Re: [linux-elitists] LOCAL Stanford University: face down the DMCA enforcers (fwd)

2003-01-21 Thread Karsten M. Self
on Mon, Jan 20, 2003 at 12:08:43AM -0500, Declan McCullagh ([EMAIL PROTECTED]) wrote:

 I suspect would be silly to stage an anti-DMCA protest against an
 invited speaker to that Stanford class. Lessig, Gilmore, Barlow,
 Farber, and Stallman have been speakers (and I'm scheduled to be in
 the spring lineup).

Gilmore and others have also been audience members.  The CPRM lecture
was attended by John, myself, and other concerned community members.

 At the very least, it makes sense to find out more about the program
 and have a cordial conversation with the organizers before rushing to
 stage a demonstration. Activist-hours are a scarce resource; use them
 prudently, carefully, and wisely.

The forums are *open to the public*.  A proportionate response is both
expected and apprpriate.

Why should a presentation at this venue be any different from protests
of immoral principles or activities in any other context?

Peace.

-- 
Karsten M. Self [EMAIL PROTECTED]http://kmself.home.netcom.com/
 What Part of Gestalt don't you understand?
   Moderator, Free Software Law Discussion mailing list:
 http://lists.alt.org/mailman/listinfo/fsl-discuss/




Re: [linux-elitists] LOCAL Stanford University: face down the DMCA enforcers (fwd)

2003-01-21 Thread Karsten M. Self
on Mon, Jan 20, 2003 at 12:08:43AM -0500, Declan McCullagh ([EMAIL PROTECTED]) wrote:

 I suspect would be silly to stage an anti-DMCA protest against an
 invited speaker to that Stanford class. Lessig, Gilmore, Barlow,
 Farber, and Stallman have been speakers (and I'm scheduled to be in
 the spring lineup).

Gilmore and others have also been audience members.  The CPRM lecture
was attended by John, myself, and other concerned community members.

 At the very least, it makes sense to find out more about the program
 and have a cordial conversation with the organizers before rushing to
 stage a demonstration. Activist-hours are a scarce resource; use them
 prudently, carefully, and wisely.

The forums are *open to the public*.  A proportionate response is both
expected and apprpriate.

Why should a presentation at this venue be any different from protests
of immoral principles or activities in any other context?

Peace.

-- 
Karsten M. Self [EMAIL PROTECTED]http://kmself.home.netcom.com/
 What Part of Gestalt don't you understand?
   Moderator, Free Software Law Discussion mailing list:
 http://lists.alt.org/mailman/listinfo/fsl-discuss/




Suit shuts down Indian Trust for security upgrade (was Re: Slashdot | U.S. Department of Interior Ordered Offline)

2001-12-06 Thread Karsten M. Self

on Thu, Dec 06, 2001 at 10:19:47PM -0600, Jim Choate ([EMAIL PROTECTED]) wrote:
 http://slashdot.org/articles/01/12/07/0223216.shtml

That's pretty poor reporting even for the combination of Choate 
Slashdot.

http://dailynews.yahoo.com/h/ap/20011205/pl/indian_money_2.html

Wednesday December 5 8:27 PM ET
Judge Shuts Down Indian Trust System

By ROBERT GEHRKE, Associated Press Writer

WASHINGTON (AP) - A judge acted Wednesday to protect hundreds of
millions of dollars in a government-run trust fund for American
Indians that has been found to be at risk of security breaches.

The emergency order came a day after a report detailed how easily a
court-appointed investigator was able to hack into the accounting
system at the Interior Department and manipulate financial data. The
government computer system is essentially a bank that manages $500
million a year in royalties from land owned by 300,000 American
Indians.

But U.S. District Judge Royce Lamberth said that Interior's system
had no firewalls to prevent intrusions, systems to detect hackers,
or auditing methods to determine if account information had been
manipulated.

``You don't expect a thief to leave a calling card?'' Lamberth asked
Justice Department (news - web sites) attorney Matt Fader.

Fader said Interior Secretary Gale Norton had already ordered all
Internet access to the system terminated while firewalls are
installed.

Naturally, the private sector does far better.  I couldn't think of a
California pension management company that had similarly poor data
security procedures.

-- 
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html



msg12356/pgp0.pgp
Description: PGP signature


Re: slavery in New Jersey

2001-12-06 Thread Karsten M. Self

on Fri, Dec 07, 2001 at 05:39:24AM -, Dr. Evil ([EMAIL PROTECTED])
wrote:
 Could people on this list please learn to format stories that they
 post here so we can read them?  How hard could that be?

Unfortunately, the usual response is for Tim May to take a bead on you
for being altruistic and helpful to humanity.

I've taken to reflowing stuff locally.  My bounces to list were not well
received.

--
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: Antivirus software will ignore FBI spyware: solutions

2001-12-02 Thread Karsten M. Self

on Mon, Nov 26, 2001 at 01:12:53PM -0800, Tim May ([EMAIL PROTECTED]) wrote:

 Some interesting tips (bottome of this message) for detecting FBI/SS
 snoopware that NAI/McAfee is now assisting the FBI in installing.

 I especially like the idea of type hundreds of random key strokes and
 see which files increase in size. (Or just look for any file size
 changes, as most of us type tens of thousands of keystrokes per day.)

Defeat:  create a log buffer file of fixed size, logged activity changes
its contents, but not the size of the file.  E.g.:  a filesystem image
file under GNU/Linux.  Techniques could be used to maintain a constant
global MD5 checksum to defeat other detection attempts.

Manipulating file create/modify times is trivial under most OSs.

 Most users of PGP take no steps to secure key materials. (I plead
 guilty, too.) Most of us are used to immediate access, and we want
 crypto integrated with our mail. The notion of going to a locked safe,
 taking out the laptop or removable hard drive, ensuring an air gap
 between the decoding system and the Net, and checking for keyloggers
 and hostile code, and so on, is foreign to most of us.

These measures can be taken for specific, high-security, messages.  Risk
profiles are not isomorphic in all circumstances.

 The dongle idea (e.g., Dallas Semiconductor buttons, etc.) has been
 around for a long time.

Many of which are woefully poorly designed.  Zimmerman at ALS spoke of
one in which the key was stored in cleartext within the dongle, don't
recall the specific device.

 Here's a new twist: the Apple iPod music player. I just got one. A 4.6
 GB hard disk (Toshiba 1.8). Hooks up via Firewire/IEEE 1394, with the
 link recharging the battery and auto-linking. The disk can also be
 mounted as a standard Firewire disk.  Meaning, it could be used to
 store key material and even be used for PGP scratch operations. The
 increased security comes from its small size (easy to lock up) and
 because I usually have it with me when I am away from home. This makes
 sneak and peek searches and plants of malicious code less useful.
 Not a complete solution. Crypto hygiene and all.

The iPod's definitely an attractive target for portable computing, it's
also fairly robust (I bounced the demo off the hardwood floor of Apple's
Palo Alto store from about 4-5 ft.).  It appears you're just using it
for storage purposes.  Note that this still requires trusting the
environment to which the iPod is attached.

Various handhelds, particularly running an advanced OS (e.g.:
GNU/Linux), would be similarly attractive devices, readily kept on ones
person at most times, and support encrypted filesystems or files.

Peace.

--
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: Cattle Herding... (was Re: in praise of gold)

2001-11-30 Thread Karsten M. Self

on Mon, Nov 26, 2001 at 05:21:07PM -0800, [EMAIL PROTECTED]
([EMAIL PROTECTED]) wrote:
 On 23 Nov 2001, at 19:13, R. A. Hettinga wrote:

  Pecunia, the latin word for money, comes from the Etruscian pecu, meaning,
cow.
 
  Cheers,
  RAH
 

 And of course the German word for money is Gelt, which means
 Gold.

 Cows might have served well as currency for primitives like the
 Etruscans, but can you imagine using them today?  I took
 a bus this morning, the fair was 1.10 and I only had paper money
 so they ripped me off 90 cents.  But if I was an Etruscan, they
 would've taken my whole cow!

No, actually, you probably came out about $1.60 ahead.

Farebox recovery -- the amount of a transit system's expenses that are
covered by direct rider payments -- tends about 30% - 40% of expenses.
This varies widely, a sparsely-attended rural service might rate 10%
returns, typical suburban service 15-20%, a well-served metro transit
system might come as high as 50-55%.

You're also neglecting the possibility that the fare might not have been
a whole cow, but just cost you an arm and a leg.

Peace.

--
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: HDCP break and DMCA

2001-11-25 Thread Karsten M. Self

on Sun, Nov 25, 2001 at 01:23:42PM -0800, Tim May ([EMAIL PROTECTED]) wrote:
 On Sunday, November 25, 2001, at 01:09 PM, Eric Cordian wrote:

  Why don't people copy paperback books?  Because it is cheaper to buy
  them.

  Not because the paperback book copyright police threaten you with
  life in prison.

 Why don't people copy hardback books?

 Answer: they do! Go to any large copying center near a university and
 look for professor packs or HistCon 101 Course Materials
 consisting of copied material out of various textbooks, hard and soft.
 The deal is that the student takes the professor pack over to a copy
 machine and runs off a copy of each of the, for example, 400 pages.
 The student pays $20 or so and saves himself having to buy 10 books to
 read one or two chapters or sections out of each. The students are
 happy, the copy shop is happy, the professor is happy, and only the
 publishers and authors are unhappy.

First:  this is somewhat orthogonal:

  - Only a portion of the book is being copied.  This makes the
reproduction cost significantly different from the sale cost of the
authorized book.

  - Materials from many sources are being assimilated, raising total
costs; and the holding period for the materials is generally short
(the duration of a quarter or semester).  Production-quality
bindings and archive-quality paper aren't required.



Second:  where exactly is this occuring?  You seem to indicate smaller
shops.

I worked at Kinko's during the period 1989 - 1992, largely serving UC
Davis.  This was during the period Kinko's was involved in a large
copyright infringement suit (Basic Books v. Kinko's, ultimately lost by
Kinko's to the tune of US$1.3m) over the issue of Professor
Publishing, the coursepack preparation service.  As Tim indicated, this
was a core of Kinko's business model from the company's founding in
Santa Barbara in the early 1970s.

