Jeff Jacoby: An inglorious suicide

2005-03-04 Thread R.A. Hettinga
http://www.townhall.com/columnists/jeffjacoby/printjj20050304.shtml

Townhall.com

An inglorious suicide
Jeff Jacoby (back to web version) | Send

March 4, 2005

Hunter Thompson's suicide was an act of selfishness and cruelty. But more
depraved by far has been the celebration of that suicide by those who
supposedly loved or admired him.
 
The 67-year-old author of the ''Fear and Loathing'' books shot himself
in the head on Feb. 20 as he sat in the kitchen of his home near Aspen,
Colo., taking a phone call from his wife. Anita Thompson had called him
from her health club, she told the Aspen Daily News, and he'd asked her to
come home and help him with the column he had to write. Then, without
warning or a goodbye, he put down the phone and fired a .45-caliber handgun
into his mouth.
 
''I was on the phone with him, he set the receiver down and he did
it,'' she said. ''I heard the clicking of the gun.'' There was a loud,
muffled noise. Then nothing. ''I was waiting for him to get back on the
phone.''
 
Could anything be more ghoulish and egotistical than making your
unsuspecting wife listen while you put a bullet through your skull?
Absolutely: making your unsuspecting wife listen while you put a bullet
through your skull - and your son, daughter-in-law, and grandson are just a
few yards away. Juan Thompson was in a nearby office when his father blew
his brains out in the kitchen. Winkel Thompson and 6-year-old Will were
playing in the living room next door.
 
It takes a real sadist to arrange his suicide so that his loved ones
are forced to hear him die. But what kind of degenerate inflicts something
so traumatic on a child of 6?
 
In Thompson's defense, it must be said that he was a hardened alcohol
and drug abuser who over the decades had ingested, inhaled, and imbibed a
staggering quantity and assortment of recreational poisons.  The cumulative
damage to his brain must have been considerable. By the time he fired his
.45, who knows how clearly he was thinking about anything?
 
But there is no defense for the treatment of Thompson's suicide as some
sort of final gonzo coup by a rebel who never played by society's rules.

''Hunter S. Thompson died Sunday as he planned,'' begins Jeff Kass's
admiring Feb. 24 account in the Rocky Mountain News, ''surrounded by his
family, at a high point in his life, and with a single, courageous, and
fatal gunshot wound to the head, his son says.''
 
 High point? Courageous? In what warped moral universe is a man's
pointless and ignoble death the ''high point in his life?'' And what is
''courageous'' about turning one's wife into a widow or depriving a
6-year-old of his grandfather?
 
Thompson's son and daughter-in-law, Kass continues, ''could not be
prouder'' of his suicide. It was the result of ''a thought process with its
own beautifully dark logic. ... The guy was a warrior, and he went out like
a warrior.'' Did Thompson, asks Kass, ''have his favorite liquid sidekick,
a glass of Chivas Regal, on the counter? 'Of course he did,' Juan Thompson
said.''
 
Another story details the impromptu cocktail party that gathered around
Thompson's corpse - still in the kitchen chair - to drink Chivas and toast
him. ''It was very loving,'' Anita Thompson is quoted as saying. ''It was
not a panic, or ugly, or freaky.'' Her husband's death should be cheered,
she says. ''This is a triumph of his, not a desperate, tragic failure.''
That is either unhinged grief speaking or overripe counterculture leftism.
Either way, it is grotesque.
 
But it has been echoed everywhere.
 
''It wouldn't be accurate to say Thompson had a death wish,'' Mark
Layman wrote for Knight Ridder. ''Just the opposite: He was the
self-described 'champion of fun.' '' Douglas Brinkley, the well-known
historian and Thompson family friend, declared that Thompson ''made a
conscious decision that he had an incredible run of 67 years, lived the way
he wanted to, and wasn't going to suffer the indignities of old age.'' One
journalist after another seized the moment to reminisce about some wild
evening once spent with Thompson, whose suicide they seem to regard as one
last piece of roguish bad craziness from an irrepressible original.
 
How striking is the contrast between Thompson's tawdry death and the
excruciating struggle of Pope John Paul II, whose passionate belief in the
sanctity of life remains unwavering, even as Parkinson's disease slowly
ravages him. The pope's example of courage and dignity sends a powerful
message, but the chattering class would rather talk instead about why this
stubborn man won't resign. Meanwhile they extol Hunter Thompson and are
itching to know - are his ashes really going to be fired from a cannon?

