Jeff Jacoby: An inglorious suicide
http://www.townhall.com/columnists/jeffjacoby/printjj20050304.shtml Townhall.com An inglorious suicide Jeff Jacoby (back to web version) | Send March 4, 2005 Hunter Thompson's suicide was an act of selfishness and cruelty. But more depraved by far has been the celebration of that suicide by those who supposedly loved or admired him. The 67-year-old author of the ''Fear and Loathing'' books shot himself in the head on Feb. 20 as he sat in the kitchen of his home near Aspen, Colo., taking a phone call from his wife. Anita Thompson had called him from her health club, she told the Aspen Daily News, and he'd asked her to come home and help him with the column he had to write. Then, without warning or a goodbye, he put down the phone and fired a .45-caliber handgun into his mouth. ''I was on the phone with him, he set the receiver down and he did it,'' she said. ''I heard the clicking of the gun.'' There was a loud, muffled noise. Then nothing. ''I was waiting for him to get back on the phone.'' Could anything be more ghoulish and egotistical than making your unsuspecting wife listen while you put a bullet through your skull? Absolutely: making your unsuspecting wife listen while you put a bullet through your skull - and your son, daughter-in-law, and grandson are just a few yards away. Juan Thompson was in a nearby office when his father blew his brains out in the kitchen. Winkel Thompson and 6-year-old Will were playing in the living room next door. It takes a real sadist to arrange his suicide so that his loved ones are forced to hear him die. But what kind of degenerate inflicts something so traumatic on a child of 6? In Thompson's defense, it must be said that he was a hardened alcohol and drug abuser who over the decades had ingested, inhaled, and imbibed a staggering quantity and assortment of recreational poisons. The cumulative damage to his brain must have been considerable. By the time he fired his .45, who knows how clearly he was thinking about anything? But there is no defense for the treatment of Thompson's suicide as some sort of final gonzo coup by a rebel who never played by society's rules. ''Hunter S. Thompson died Sunday as he planned,'' begins Jeff Kass's admiring Feb. 24 account in the Rocky Mountain News, ''surrounded by his family, at a high point in his life, and with a single, courageous, and fatal gunshot wound to the head, his son says.'' High point? Courageous? In what warped moral universe is a man's pointless and ignoble death the ''high point in his life?'' And what is ''courageous'' about turning one's wife into a widow or depriving a 6-year-old of his grandfather? Thompson's son and daughter-in-law, Kass continues, ''could not be prouder'' of his suicide. It was the result of ''a thought process with its own beautifully dark logic. ... The guy was a warrior, and he went out like a warrior.'' Did Thompson, asks Kass, ''have his favorite liquid sidekick, a glass of Chivas Regal, on the counter? 'Of course he did,' Juan Thompson said.'' Another story details the impromptu cocktail party that gathered around Thompson's corpse - still in the kitchen chair - to drink Chivas and toast him. ''It was very loving,'' Anita Thompson is quoted as saying. ''It was not a panic, or ugly, or freaky.'' Her husband's death should be cheered, she says. ''This is a triumph of his, not a desperate, tragic failure.'' That is either unhinged grief speaking or overripe counterculture leftism. Either way, it is grotesque. But it has been echoed everywhere. ''It wouldn't be accurate to say Thompson had a death wish,'' Mark Layman wrote for Knight Ridder. ''Just the opposite: He was the self-described 'champion of fun.' '' Douglas Brinkley, the well-known historian and Thompson family friend, declared that Thompson ''made a conscious decision that he had an incredible run of 67 years, lived the way he wanted to, and wasn't going to suffer the indignities of old age.'' One journalist after another seized the moment to reminisce about some wild evening once spent with Thompson, whose suicide they seem to regard as one last piece of roguish bad craziness from an irrepressible original. How striking is the contrast between Thompson's tawdry death and the excruciating struggle of Pope John Paul II, whose passionate belief in the sanctity of life remains unwavering, even as Parkinson's disease slowly ravages him. The pope's example of courage and dignity sends a powerful message, but the chattering class would rather talk instead about why this stubborn man won't resign. Meanwhile they extol Hunter Thompson and are itching to know - are his ashes really going to be fired from a cannon? -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity,
Virus Alert
The mail message (file: application.pif) you sent to [EMAIL PROTECTED] contains a virus. (on email-srv-b)
[Htech] Tracking a Specific Machine Anywhere On The Net (fwd from eugen@leitl.org)