Kinko's, at least, of major copy centers, has significantly revised its
processes, both securing copyright clearance on more (most?) of the
materials, and deemphasizing the role of Professor Publishing within
Kinko's.

At the time I left the company, there was a strong awareness for all
employees about making unauthorized copies (and you'll occasionally hear
stories about people who're denied service to copy materials they own),
at least when this is done behind the counter.  What customers did in
the self-serve area was largely unregulated.

 This was very common here in Santa Cruz, as recently as several years
 ago when I was doing a lot of copying of my own papers.

Care to name any of the shops at which this was occuring?  Kinko's,
AlphaGraphics (are they still around?), and other high-profile repro
shops tend to have fairly strong policies regarding unauthorized
copying.  The same tends to extend to copy centers run by colleges and
universities.  Smaller, privately held shops tend to play faster and
looser.

 There were signs up about not violating copyright law, but these
 professor packs were in clear violation.

 (Yeah, someone may say Maybe the professors made an arrangement with
 the publishers and authors. I give this a vanishingly small chance of
 being the case in more than 2% of all such course materials packs.)

In the case of Kinko's, the covered materials were most if not all in my
experience, with a sheet listing clearances added to packs by the time
I'd left.  There's also the Copyright Clearance Center (CCC:
http://www.copyright.com/), formed in the 1970s, which has played a
significant role in recent photocopy copyright infringement claims as,
as its existence has removed any excuse for unauthorized copying
(Paul Goldstein, _Copyright's Highway_, Hill  Wang, 1994).

Peace.  Tim May excepted.

--
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: HOWTO Build a Nuclear Device

2001-11-17 Thread Karsten M. Self

on Sat, Nov 17, 2001 at 12:24:31AM -0800, Tim May ([EMAIL PROTECTED]) wrote:
 On Friday, November 16, 2001, at 08:20 PM, !Dr. Joe Baptista wrote:

  Anyone on this planet can build a nuclear device.  So the only issue
  in building the device is the will to die for a cause.  And the only
  thing I find unfortunate in all of this is that there are so many
  causes that people are willing to die for.  And war will not make
  those reasons go away - it will only encourage them.

 It's really _not_ this easy. It took China and India a while before
 they successfully tested an A-bomb (many years after they had the raw
 materials from their reactor programs). It may have taken the South
 Africans and Israelis a few years after getting materials, too. So,
 why didn't they just hammer U-235 into stainless steel mixing bowls
 and do it the way anyone on this planet can build a nuclear device,
 one wonders.

This analysis neglects consideration of several points:

  - Nation-states (even authoritarian ones) will likely want to create
both a sustained program, not merely crank out a few crude nukes,
and preserve the talent involved.  One-offs are almost always easier
to complete than a production effort, but the lowered total cost is
offset by a higher unit cost.  The terrorist organization can
accomplish its goals with crude tactics and marginally effective
devices.  Credible military threat isn't as simple.

  - Credible military weapons have minimum requirements of both efficacy
-- efficient use of supercritical energy -- and predictability --
having the damned thing go off in the silo / bunker / hanger /
munitions dump rather than the chosen target isn't particularly
useful.

Tighter constraints = Longer fulfillment time.

The original US project, as described by Feynman, involved much
radiation exposure and high risks of criticality incidents at Oak Ridge,
some of which are documented in his biographical essay collections.  The
Hanford reservation is still a glowing waste zone, much of which greatly
postdates a fairly deep understanding of radiation hazards.

Peace.

--
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: [free-sklyarov] OT: [postmaster@eth.net: Mail Delivery Status Notification]

2001-11-16 Thread Karsten M. Self

on Fri, Nov 16, 2001 at 08:49:47AM -0600, [EMAIL PROTECTED] ([EMAIL PROTECTED]) wrote:
 On Fri, 16 Nov 2001, A. Melon wrote:
 
  Would someone please inform the recipient listed in the bounce message
  below, and his/her postmaster that GPG signatures in RFC 2015 MIME
  encoded form are not hazardous attachements?

Yeah, that's me.

 snip
 
  DishnetDSL SENDER NOTIFICATION
  
 snip
  
  has been stripped of all/certain attachments by DishnetDSL Mail server due 
  to security reasons.
   
  DishnetDSL allows only the following attachments:
  
  1. .doc
   Maybe safe, depending on what produced it, and who recieves it.
  2. .txt
  3. .xls
   Oh yeah, *thats* secure!
 
  4. .ppt
  5. .pdf
   Usually OK, but...

There are some PDF exploits I've heard of, not sure if they're
theoretical or not.  Postscript itself is not immune, as it's an
executable format itself.  There's discussion I've heard of Postscript
exploits which would be resident in printer networks.

Powerpoint's also got its problems.  ZIP is a panapoly which encompasses
a whole slew of formats.  And even good old .TXT is not secure if my
understanding of MSFT filehandling is right.  Associate .TXT with MS
Word, add a .TXT extension to a MS Word file with a macro virus, and
you're back to the root problem.  A similar issue exists with RTF files
if they're opened by MS Word by default -- the extension determines the
application, but not the method(s) used for opening the file.

I'm of the opinion that MIME has its uses.


-- 
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html



msg10912/pgp0.pgp
Description: PGP signature


WashPost: DoJ to monitor lawyer's calls

2001-11-09 Thread Karsten M. Self
 innocuous at first glance.  How is the 'taint
team' going to know if something a person says to a lawyer is part of
the mosaic or not without sharing it with others?  This seems to be a
useless safeguard.  What if they think what they overhear is in code?

Martin said monitoring of witnesses and others who have not been
convicted would be particularly outrageous. Murphy, who is director
of the ACLU's Washington national office, agreed, saying, the idea
that this could be happening to innocent people is really disturbing.
A lawyer's effectiveness, she added, can be dramatically diminished if
the government is listening in, making a client fearful of disclosing
all that the attorney needs to know to mount a forceful defense.

The attorney-client eavesdropping authority is an addition to the
special administrative measures the government has imposed on
certain inmates since the World Trade Center bombing in 1993 and the
bombing of a federal building in Oklahoma City in 1995.  They include
solitary confinement, interception of mail and restrictions on
visitors and telephone calls.  But until Ashcroft signed the new
regulation, they were limited to 120-day periods.  Now, all such steps
can be ordered for a year at a time and renewed indefinitely at
one-year intervals.

Those under special measure regimes include Omar Abdul Rahman, the
blind sheik convicted in the 1993 World Trade Center bombing; Abdul
Hakim Murad and Wali Khan Amin Shah, convicted of conspiracy to blow
up 12 civilian jumbo jets; Eyad Ismail and Ramzi Yousef, two others
convicted in the WTC bombing; Wadih Hage, convicted of conspiring to
kill Americans around the world; and Mohammed Saddiq Odeh and Mohamed
Rashed Daoud Owhali, who were convicted in the 1998 bombings of the
U.S. embassies in Kenya and Tanzania.

At a trial last June, an Algerian witness said Rahman issued a fatwa
or religious ruling from prison, telling followers to fight Americans
and hit their interests everywhere.

Staff researcher Lynn Davis contributed to this report.

) 2001 The Washington Post Company

--
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: Security-by-credential or security-by-inspection

2001-11-08 Thread Karsten M. Self

on Thu, Nov 08, 2001 at 03:58:04PM -0500, Trei, Peter ([EMAIL PROTECTED])
wrote:
  Tim May[SMTP:[EMAIL PROTECTED]] wrote
 
  The confusion Nomen Nescio shows in thinking that an is-a-person
  government tracking system fixes the airline security problem is common
  these days. It's the same confusion that causes many to think national
  I.D. cards will fix current pressing problems. They won't.
 
  This is the same security ticket problem that shows up in computer
  security with malicious actors obtaining passwords or other access
  permissions.

...

 I've been thinking along these lines myself - Tim got to the post
 first.

 There are two points I'd like to make.

 1. The reasons which are publicly aired for installing the current
 'security' regime are (in my considered opinion) NOT the
 actually reasons.

 US airlines insisting on IDs which match tickets has nothing to
 do with airline security, and everything to do with extracting as
 much cash as possible from the public.

 Before the Pan Am 800 accident, when people were freeer, there
 was a secondary market in airline tickets which the original
 purchasers could not, for one reason or another, use. If you
 bought a non-refundable return ticket, and then could not
 use it, you could sell it to someone who did want to travel
 on those dates to that location. The price varied, but was
 less than the cost to the repurchaser of buying a ticket from
 the airline.

...

 It's got nothing to do with security.

...and, as previously reported here, an age-old practice:

It's an older practice than you'd think.  I just ran across the
following while looking at some IBM history, regarding the
Hollerith Card:

http://www4.wittenberg.edu/academics/mathcomp/bjsdir/history0.shtml

Hollerith claimed he got [the punched data card] idea from
punch  photograph cards used by rail road officials. Used to
prevent the theft of railroad tickets from passengers,
conductors would record the physical characteristics of the
ticket owner (e.g. eye color,   hair color) by punching
specially marked areas on the edge of the card. Hollerith used
holes punched through the card, not on the edge of the card.

Maybe someone should propose a three strikes law for suicide terror
attacks.

Peace.

--
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Minneapolis, Nov 15: Fwd: [free-sklyarov] Bruce Schneier talk

2001-11-07 Thread Karsten M. Self

on Wed, Nov 07, 2001 at 09:34:36AM -0600, Jim Crumley ([EMAIL PROTECTED])
wrote:

 Students for Fair Copyright[1] is pleased to announce Bruce Schneier's
 talk[2] about the DMCA on Thursday,  November 15th at 7:00 in room
 2-690 of the Moos Tower on the University of Minnesota's Minneapolis
 campus. This is the third lecture in our continuing series:
 Reclaiming the Public Domain: Intellectual Property in the Digital
 Millennium. More details about the talk, including a link to a map to
 Moos Tower, are available at the press release link below.