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,

Virus Alert

2005-03-04 Thread viruschk
The mail message (file: application.pif) you sent to [EMAIL PROTECTED] 
contains a virus. (on email-srv-b)



[Htech] Tracking a Specific Machine Anywhere On The Net (fwd from eugen@leitl.org)

2005-03-04 Thread Eugen Leitl
- Forwarded message from Eugen Leitl [EMAIL PROTECTED] -

From: Eugen Leitl [EMAIL PROTECTED]
Date: Fri, 4 Mar 2005 18:28:27 +0100
To: [EMAIL PROTECTED]
Subject: [Htech] Tracking a Specific Machine Anywhere On The Net
User-Agent: Mutt/1.4i
Reply-To: [EMAIL PROTECTED]


Link: http://slashdot.org/article.pl?sid=05/03/04/1355253
Posted by: Zonk, on 2005-03-04 16:45:00

   from the not-the-sandra-bullock-movie dept.
   An anonymous reader writes An article on ZDNet Australia tells of a
   new technique developed at CAIDA that involves using the individual
   machine's clock skew to [1]fingerprint it anywhere on the net.
   Possible uses of the technique include tracking, with some
   probability, a physical device as it connects to the Internet from
   different access points, counting the number of devices behind a NAT
   even when the devices use constant or random IP identifications,
   remotely probing a block of addresses to determine if the addresses
   correspond to virtual hosts (for example, as part of a virtual
   honeynet), and unanonymising anonymised network traces.


References

   1. http://www.zdnet.com.au/news/security/0,261744,39183346,00.htm

- End forwarded message -

How to track a PC anywhere it connects to the Net

Renai LeMay, ZDNet Australia
March 04, 2005
URL: http://www.zdnet.com.au/news/security/0,261744,39183346,00.htm


Anonymous Internet access is now a thing of the past. A doctoral student at
the University of California has conclusively fingerprinted computer hardware
remotely, allowing it to be tracked wherever it is on the Internet.

In a paper on his research, primary author and Ph.D. student Tadayoshi Kohno
said: There are now a number of powerful techniques for remote operating
system fingerprinting, that is, remotely determining the operating systems of
devices on the Internet. We push this idea further and introduce the notion
of remote physical device fingerprinting ... without the fingerprinted
device's known cooperation.

The potential applications for Kohno's technique are impressive. For example,
tracking, with some probability, a physical device as it connects to the
Internet from different access points, counting the number of devices behind
a NAT even when the devices use constant or random IP identifications,
remotely probing a block of addresses to determine if the addresses
correspond to virtual hosts (for example, as part of a virtual honeynet), and
unanonymising anonymised network traces.

NAT (network address translation) is a protocol commonly used to make it
appear as if machines behind a firewall all retain the same IP address on the
public Internet.

Kohno seems to be aware of the interest from surveillance groups that his
techniques could generate, saying in his paper: One could also use our
techniques to help track laptops as they move, perhaps as part of a
Carnivore-like project. Carnivore was Internet surveillance software built
by the United States' Federal Bureau of Investigation. Earlier in the paper
Kohno overshadowed possible forensics applications, saying that investigators
could use his techniques to argue whether a given laptop was connected to
the Internet from a given access location.

Another application for Kohno's technique is to obtain information about
whether two devices on the Internet, possibly shifted in time or IP
addresses, are actually the same physical device.

The technique works by exploiting small, microscopic deviations in device
hardware: clock skews. In practice, Kohno's paper says, his techniques
exploit the fact that most modern TCP stacks implement the TCP timestamps
option from RFC 1323 whereby, for performance purposes, each party in a TCP
flow includes information about its perception of time in each outgoing
packet. A fingerprinter can use the information contained within the TCP
headers to estimate a device's clock skew and thereby fingerprint a physical
device.

Kohno goes on to say:  Our techniques report consistent measurements when
the measurer is thousands of miles, multiple hops, and tens of milliseconds
away from the fingerprinted device, and when the fingerprinted device is
connected to the Internet from different locations and via different access
technologies. Further, one can apply our passive and semi-passive techniques
when the fingerprinted device is behind a NAT or firewall.

And the paper stresses that For all our methods, we stress that the
fingerprinter does not require any modification to or cooperation from the
fingerprintee. Kohno and his team tested their techniques on many operating
systems, including Windows XP and 2000, Mac OS X Panther, Red Hat and Debian
Linux, FreeBSD, OpenBSD and even Windows for Pocket PCs 2002.

In all cases, the paper says, we found that we could use at least one of
our techniques to estimate clock skews on the machines and that we required
only a small amount of data, although the exact data requirements depended on
the operating system in 

SEC probing ChoicePoint stock sales

2005-03-04 Thread R.A. Hettinga
http://www.msnbc.msn.com/id/7087572/print/1/displaymode/1098/
  MSNBC.com

SEC probing ChoicePoint stock sales
Execs sold shares before ID thefts made public
The Associated Press
Updated: 10:30 a.m. ET March 4, 2005


ATLANTA - ChoicePoint Inc., a leading data warehouser, says the Securities
and Exchange Commission is investigating stock sales by its top two
executives and the embattled company has decided to stop giving personal
information about consumers to small businesses. Its shares tumbled on the
news.