- Forwarded message from Eugen Leitl [EMAIL PROTECTED] - From: Eugen Leitl [EMAIL PROTECTED] Date: Fri, 4 Mar 2005 18:28:27 +0100 To: [EMAIL PROTECTED] Subject: [Htech] Tracking a Specific Machine Anywhere On The Net User-Agent: Mutt/1.4i Reply-To: [EMAIL PROTECTED] Link: http://slashdot.org/article.pl?sid=05/03/04/1355253 Posted by: Zonk, on 2005-03-04 16:45:00 from the not-the-sandra-bullock-movie dept. An anonymous reader writes An article on ZDNet Australia tells of a new technique developed at CAIDA that involves using the individual machine's clock skew to [1]fingerprint it anywhere on the net. Possible uses of the technique include tracking, with some probability, a physical device as it connects to the Internet from different access points, counting the number of devices behind a NAT even when the devices use constant or random IP identifications, remotely probing a block of addresses to determine if the addresses correspond to virtual hosts (for example, as part of a virtual honeynet), and unanonymising anonymised network traces. References 1. http://www.zdnet.com.au/news/security/0,261744,39183346,00.htm - End forwarded message - How to track a PC anywhere it connects to the Net Renai LeMay, ZDNet Australia March 04, 2005 URL: http://www.zdnet.com.au/news/security/0,261744,39183346,00.htm Anonymous Internet access is now a thing of the past. A doctoral student at the University of California has conclusively fingerprinted computer hardware remotely, allowing it to be tracked wherever it is on the Internet. In a paper on his research, primary author and Ph.D. student Tadayoshi Kohno said: There are now a number of powerful techniques for remote operating system fingerprinting, that is, remotely determining the operating systems of devices on the Internet. We push this idea further and introduce the notion of remote physical device fingerprinting ... without the fingerprinted device's known cooperation. The potential applications for Kohno's technique are impressive. For example, tracking, with some probability, a physical device as it connects to the Internet from different access points, counting the number of devices behind a NAT even when the devices use constant or random IP identifications, remotely probing a block of addresses to determine if the addresses correspond to virtual hosts (for example, as part of a virtual honeynet), and unanonymising anonymised network traces. NAT (network address translation) is a protocol commonly used to make it appear as if machines behind a firewall all retain the same IP address on the public Internet. Kohno seems to be aware of the interest from surveillance groups that his techniques could generate, saying in his paper: One could also use our techniques to help track laptops as they move, perhaps as part of a Carnivore-like project. Carnivore was Internet surveillance software built by the United States' Federal Bureau of Investigation. Earlier in the paper Kohno overshadowed possible forensics applications, saying that investigators could use his techniques to argue whether a given laptop was connected to the Internet from a given access location. Another application for Kohno's technique is to obtain information about whether two devices on the Internet, possibly shifted in time or IP addresses, are actually the same physical device. The technique works by exploiting small, microscopic deviations in device hardware: clock skews. In practice, Kohno's paper says, his techniques exploit the fact that most modern TCP stacks implement the TCP timestamps option from RFC 1323 whereby, for performance purposes, each party in a TCP flow includes information about its perception of time in each outgoing packet. A fingerprinter can use the information contained within the TCP headers to estimate a device's clock skew and thereby fingerprint a physical device. Kohno goes on to say: Our techniques report consistent measurements when the measurer is thousands of miles, multiple hops, and tens of milliseconds away from the fingerprinted device, and when the fingerprinted device is connected to the Internet from different locations and via different access technologies. Further, one can apply our passive and semi-passive techniques when the fingerprinted device is behind a NAT or firewall. And the paper stresses that For all our methods, we stress that the fingerprinter does not require any modification to or cooperation from the fingerprintee. Kohno and his team tested their techniques on many operating systems, including Windows XP and 2000, Mac OS X Panther, Red Hat and Debian Linux, FreeBSD, OpenBSD and even Windows for Pocket PCs 2002. In all cases, the paper says, we found that we could use at least one of our techniques to estimate clock skews on the machines and that we required only a small amount of data, although the exact data requirements depended on the operating system in
SEC probing ChoicePoint stock sales