   1. http://faircopyright.org/
   2. http://faircopyright.org/press/schneier.html
 --
 Jim Crumley  |Free Dmitry Sklyarov!
 [EMAIL PROTECTED] |http://faircopyright.org/
 Work: 612 624-6804 or -0378  |http://freesklyarov.org/

 ___
 free-sklyarov mailing list
 [EMAIL PROTECTED]
 http://zork.net/mailman/listinfo/free-sklyarov

--
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: FW: Damn ! I wish I'd though ot fhis myself

2001-11-04 Thread Karsten M. Self

on Sun, Nov 04, 2001 at 02:39:52PM -0800, Sandy Sandfort
([EMAIL PROTECTED]) wrote:
 C'punks,

 Friend of mine sent me this.  I like the poetic justice of it.

Terminal velocity of dust is pretty low.

Reports are that the bulk of the WTC debris are same.  There are
structural components from the base of the towers, and debris from
neigboring buildings, which are more substantial.

Frankly, a modicum of HE attached to a guided device is more effective
ordinance.

There's a poetic sense to this, but not much military practicality.


  S a n d y

  A Good Idea!
 
  All of the rubble from New York ... all the huge blocks of concrete
  and steel, the old busted up computers, refrigerators, hot water
  heaters, air conditioners, fire trucks, broken glass, etc., should
  be shoveled into C130's and C5A's, flown over Iraq and Afghanistan
  and dropped from 32,000 feet.
 
  A Frigidaire can do a heck of a lot of damage from 5 miles up.  With
  each assault, we can drop pamphlets: Greetings, from the 110th
  floor of the World Trade Center!
 
  The next day it would read, ...from the 109th floor...
 
  Then the 108th, etc., etc.
 
  After 110 days of this, I can't imagine there would be much left
  standing on the ground.  Can't you just see the headlines:
 
  WORLD TRADE CENTER STRIKES BACK!
 
  What wonderful irony this would be, and think how much money we
  wouldn't have to spend on new bombs or missiles!  Not to mention the
  100-million tons diverted from the New York City landfill.

--
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: Napster execs needing culling

2001-11-02 Thread Karsten M. Self

on Fri, Nov 02, 2001 at 10:56:20PM -, Anonymous ([EMAIL PROTECTED])
wrote:
 On Tue, 30 Oct 2001 17:29:58 -0600 (CST), Jim Choate wrote:

 I'll Fed-Ex an invoice to Hillary Rosen immediately for all the air
 he's using up! Hey I just 'farm' the air, I don't ask anyone to breath
 it!

She.

--
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: Transperancy Spray?

2001-10-30 Thread Karsten M. Self

on Mon, Oct 29, 2001 at 10:23:55PM -0800, Max Inux ([EMAIL PROTECTED])
wrote:
 Well, I was watching CNN and it looks like the Postal workers now are
 armed with a new weapon.. Against terror of course.  THe whole cant read
 someone elses mail thing is out the window it looks like, they can spray
 this go on the letter and read through the envelope..  It seems
 implausable but its CNN, they dont lie right? well ANYWAYS, I now have a
 nice stash of black construction paper...

That's been around quite the while:

http://www.google.com/search?q=envelope%20transparent%20spray

http://www.countdown.org/end/big_brother_13.htm

Source: Robert Uhlig, Electronic Telegraph
Date: 3rd March, 2001

[We've got mail] An aerosol spray that makes unopened envelopes
transparent so that the contents can be read has been invented.

You spray it on and it temporarily makes the envelope clear, said
Robert Schlegel, vice-president of the makers, Mistral Security, of
Maryland. It leaves an odor for 10 to 15 minutes, but there is no
smudging of ink, no stain, no evidence at all. The envelope is
transparent for a few minutes and you can respray it hundreds of
times without leaving any stain.

I'd heard of use of same by CIA going back maybe ten years, if not
longer.

Peace.

--
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




NOTAM: GA prohibited w/in 10 miles of nuke plants

2001-10-30 Thread Karsten M. Self

Copied from a friend, generally reliable.  NOTAMs are eventually posted
to a few publicly available sites:

!FDC 1/1763 FDC PART 1 OF 6 TEMPORARY FLIGHT RESTRICTIONS OVER
NUCLEAR SITES. FOR REASONS OF NATIONAL SECURITY. EFFECTIVE
IMMEDIATELY UNTIL NOVEMBER 07, 2001 0500 UTC. PURSUANT TO TITLE 14
CFR SECTIONS 91.139, EMERGENCY AIR TRAFFIC RULES AND 99.7 SPECIAL
SECURITY INSTRUCTIONS. ALL GENERAL AVIATION FLIGHT OPERATIONS ARE
PROHIBITED WITHIN A 10 NAUTICAL MILES RADIUS OF AND BELOW 18000 FEET
MSL OVER THE BELOW LISTED NUCLEAR SITES EXCEPT FOR MEDEVAC, LAW
ENFORCEMENT, RESCUE/RECOVERY, EMERGENCY EVACUATION AND FIRE FIGHTING
OPERATIONS WHEN AUTHORIZED BY ATC:

He continues:

I've got no idea what the hell they're doing, but damn, a GA plane
wouldn't do more than scratch the friggen concrete on a nuke plant.

(It was wondered what a plane crash would do, so a F-4 Phantom II
was rammed into a containment wall at 600+ MPH, it penetrated 2.5
inches. (Its a 6 foot wall).

G. Insane restrictions. Bullyboys in uniforms pushing around,
people held illegally.

Sounds like the feds are treating the current credible threat as broad
and shutting down all options.  Anyone care to posit a scenario in which
GA could threaten a nuke?

Peace.

--
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Soothe or alarm: What is weaponized anthrax?

2001-10-28 Thread Karsten M. Self

I posted on this question Oct 21, saying:


[Rep Frist's (R-TN) comment] leads one to question the descriptions
of anthrax as weaponized and non-weaponized, particularly as
there are several dimensions of weaponization.  The lesser is spore
size, with 5 micron being the preferred form for inducing inhalation
anthrax.  The greater is antibiotic resistance, and it appears that
this is the criterion on which statements of non-weaponized
anthrax are being made.  Truth seems to be that resistance is
secondary to spore size given the difficulty of treating advanced
cases of inhalation anthrax.

My suggestion to the press would be to disaggregate the term
weaponized to its components:  inhalable, and antibiotic
resistant.  This provides the public with more useful information:
the bacterium is or is not a grave infection threat (inhalable), and
the bacterium is or is not treatable (resistant).  This is
actionable information: inhalable, but nonresistant, anthrax means
that individuals should be aware of respiratory illness symptoms and
submit for early diagnosis and/or treatment.


Today's SF Chronicle reports:

http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2001/10/28/MN188786.DTLt
ype=printable

When it comes to describing anthrax, it is as if they are speaking
different languages.

Weapons-grade material, Gephardt, the House Democratic leader from
Missouri, told reporters this week, describing the potency of the
anthrax in a letter opened in Daschle's office.

Common variety, Senate Majority Leader Daschle from South Dakota
said of the same white powder.

Scientists say both are right.

The material was weapons grade, in the sense that it was finely
milled and aerosolized to make it easier to infiltrate a victim's
lungs. At the same time,

it was a common variety that was not genetically altered, making it
fully treatable with common antibiotics.

So which statement is more responsible?

[...]


I don't think 'weaponized' has any medical or scientific value,
[Ridge] explained late this week. It seems to have different
meanings . . .  to different people.

The discrepancy in labeling the potency of the poison is a perfect
illustration of the challenges confronting authorities as they try
to communicate complex, evolving and grim information on live
television, often on an hourly basis.

The failure to use precise language can have fatal consequences.

On Oct. 18, three days after Daschle's letter was opened, Postmaster
General John Potter invited the press into a mail facility in
southeast Washington, and told the assembled reporters and workers
that there is only a minute chance that anthrax spores could have
escaped from envelopes and harmed postal workers.

Today, Potter is on a 60-day dose of antibiotics. So are the
reporters and anyone else who attended the news conference,
including Washington, D.C., Mayor Anthony Williams and his
80-year-old mother. Two workers at the facility have since died.

Authorities knew at the time that the refined spores were highly
potent, but based on previous experience in New Jersey and Florida,
had no reason to believe they would contaminate the Washington mail
house. And they wanted to calm anxious postal workers.

The administration has been forthright in making information known
as soon as information is available, said White House spokesman Ari
Fleischer. It is the nature of this type of attack involving
anthrax that information develops over time.

Nevertheless, there is frustration from those who feel that soft
words intended to soothe might instead lull people into a false
sense of complacency.

I think we've got to stop parsing words and trying to be anything
other than accurate about what this is, Gephardt said of the
biological attack on the Capitol. This is highly sophisticated
material. It is small in size and it aerosolizes, and so you've got
to be careful in the way it can be handled.

I believe people are smart. If you arm them (people) with accurate
information, you have a better chance of preventing successful
attacks, Gephardt said.

Peace.

--
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: Why Plan-9?

2001-10-26 Thread Karsten M. Self

on Fri, Oct 26, 2001 at 08:35:36PM -0500, Jim Choate ([EMAIL PROTECTED]) wrote:
 On Thu, 25 Oct 2001, Karsten M. Self wrote:
 
   Being 'first' doesn't imply they were 'alone'. You misrepresent
   reality to your own end.
  
  Define your market or relevant niche, with specificity.
 
 Computers intended for single-user interactive processing. 

The problem I've got with this response is that Unix and GNU/Linux
aren't computers, they're operating systems.  Unix was written to run on
those computers that didn't exist, largely the PDP 7 and 11.

I was seeing the market as the *operating systems* running on these
computers.  While I'll concede that Unix and GNU/Linux probably drove
hardware, the fact is that both emerged in environments where there were
existing OSs running, almost always preinstalled, on the hardware of
choice for each system:  RSX-11D, TWENEX, VMS.  The Jargon file has
TWENEX users migrating to Unix in the 1980s.  For larger systms, VM/CMS
still has its fans.