The dual announcements were made Friday by the Alpharetta, Ga.-based
company in a news statement and a regulatory filing.

The SEC probe involves sales of stock by chief executive Derek Smith and
president Douglas Curling for a $16.6 million profit in the months after
the company learned its massive database had been breached and before that
was made public.

ChoicePoint's stock had dropped about 10 percent since the personal
information breach at the data collector was announced Feb. 15. On Friday,
ChoicePoint shares fell $2.43, or 6 percent, to $37.85 in early trading on
the New York Stock Exchange.

Corporate governance experts say the pattern and timing of the trading by
Smith and Curling raise questions, while ChoicePoint has said the stock
trading was prearranged under a plan approved by the company's board.

The decision to stop selling data to small businesses was made because that
was the segment of the company that thieves tapped into to gain access to
ChoicePoint's database. Smith said in a statement that the decision follows
the response of consumers who have made it clear to us that they do not
approve of sensitive personal data being used without a direct benefit to
them.

ChoicePoint said it will stop selling information products that contain
sensitive consumer data, including Social Security numbers, to small
businesses, except in limited cases where the products support federal,
state or local government purposes.

Last month, ChoicePoint said it was notifying about 145,000 Americans that
their Social Security numbers and other personal information may have been
viewed by criminals posing as legitimate ChoicePoint customers. The company
said Friday that the number of potentially affected customers may increase,
but it doesn't believe the increase will be substantial.

ChoicePoint has said repeatedly it learned of the breach in October, but
delayed disclosing it because it said California authorities had asked it
to keep quiet to protect the fraud investigation. It said in a detailed
explanation Friday that it first learned of the possibility of fraud on
Sept. 27. A similar breach involving 7,000 to 10,000 ChoicePoint records
occurred in 2002.

ChoicePoint said Friday the SEC has notified the company that it is
conducting an informal inquiry of the stock sales as well as the
circumstances surrounding the possible theft of people's identities in
connection with the breach of its database. The stock sales occurred
between November and February.

ChoicePoint said it will cooperate with the probe and provide requested
information and documents to the SEC.

The company also said in a lengthy regulatory filing that the Federal Trade
Commission is conducting an inquiry into its compliance with federal laws
governing consumer information security and related issues.

The FTC has asked for information and documents regarding ChoicePoint's
customer credentialing process and the recent incident in Los Angeles
involving a Nigerian man who was accused of committing fraud using consumer
information from the company's database.

The company said it is a defendant in several lawsuits and complaints
arising from the breach. It said it could not estimate the financial impact
on the company of the customer fraud and related events.

It wasn't immediately clear how many customers the decision on small
businesses affects. ChoicePoint said Feb. 21 when it decided to rescreen
17,000 small business customers that that action affected 5 percent of its
annual revenue of $900 million.

In Friday's regulatory filing, it said that because it will no longer sell
information to small businesses, it expects a decline in core revenue this
year of $15 million to $20 million.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Jeff Jacoby: An inglorious suicide

2005-03-04 Thread Anonymous
R.A. Hettinga spoke thusly...
 http://www.townhall.com/columnists/jeffjacoby/printjj20050304.shtml
 
 Townhall.com
 
 An inglorious suicide
 Jeff Jacoby (back to web version) | Send
 
 March 4, 2005
 
 Hunter Thompson's suicide was an act of selfishness and cruelty. But more
 depraved by far has been the celebration of that suicide by those who
 supposedly loved or admired him.

What does this have to do with cypherpunks?  This is not your personal
blog.  Most of the list traffic is forwarded or cross-posted news
articles, but how is HST's suicide remotely on-topic?

It's not as if every possible angle on HST's suicide hasn't already been
covered by the press.



cadastros de emails por classe social

2005-03-04 Thread nazirajbd_g5a
Cadastros de emails mala direta Cadastros para mala direta livre de spam listas 
de e-mails divididas por estados:

http://www.gueb.de/segmails

cadastros de emails por classe social Cadastros de emails mala direta Cadastros 
para mala direta livre de spam emails para mala direta segmentada por profissão 
Cadastros para mala direta livre de spam Cadastros de emails mala direta
Cadastros para mala direta livre de spam cadastros de emails por classe social:

http://www.gueb.de/segmails


Cadastros de emails mala direta Cadastros para mala direta livre de spam listas 
de e-mails divididas por estados emails para mala direta segmentada por 
profissão 
listas de e-mails divididas por estados
E-mails segmentados para divulgação - Cadastros de e-mail cadastros de emails 
por classe social Cadastros de emails mala direta listas de e-mails divididas 
por estados cadastros de emails por classe social E-mails segmentados para 
divulgação 
- Cadastros de e-mail
listas de e-mails divididas por estados Cadastros de emails mala direta:

http://www.gueb.de/segmails



Warm Party for a Code Group

2005-03-04 Thread R.A. Hettinga
 At 9:01 PM +0100 3/4/05, Anonymous wrote:
What does this have to do with cypherpunks?