http://www.msnbc.msn.com/id/7087572/print/1/displaymode/1098/ MSNBC.com SEC probing ChoicePoint stock sales Execs sold shares before ID thefts made public The Associated Press Updated: 10:30 a.m. ET March 4, 2005 ATLANTA - ChoicePoint Inc., a leading data warehouser, says the Securities and Exchange Commission is investigating stock sales by its top two executives and the embattled company has decided to stop giving personal information about consumers to small businesses. Its shares tumbled on the news. The dual announcements were made Friday by the Alpharetta, Ga.-based company in a news statement and a regulatory filing. The SEC probe involves sales of stock by chief executive Derek Smith and president Douglas Curling for a $16.6 million profit in the months after the company learned its massive database had been breached and before that was made public. ChoicePoint's stock had dropped about 10 percent since the personal information breach at the data collector was announced Feb. 15. On Friday, ChoicePoint shares fell $2.43, or 6 percent, to $37.85 in early trading on the New York Stock Exchange. Corporate governance experts say the pattern and timing of the trading by Smith and Curling raise questions, while ChoicePoint has said the stock trading was prearranged under a plan approved by the company's board. The decision to stop selling data to small businesses was made because that was the segment of the company that thieves tapped into to gain access to ChoicePoint's database. Smith said in a statement that the decision follows the response of consumers who have made it clear to us that they do not approve of sensitive personal data being used without a direct benefit to them. ChoicePoint said it will stop selling information products that contain sensitive consumer data, including Social Security numbers, to small businesses, except in limited cases where the products support federal, state or local government purposes. Last month, ChoicePoint said it was notifying about 145,000 Americans that their Social Security numbers and other personal information may have been viewed by criminals posing as legitimate ChoicePoint customers. The company said Friday that the number of potentially affected customers may increase, but it doesn't believe the increase will be substantial. ChoicePoint has said repeatedly it learned of the breach in October, but delayed disclosing it because it said California authorities had asked it to keep quiet to protect the fraud investigation. It said in a detailed explanation Friday that it first learned of the possibility of fraud on Sept. 27. A similar breach involving 7,000 to 10,000 ChoicePoint records occurred in 2002. ChoicePoint said Friday the SEC has notified the company that it is conducting an informal inquiry of the stock sales as well as the circumstances surrounding the possible theft of people's identities in connection with the breach of its database. The stock sales occurred between November and February. ChoicePoint said it will cooperate with the probe and provide requested information and documents to the SEC. The company also said in a lengthy regulatory filing that the Federal Trade Commission is conducting an inquiry into its compliance with federal laws governing consumer information security and related issues. The FTC has asked for information and documents regarding ChoicePoint's customer credentialing process and the recent incident in Los Angeles involving a Nigerian man who was accused of committing fraud using consumer information from the company's database. The company said it is a defendant in several lawsuits and complaints arising from the breach. It said it could not estimate the financial impact on the company of the customer fraud and related events. It wasn't immediately clear how many customers the decision on small businesses affects. ChoicePoint said Feb. 21 when it decided to rescreen 17,000 small business customers that that action affected 5 percent of its annual revenue of $900 million. In Friday's regulatory filing, it said that because it will no longer sell information to small businesses, it expects a decline in core revenue this year of $15 million to $20 million. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: Jeff Jacoby: An inglorious suicide
R.A. Hettinga spoke thusly... http://www.townhall.com/columnists/jeffjacoby/printjj20050304.shtml Townhall.com An inglorious suicide Jeff Jacoby (back to web version) | Send March 4, 2005 Hunter Thompson's suicide was an act of selfishness and cruelty. But more depraved by far has been the celebration of that suicide by those who supposedly loved or admired him. What does this have to do with cypherpunks? This is not your personal blog. Most of the list traffic is forwarded or cross-posted news articles, but how is HST's suicide remotely on-topic? It's not as if every possible angle on HST's suicide hasn't already been covered by the press.