I guess the question would be:  what other OSs were popular in research
environments at the time?  What benefits did Unix offer?  What timeframe
are we discussing?  Again, public availability of Unix seems to have
come after 1974.

 A new class of machines was coming out (my first machine was a PDP 8e
 running BASIC) and while there were plenty of tools they tended to be
 vertical in intent or else not general purpose enough for this sort of
 computing. Look at the first couple of years of Byte or Dr. Dobb's for
 more specific examples (remember Godbout?) in the personal computer
 market.

As I've indicated, I'm not as old as you think I am.  Unix and I are
close to the same age.  My real awareness starts in the early to mid
1980s, some exceptions.

Incidentally, if you want to remenisce, there's a DEC timeline here:

http://www.montagar.com/dfwcug/VMS_HTML/timeline/1964-3.htm
http://www.montagar.com/dfwcug/VMS_HTML/timeline/DECHISTORY.HTM

 Which happens to be one of the primary reasons Unix was developed,
 there were no realistic choices in the market for this paradigm. So a
 solution can trotting along.

I'm unconvinced.

Again, the PDP series, notably the '7  '11, as well as the HP 3000,
stand out in searches as significant mini systems of the day.  I have to
assume they included operating systems.

And again, GNU/Linux emerged in a universe of PC operating systems:
DOS, Macintosh, OS/2, Xenix, Minix, BSDi.  

In both cases, the newcomer (Unix/Linux) emerged as a technically
inferior system, but (rapidly or otherwise) outpaced its competition due
to architecture, licensing, and social factors.

Regarding your comment (two posts back) that Linux was coincident with
the Internet:  yes, I agree that this was a formative factor.  I have no
doubt that if Linus hadn't come along, another solution would have
emerged, the time was ripe.  GNU/Linux happened to be best-of-breed.

 We're facing the same sort of thing today with respect to 'grid
 computing' and such. All the current OS'es (Linux incl.) are focused
 on the old style of solutions. We'll also find that our current views
 of what IP means will be found to be as antiquated.

References?

-- 
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

 PGP signature


Re: Senate approves USA Act, sends to Bush, Ashcroft vows new era

2001-10-25 Thread Karsten M. Self

on Thu, Oct 25, 2001 at 02:31:42PM -0400, Declan McCullagh ([EMAIL PROTECTED])
wrote:

 Attorney General John Ashcroft
 Prepared Remarks for the US Mayors Conference
 October 25, 2001

...

  Within days of the September 11 attacks, we launched this
  anti_terrorism offensive to prevent new attacks on our
  homeland.  To date, our anti_terrorism offensive has arrested or
  detained nearly 1,000 individuals as part of the September 11
  terrorism investigation.  Those who violated the law remain in
  
  custody.  Taking suspected terrorists in violation of the law off

  the streets and keeping them locked up is our clear strategy to
  prevent terrorism within our borders.

Conviction without trial?

The following sentence also parses ambiguously.  Is that taking
suspected terrorists, who are in violation of the law, off the
streets..., or taking, in violation of the law, suspected terrorists
off the streets...?

Peace.

--
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: USPS: glowing by leaps and bounds

2001-10-24 Thread Karsten M. Self

on Tue, Oct 23, 2001 at 08:31:38AM -0700, David Honig ([EMAIL PROTECTED])
wrote:
 At 04:23 AM 10/23/01 -0700, Karsten M. Self wrote:
 Any pointers on packaging for photographic and/or magnetic media through
 mail to survive irradiation equipment?  How about the magstrips on all
 those credit cards issued through the mail?
 

 Forget that, how about seeds and seedlings?  What will Burpee do?

OTOH, futures for nuclear winter wheat are strong.

--
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: Where the torture never stops..

2001-10-24 Thread Karsten M. Self

on Wed, Oct 24, 2001 at 07:12:13PM -0700, John Young ([EMAIL PROTECTED])
wrote:

 These procedures were described in exquisite detail during
 the USA v. bin Laden et al trial earlier this year:

   http://cryptome.org/usa-v-ubl-dt.htm

 Use the search on Cryptome to find the transcripts describing
 the comb attack.

http://cryptome.org/usa-v-ubl-72.htm

Peace.

--
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: Why Plan-9?

2001-10-24 Thread Karsten M. Self

on Wed, Oct 24, 2001 at 09:53:35PM -0500, Jim Choate ([EMAIL PROTECTED]) wrote:
 This entire view misses the(!) one most important component of Unix's (and
 Linux's) success, they were first.

Not hardly.

I wasn't keeping notes when KR were designing their gaming platform,
but history seems to recall OS/360, Multics, TICO, ITS, VMS.  A bit of
quick Googling suggests the PDP-7 had its own native operating system
(the PDP-11 certainly did), certainly more than what a couple of guys
hanging around a broom closet could hammer out in a few days.

Throughout the 1970s and 80s, Ken Olsen was selling VAXs running VMS and
complaining bitterly about snake oil (I guess there's a bunch of snakes
out there).  However, to quote someone's response to Tim May in this
list recently, I'm just one of the dilettants posting here out of
ignorance for some free research on the part of the rest of you.
Someone who was around at the time is going to have a better answer than
me. 



When Linus started Linux, he was bootstrapping with Minix, and trying to
get around its limitations.  For PC Unix, there was alread Xenix and one
or more of the very forgettably named SCO products (not Xenix).  The
Jolitzesi were wresting BSD from Berkeley.  FSF had been working on the
HURD since 1983 (originally as TRIX), in fits and starts.  By the time
Larry McVoy wrote The Sourceware Operating System Proposal in 1993, it
still wasn't clear whether or not FreeBSD or Linux was the cart to hitch
the horse to.

http://www.redhat.com/knowledgebase/otherwhitepapers/whitepaper_freeunix.html

The ultimate success of Linux doesn't have a single factor -- it meets
most of the marks set in the exerpt I posted from KP, I'd argue that
licensing played a role, as did the fact it wasn't encumbered by the
ATT/UCB lawsuits, and most people give Linus himself strong credits for
his project management skills and personality.  Topics covered
extensively elsewhere.

Peace.

-- 
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

 PGP signature


Re: Why Plan-9 licensing?

2001-10-22 Thread Karsten M. Self

on Sun, Oct 21, 2001 at 08:30:19PM -0500, Jim Choate ([EMAIL PROTECTED]) wrote:
 On Sun, 21 Oct 2001, Karsten M. Self wrote:
 
  Summer, June/July, IIRC.  I've done a couple of look-ups since.  There's
  been little additional news or information (I'm not saying none, I'm
  saying little).  OpenBSD, a relatively little-known free 'nix, gets
  rather more press and community coverage.
 
 You need to be on the mailing list. There is almost constant changes.
 You can also visit the wiki link at Bell Labs for the most current
 info.

I'll stop by.

  proposed licenses and terms.  I'm rather convinced that novelty, all
  else being equal, is bad.
 
 Can't disagree more.

Care to expand (off list if you wish).  It's an area of interest.

Nutshell argument:  license interactions are factorial.  Interaction
complexity reduces overall value of a codebase, and tends to marginalize
minority licenses.

By various methods (Debian package listings, Sourceforge projects), the
GPL or LPGL are applied to some 84% of free software.  A tally from
January of this year:

Of the roughly 8,800 listed projects with a license on SourceForge:
 
8,384 are based on an OSI approved license.  
  208 are based on an other or proprietary license. 
  235 are public domain.  

Of the OSI licenses, the breakdown is as follows (note that results may
vary daily as projects are added and removed):

GNU GPL:6,178   74%
GNP LGPL: 844   10%
BSD:  4806%
Artistic: 3024%
MozPL:1141%
MIT:  1101%
Python:781%
QPL:   601%
zlib/libpng:   461%
IBM-PL:101%
MITRE (CVW):40%

As mentioned, 84% of projects are licensed under the GPL.  Compatibly
licensed projects include software under the BSD (revised) terms, MIT,
Artistic, and Python (most recent) licenses.  Major QPL projects are
licensed compatibly with the GPL.  Major MozPL projects are licensed
compatibly with the GPL.  Given some room for variance (there are
non-compatible BSD, and MozPL projects), some 90-95% of projects are
likely licensed under terms compatible with the GNU GPL.
Noncompatibility puts you in a rather small mindshare camp, with a
serious sacrifice of network effects (Metcalfe's Law).

This does assume that a project's intent is to become relatively widely
used and supported by broad mindshare.  As these are among the principle
technical advantages offered by free software / open source, it's not an
advantage to discard lightly.

Per the FSF's analysis, Plan 9 is, again, not open source, free
software, or GPL compatible.  This is a significant strategic handicap.
Moreover, the bulk of terms in the Plan 9 license serve the corporate
interests of the software's owner -- there's little quid pro quo for the
developer or community.  This is typical of corporate licenses,
particularly first drafts.  The evolution of IBM's own Jikes licensing
is instructive.

If the code exists for its own purposes, it may not matter.  From a
broader community perspective, you could do better.

Peace.

-- 
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

 PGP signature


Re: Karsten M. Self shows himself to be clueless, again

2001-10-22 Thread Karsten M. Self

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

on Sun, Oct 21, 2001 at 10:26:55PM -0700, Tim May ([EMAIL PROTECTED]) wrote:
 On Sunday, October 21, 2001, at 06:34 PM, Karsten M. Self wrote:
 
  gpg: Invalid passphrase; please try again ...
  -BEGIN PGP SIGNED MESSAGE-

...

 Jesus fucking Christ, if you're going to subject us to all of your PGP, 
 GPG, GnuPG1.0.6 crud, at least get your fucking password straight, you 
 fucking moron.
 
 gpg: Invalid passphrase: please try again...
 
 Fucking creep. Where's that sniper rifle, Bob?

Dammit Tim, this is *my* cornfield.

So, let's get this straight:

  - RFC 2015 encoded, striped by lne:  fucking moron.
  - Clearsigned:  fucking moron.