Narcs and feds will not be allowed at the meeting. Fuck them dead.

Cheers,
RAH

--


http://www.wired.com/news/print/0,1294,55114,00.html

Wired News


Warm Party for a Code Group 
By Danit Lidor?

Story location: http://www.wired.com/news/culture/0,1284,55114,00.html

02:00 AM Sep. 13, 2002 PT

The cypherpunks are throwing a PGP (pretty good party) this weekend.


 The venerable online community is celebrating its 10th anniversary which,
in the ephemeral world of the Internet, is remarkable.

 No wonder. In 1992, the cypherpunks emerged from a small group of people
who, because of their interest in cryptography and encryption, recognized
that the free-flowing format of the burgeoning Web culture must provide for
anonymous interactions.

 Not surprisingly, they soon came under the uncomfortable scrutiny of the
formidable National Security Agency.

 The situation escalated in early 1993, after a computer programmer named
Phil Zimmermann (a patron saint of the community) -- alarmed that the
patents for public key encryption were sold to a company called RSA --
wrote an open-source, free program called PGP (Pretty Good Privacy).

 The resulting debacle, in which Zimmermann was threatened with criminal
prosecution for exporting weapons (encryption technology is termed a weapon
by the U.S. government), brought the public's right to privacy to the
forefront of the now-commonplace tug-of-war between those who favor crypto
anarchy and those who don't.

 Through the active work of many civil libertarians, including the
cypherpunks, pressure was brought to bear upon the government to re-think
its position. The charges against Zimmermann were dropped.

 It was a triumph. The geeks fought the law, and the geeks won.

 The cypherpunks' paranoia about information exploitation is becoming
mainstream, Peter Wayner, author of Translucent Databases, wrote in an
e-mail interview. Everyone is learning that the cypherpunks' insistence on
limiting the proliferation of information is a good thing.

 The cypherpunks' e-mail list forms the nucleus of the community, which has
grown to include people of many agendas and interests. No longer the
exclusive domain of crypto geeks, cypherpunks are doctors, lawyers,
mathematicians, felons, druggies, anti-druggies, anarchists, libertarians,
right-wing fanatics, left-wing fanatics, teachers, housewives,
househusbands, students, cops and criminals, cypherpunk J.A. Terranson
wrote in a posting.

 Cypherpunk Optimizzin Al-gorithym wrote in typically obscure cypherpunk
fashion, We're all just voices in Tim May's head.

 May, one of the original cypherpunks, continues to be an active figurehead
of the cypherpunks and has often bridged the chasm between its historically
secretive culture and its forays into the public sphere.

In 10 years, the list has become an amalgamation of a political watchdog
site, a social club and a repository of technical cryptographic discussion.

 (It's) where people from all different backgrounds and views can hear
from one another, mathematician Nina Fefferman said. We math people are
frequently shocked and confused by what the politicians do with regard to
legislating crypto-related issues. Conversely, the policy and society
people are frequently interested in issues that have to do with the use and
regulation of cryptographic standards and research.

 The atmosphere isn't as electric because the scene has grown so big,
Wayner said. It's not just a few guys talking about the importance of some
mathematical equations. It's like debating the importance of indoor
plumbing now. No one disputes it, they just want to argue about copper
versus PVC.

 Wayner, Zimmermann, as well as May, John Gilmore and Eric Hughes (the
original founders of the list), however, have emerged from their cypherpunk
association as key public privacy figures: vocal and passionate defenders
of civil liberties on the Web.

 It's hard to imagine the secretive and fractious cryptocrusaders
assembling for a physical meeting. Even May, the party's host, isn't sure
who or how many cypherpunks to expect to his soiree at a hideaway in the
Santa Cruz (California) mountains.

 But he's adamant about who won't be coming. Never one to mince words, he
wrote, Narcs and feds will not be allowed at the meeting. Fuck them dead.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: [Htech] Tracking a Specific Machine Anywhere On The Net (fwd from eugen@leitl.org)

2005-03-04 Thread Sarad AV
hi,

After looking at RFC1323 below
http://www.cse.ohio-state.edu/cgi-bin/rfc/rfc1323.html#sec-4


the only reasonable option is to use the time old
pseudorandom numbers for TCP sequence numbers in the
TCP IP stack.

Another option would be to synchronize the client with
NTP but that wouldn't work either.Say that the client
clock can be updated ever one millisecond. However the
minimum network delay between the time server and the
client is usually 300ms to 800 ms.During this period a
large number of outboud packets are send from the
client depending on the speed at which the client is
blasting away. There are plenty of packets to analyze
for the attacker to determine the skew.