cadastros de emails por classe social
Cadastros de emails mala direta Cadastros para mala direta livre de spam listas de e-mails divididas por estados: http://www.gueb.de/segmails cadastros de emails por classe social Cadastros de emails mala direta Cadastros para mala direta livre de spam emails para mala direta segmentada por profissão Cadastros para mala direta livre de spam Cadastros de emails mala direta Cadastros para mala direta livre de spam cadastros de emails por classe social: http://www.gueb.de/segmails Cadastros de emails mala direta Cadastros para mala direta livre de spam listas de e-mails divididas por estados emails para mala direta segmentada por profissão listas de e-mails divididas por estados E-mails segmentados para divulgação - Cadastros de e-mail cadastros de emails por classe social Cadastros de emails mala direta listas de e-mails divididas por estados cadastros de emails por classe social E-mails segmentados para divulgação - Cadastros de e-mail listas de e-mails divididas por estados Cadastros de emails mala direta: http://www.gueb.de/segmails
Warm Party for a Code Group
At 9:01 PM +0100 3/4/05, Anonymous wrote: What does this have to do with cypherpunks? Narcs and feds will not be allowed at the meeting. Fuck them dead. Cheers, RAH -- http://www.wired.com/news/print/0,1294,55114,00.html Wired News Warm Party for a Code Group By Danit Lidor? Story location: http://www.wired.com/news/culture/0,1284,55114,00.html 02:00 AM Sep. 13, 2002 PT The cypherpunks are throwing a PGP (pretty good party) this weekend. The venerable online community is celebrating its 10th anniversary which, in the ephemeral world of the Internet, is remarkable. No wonder. In 1992, the cypherpunks emerged from a small group of people who, because of their interest in cryptography and encryption, recognized that the free-flowing format of the burgeoning Web culture must provide for anonymous interactions. Not surprisingly, they soon came under the uncomfortable scrutiny of the formidable National Security Agency. The situation escalated in early 1993, after a computer programmer named Phil Zimmermann (a patron saint of the community) -- alarmed that the patents for public key encryption were sold to a company called RSA -- wrote an open-source, free program called PGP (Pretty Good Privacy). The resulting debacle, in which Zimmermann was threatened with criminal prosecution for exporting weapons (encryption technology is termed a weapon by the U.S. government), brought the public's right to privacy to the forefront of the now-commonplace tug-of-war between those who favor crypto anarchy and those who don't. Through the active work of many civil libertarians, including the cypherpunks, pressure was brought to bear upon the government to re-think its position. The charges against Zimmermann were dropped. It was a triumph. The geeks fought the law, and the geeks won. The cypherpunks' paranoia about information exploitation is becoming mainstream, Peter Wayner, author of Translucent Databases, wrote in an e-mail interview. Everyone is learning that the cypherpunks' insistence on limiting the proliferation of information is a good thing. The cypherpunks' e-mail list forms the nucleus of the community, which has grown to include people of many agendas and interests. No longer the exclusive domain of crypto geeks, cypherpunks are doctors, lawyers, mathematicians, felons, druggies, anti-druggies, anarchists, libertarians, right-wing fanatics, left-wing fanatics, teachers, housewives, househusbands, students, cops and criminals, cypherpunk J.A. Terranson wrote in a posting. Cypherpunk Optimizzin Al-gorithym wrote in typically obscure cypherpunk fashion, We're all just voices in Tim May's head. May, one of the original cypherpunks, continues to be an active figurehead of the cypherpunks and has often bridged the chasm between its historically secretive culture and its forays into the public sphere. In 10 years, the list has become an amalgamation of a political watchdog site, a social club and a repository of technical cryptographic discussion. (It's) where people from all different backgrounds and views can hear from one another, mathematician Nina Fefferman said. We math people are frequently shocked and confused by what the politicians do with regard to legislating crypto-related issues. Conversely, the policy and society people are frequently interested in issues that have to do with the use and regulation of cryptographic standards and research. The atmosphere isn't as electric because the scene has grown so big, Wayner said. It's not just a few guys talking about the importance of some mathematical equations. It's like debating the importance of indoor plumbing now. No one disputes it, they just want to argue about copper versus PVC. Wayner, Zimmermann, as well as May, John Gilmore and Eric Hughes (the original founders of the list), however, have emerged from their cypherpunk association as key public privacy figures: vocal and passionate defenders of civil liberties on the Web. It's hard to imagine the secretive and fractious cryptocrusaders assembling for a physical meeting. Even May, the party's host, isn't sure who or how many cypherpunks to expect to his soiree at a hideaway in the Santa Cruz (California) mountains. But he's adamant about who won't be coming. Never one to mince words, he wrote, Narcs and feds will not be allowed at the meeting. Fuck them dead. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: [Htech] Tracking a Specific Machine Anywhere On The Net (fwd from eugen@leitl.org)