Hey:  Tim's internally consistent!

Peace.

- -- 
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE708DsOEeIn1XyubARAviYAKCCjmxkxecXYyP9wv+ahehp8z1dOQCeNSYO
BuBAhI2nsTt7vzi+NhHt/F4=
=K980
-END PGP SIGNATURE-




Re: Why Plan-9 licensing?

2001-10-22 Thread Karsten M. Self

on Mon, Oct 22, 2001 at 02:20:34AM -0500, Jim Choate ([EMAIL PROTECTED]) wrote:
 On Sun, 21 Oct 2001, Karsten M. Self wrote:
 
  Nutshell argument:  license interactions are factorial.
 
 How so? Proof?

Sorry.  Combinatorial.  Not quite as extreme.  From a legal standpoint,
interactions of all combinations of licenses must be considered.  The
interesting cases usually reduce to a much smaller number.  

The trend in free software licensing has been strong reluctance to
accepting novel licenses.  A strong case for benefit is generally
requested, many licenses boil down to ego, corporate politics, or
failure to understand free software / open source concepts -- the
licenses simply aren't either, again, Plan 9 is a case in point.

There's also been a tendency among major projects to seek compatibility
(usually through dual or multiple licensing) with the GPL, Sun and
Mozilla being two cases in point.

  Interaction complexity reduces overall value of a codebase, and
  tends to marginalize minority licenses.
 
 Interaction for who, the author or the user? 

Interaction between licenses.  It's more overhead for the developer to
deal with. 

Case in point:  Tom's Root/Boot.  GNU/Linux on a floppy, 1.77 MB.
Licenses themselves comprised some 50KB, significant for this task.
Terms for compliance that require license and binary to occupy the same
media in use are not acceptable for the technical task (fortunately none
of the major free software licenses require this).  OpenBSD has
eliminated several packages from Donald J. Bernstein due to his
licensing clauses, despite their being technically excellent (if non
standards compliant) software.  Any number of proposals cross the OSI's
door which exclude specific types of use or transfer.

It's too much overhead for developers to consider most of these, they'll
stick to a half-dozen or so known (or highly similar) licenses.  Again,
GPL, LGPL, BSD/MIT, and Mozilla cover a broad range of strategic
interests.

 All license start out in the minority. It's a competition in a way.

What are you competing for?  What characteristics of a license will
win the competition?  This isn't software domination, it's more a
protocol for collaborative development.  Once you've got that nailed
down, stop dicking with the damned lawyers, and start writing code.

Peace.

-- 
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

 PGP signature


Re: Additional Anthrax Deaths Suspected

2001-10-22 Thread Karsten M. Self

on Mon, Oct 22, 2001 at 12:14:29PM -0700, Eric Cordian
([EMAIL PROTECTED]) wrote:
 Tim wrote:

  Looks like the toast and goner comments are right on...as expected.

  I've been watching a press conference of D.C. politicos, mayor and
  company, on CNN. Looks like several inhalational anthrax cases
  confirmed, and *two deaths* of postal workers over the weekend with
  suspicious symptoms and test results.

  (Don't know if one of them is the postal worker already diagnosed with
  inhalational anthrax since last Friday...it's possible this is one of
  the people. Sounds like the two deaths were of others, though, with
  anthrax only being suspected post mortem.)

 Yes, this is very worrisome.  I've been waiting for the day when we
 have less anthrax cases than the day before, and apparently we've not
 seen the peak yet.

antrax: n. AKA mailsorter's disease

(Future dictionary entry)

There is a vaccine for anthrax.  It's not generally distributed, though
military and vetinary personnel may receive it.  The CDC's fact sheet
states that it requires six doses (three at two week intervals, then six
months), protects against cutaneous and inhalation anthrax, and
requires an annual booster.  There are some risks of the vaccine, though
exposure risks are higher, the worst is a sever allergic reaction,
observed in less than 1 in 100,000 doses.

Might it make sense to vaccinate mailroom personnel?  Like high-end
routers on the 'Net, this is where the current delivery mechanism is
bottlenecked.

Peace.

--
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: Additional Anthrax Deaths Suspected

2001-10-22 Thread Karsten M. Self

on Mon, Oct 22, 2001 at 02:36:58PM -0700, Karsten M. Self
([EMAIL PROTECTED]) wrote:

 The CDC's fact sheet

Memo to self:  include URLs.

http://www.cdc.gov/nip/publications/VIS/vis-anthrax.pdf

Peace.

--
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: Retribution not enough

2001-10-22 Thread Karsten M. Self

on Mon, Oct 22, 2001 at 04:58:54PM -0700, David Honig ([EMAIL PROTECTED])
wrote:
 At 01:17 PM 10/22/01 -0700, Steve Schear wrote:
 
 One of the great long term hopes for nanotechnology is the
 cornucopia or StarTrek replicator, a device which can manufacture
 from raw materials and information a broad variety of consumables and
 hard goods.  If it ever does come about and is not something
 centrally controlled and monitored a 'la Stephenson's Diamond Age, it
 could usher in an age of individual sovereignty the likes of which
 the world as not known since its transition from hunter gatherer to
 agriculture.  It might also spell the end of economy.
 
 steve

 Replicators exist.  They're called computers.  They can only replicate
 bits, but
 they do so well enough to make Jack Valenti mess his diapers.

 As to the end of the economy, see Schneier (et al?)'s _Street
 Performer Protocol_ (IIRC) paper.  But you knew that.

Better yet:  energy can't be replicated.

--
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: Farm Out! (was Re: Retribution not enough)

2001-10-22 Thread Karsten M. Self

on Mon, Oct 22, 2001 at 05:39:08PM -0400, Declan McCullagh ([EMAIL PROTECTED]) wrote:
 Now if only some handy, self-effacing volunteer would come along and
 repost your ill-formatted message wrapped at 72 columns, perhaps with
 a severe admonition about the proper forms of netiquette, my day
 would be complete.

That's wishful thinking, Declan.  After, all, this is a capatilist
society.  What's in it for me? [1]

| Steve Furlong wrote:
| 
|  Then let them. A self-sufficient subsistence farmer won't be bothered by
|  the trade his neighbors are carrying out. [1] His farm can be a
|  neolithic bubble as the world progresses.
| 
| What? You're talking nonsense here. Of course they make part of their
| living selling crops --- what's all the bs about forging his own
| metals etc. Total straw man arguement. The point was that they aren't
| starving for one thing, and, if it were up to them, they'd stay put.
| 
| Look, I'll try to explain it in terms that perhaps even a city boy like
| you can understand. You don't have to go to the 3rd world, just go talk
| to small american family farmers. There are thousands of them out there
| who simply don't care that they aren't making lots of money -- the
| important thing is that they can keep their farms and do their own
| thing. What's wrong with that?
| 
| You know what destroyed the small family farm in this country? Education
| -- ag schools and the county extension agent. Funded, for the most part,
| by large chemical companies. The old story of the country bumpkin
| getting conned by the city-slicker salesman. Kids went off to ag school,
| came home and told Dad to do things the modern way, factory farming
| with modern chemicals -- sure, go into debt, buy all those new tractors
| and fancy equipment and we'll be rich.
| 
| And then, of course, that little trick the Fed Reserve and the banks
| pulled back in the 70's with manipulating the economy so that rural land
| prices went thru the roof, farmers who had been mortgage free for
| generations got duped into borrowing money on their land to buy that
| fancy new equipment that the ag schools and extension agents told them
| they needed, then bingo -- the Fed played some more tricks, land values
| dropped back down, and a whole lot of farmers lost their land.
| 
| Is that what you call free-market economics? I call it fascism -- state
| and industry working in concert to whipsaw the masses and get more
| control over peoples lives. People who were very free and independant
| are suddenly wage slaves in the city because they listened to the
| experts from industry and government. And got duped.
| 
| I know one heck of a lot of people who much prefer living in rural
| poverty to living in a city making big bucks. Although my wife and I
| have been making a whole lot more money in recent years than we ever
| thought we would, and live in a big fancy house in the city, we consider
| it a serious mistake. Money isn't everything. We were one heck of a lot
| happier when we earned about $4000.00 a year.  We will soon rectify
| that. Why make a bunch money and feed the fascist machine?
| 
| One of my favorite cartoons was one of Snuffy Smith and his wife --- she
| says Pa, the world is passing us by. Snuffy replies, It sure better!
| Damn straight!
| 
| Tune in, turn on, and drop out.  Now that's real free market economics.
| 
| 
| 
|  If he _isn't_ self-sufficient, then he does care about the trade going
|  on around him. That's been the case forever, and new trade always
|  disrupts someone who was making his living with the way things were.
| 
|  And if he wants to make use of metal tools, then he'll have to exchange
|  as best he can for them. But, again, he's not self-sufficient, unless he
|  can dig and forge his own metals. Complaining that the world isn't the
|  way it was for Grandpa shouldn't get a sympathetic ear from anyone who
|  uses metals, plastics, or medicine, or who eats fresh produce out of
|  season.
| 
|  [1] Assuming they don't pollute him out of raising his crops or
|  livestock, tax or regulate his farm out of existence.
| 
|  --
|  Steve FurlongComputer Condottiere   Have GNU, Will Travel
|617-670-3793
| 
|  Good people do not need laws to tell them to act responsibly
|  while bad people will find a way around the laws. -- Plato
| 
| --
| Harmon Seaver, MLIS
| CyberShamanix
| Work 920-203-9633
| Home 920-233-5820
| [EMAIL PROTECTED]
| http://www.cybershamanix.com/resume.html


Notes:

1.  Gratuitous abuse from Tim May, of course.  Back to the cornfield.

-- 
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html




Re: Why Plan-9?