Sarad.




--- Eugen Leitl [EMAIL PROTECTED] wrote:

 - Forwarded message from Eugen Leitl
 [EMAIL PROTECTED] -
 
 From: Eugen Leitl [EMAIL PROTECTED]
 Date: Fri, 4 Mar 2005 18:28:27 +0100
 To: [EMAIL PROTECTED]
 Subject: [Htech] Tracking a Specific Machine
 Anywhere On The Net
 User-Agent: Mutt/1.4i
 Reply-To: [EMAIL PROTECTED]
 
 
 Link:
 http://slashdot.org/article.pl?sid=05/03/04/1355253
 Posted by: Zonk, on 2005-03-04 16:45:00
 
from the not-the-sandra-bullock-movie dept.
An anonymous reader writes An article on ZDNet
 Australia tells of a
new technique developed at CAIDA that involves
 using the individual
machine's clock skew to [1]fingerprint it
 anywhere on the net.
Possible uses of the technique include tracking,
 with some
probability, a physical device as it connects to
 the Internet from
different access points, counting the number of
 devices behind a NAT
even when the devices use constant or random IP
 identifications,
remotely probing a block of addresses to
 determine if the addresses
correspond to virtual hosts (for example, as part
 of a virtual
honeynet), and unanonymising anonymised network
 traces.
 
 
 References
 
1.

http://www.zdnet.com.au/news/security/0,261744,39183346,00.htm
 
 - End forwarded message -
 
 How to track a PC anywhere it connects to the Net
 
 Renai LeMay, ZDNet Australia
 March 04, 2005
 URL:

http://www.zdnet.com.au/news/security/0,261744,39183346,00.htm
 
 




__ 
Celebrate Yahoo!'s 10th Birthday! 
Yahoo! Netrospective: 100 Moments of the Web 
http://birthday.yahoo.com/netrospective/



RE: Jeff Jacoby: An inglorious suicide

2005-03-04 Thread Trei, Peter


 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] Behalf Of Anonymous
 Sent: Friday, March 04, 2005 3:01 PM
 To: [EMAIL PROTECTED]
 Subject: Re: Jeff Jacoby: An inglorious suicide
 
 
 R.A. Hettinga spoke thusly...
  
 http://www.townhall.com/columnists/jeffjacoby/printjj20050304.shtml
  
  Townhall.com
  
  An inglorious suicide
  Jeff Jacoby (back to web version) | Send
  
  March 4, 2005
  
  Hunter Thompson's suicide was an act of selfishness and 
 cruelty. But more
  depraved by far has been the celebration of that suicide by 
 those who
  supposedly loved or admired him.
 
 What does this have to do with cypherpunks?  This is not your personal
 blog.  Most of the list traffic is forwarded or cross-posted news
 articles, but how is HST's suicide remotely on-topic?
 


I absolutely agree. The value of Hettinga's posts to Cypherpunks and 
the Cryptography list has absolutely gone down the tubes, to the point
where I have had to write special filter rules to isolate his posts
from the actual content.

The dozen or so full-length article on HST have simply no relevance
to either list.

If he had any respect for others at all, he'd give the URL and
a couple lines of summary. Or even better is your suggestion that
he use his own blog, or set up his own mailing list instead of
spamming the lists with off-topic crap.

His behaviour has sunk his reputation well into the 
Choate/Matt Taylor range.

Peter Trei



Handheld Licence Plate Scanner/OCR/Lookup

2005-03-04 Thread Bill Stewart
More news dispatches from Brinworld
http://www.chieftain.com/business/1109862027/1
http://www.thenewspaper.com/news/01/196.asp
Bootfinder, made by G2 Systems in Alexandria VA,
is a combination of a handheld digital camera,
OCR software for locating and reading license plates,
and a database lookup system that shows the user
whatever information it has about that license plate.
The software runs on a laptop; the article doesn't say
if it has an online live data feed or just runs on stored data.
The two governments currently using it, New Haven Conn
and Arlington County VA, are using it to find
car tax and parking ticket delinquents,
so it's something that doesn't need a live data feed,
but that would be easy to patch on - the hard technology's
in reading the number, not in using it.
It was originally developed for tracing stolen cars,
but the developer found that to be a hard sell with
cash-strapped police departments, while parking enforcement
is a revenue-generating activity so anything that
lets those departments rake in money faster is an easy sell.
One city saw their car tax payment compliance go from
80% to 95% because it was easy to catch many non-payers
and to scare other people into paying before they get caught.
The camera can scan 1000 license plates per minute -
the article doesn't say how fast the cars can be going,
but the cities that use it have parking officials driving
down the street scanning parked cars' plates,
which are easier to aim at than moving cars.
Even so, that suggests that more widespread privacy-invading
applications should be easy to develop -
David Brin's Transparent Society prediction of
cameras and computing being cheap enough to become ubiquitous
becomes more realistic every year.


