Get New Customers and Orders, Literally Overnight
Re: The ghost of Cypherpunks
-- > Did the Cypherpunks have their heyday and that's it? That is it. This is the ghost of cypherpunks. Cypherpunks always was a self contradiction - a political group pushing a fundamentally non political attack upon the state, and thus upon the very existence of politics. This made some sense when the state was attempting to ban and regulate encryption. It no longer attempts to do so, thus cypherpunks today has no real function. Our former evil arch nemesis is now quietly doing government do gooding to make sure that everyone has strong cryptography. Now the cypherpunks project is advanced by more boring stuff: standards, software, and business. Excessive mention of the ideological implications of certain standards and software would be counterproductive. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG SmFa4oMi36RAKGxsYaqtmROD3IFtA0joUvzs+ROw 4XxJQayZH7Q+T8hHbWUkebTqtPmxEnIlz+j/Dt1kG
Re: /. [Keyboard Sound Aids Password Cracking]
On Wed, 14 Sep 2005 10:06:21 -0400, Trei, Peter said: > This technique is decades old. I read an account of the British > Secret Service (MI5? 6?) installing a bugged phone next to a > cable machine in the London Soviet Embassy in the late 70's, but MI5, early 60's or even late 50's. Described in Spycatcher by Peter Wright. Shalom-Salam, Werner
Seeking a single source for online personals, please read (September 14, 2005)
Hello, Some of my clients are searching online for a source for information on online peronals services. My job is to find one place to send them to. I'd like to discuss an arrangement with you. Please contact me at your earliest convenience. I will be in today (Wednesday) from 8:00 AM PST to 5:00 PM PST. You'll need to be at your computer when you call me. Please call when you have a few minutes and I will a> demonstrate how you would benefit from what we do and b> answer any and all questions you have. Best Regards, Rebecca Diamond Business Segment Analyst, Star Position Phone (US): 877.732.5128 ext 2002 Outside US: 213.250.8474 PS: It is my job to send my clients looking from the search engines to one place at the exact moment they are looking. We have over 16,900,000 people on our network, and growing. The users on our Network are the clients I am referring to.
RE: /. [Keyboard Sound Aids Password Cracking]
Eugen Leitl wrote > > Link: http://slashdot.org/article.pl?sid=05/09/13/1644259 > Posted by: CmdrTaco, on 2005-09-13 17:04:00 > >from the but-i-love-clicky-keyboards dept. >[1]stinerman writes "Three students at UC-Berkley used a 10 minute >[2]recording of a keyboard to recover 96% of the characters typed >during the session. The article details that their methods did not >require a 'training text' in order to calibrate the conversion >algorithm as has been used previously. The [3]research paper [PDF] >notes that '90% of 5-character random passwords using only > letters can >be generated in fewer than 20 attempts by an adversary; 80% of >10-character passwords can be generated in fewer than 75 > attempts.'" This technique is decades old. I read an account of the British Secret Service (MI5? 6?) installing a bugged phone next to a cable machine in the London Soviet Embassy in the late 70's, but the events described took place earlier - perhaps in the 60s. Peter Trei