like regular ones, only they contain radio devices that signal secret serial numbers. Special equipment linked to the casino's computer systems and placed throughout the property will identify legitimate chips and detect fakes, said Rick Doptis, vice president of table games for the Wynn. News.context What's new: Betting chips are getting a high-tech RFID makeover designed to deter counterfeiting and misbehavior at the tables. Bottom line:Despite this, RFID technology is still relatively rare in casinos--until that killer application arrives. More stories on RFID Security-wise, it will be huge for us, Doptis said. The technology behind these chips is known as radio frequency identification, or RFID, and it's been used for years to track livestock, enable employee security badges and pay tolls. The casino industry is just the latest to find new uses for RFID technology. Retail chains, led by Wal-Mart Stores, are using it to monitor merchandise. Libraries are incorporating it into book collections to speed checkouts and re-shelving. The United States and other nations are incorporating it into passports to catch counterfeits. One company even offers to inject people with RFID chips linked to their medical records to ensure they receive proper medical care. In casinos, RFID technology is still relatively rare and in search of a killer application to spur adoption. Yet some tech-savvy casino executives envision RFID transforming the way they operate table games, including blackjack, craps and roulette, over the next four or five years. For one thing, there's the counterfeiting problem, on which there is scant data. The Nevada Gaming Commission gets about a dozen complaints every year related to counterfeit chips, said Keith Copher, the agency's chief of enforcement. Last year, a casino in Reno quickly lost $26,000 in such a scheme--one of the biggest hits reported to the commission in recent years. And counterfeiting is on the rise at overseas casinos, Copher noted. The RFID technology would let dealers or cashiers see when the value of the chips in front of them don't match the scanners' tally. However, financial losses due to counterfeit chips are usually minor, and few perpetrators get away with it, Copher said. Perhaps that's why the Wynn has found a dual purpose for the high-tech chips: The casino is also using the chips to help account for the chips they issue on credit to players, since managing credit risk is a huge part of any big casino's operations. The Wynn plans to take note of the serial numbers of the chips they lend and of the name of players who cash them in. If someone else returns the chips, it could signal that the original player is using their credit line with the casino to make loans to others--something casinos generally frown upon. That sort of security doesn't come cheap: The Wynn is spending about $2 million on the chips. That's about double the price of regular chips, and doesn't include addition equipment the Wynn will need to purchase, such as RFID readers, computers and networking gear. Eye in the sky The technology could also help casinos catch card players who sneak extra betting chips onto the table after hands are dealt or players who count cards. That's one reason the Hard Rock Hotel and Casino in Las Vegas plans to switch on a new set of RFID-equipped betting chips and tables next month. The casino is installing RFID readers and PCs at game tables. With antennas placed under each player's place at the table, dealers can take a quick inventory of chips that have been wagered at the push of a button. The PCs display all the initial bets, deterring players from sneaking extra chips into their pile after hands are dealt. Yet the benefits of RFID go beyond security. It may also help casinos boost profits through savvier marketing. Vegas has a little bit of a wait-and-see attitude... They want to make sure the product is bulletproof. --Tim Richards, vice-president of marketing, Progressive Gaming International Take the Hard Rock Hotel. In addition to monitoring wagers, the casino plans to use its new RFID system to rate players--monitor gamblers to reward them with free rooms, meals and other perks based on how much and how often they wager. As the technology advances, RFID could also help track how well they play. The casinos generally reserve the most enticing rewards
Data, Net tax plan divides Republicans
http://news.com.com/2102-1028_3-5569545.html?tag=st.util.print CNET News Data, Net tax plan divides Republicans By Declan McCullagh A recent congressional report saying that new taxes could be levied on all Internet and data connections is pitting two influential groups of Republicans against each other. Sixteen members of Congress have slammed a suggestion from Congress' Joint Committee on Taxation that a tax originally created to pay for the Spanish-American War could be extended to all Internet and data connections this year. In a letter to the committee sent Tuesday, the House members said they were perplexed that the committee would gratuitously suggest tax increases that would slow the growth of the U.S. economy. The committee is headed by two Republicans, Sen. Charles Grassley of Iowa and Rep. William Thomas of California. Consumers who now enjoy freedom from regressive taxes on Internet access are not tax cheats, the letter says. It charges the committee with finding ways to justify