Re: SEC probing ChoicePoint stock sales

2005-03-04 Thread Anonymous
R.A. Hettinga wrote:
 http://www.msnbc.msn.com/id/7087572/print/1/displaymode/1098/

While this is marginally more cypherpunks-related than Hunter Thompson's
suicide, I think we're all capable of reading the daily headlines if we
care about the SEC investigation du jour.



Re: Jeff Jacoby: An inglorious suicide

2005-03-04 Thread Damian Gerow
Thus spake Anonymous ([EMAIL PROTECTED]) [04/03/05 15:18]:
: What does this have to do with cypherpunks?  This is not your personal
: blog.  Most of the list traffic is forwarded or cross-posted news
: articles, but how is HST's suicide remotely on-topic?

Actually, I'm kinda getting sick of reading about his suicide.  Seriously,
enough already.  He's dead.  Let him rest in peace.



In-Plant Surplus Machines

2005-03-04 Thread Kevin Murphy





 
  
 IN-PLANT  
 SURPLUS !!

HORIZONTAL 
MACHINING CENTERS 

CINCINNATI MILACRON MAGNUM 1000 
Horizontal Machining Center,Acramatic 950 CNC Control, (4) 1000mm 
Pallets with 1 Degree Indexing, X=61", Y=51.2", Z=47.2", 50HP, 6500 RPM, 90 
Station Tool Changer, 1998
CINCINNATI MILACRON MAGNUM 800 Horizontal 
Machining Center,Acramatic 950 CNC Control, (2) 800mm Pallets 
with 1 Degree Indexing, X=51.2", Y=43.3", Z=44.3", 50HP, 6500 RPM, 90 Station 
Tool Changer, 1996
CINCINNATI T-30 CNC 
Horizontal Machining Center, Acramatic 
900CNC Control,X=40", Y=40", Z= 42", 4,000 
RPM,60 Station Tool Changer, Thru SpindleCoolant,30HP, 6Pallet work 
Changer, (60 31.5" Square Pallets with 1 Degree Indexing, $ 
39,500.
 VERTICAL MACHINING 
CENTERS 
OKUMA MC-60VAECNC Vertical 
Machining Center,Okuma OSP-7000M CNC, X=59.06", Y=24.8", Z=24.02", 60.24" x 24.8" 
Table, 5000 RPM, CAT-50, 22HP,20 ATC,New 1997, Big Heavy Duty 
Machine.
CINCINNATi ARROW 500CNC Vertical 
Machining Center,Acramatic 2100 PC Based CNC Control, X=20", Y=20", Z= 20", 27.5" x 20" Table, 100-8000 
RPM, CAT-40, 15HP,21 ATC,New 1999, From Tool Room ! Excellent 
Condition !
LEADWELL (2) PalletCNC Vertical 
Machining Center,Fanuc 18MC CNCControl, X=20", Y=14", Z= 16", (2) 26" x 13.8" 
WorkTables, 100-1 RPM, CAT-40, 16HP,32 ATC,New 
1998
CINCINNATI SABRE 750CNC Vertical 
Machining Center,Acramatic 850SX CNCControl, X=30", Y=20", Z=22",6000 RPM, CAT-40, 
22HP,21 ATC,New 1993, $ 14,500. Very Nice Condition 
!
CNC 
TURNINGCENTERS 

  
OKUMACADET L1420/650,  OSP 700L CNC, !GF, 24.41" Swing, 14.17" Max 
Turn Diameter, 26.38" Machining Length, 12 Station Turret, 10" Chuck, 
1996.
OKUMALB-300 Big 
Bore with 3.1" Bar Capacity, OSP U100L CNC, 20.8" Swing, 
14.56" Max Turn Diameter, 20.47" Centers, 3800 RPM, 30HP, 12 Position Turret. 
Collet Chuck with 1 Degree Indexing,New 2000. $ 99,500.
OKUMACADET BIG 
BORE LNC-8C, OSP 700L CNC, 15.75" Swing, 9.84" Max Turn Diameter, 
15.69" Machining Length, 12 Station Turret, 10" Chuck, 1997, Nice 
Machine.
CINCINNATI 18C 
CNCTurning Center, Rebuilt and Retrofit by Cincinnati in 
1992, Acramatic 850 CNC, 30.5" Over 
Bed,ProgrammableSwing-upTailstock with 34" Between 
Centers, 18" Chuck, 4.5" Thru Hole, 50HP, 16-1600 RPM, Excellent Condition 
!
FORGING PRESSES 