2001-10-21 Thread Karsten M. Self

on Sun, Oct 21, 2001 at 06:29:16PM -0500, Jim Choate ([EMAIL PROTECTED]) wrote:
 On Sun, 21 Oct 2001, Karsten M. Self wrote:
 
  This says nothing about current development.  Word I've heard (from
  someone tangentially involved with the project) was that the release was
  something of a desperation move.  As someone who watches free software
  licences closely, the Plan 9 license is one of the more twisted bits of
  corporate-authored licenses.  Not necessarially bad, but it reeks of
  compromise clauses speaking to internal battles.  Rumor was that a
  codebase that had been stable for a couple of years saw a slew of
  commits in the weeks leading to the public release.
 
 ??? Plan 9 was released Open Source in 2000. 

Summer, June/July, IIRC.  I've done a couple of look-ups since.  There's
been little additional news or information (I'm not saying none, I'm
saying little).  OpenBSD, a relatively little-known free 'nix, gets
rather more press and community coverage.

While there's nothing wrong with a small, dedicated core, I'm just
commenting that there doesn't appear to be much broader appeal.

  The license is *not* OSI certified, nor is it considered Free Software
  by the FSF.
 
 shrug Ask me if I care.

A fair number of people respect the opinions of the OSI and FSF, if only
because they don't feel like combing through licensing terms themselves.
I'm active on the OSI's license-discuss list, and see quite a few
proposed licenses and terms.  I'm rather convinced that novelty, all
else being equal, is bad.  Compellingly adventageous licensing language
may be of some interest.  The MozPL is the last license I'd consider to
have provided this (it's a community-friendly mixed-mode copyleft +
proprietary use license).

Poor licensing choices are one of several key modes of failure for free
software projects.  If Plan 9 procedes forward, I expect to see another
two or three significant licensing revisions.

 Read Lessigs Code.

At my side.  What specifically?

- Filesystem is fully transitive, everything is treated like a file.
  This creates some unique opportunities to make publicly shared but
  privately maintaned resource pools. Hangar 18 is an attempt to do
  just this.
  
  What does this mean?  How does this compare with,
 
 Transitive means that A mounts B, C mounts A and gets B free. Plan 9 does
 this, managed by a set of authorization layers for fine control, native.
 This means that when Hangar 18 goes online you can mount /hangar18 into
 your filespace (via Plan 9 or Linux NFS services) and you will get all the
 resources that Hangar 18 mounts through that point. ftp is a good example.
 In Plan 9 you 'mount' the ftp server to your file system. If you ever go
 out and walk that part of the file space tree and request a file it only
 then goes and gets it. You can control its lifetime (to manage disk space
 for example) via local cache controls. A 'lazy update' mechanism, very
 efficient of network and local resources.

Interesting.  Some similarity then with the autofs system under
GNU/Linux, in which remote filesystems may be mounted by various
methods, including FTP, though transitivity isn't generally included
IIRC.

- Encryption (currently DES, needs fixing) built right in.
  
  Built into what?
 
 The network layer. The traffic between any two Plan 9 boxes is
 encrypted with keys dependent upon the individual boxes (or larger
 classes if you desire) if the system is so configured. You can also
 use this to encrypt branches of your filesystem. Plan 9 provides SSH.

Always or at discression?  Again, possible with GNU/Linux, though not as
trivial as desireable at present.

 But the passwords don't go across the network, therefore they're not
 'used' in the conventional sense.

Interesting.  Somewhat like, say, SSH RSA key authentication, but at OS
level?

Peace.

-- 
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

 PGP signature


Instant Anthrax...test (was: Re: And another one bites the dust...)

2001-10-21 Thread Karsten M. Self

gpg: Invalid passphrase; please try again ...
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

on Sun, Oct 21, 2001 at 06:02:17PM -0700, David Honig ([EMAIL PROTECTED]) wrote:
 At 02:56 PM 10/21/01 -0700, Karsten M. Self wrote:
 The media hype also tends to ignore the fact that anthrax is, in the
 forms detected to date, largely treatable.  Gross attempts at
 containment (expensive) are less advisable than identification and
 treatment of exposed individuals (less expensive).
 
 Once the person has enough symptoms to seek treatment, I think they're
 toast.  We'll see.  Maybe all USPO workers will be given 60 days of
 Cipro.  If they're the only ones to survive, the species is fucked.

You clearly can't to wait for individuals to be symptomatic, you have to
detect eposures.  The point, however, is that exposure itself isn't a
high risk given appropriate, timely, treatment.

The Economist is now reporting on instant screening:

http://www.economist.com/science/displayStory.cfm?Story_ID=821937

Biological weapons
Testing times
Oct 18th 2001
From The Economist print edition

Instant screening for anthrax is now possible

[...]

Unfortunately, the two established methods for identifying anthrax
and other microbial contaminants involve time-consuming laboratory
techniques. One is to try to culture an organism from the powder,
and then subject it to a barrage of chemical tests to identify it.
The other is to amplify and identify its DNA . The first takes days,
and the second is a sophisticated technique that few laboratories
are yet able to manage. So, even if the result is negative, chaos
may already have been caused and the act of terrorism rewarded.

A better solution would be to screen on the spot. And technology to
do this is now available. It uses a test strip, costing $20, that
looks like a pregnancy-detection kit.

The Guardian Bio-Threat Alert System is a joint development by
Alexeter Technologies, based in Wheeling, Illinois, and Tetracore,
of Gaithersburg, Maryland. It takes 15 minutes to react to the
presence of anthrax, and it is the only rapid field test now
available. 

[...]

Apologies if this was already posted here.  Search of my inbox doesn't
turn it up.

Peace.

- -- 
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE703eMOEeIn1XyubARAkv8AJsGXp1TQp8Zy+CPWNLrtb34BeJBdQCfb470
tehhCnLmo1UbvUhPFE7o4Z0=
=cjrt
-END PGP SIGNATURE-




Clubbing in Fortress Amerika (fwd)

2001-10-20 Thread Karsten M. Self

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Life is a Cabaret, my friends.

on Sat, Oct 20, 2001 at 12:56:02PM -0700, Giovanna Imbesi ([EMAIL PROTECTED]) wrote:
 Last night my friend and I stopped at a Venice club/bar.  At the door
 they were doing the normal ID check, but then took my driver's license
 and swiped it into a little Palm-like device...and all the info popped
 up on the screen.  I was startled, amused and outraged all at the same
 time.  My friend knows the new owners of the building and told me that
 the owners had rented part of the upstairs space to a guy with a youth
 marketing company, also coincidentally a long-time friend of his.
 What are they doing with this information?  I've been wondering what
 real implications a national ID card would present and here was a
 clear example of potential abuse.  Is this even legal? Aren't they
 authorized to check date-of-birth but no more?  Is it legal to retain
 the data?  What data is stored in the magnetic stripe on a California
 driver's license - name, address, DOB, license #, and signature? 
 
 On the way out I asked if we got our data back but only got a nervous
 laugh in reply.  
 
 G.
 
 
 Giovanna Imbesi
 TuttoMedia
 http://www.tuttomedia.com
 310-399-2800
 [EMAIL PROTECTED]
 
 
 -
 This is the pho mailing list, managed by Majordomo 1.94.4.
 
 To send a message to the list, email [EMAIL PROTECTED]
 To send a request to majordomo, email [EMAIL PROTECTED] and put your
 request in the body of the message (use request help for help).
 To unsubscribe from the list, email [EMAIL PROTECTED] and put
 unsubscribe pho in the body of the message.

- -- 
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE70dnAOEeIn1XyubARArMaAJ95uo4KZfqqkWj/RD8adX3PN1Z/vACfa9xA
rLjWNMMw6+UefXhnRwN8x60=
=tBCH
-END PGP SIGNATURE-




Re: Clubbing in Fortress Amerika (fwd)

2001-10-20 Thread Karsten M. Self

on Sat, Oct 20, 2001 at 05:48:44PM -0500, Harmon Seaver
([EMAIL PROTECTED]) wrote:
 Dr. Evil wrote:

   Do different states use different formats for the data on the magstrip?
 
  Do all states even have magstrips?

   You know, I never even realized until right now that my DL has a mag
 strip. This is a new thing for WI, I think. Pretty sure my recent MN didn't
 have one. I guess the more interesting thing would be, before wiping it
out,
 to figure out a way to read it.

http://www.google.com/search?q=drivers+license+magnetic+stripe

California, Maryland, New York, Ohio, Texas, and Wisconsin, notably.

See also:  http://catless.ncl.ac.uk/Risks/13.18.html

[From California SB 1447, 1992, the Privacy Act of 1992]

SECTION 2: INFORMATION OBTAINED FROM DRIVER'S LICENSES

This section requires the written consent of a consumer for a
business entity to (1) sell information obtained from the consumer's
driver's license or (2) use such information to advertise goods or
services.

The section is intended to cover instances where a consumer presents
a driver's license or identification card for identification
purposes during a business transaction.  The section is not intended
to prevent businesses from using driver's license information for
business record-keeping, or for other purposes related to the
transaction (i.e. authorizing a transaction).

The section is not intended to change existing law with respect to
the ability of businesses to obtain driver's license information
from other sources (such as DMV records).

The need for this section is heightened by the new magstripe
drivers license developed by the Department of Motor Vehicles.  This
license has a magnetic stripe on the back which contains much of the
information on the front of the license.  The stripe will enable a
business entity to store information contained on a driver's license
simply by scanning the card through a reader.

A publication by the Department of Motor Vehicles dated May 1991
(Department of Motor Vehicles Magnetic Stripe Drivers
License/Identification Card) states that using point of sale (POS)
readers and printers, the business community can electronically
record the DL [driver's license] /ID number on receipts and business
records.  The publication notes that magnetic stripe readers are
readily available, relatively low in cost, and are already available
in many retail outlets.

However, a merchant might access much more than the driver's
license/ID number; the publication notes that readers have been
produced, and market available readers can be modified that will
read the three tracks of information contained on the California
card.  According to the publication, the tracks contain information
such as license type, name, address, sex, hair-color, eye-color,
height, weight, restrictions, issue date.

Peace.

--
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: stupid anthrax q: would microwaving your snail mail help?