tax hikes when its report was supposed to be about identifying people who were dodging taxes. I think the problem lies not with the senators but with staff that is involving itself gratuitously in proposals to raise taxes on the Internet, Rep. Chris Cox, a California Republican who signed the letter, said in a telephone interview with CNET News.com. George Yin, the tax committee's chief of staff, was not immediately available for comment. Currently, the 3 percent excise tax applies only to traditional telephone service. But because of technological convergence and the dropping popularity of landlines, the Joint Committee on Taxation said extending the century-old tax to broadband and data links was an option. The committee's report, published in late January, said that tax law could be rewritten so the telecommunications levy would cover all data communications services to end users, including broadband; dial-up; fiber; cable modems; cellular; voice over Internet Protocol (VoIP) and DSL, or digital subscriber line, links. Another option it listed was extending the tax only to VoIP providers, including Internet-only ones like Skype. Congress enacted the so-called luxury excise tax at 1 cent a phone call to pay for the Spanish-American War back in 1898, when only a few thousand phone lines existed in the country. It was repealed in 1902, but was reimposed at 1 cent a call in 1914 to pay for World War I and eventually became permanent at a rate of 3 percent in 1990. Republicans signing the letter to the tax committee include Chris Cannon, R-Utah; Walter Jones, R-N.C.; Chip Pickering, R-Miss.; Ron Paul, R-Texas; Jeff Miller, R-Fla.; Mark Foley, R-Fla.; Mike Rogers, R-Mich.; Fred Upton, R-Mich; Patrick McHenry, R-N.C.; Jerry Weller, R-Ill.; Rob Simmons, R-Conn.; Charles Bass, R-N.H.; and Vito Fossella, R-N.Y. Two Democrats, John Lewis, D-Ga. and Anna Eshoo, D-Calif. also signed the letter. Members of the Joint Committee on Taxation include Orrin Hatch, R-Utah; Max Baucus, D-Mont.; John Rockefeller, D-W.Va.; and representatives Bill Thomas, R-Calif.; and Charles Rangel, D-N.Y. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Polanski wins video link battle
http://news.bbc.co.uk/2/low/entertainment/4253457.stm The BBC Thursday, 10 February, 2005, 12:51 GMT Polanski wins video link battle Film director Roman Polanski will give evidence in a libel case via video link from France, the Law Lords have ruled. Mr Polanski is bringing libel action against the magazine Vanity Fair in the English High Court. But to avoid the risk of extradition to the US, where he is wanted on an outstanding child sex offence, the director will give evidence from Paris. The Law Lords ruled on Thursday that Mr Polanski should not be denied access to justice because of extradition fears. Despite his fugitive status, a fugitive from justice is entitled to invoke the assistance of the court Lord Nicholls Mr Polanski, 71, fled the US more than 25 years ago after admitting having sex with 13-year-old girl. As a French citizen, Mr Polanski cannot be extradited to the US from France, but that protection would not apply were he to travel to the UK. Mr Polanski has issued libel proceedings against Conde Naste, publishers of Vanity Fair, over an article published in July 2002. After issuing his libel writ, Mr Polanski sought a High Court order allowing him to give evidence via a video conferencing (VCF) link from France. In granting the order, Mr Justice Eady said that, although the reason underlying the application was unattractive, this did not justify depriving Mr Polanski of the chance to have his case heard. That decision was overturned by the Court of Appeal, but restored on Thursday by the House of Lords in a 3-2 majority ruling. Constitutional right Lord Nicholls said: Despite his fugitive status, a fugitive from justice is entitled to invoke the assistance of the court and its procedures in protection of his civil rights. The fact that Mr Polanski was guilty of a serious crime and feared extradition did not take the case outside the general rule. Lord Hope said the director had an undoubted constitutional right, as a citizen of France, not to be extradited. That is his right and he wishes to exercise it, he said. He is not trying to hide from anybody. It is incorrect, then, to say that his sole aim in seeking this order is to avoid being extradited. 'Quite wrong' Baroness Hale said there was a strong public interest in allowing a claim to be properly litigated. She said: New technology such as VCF is not a revolutionary departure from the norm to be kept strictly in check, but simply another tool for securing effective access to justice for everyone. If we had a rule that people such as the appellant were not entitled to access to justice at all, then of course that tool should be denied him. But we do not and it should not. Disagreeing, Lord Slynn said the video link facility should be refused where the sole reason for asking for it was to escape a criminal conviction or sentence. Lord Carswell said it would be quite wrong to allow him to give his evidence in a special way to avoid the consequences of his criminal act. Roman Polanski won a best director Oscar for The Pianist in 2003, following earlier nominations for Chinatown (1974) and Tess (1979), and a best adapted screenplay nomination for Rosemary's Baby (1968). -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: Hack License