5000 TON ERIE 
MECHANICAL FORGING PRESS,Allen Bradley Panel Master 900 
PLC, 16" Stroke, 67" x 60" Bed, 58" x 56" Ram, 300 HP, 45 SPM, Press was new in 
1981 and Rebuilt and retrofit by Erie Press in 1997.
2500 TON ERIE 
MECHANICAL FORGING PRESS,Allen Bradley Panel Master 900 
PLC, 14" Stroke, 67" x 60" Bed, 58" x 56" Ram, 150 HP, 50 SPM, Press was new in 
1981 and Rebuilt and retrofit by Erie Press in 1997.
GUN 
DRILL 
ELDORADO 1" x 36" CNC GUN DRILL, 
Fanuc CNC, 
Eldorado Coolant System, Flo Meter, Power Bushing, (2) Whip Guides, 1 " 
Drilling Capacity from Solid, 1.25" Reaming Diameter, Very Well Tooled ! New 
Sept 2002. Used less than 100 Hours. Like New ! $ 
89,500.
BORING 
MILL 
Shibaura BFT-13CW3-PD Table 
TapeHorizontal Boring Mill,5" Spindle, 48" x 120" 
Table, X= 118", Y(Vertical)= 72", W= 72", Z(Quill)= 36", 50 Taper, 
Pendent Control, New 1978, $ 39,500.
CNC 
RAM EDM MACHINE 
MAKINO EDNC65 CNC Ram Type EDM 
Machinestal Boring Mill,MGF 20 CNC Control, Drop Tank Design, 
X=25.6", Y=17.7", Z=13.7", C-Axis Rotation, 16 Station Tool Changer, Very Low 
Hours ! $ 149,500.
WANTEDS !! HOT 
BUYERS Ready to plunk down cold cash if you have one of these that you want to 
sell.
  
  SIMPLEX PRODUCTION MILL 
with  
  60" Table  Travel, 25HP, Arbor 
Support.
  
  CINCINNATI  
  10HC1000 CNCHorizontal  Machining Center, 50 
Taper.
Cincinnati Arrow 1250 or 1500, 1998 or Newer with 2100 
CNC
   HAVE 
Surplus 
   ? We need to 
  know about it !!Our advertising reaches over 100,000 shops every week 
  ! You could be part of that too 
  
Kevin 
Murphy 
GREAT AMERICAN EQUIPMENT CO
11925 Enterprise Ave
Cincinnati Ohio 45241
   Ph: 513-771-2111 Fax: 513-771-2552

TO BE REMOVED
 


: If you no longer want to receive updates on machines we have for saleyou can 
click on this Link to be removed  http://www.gaec.com/catalog/EmailRemove.htmor 
you can just giveus a call at 1-800-326-4232and ask to be 
removed.







RE: I'll show you mine if you show me, er, mine

2005-03-04 Thread Whyte, William
I haven't read the original paper, and I have a great deal of
respect for Markus Jakobsson. However, techniques that establish
that the parties share a weak secret without leaking that secret
have been around for years -- Bellovin and Merritt's DH-EKE,
David Jablon's SPEKE. And they don't require either party to
send the password itself at the end.

William

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
 Sent: Wednesday, February 23, 2005 7:30 AM
 To: cryptography@metzdowd.com; [EMAIL PROTECTED]; 
 [EMAIL PROTECTED]
 Subject: Re: I'll show you mine if you show me, er, mine
 
 
 R.A. Hettinga [EMAIL PROTECTED] forwarded:
 
 Briefly, it works like this: point A transmits an encrypted 
 message to point
 B. Point B can decrypt this, if it knows the password. The 
 decrypted text is
 then sent back to point A, which can verify the decryption, 
 and confirm that
 point B really does know point A's password. Point A then 
 sends the password
 to point B to confirm that it really is point A, and knows 
 its own password.
 
 Isn't this a Crypto 101 mutual authentication mechanism (or at least a
 somewhat broken reinvention of such)?  If the exchange to 
 prove knowledge of
 the PW has already been performed, why does A need to send 
 the PW to B in the
 last step?  You either use timestamps to prove freshness or 
 add an extra
 message to exchange a nonce and then there's no need to send 
 the PW.  Also in
 the above B is acting as an oracle for password-guessing 
 attacks, so you don't
 send back the decrypted text but a recognisable-by-A 
 encrypted response, or
 garbage if you can't decrypt it, taking care to take the same 
 time whether you
 get a valid or invalid message to avoid timing attacks.  Blah 
 blah Kerberos
 blah blah done twenty years ago blah blah a'om bomb blah blah.
 
 (Either this is a really bad idea or the details have been 
 mangled by the
 Register).
 
 Peter.
 