2001-10-19 Thread Karsten M. Self

on Sun, Oct 14, 2001 at 04:11:16PM -0400, sunder ([EMAIL PROTECTED]) wrote:
 This is a stupid question but as I'm not a biologist, I'll ask it
 anyway and risk looking foolish...
 
 Would it help to microwave your mail if you don't know where it came
 from and you're sure it doesn't contain an objects?  i.e. it's not a
 CD you've ordered from Amazon. :)

This suggestion turned up on Kuro5hin, a web discussion site (Slashdot's
baby brother):

If you want to sterilize your mail, simply place the unopened
envelope on an ironing board and place a damp, thin cloth on top of
it. Then iron it. Yes, iron it. Just like you would iron your pants.
The damp heat will kill any bacteria, including anthrax, inside the
envelope, and you will be safe.

http://www.kuro5hin.org/comments/2001/10/18/44222/299/16#16

Probably more accessible to most of the population (and workplaces) than
claves, pressure cookers, or irradiation equipment.

Anyone have thoughts or (?) knowledge on efficacy, or guidelines on how
long the heating should last for decontamination?

The obvious terrorist counter-countermeasure would be to add a
heat-activated agent to the weapon.

Peace.

-- 
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

 PGP signature


Re: stupid anthrax q: would microwaving your snail mail help?

2001-10-19 Thread Karsten M. Self

on Fri, Oct 19, 2001 at 07:27:18AM -0500, Jim Choate ([EMAIL PROTECTED]) wrote:
 On Fri, 19 Oct 2001, Karsten M. Self wrote:
 
  This suggestion turned up on Kuro5hin, a web discussion site (Slashdot's
  baby brother):
  
  If you want to sterilize your mail, simply place the unopened
  envelope on an ironing board and place a damp, thin cloth on top of
  it. Then iron it. Yes, iron it. Just like you would iron your pants.
  The damp heat will kill any bacteria, including anthrax, inside the
  envelope, and you will be safe.
  
  http://www.kuro5hin.org/comments/2001/10/18/44222/299/16#16
  
  Probably more accessible to most of the population (and workplaces) than
  claves, pressure cookers, or irradiation equipment.
  
  Anyone have thoughts or (?) knowledge on efficacy, or guidelines on how
  long the heating should last for decontamination?
 
 Sounds like somebody doesn't do their own washing/ironing :)

I bathe regularly.  All else is gloss.

 The steam in an iron doesn't get anywhere that hot, it'd ruin the
 clothes.  

/me retreats to iron w/ thermometer.

Black and Decker Light 'n' Easy iron, cotton dishtowl (folded quarto),
Good Cook dial thermometer inserted under top fold.  With four
minutes' preheat, temperature is off the scale (220°F), extrapolating,
it looks to be 270°-280°F.  After about two minutes, there's a slight
yellowing of the dishtowel.

 Also an iron will have steam escaping around the edges (when you hit
 the steam button especially) and this has the potential to spread
 un-heated spores into the atmosphere.

The filtration offered by an envelope and moistened towel should
minimize this.

References online suggest that claving cycles are ~2h at 140°C+.  A WHO
document on animal carcass processing suggests rendering cycles range
from 10-60 minutes, though whether or not this is sufficient to
disinfect the carcasses isn't clear from a quick read.  

http://www.who.int/emc-documents/zoonoses/docs/whoemczdi986.html

I'd say that for paranoics with a low risk threshhold, ten minutes of
steam might provide some assurance.  And neatly creased correspondence.
It's a bit hard on the pre-approved credit cards though.

Peace.

-- 
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

 PGP signature


Re: stupid anthrax q: would microwaving your snail mail help?

2001-10-19 Thread Karsten M. Self

on Fri, Oct 19, 2001 at 03:13:02PM -0700, Karsten M. Self ([EMAIL PROTECTED]) wrote:
 on Fri, Oct 19, 2001 at 07:27:18AM -0500, Jim Choate ([EMAIL PROTECTED]) wrote:
  On Fri, 19 Oct 2001, Karsten M. Self wrote:
 
   This suggestion turned up on Kuro5hin, a web discussion site (Slashdot's
   baby brother):
  
   If you want to sterilize your mail, simply place the unopened
   envelope on an ironing board and place a damp, thin cloth on top of
   it. Then iron it. Yes, iron it. Just like you would iron your pants.
   The damp heat will kill any bacteria, including anthrax, inside the
   envelope, and you will be safe.
  
   http://www.kuro5hin.org/comments/2001/10/18/44222/299/16#16
  
   Probably more accessible to most of the population (and workplaces) than
   claves, pressure cookers, or irradiation equipment.
  
   Anyone have thoughts or (?) knowledge on efficacy, or guidelines on how
   long the heating should last for decontamination?
 
  Sounds like somebody doesn't do their own washing/ironing :)
 
 I bathe regularly.  All else is gloss.
 
  The steam in an iron doesn't get anywhere that hot, it'd ruin the
  clothes.
 
 /me retreats to iron w/ thermometer.
 
 Black and Decker Light 'n' Easy iron, cotton dishtowl (folded quarto),
 Good Cook dial thermometer inserted under top fold.  With four
 minutes' preheat, temperature is off the scale (2200F), extrapolating,
 it looks to be 2700-2800F.  After about two minutes, there's a slight
 yellowing of the dishtowel.

Above mistranslates ISO-8859-1 encoded \260 (octal), the degree sign, as
a zero.

Temperatures should read 220 F, 270 F, and 280 F, not thousands of
degrees.

-- 
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

 PGP signature


Re: Inflation

2001-10-19 Thread Karsten M. Self

on Fri, Oct 19, 2001 at 04:41:28PM -0700, [EMAIL PROTECTED] ([EMAIL PROTECTED])
wrote:
 Greg Broiles [EMAIL PROTECTED] wrote :
 At 03:13 PM 10/19/2001 -0700, Karsten M. Self wrote:
 
 /me retreats to iron w/ thermometer.
 
 Black and Decker Light 'n' Easy iron, cotton dishtowl (folded quarto),
 Good Cook dial thermometer inserted under top fold.  With four
 minutes' preheat, temperature is off the scale (2200F), extrapolating,
 it looks to be 2700-2800F.  After about two minutes, there's a slight
 yellowing of the dishtowel.
 
 Is it possible you're off by a factor of 10 here? I am very skeptical that
 you have an iron which heats up to 2200 or 2700 degrees Fahrenheit. I would
 expect a little more than a slight yellowing of the dish towel at those
 temperatures, unless you have asbestos dish towels you use along with your
 superheated iron.
 
 
 --
 Greg Broiles
 [EMAIL PROTECTED]
 We have found and closed the thing you watch us with. -- New Delhi street
kids
 
 Kind of like using one of those ugly red lab hot air guns to dry your
 hair, eh?

 Definitely an honest mistake.

As previously posted, an iso-8859-1 to ASCII encoding error.  The degree
symbol was converted to a zero.  Divide values by 10.

Peace.

--
Karsten M. Self [EMAIL PROTECTED]   http://kmself.home.netcom.com/
 What part of Gestalt don't you understand? Home of the brave
  http://gestalt-system.sourceforge.net/   Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: Nifty secret bank system

2001-10-04 Thread Karsten M. Self

on Wed, Oct 03, 2001 at 03:25:33PM -0700, Steve Schear ([EMAIL PROTECTED])
wrote:
 At 06:30 PM 10/3/2001 +0100, CDR Anonymizer wrote:
 http://archives.nytimes.com/2001/10/03/international/03LAUN.html
 
 lo-tech, trust-based, stable and fully functional since antiquity. I like
 it :-)

 You'll notice the cost of money transfers using this private system are
 well below international bank wires.  If governments want to
 reduce/eliminate this illicit competition they should fully underwrite
 the cost of international wires below a certain threshold (say $10,000).

For some, cost of transfer is a secondary consideration to secrecy, and
possibly sufficient to keep a significant underground network active.

Peace.

--
Karsten M. Self [EMAIL PROTECTED]http://kmself.home.netcom.com/
 What part of Gestalt don't you understand?  Home of the brave
  http://gestalt-system.sourceforge.net/Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA!  http://www.freesklyarov.org
Geek for Hire  http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: USG pulls 'sensitive' info off net

2001-10-03 Thread Karsten M. Self

on Wed, Oct 03, 2001 at 11:00:04AM -0400, Declan McCullagh ([EMAIL PROTECTED])
wrote:

 On Wed, Oct 03, 2001 at 06:38:05AM -0700, Khoder bin Hakkin wrote:
  Must've never heard of caching..
 
  http://www.latimes.com/news/nationworld/nation/la-100301safe.story

 Inevitable next step: Enterprising cypherpunk registers
 censoredfedinfo.org, hunts through google's cache, posts everything
 there, etc.

Note that there are a relatively small number of Googles on the Net.

This is a point that was brought forth pointedly at John Wharton's ee380
seminar at Stanford last spring, during Rhonda Hauben's seminar Usenet
and the Usenet Archives The Challenges of Building a Collaborative
Technical Community

http://www.stanford.edu/class/ee380/Abstracts/010523.html

Specifically, the Usenet community became used to the Deja News
archives, to the extent that many independent archives of specific
newsgroups or collections of groups were deactivated, relying instead on
Deja.

While comprehensive archives are useful, *single* comprehensive archives
present a point of failure and control.  The Net would be advised to
develop multiple Google alternatives.  And I say this as quite the fan
of Google

Peace.

--
Karsten M. Self [EMAIL PROTECTED]http://kmself.home.netcom.com/
 What part of Gestalt don't you understand?  Home of the brave
  http://gestalt-system.sourceforge.net/Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA!  http://www.freesklyarov.org
Geek for Hire  http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: cryptome down ?

2001-10-02 Thread Karsten M. Self

on Tue, Oct 02, 2001 at 07:11:19PM -0500, Neil Johnson
([EMAIL PROTECTED]) wrote:
 I tried to get to cryptome, but it appears to be down.

 Any info ?

Works from here.