--- R.A. Hettinga [EMAIL PROTECTED] quoted: http://www.technologyreview.com/articles/05/03/issue/review_hack.asp?p=0 Hack License By Simson Garfinkel March 2005 [snip] Stallman wrote in 1985, the golden rule requires that if I like a program I must share it with other people who like it. Stallman continues, Software sellers want to divide the users and conquer them, making each user agree not to share with others. I refuse to break solidarity with other users in this way. I cannot in good conscience sign a nondisclosure agreement or a software license agreement. [snip] Interestingly enough, Stallman expects people to use one of the GNU software licenses when they release a product. Big deal. Ideology and people change. Today the significance of the open source 'movement' being in conflict with the 'vectorialists', or rather the commercial and proprietary software community is that the polarization of the industry is limited to two poles: commercial, for-pay software or free open-source software. Alternatives, or hybrid licensing agreements are generally unknown to the computing public at large. Thus the software industry largely resembles the basic structure of the United States federal political system. Republican, or democrat : open source, or commercial software. Code that I have that is waiting for completion and formal release (some of it has been stolen and distributed in advance of its completion) I intend presently to license under a hybrid license that essentialy grants unrestricted use for non-commercial and non-military purposes, but which requires a license agreement for any commercial use. My thinking was that under the existing arrangement, commercial vendors largely benefited from the efforts of many thousands of open-source developers, thus reducing RD costs, without necessarily returning anything either to the community, or to the developers themselves. Furthermore, unless one is a high-profile open-source developer it is next to impossible to make a living writing code that is given away to free to all takers. Of this last problem, it may become moot one day if the world economy moves away from the use of money as an intermediate medium of value exchange, but today it is necessary to have money so the developer can pay his rent and buy food and purchase computer hardware tools. Of the former problem, some few vendors have recently exposed their proprietary software to the open source community. Sun Microsystems has recently put their operating system on the table; the NSA released SE Linux, and of course many smaller examples abound. There are other considerations that remain largely unaddressed by the present status quo, however, and I wanted to address some of them. For instance, I wanted to stop my software from being used by a military force in the process of developing proprietary (and presumably classified) weapons of mass destruction or weapons designed to be used against [domestic] civilian populations. Of course, I wouldn't also want my software to be used by terrorists such as the Ted Kaczinski's of the world. As an individual developer, I didn't realistically expect that I would actually halt the unlicensed use of my software for, say, illegal purposes, but I did expect to force such people and organisations to actually have to _steal_ the software rather than handing to them on a sliver platter, with my tacit blessing. While the existing judicial and legislative environment doesn't seem to be friendly to the idea of people taking responsibility for the purposes that their creations are put to, I think that software professionals should put some thought to the moral dimension of the application of their products. The concept of know your customer exists today, however badly it is deployed by extant legislation. I believe it may be done well by intelligent people, and surely it can also be abused. A group of Klansmen might release software that contained a licensing agreement restricting its [free] use to aryans. I think Tim might say that they should be free to do so, because coloured people as well as concerned caucasions would have the ability and right to produce nominally equivalent software to compete with the Klansman's code. However this view relies on the minimalist view of government regulation, a point of view that is not much in favour today. Whatever the particulars of any given scenario, the point remains that the two-pole system that dominates the software community has some rather large holes. I expect that one day I will be able to afford to replace the computer(s) that were stolen by the local authorities, despite their ongoing and malicious interference and harassment. Then, I may end up finishing off a few things for release; some of it certainly under the scheme I touch on above, and some perhaps under a 'true' open-source license. Some of said software may even be useful to a non-trivial population of users.
Re: Desire safety on Net? (n) code has the solution
At 09:43 AM 2/10/2005, R.A. Hettinga wrote: I'm starting get the hang of this. I mean, fertilizer...crypto, crypto...fertilizer: They're both *munitions*, right? Right? Well, sometimes they're both munitions, but sometimes they're both bullshit. I have no reason to assume they're not producing a quality product, but it's certainly a field where independent verification is necessary.