hi, After looking at RFC1323 below http://www.cse.ohio-state.edu/cgi-bin/rfc/rfc1323.html#sec-4 the only reasonable option is to use the time old pseudorandom numbers for TCP sequence numbers in the TCP IP stack. Another option would be to synchronize the client with NTP but that wouldn't work either.Say that the client clock can be updated ever one millisecond. However the minimum network delay between the time server and the client is usually 300ms to 800 ms.During this period a large number of outboud packets are send from the client depending on the speed at which the client is blasting away. There are plenty of packets to analyze for the attacker to determine the skew. Sarad. --- Eugen Leitl [EMAIL PROTECTED] wrote: - Forwarded message from Eugen Leitl [EMAIL PROTECTED] - From: Eugen Leitl [EMAIL PROTECTED] Date: Fri, 4 Mar 2005 18:28:27 +0100 To: [EMAIL PROTECTED] Subject: [Htech] Tracking a Specific Machine Anywhere On The Net User-Agent: Mutt/1.4i Reply-To: [EMAIL PROTECTED] Link: http://slashdot.org/article.pl?sid=05/03/04/1355253 Posted by: Zonk, on 2005-03-04 16:45:00 from the not-the-sandra-bullock-movie dept. An anonymous reader writes An article on ZDNet Australia tells of a new technique developed at CAIDA that involves using the individual machine's clock skew to [1]fingerprint it anywhere on the net. Possible uses of the technique include tracking, with some probability, a physical device as it connects to the Internet from different access points, counting the number of devices behind a NAT even when the devices use constant or random IP identifications, remotely probing a block of addresses to determine if the addresses correspond to virtual hosts (for example, as part of a virtual honeynet), and unanonymising anonymised network traces. References 1. http://www.zdnet.com.au/news/security/0,261744,39183346,00.htm - End forwarded message - How to track a PC anywhere it connects to the Net Renai LeMay, ZDNet Australia March 04, 2005 URL: http://www.zdnet.com.au/news/security/0,261744,39183346,00.htm __ Celebrate Yahoo!'s 10th Birthday! Yahoo! Netrospective: 100 Moments of the Web http://birthday.yahoo.com/netrospective/
RE: Jeff Jacoby: An inglorious suicide
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Anonymous Sent: Friday, March 04, 2005 3:01 PM To: [EMAIL PROTECTED] Subject: Re: Jeff Jacoby: An inglorious suicide R.A. Hettinga spoke thusly... http://www.townhall.com/columnists/jeffjacoby/printjj20050304.shtml Townhall.com An inglorious suicide Jeff Jacoby (back to web version) | Send March 4, 2005 Hunter Thompson's suicide was an act of selfishness and cruelty. But more depraved by far has been the celebration of that suicide by those who supposedly loved or admired him. What does this have to do with cypherpunks? This is not your personal blog. Most of the list traffic is forwarded or cross-posted news articles, but how is HST's suicide remotely on-topic? I absolutely agree. The value of Hettinga's posts to Cypherpunks and the Cryptography list has absolutely gone down the tubes, to the point where I have had to write special filter rules to isolate his posts from the actual content. The dozen or so full-length article on HST have simply no relevance to either list. If he had any respect for others at all, he'd give the URL and a couple lines of summary. Or even better is your suggestion that he use his own blog, or set up his own mailing list instead of spamming the lists with off-topic crap. His behaviour has sunk his reputation well into the Choate/Matt Taylor range. Peter Trei
Handheld Licence Plate Scanner/OCR/Lookup
More news dispatches from Brinworld http://www.chieftain.com/business/1109862027/1 http://www.thenewspaper.com/news/01/196.asp Bootfinder, made by G2 Systems in Alexandria VA, is a combination of a handheld digital camera, OCR software for locating and reading license plates, and a database lookup system that shows the user whatever information it has about that license plate. The software runs on a laptop; the article doesn't say if it has an online live data feed or just runs on stored data. The two governments currently using it, New Haven Conn and Arlington County VA, are using it to find car tax and parking ticket delinquents, so it's something that doesn't need a live data feed, but that would be easy to patch on - the hard technology's in reading the number, not in using it. It was originally developed for tracing stolen cars, but the developer found that to be a hard sell with cash-strapped police departments, while parking enforcement is a revenue-generating activity so anything that lets those departments rake in money faster is an easy sell. One city saw their car tax payment compliance go from 80% to 95% because it was easy to catch many non-payers and to scare other people into paying before they get caught. The camera can scan 1000 license plates per minute - the article doesn't say how fast the cars can be going, but the cities that use it have parking officials driving down the street scanning parked cars' plates, which are easier to aim at than moving cars. Even so, that suggests that more widespread privacy-invading applications should be easy to develop - David Brin's Transparent Society prediction of cameras and computing being cheap enough to become ubiquitous becomes more realistic every year.