 
 -
 The Cryptography Mailing List
 Unsubscribe by sending unsubscribe cryptography to 
 [EMAIL PROTECTED]
 



Re: Jeff Jacoby: An inglorious suicide

2005-03-04 Thread Anonymous
R.A. Hettinga spoke thusly...
 http://www.townhall.com/columnists/jeffjacoby/printjj20050304.shtml
 
 Townhall.com
 
 An inglorious suicide
 Jeff Jacoby (back to web version) | Send
 
 March 4, 2005
 
 Hunter Thompson's suicide was an act of selfishness and cruelty. But more
 depraved by far has been the celebration of that suicide by those who
 supposedly loved or admired him.

What does this have to do with cypherpunks?  This is not your personal
blog.  Most of the list traffic is forwarded or cross-posted news
articles, but how is HST's suicide remotely on-topic?

It's not as if every possible angle on HST's suicide hasn't already been
covered by the press.



Warm Party for a Code Group

2005-03-04 Thread R.A. Hettinga
 At 9:01 PM +0100 3/4/05, Anonymous wrote:
What does this have to do with cypherpunks?

Narcs and feds will not be allowed at the meeting. Fuck them dead.

Cheers,
RAH

--


http://www.wired.com/news/print/0,1294,55114,00.html

Wired News


Warm Party for a Code Group 
By Danit Lidor?

Story location: http://www.wired.com/news/culture/0,1284,55114,00.html

02:00 AM Sep. 13, 2002 PT

The cypherpunks are throwing a PGP (pretty good party) this weekend.


 The venerable online community is celebrating its 10th anniversary which,
in the ephemeral world of the Internet, is remarkable.

 No wonder. In 1992, the cypherpunks emerged from a small group of people
who, because of their interest in cryptography and encryption, recognized
that the free-flowing format of the burgeoning Web culture must provide for
anonymous interactions.

 Not surprisingly, they soon came under the uncomfortable scrutiny of the
formidable National Security Agency.

 The situation escalated in early 1993, after a computer programmer named
Phil Zimmermann (a patron saint of the community) -- alarmed that the
patents for public key encryption were sold to a company called RSA --
wrote an open-source, free program called PGP (Pretty Good Privacy).

 The resulting debacle, in which Zimmermann was threatened with criminal
prosecution for exporting weapons (encryption technology is termed a weapon
by the U.S. government), brought the public's right to privacy to the
forefront of the now-commonplace tug-of-war between those who favor crypto
anarchy and those who don't.

 Through the active work of many civil libertarians, including the
cypherpunks, pressure was brought to bear upon the government to re-think
its position. The charges against Zimmermann were dropped.

 It was a triumph. The geeks fought the law, and the geeks won.

 The cypherpunks' paranoia about information exploitation is becoming
mainstream, Peter Wayner, author of Translucent Databases, wrote in an
e-mail interview. Everyone is learning that the cypherpunks' insistence on
limiting the proliferation of information is a good thing.

 The cypherpunks' e-mail list forms the nucleus of the community, which has
grown to include people of many agendas and interests. No longer the
exclusive domain of crypto geeks, cypherpunks are doctors, lawyers,
mathematicians, felons, druggies, anti-druggies, anarchists, libertarians,
right-wing fanatics, left-wing fanatics, teachers, housewives,
househusbands, students, cops and criminals, cypherpunk J.A. Terranson
wrote in a posting.

 Cypherpunk Optimizzin Al-gorithym wrote in typically obscure cypherpunk
fashion, We're all just voices in Tim May's head.

 May, one of the original cypherpunks, continues to be an active figurehead
of the cypherpunks and has often bridged the chasm between its historically
secretive culture and its forays into the public sphere.

In 10 years, the list has become an amalgamation of a political watchdog
site, a social club and a repository of technical cryptographic discussion.

 (It's) where people from all different backgrounds and views can hear
from one another, mathematician Nina Fefferman said. We math people are
frequently shocked and confused by what the politicians do with regard to
legislating crypto-related issues. Conversely, the policy and society
people are frequently interested in issues that have to do with the use and
regulation of cryptographic standards and research.

 The atmosphere isn't as electric because the scene has grown so big,
Wayner said. It's not just a few guys talking about the importance of some
mathematical equations. It's like debating the importance of indoor
plumbing now. No one disputes it, they just want to argue about copper
versus PVC.

 Wayner, Zimmermann, as well as May, John Gilmore and Eric Hughes (the
original founders of the list), however, have emerged from their cypherpunk
association as key public privacy figures: vocal and passionate defenders
of civil liberties on the Web.

 It's hard to imagine the secretive and fractious cryptocrusaders
assembling for a physical meeting. Even May, the party's host, isn't sure
who or how many cypherpunks to expect to his soiree at a hideaway in the
Santa Cruz (California) mountains.

 But he's adamant about who won't be coming. Never one to mince words, he
wrote, Narcs and feds will not be allowed at the meeting. Fuck them dead.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'