[Announce] Attack against OpenPGP encryption
--- begin forwarded text Date: Thu, 10 Feb 2005 20:00:17 -0500 From: David Shaw [EMAIL PROTECTED] To: [EMAIL PROTECTED] OpenPGP: id=99242560; url=http://www.jabberwocky.com/david/keys.asc User-Agent: Mutt/1.5.7i Cc: Subject: [Announce] Attack against OpenPGP encryption Sender: [EMAIL PROTECTED] Content-Type: multipart/signed; micalg=pgp-sha1; protocol=application/pgp-signature; boundary=IMjqdzrDRly81ofr Content-Disposition: inline Last night, Serge Mister and Robert Zuccherato published a paper reporting on an attack against OpenPGP symmetric encryption. This attack, while very significant from a cryptographic point of view, is not generally effective in the real world. To be specific, unless you have your OpenPGP program set up as part of an automated system to accept encrypted messages, decrypt them, and then provide a response to the submitter, then this does not affect you at all. There is a very good writeup on the attack that goes into more depth at http://www.pgp.com/library/ctocorner/openpgp.html There will undoubtedly be further discussion of this over the next several days, but I wanted to provide a few comments now, to try and answer some questions that may arise: 1) This is not a bug in any particular OpenPGP implementation (GnuPG, PGP, Hushmail, etc). Rather, this is an attack against the OpenPGP protocol itself. 2) The attack requires an average of 32,768 probes to get two bytes of plaintext. This is why it is completely ineffective against human beings, who will presumably wonder why a stranger wants them to decrypt thousands and thousands of messages that won't decrypt, and then tell them what errors were seen. 3) It might be effective against an automated process that incorporates OpenPGP decryption, if that process returns errors back to the sender. 4) The OpenPGP Working Group will be discussing this issue and coming up with an effective and permanent fix. In the meantime, I have attached two patches to this mail. These patches disable a portion of the OpenPGP protocol that the attack is exploiting. This change should not be user visible. With the patch in place, this attack will not work using a public-key encrypted message. It will still work using a passphrase-encrypted message. These patches will be part of the 1.2.8 and 1.4.1 releases of GnuPG. 5) The full paper is available at http://eprint.iacr.org/2005/033 It's a great piece of work. David ___ Gnupg-announce mailing list [EMAIL PROTECTED] http://lists.gnupg.org/mailman/listinfo/gnupg-announce --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: What is a cypherpunk?
-- James A. Donald: Corporate lawyers did not descend on Linux until there were enough wealthy linux users to see them in court, and send in their own high priced lawyers to give them the drubbing they deserved. Eugen Leitl You're misinterpreting the events. Industry has so far been fighting with propagada only. Outside of FOSS IP wars are the rule. What has happened so far is that corporate lawyers have lost, and linux has won - that is to say, corporations using linux have successfully defended their right to do so. Compare with what happens to tax evaders. The state is your enemy. The corporation is your friend. It was corporations that defended linux in court, and created substantial parts of linux - for example a lot of linux was written by IBM employees on IBM salary - presumably as an anti microsoft measure. Corporations deal with competition by creating stuff, governments deal with competition by shooting it. The corporation is free and voluntary association. The alternative is state imposed association. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG mCPvNIMCElEgaF3RT8krDyySbf6TRivdp5TOTL3/ 45fmEJA1E7SZ6GhiXjBjgr5i6tT7dfRXf3teVziId
Re: What is a cypherpunk?