Re: SEC probing ChoicePoint stock sales
R.A. Hettinga wrote: http://www.msnbc.msn.com/id/7087572/print/1/displaymode/1098/ While this is marginally more cypherpunks-related than Hunter Thompson's suicide, I think we're all capable of reading the daily headlines if we care about the SEC investigation du jour.
Re: Jeff Jacoby: An inglorious suicide
Thus spake Anonymous ([EMAIL PROTECTED]) [04/03/05 15:18]: : What does this have to do with cypherpunks? This is not your personal : blog. Most of the list traffic is forwarded or cross-posted news : articles, but how is HST's suicide remotely on-topic? Actually, I'm kinda getting sick of reading about his suicide. Seriously, enough already. He's dead. Let him rest in peace.
In-Plant Surplus Machines
IN-PLANT SURPLUS !! HORIZONTAL MACHINING CENTERS CINCINNATI MILACRON MAGNUM 1000 Horizontal Machining Center,Acramatic 950 CNC Control, (4) 1000mm Pallets with 1 Degree Indexing, X=61", Y=51.2", Z=47.2", 50HP, 6500 RPM, 90 Station Tool Changer, 1998 CINCINNATI MILACRON MAGNUM 800 Horizontal Machining Center,Acramatic 950 CNC Control, (2) 800mm Pallets with 1 Degree Indexing, X=51.2", Y=43.3", Z=44.3", 50HP, 6500 RPM, 90 Station Tool Changer, 1996 CINCINNATI T-30 CNC Horizontal Machining Center, Acramatic 900CNC Control,X=40", Y=40", Z= 42", 4,000 RPM,60 Station Tool Changer, Thru SpindleCoolant,30HP, 6Pallet work Changer, (60 31.5" Square Pallets with 1 Degree Indexing, $ 39,500. VERTICAL MACHINING CENTERS OKUMA MC-60VAECNC Vertical Machining Center,Okuma OSP-7000M CNC, X=59.06", Y=24.8", Z=24.02", 60.24" x 24.8" Table, 5000 RPM, CAT-50, 22HP,20 ATC,New 1997, Big Heavy Duty Machine. CINCINNATi ARROW 500CNC Vertical Machining Center,Acramatic 2100 PC Based CNC Control, X=20", Y=20", Z= 20", 27.5" x 20" Table, 100-8000 RPM, CAT-40, 15HP,21 ATC,New 1999, From Tool Room ! Excellent Condition ! LEADWELL (2) PalletCNC Vertical Machining Center,Fanuc 18MC CNCControl, X=20", Y=14", Z= 16", (2) 26" x 13.8" WorkTables, 100-1 RPM, CAT-40, 16HP,32 ATC,New 1998 CINCINNATI SABRE 750CNC Vertical Machining Center,Acramatic 850SX CNCControl, X=30", Y=20", Z=22",6000 RPM, CAT-40, 22HP,21 ATC,New 1993, $ 14,500. Very Nice Condition ! CNC TURNINGCENTERS OKUMACADET L1420/650, OSP 700L CNC, !GF, 24.41" Swing, 14.17" Max Turn Diameter, 26.38" Machining Length, 12 Station Turret, 10" Chuck, 1996. OKUMALB-300 Big Bore with 3.1" Bar Capacity, OSP U100L CNC, 20.8" Swing, 14.56" Max Turn Diameter, 20.47" Centers, 3800 RPM, 30HP, 12 Position Turret. Collet Chuck with 1 Degree Indexing,New 2000. $ 99,500. OKUMACADET BIG BORE LNC-8C, OSP 700L CNC, 15.75" Swing, 9.84" Max Turn Diameter, 15.69" Machining Length, 12 Station Turret, 10" Chuck, 1997, Nice Machine. CINCINNATI 18C CNCTurning Center, Rebuilt and Retrofit by Cincinnati in 1992, Acramatic 850 CNC, 30.5" Over Bed,ProgrammableSwing-upTailstock with 34" Between Centers, 18" Chuck, 4.5" Thru Hole, 50HP, 16-1600 RPM, Excellent Condition ! FORGING PRESSES 5000 TON ERIE MECHANICAL FORGING PRESS,Allen Bradley Panel Master 900 PLC, 16" Stroke, 67" x 60" Bed, 58" x 56" Ram, 300 HP, 45 SPM, Press was new in 1981 and Rebuilt and retrofit by Erie Press in 1997. 2500 TON ERIE MECHANICAL FORGING PRESS,Allen Bradley Panel Master 900 PLC, 14" Stroke, 67" x 60" Bed, 58" x 56" Ram, 150 HP, 50 SPM, Press was new in 1981 and Rebuilt and retrofit by Erie Press in 1997. GUN DRILL ELDORADO 1" x 36" CNC GUN DRILL, Fanuc CNC, Eldorado Coolant System, Flo Meter, Power Bushing, (2) Whip Guides, 1 " Drilling Capacity from Solid, 1.25" Reaming Diameter, Very Well Tooled ! New Sept 2002. Used less than 100 Hours. Like New ! $ 89,500. BORING MILL Shibaura BFT-13CW3-PD Table TapeHorizontal Boring Mill,5" Spindle, 48" x 120" Table, X= 118", Y(Vertical)= 72", W= 72", Z(Quill)= 36", 50 Taper, Pendent Control, New 1978, $ 39,500. CNC RAM EDM MACHINE MAKINO EDNC65 CNC Ram Type EDM Machinestal Boring Mill,MGF 20 CNC Control, Drop Tank Design, X=25.6", Y=17.7", Z=13.7", C-Axis Rotation, 16 Station Tool Changer, Very Low Hours ! $ 149,500. WANTEDS !! HOT BUYERS Ready to plunk down cold cash if you have one of these that you want to sell. SIMPLEX PRODUCTION MILL with 60" Table Travel, 25HP, Arbor Support. CINCINNATI 10HC1000 CNCHorizontal Machining Center, 50 Taper. Cincinnati Arrow 1250 or 1500, 1998 or Newer with 2100 CNC HAVE Surplus ? We need to know about it !!Our advertising reaches over 100,000 shops every week ! You could be part of that too Kevin Murphy GREAT AMERICAN EQUIPMENT CO 11925 Enterprise Ave Cincinnati Ohio 45241 Ph: 513-771-2111 Fax: 513-771-2552 TO BE REMOVED : If you no longer want to receive updates on machines we have for saleyou can click on this Link to be removed http://www.gaec.com/catalog/EmailRemove.htmor you can just giveus a call at 1-800-326-4232and ask to be removed.
RE: I'll show you mine if you show me, er, mine
I haven't read the original paper, and I have a great deal of respect for Markus Jakobsson. However, techniques that establish that the parties share a weak secret without leaking that secret have been around for years -- Bellovin and Merritt's DH-EKE, David Jablon's SPEKE. And they don't require either party to send the password itself at the end. William -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Sent: Wednesday, February 23, 2005 7:30 AM To: cryptography@metzdowd.com; [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: Re: I'll show you mine if you show me, er, mine R.A. Hettinga [EMAIL PROTECTED] forwarded: Briefly, it works like this: point A transmits an encrypted message to point B. Point B can decrypt this, if it knows the password. The decrypted text is then sent back to point A, which can verify the decryption, and confirm that point B really does know point A's password. Point A then sends the password to point B to confirm that it really is point A, and knows its own password. Isn't this a Crypto 101 mutual authentication mechanism (or at least a somewhat broken reinvention of such)? If the exchange to prove knowledge of the PW has already been performed, why does A need to send the PW to B in the last step? You either use timestamps to prove freshness or add an extra message to exchange a nonce and then there's no need to send the PW. Also in the above B is acting as an oracle for password-guessing attacks, so you don't send back the decrypted text but a recognisable-by-A encrypted response, or garbage if you can't decrypt it, taking care to take the same time whether you get a valid or invalid message to avoid timing attacks. Blah blah Kerberos blah blah done twenty years ago blah blah a'om bomb blah blah. (Either this is a really bad idea or the details have been mangled by the Register). Peter. - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
Re: Jeff Jacoby: An inglorious suicide
R.A. Hettinga spoke thusly... http://www.townhall.com/columnists/jeffjacoby/printjj20050304.shtml Townhall.com An inglorious suicide Jeff Jacoby (back to web version) | Send March 4, 2005 Hunter Thompson's suicide was an act of selfishness and cruelty. But more depraved by far has been the celebration of that suicide by those who supposedly loved or admired him. What does this have to do with cypherpunks? This is not your personal blog. Most of the list traffic is forwarded or cross-posted news articles, but how is HST's suicide remotely on-topic? It's not as if every possible angle on HST's suicide hasn't already been covered by the press.