-- James A. Donald wrote: If, however, you decline to pay taxes, men with guns will attack you. That is the difference between private power and government power. ken wrote: But in most places at most times the state is run at least partly by and for the rich and the owners of property and supports and privileges their continuing private power. The state was created to attack private property rights - to steal stuff. Some rich people are beneficiaries, but from the beginning, always at the expense of other rich people. And there are circumstances where private individuals send men with guns to attack you if you cross them. Compare mafia extortion with government taxation. The mafia charges are small in proportion as their power is small. The Gangsta disciples charged drug dealers thirty dollars a month for protection, and, unlike the state, actually provided protection. The mafia cannot afford to seriously piss off its customers, because there is no large difference between customer firepower and mafia firepower. The government, on the other hand, can afford to seriously piss of its subjects. The federal government established its monopoly of force by burning Atlanta and Shenendoah. Al Capone did the Saint Valentine's day massacre. Big difference. Quite a lot of them, from the feudal barons, to drug-dealers in modern cities, to just about anywhere out of easy reach of the state's police. Again, compare the burning of Shenendoah with the Saint Valentine's day massacre. There is just no comparison. Governmental crimes are stupendously larger, and much more difficult to defend against. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG sE92+Z9bMSzulF42TGzG/hIjoDv+qod3IBzFehdT 4O/i5gQElpUPn6EYOMIETP8gkc9EP5DSN2QYuq83i
Re: Mail Delivery (failure techsupport@m-w.com)
Due to a dramatic increase in the volume of spam and virus-related messages received at this address, it has been disabled. Please resend your inquiry to the new address: technicalsupport[at sign]merriam-webster.com (Please replace [at sign] with @.) We apologize for any inconvenience this may have caused. Merriam-Webster Technical Support
Desire safety on Net? (n) code has the solution
I'm starting get the hang of this. I mean, fertilizer...crypto, crypto...fertilizer: They're both *munitions*, right? Right? :-) Cheers, RAH http://cities.expressindia.com/fullstory.php?newsid=117201# Express India Desire safety on Net? (n) code has the solution Express News Service Ahmedabad, February 9: ADDRESSING a wide spectrum of needs of the Net-dependent business world ranging from online buying to signing and sending web forms, (n) code solutions, promoted by IT branch of the Gujarat Narmada Valley Fertilizer Company Limited, has launched its nationwide services at NASSCOM, India Leadership Forum 2005. (n) code solutions has been recently licensed by the IT ministry as certifying authority for providing digital signature certificates to individuals and organisations. Digital certificates can be explained as digital passports, which help in authentication of the bearer on the Internet. This also helps maintain, privacy and integrity of Net-based transactions. Digital signatures are accorded the same value as paper-based signatures of the physical world by the Indian IT Act 2000. Each of these functions help bring trust in Net-based transactions. (n) code has simultaneously released a suite of applications like, (n) procure, (n) sign, (n) form and (n) pay to make use of digital signatures to ensure safety and security in the virtual world in various ways. (n) code has also put in motion, nationwide machinery to support different market segments like banking and financial institutions, public and private sector enterprises and state and central government organisation. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: Desire safety on Net? (n) code has the solution
At 09:43 AM 2/10/2005, R.A. Hettinga wrote: I'm starting get the hang of this. I mean, fertilizer...crypto, crypto...fertilizer: They're both *munitions*, right? Right? Well, sometimes they're both munitions, but sometimes they're both bullshit. I have no reason to assume they're not producing a quality product, but it's certainly a field where independent verification is necessary.
Re: What is a cypherpunk?
A cypherpunk is one who is amused at the phrase illicit Iraqi passports. Given that the government of .iq has been replaced by a conquerer's puppet goverment, who exactly has authority to issue passports there? And why does this belief about the 1-to-1-ness of passports to meat puppets or other identities fnord persist? A CP is not an anarchist; and anarchists are ill defined by current authors, since the word merely means no head, rather than no rules, as Herr May frequently reminded. (In fact, the rules would de facto be set by the local gangster, rather than a DC based gang claiming to be the head. A better form is libertarian archy, but that is perhaps another thread.) A CP, removing arguable claims about political idealogy, is one who understands the potential effects of certain techs on societies, for good or bad. And is not, like a good sci fi writer, afraid to consider the consequences. And, ideally, a CP is one who can write code, and does so, code that might be useful for free sentients, not even necessarily free (in the beer sense) code. (Albeit 'tis hard to write useful code in the uninspectable sense of not-free, and inspectability facilitates beer-free copying ) But this is an ideal, and perhaps three meanings of free in one rant is too many for most readers. At 12:04 PM 2/7/05 -0500, R.A. Hettinga wrote: While officials in Baghdad and Washington berate Iraq's neighbours for failing to block insurgency movements across their borders, one of the most dangerous security lapses thrives in Baghdad's heart - a trade in illicit Iraqi passports.
Re: What is a cypherpunk?
At 10:38 PM 2/9/05 -0600, Shawn K. Quinn wrote: On Wed, 2005-02-09 at 09:09 -0800, James A. Donald wrote: There is nothing stopping you from writing your own operating system, so Linus did. Linus Torvalds didn't write the GNU OS. He wrote the Linux kernel, which when added to the rest of the existing GNU OS, written by Richard Stallman among others, allowed a completely free operating system. Please don't continue to spread the misconception that Linus Torvalds wrote the entire (GNU) operating system. Who gives a fuck? RMS was fermenting in his own philosophical stew, to put it politely. The shame is that BSD didn't explode like L*nux did, and that all that work had to be re-done, and with a nasty ATT flavor to boot (no pun intended).