Warm Party for a Code Group
At 9:01 PM +0100 3/4/05, Anonymous wrote: What does this have to do with cypherpunks? Narcs and feds will not be allowed at the meeting. Fuck them dead. Cheers, RAH -- http://www.wired.com/news/print/0,1294,55114,00.html Wired News Warm Party for a Code Group By Danit Lidor? Story location: http://www.wired.com/news/culture/0,1284,55114,00.html 02:00 AM Sep. 13, 2002 PT The cypherpunks are throwing a PGP (pretty good party) this weekend. The venerable online community is celebrating its 10th anniversary which, in the ephemeral world of the Internet, is remarkable. No wonder. In 1992, the cypherpunks emerged from a small group of people who, because of their interest in cryptography and encryption, recognized that the free-flowing format of the burgeoning Web culture must provide for anonymous interactions. Not surprisingly, they soon came under the uncomfortable scrutiny of the formidable National Security Agency. The situation escalated in early 1993, after a computer programmer named Phil Zimmermann (a patron saint of the community) -- alarmed that the patents for public key encryption were sold to a company called RSA -- wrote an open-source, free program called PGP (Pretty Good Privacy). The resulting debacle, in which Zimmermann was threatened with criminal prosecution for exporting weapons (encryption technology is termed a weapon by the U.S. government), brought the public's right to privacy to the forefront of the now-commonplace tug-of-war between those who favor crypto anarchy and those who don't. Through the active work of many civil libertarians, including the cypherpunks, pressure was brought to bear upon the government to re-think its position. The charges against Zimmermann were dropped. It was a triumph. The geeks fought the law, and the geeks won. The cypherpunks' paranoia about information exploitation is becoming mainstream, Peter Wayner, author of Translucent Databases, wrote in an e-mail interview. Everyone is learning that the cypherpunks' insistence on limiting the proliferation of information is a good thing. The cypherpunks' e-mail list forms the nucleus of the community, which has grown to include people of many agendas and interests. No longer the exclusive domain of crypto geeks, cypherpunks are doctors, lawyers, mathematicians, felons, druggies, anti-druggies, anarchists, libertarians, right-wing fanatics, left-wing fanatics, teachers, housewives, househusbands, students, cops and criminals, cypherpunk J.A. Terranson wrote in a posting. Cypherpunk Optimizzin Al-gorithym wrote in typically obscure cypherpunk fashion, We're all just voices in Tim May's head. May, one of the original cypherpunks, continues to be an active figurehead of the cypherpunks and has often bridged the chasm between its historically secretive culture and its forays into the public sphere. In 10 years, the list has become an amalgamation of a political watchdog site, a social club and a repository of technical cryptographic discussion. (It's) where people from all different backgrounds and views can hear from one another, mathematician Nina Fefferman said. We math people are frequently shocked and confused by what the politicians do with regard to legislating crypto-related issues. Conversely, the policy and society people are frequently interested in issues that have to do with the use and regulation of cryptographic standards and research. The atmosphere isn't as electric because the scene has grown so big, Wayner said. It's not just a few guys talking about the importance of some mathematical equations. It's like debating the importance of indoor plumbing now. No one disputes it, they just want to argue about copper versus PVC. Wayner, Zimmermann, as well as May, John Gilmore and Eric Hughes (the original founders of the list), however, have emerged from their cypherpunk association as key public privacy figures: vocal and passionate defenders of civil liberties on the Web. It's hard to imagine the secretive and fractious cryptocrusaders assembling for a physical meeting. Even May, the party's host, isn't sure who or how many cypherpunks to expect to his soiree at a hideaway in the Santa Cruz (California) mountains. But he's adamant about who won't be coming. Never one to mince words, he wrote, Narcs and feds will not be allowed at the meeting. Fuck them dead. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'