--
Karsten M. Self [EMAIL PROTECTED]http://kmself.home.netcom.com/
 What part of Gestalt don't you understand?  Home of the brave
  http://gestalt-system.sourceforge.net/Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA!  http://www.freesklyarov.org
Geek for Hire  http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: [FREE] stratfor (fwd)

2001-10-01 Thread Karsten M. Self

on Mon, Oct 01, 2001 at 08:37:30AM -0700, Subcommander Bob ([EMAIL PROTECTED])
wrote:
 At 04:08 PM 9/30/01 -0700, Karsten M. Self wrote:
 
  This is IMHO naive.  Have you ever been in a brawl?
 
 Have you ever been in a brawl where one side (or both) has friends?

 Balkans, just before WWI.  Poison gas followed that one (too).

...let's look at the bright side.

Afghanistan isn't a Balkan state

Peace.

--
Karsten M. Self [EMAIL PROTECTED]http://kmself.home.netcom.com/
 What part of Gestalt don't you understand?  Home of the brave
  http://gestalt-system.sourceforge.net/Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA!  http://www.freesklyarov.org
Geek for Hire  http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: America needs therapy

2001-10-01 Thread Karsten M. Self

on Mon, Oct 01, 2001 at 11:57:18AM -0700, [EMAIL PROTECTED]
([EMAIL PROTECTED]) wrote:
 On 1 Oct 2001, at 11:05, Eric Murray wrote:

 Not to mention things like travel delays due to road congestion
 ($46.5 to $174.6 billion), which not only would still exist with
 electric cars, but is a cost ALREADY paid by automobile users.  To
 call something like that a hidden subsidy of the oil industry should
 be enough to get this study rejected by a reesponsible reviewer.

Electric vehicles are far more efficient idlers than ICE vehicles.

Idling is essentially paying the oil companies for the privilege of
sitting still.  It's not an inconsequential cost.

Other congestion costs are not as attributable to oil, but direct
combustion is.

Peace.

--
Karsten M. Self [EMAIL PROTECTED]http://kmself.home.netcom.com/
 What part of Gestalt don't you understand?  Home of the brave
  http://gestalt-system.sourceforge.net/Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA!  http://www.freesklyarov.org
Geek for Hire  http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: NYPOST.COM World News: DATA POURING IN FASTER THAN NSA CAN DECIPHER IT By GREG SEIGLE

2001-10-01 Thread Karsten M. Self

on Mon, Oct 01, 2001 at 07:28:56AM -0500, Jim Choate ([EMAIL PROTECTED]) wrote:
 http://www.nypost.com/news/worldnews/5334.htm

A suggestion I've made before in other circles:

   Open source the data.

There are clearly a few wrinkles to be worked out, but there are some
inflection points that can be used to define the task:

  - Open sources intelligence -- data gathered from publicly available
data -- may be distributed without fear of compromising sources.

  - Court-of-law doctrines don't apply:  there's no need to tell the
truth, the whole truth, or nothing but the truth.  Information can
be selectively withheld.  Disinformation may be submitted.  Details
may be distorted.  Scenarios may be projected for the purpose of
analyzing possible outcomes.

  - Covert intelligence may also be selectively leaked, with or without
intentional modifications and/or origin masking. 

  - The leaks need not be made under the auspices of the US (or allied)
intelligence services, but could be injected anonymously or
pseudonymously into existing discussions on Usenet, Webboards, 
mailing lists, Internet indices such as Google, the press, or other
channels.  

One of the natural problems is identifying *useful* discussion
forthcoming.  Some existing channels have meaningful ways  of
idnetifying useful or more meaningful content (proxies such as user
tracking, or direct measures such as moderation, preference indication,
or collaborative filtering).


One of the first discussions I had with a friend following the 9/11
attacks was the similarities between terrorist organization and the free
software movement:  decentralized operations which are difficult to
locate and/or isolate.  On reflection, I decided that the distinctions
were more meaningful.  One of the great strengths (and a frequent
criticism) of the free software community is that it is *so* open and
deliberative.  In particular, organized criticism or oposition often
finds itself buried under an onslaught of response.  Witness many
journalists with a Microsoft bent and their complaints of the seething
unwashed GNU/Linux hoards, or this past weekends conclusive denunciation
of W3C for proposing and promoting a highly free-software unfriendly
licensing policy.  By contrast, the opponents of free software must
communicate out of band, covertly.  

One of the advantages of the forces opposed to terrorism is that a very
large portion (though granted:  not all) of their communications can be
free and open.  This increases pathways of intelligence analysis and
discovery.

Worth considering?

Peace.

-- 
Karsten M. Self [EMAIL PROTECTED]http://kmself.home.netcom.com/
 What part of Gestalt don't you understand?  Home of the brave
  http://gestalt-system.sourceforge.net/Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA!  http://www.freesklyarov.org
Geek for Hire  http://kmself.home.netcom.com/resume.html

 PGP signature


Re: Just Say So?

2001-10-01 Thread Karsten M. Self

on Mon, Oct 01, 2001 at 01:24:29PM -0700, Tim May ([EMAIL PROTECTED]) wrote:
 When confronted with calls to Do something! or We can't just stand by
 and watch!, I think of one word: So?

There's an alternative formulation:

   Don't just do something.  Stand there.

The gist is the same.  Senseless activity isn't justified by virtue of
being activity.

Peace.

--
Karsten M. Self [EMAIL PROTECTED]http://kmself.home.netcom.com/
 What part of Gestalt don't you understand?  Home of the brave
  http://gestalt-system.sourceforge.net/Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA!  http://www.freesklyarov.org
Geek for Hire  http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Text of Ashcroft Anti-Terrorism act?

2001-10-01 Thread Karsten M. Self

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Does anyone know if the updated text of the proposed Anti-Terrorism act
has been published?

The NYT reports Ashcroft urging a vote by next week:

http://archives.nytimes.com/2001/10/01/national/01SECU.html

No substance on the bill itself.

Peace.

- -- 
Karsten M. Self [EMAIL PROTECTED]http://kmself.home.netcom.com/
 What part of Gestalt don't you understand?  Home of the brave
  http://gestalt-system.sourceforge.net/Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA!  http://www.freesklyarov.org
Geek for Hire  http://kmself.home.netcom.com/resume.html
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE7uPSwOEeIn1XyubARAhlOAJ9nwMEbAflsEosg6gbGHTXDT6vb5QCdHFk9
cdcIK3NoTCMTUi6tkBno+U0=
=Xlov
-END PGP SIGNATURE-




Re: [FREE] stratfor (fwd)

2001-09-30 Thread Karsten M. Self

on Sun, Sep 30, 2001 at 05:55:50PM -0400, James B. DiGriz ([EMAIL PROTECTED]) 
wrote:
 [EMAIL PROTECTED] wrote:

 dict.org cites Webster's Revised Unabridged Dictionary (1913):
 
 War War, n. OE.  AS. werre; akin to OHG. werra scandal,

...

 1. A contest between nations or states, carried on by force,

...

 Note: As war is the contest of nations or states, it always
   implies that such contest is authorized by the monarch
   or the sovereign power of the nation. 

Which neatly gets you into the problem of what to call a civil war.

I've had this discussion with several European friends.  Seems there's a
few definitions of war to be found, even in standard dictionaries.
Not all refer to nations or states.  Others may note that a nation is
not identical to a state.  There are stateless nations (e.g.:
Palestine), and states which are host to people of several nations
(e.g.:  the Swiss Federation).

I use the somewhat informal, though largely conformant, definitions of:

   Nation:  a group of people identified by common culture, language,
   beliefs, or institutions.  (my own distilation)

   War:  armed hostilities, especially between nations.  (The Oxford
   Encyclopedic English Dictionary).

One of the most asinine arguments I've heard to date was a commentator
on the BBC/PRI The World radio program a couple of weeks back.  Her
statement was that by calling this a war, the US was validating the
deaths at the WTC/P5 attacks as casualties of war.

Bollox.

Deaths aren't justified or not.  What declaring war (formally or
otherwise) does is put both combatents and other parties on notice (as
the US was most decidedly not prior to the attacks) that there is a
state of armed hostilities.  Actions supportive of the (admittedly ill
defined) enemy may be construed as acts of war against the US.  And
innocents are best advised to stay out of the hot zone.

Peace.  By any means.

-- 
Karsten M. Self [EMAIL PROTECTED]http://kmself.home.netcom.com/
 What part of Gestalt don't you understand?  Home of the brave
  http://gestalt-system.sourceforge.net/Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA!  http://www.freesklyarov.org
Geek for Hire  http://kmself.home.netcom.com/resume.html

 PGP signature


Re: [FREE] stratfor (fwd)

2001-09-30 Thread Karsten M. Self

on Sun, Sep 30, 2001 at 04:11:21PM -0400, James B. DiGriz ([EMAIL PROTECTED]) 
wrote:
 Declan McCullagh wrote:
 
  The Washington Times ran a stratfor.com article (as a news article, like
  the paper would run Reuters or AP) yesterday. I haven't visited their
  website, but what I read yesterday is quite interesting.
  
  -Declan
 
 What I find interesting is how we can have a war without a
 Congressional declaration, which out of practical if not legal
 necessity requires something at least approximating a foreign power as
 the enemy. It would be extremely helpful if there were some overt
 state action or at least a smoking gun to publicly identify such
 party.

As the US President is CinC of the US armed forces, he may deploy these
forces as he sees fit.  However, Congress holds the purse strings, and
the impeachment vote.  My understanding is that the War Powers Act,
passed in the wake of the SouthEast Asia Disagreement of 1965-1975,
limits such deployments to 30 or 90 days.

I have to admit being somewhat confused myself over just what
distinctions there are between a formal declaration, and a vote of
support such as we saw following the 9/11 attacks.  I believe a formal
declaration would entail far more Presidential support and powers,
resources for the military, including likely more sweeping restrictions
on civil liberties.

Peace.

-- 
Karsten M. Self [EMAIL PROTECTED]http://kmself.home.netcom.com/
 What part of Gestalt don't you understand?  Home of the brave
  http://gestalt-system.sourceforge.net/Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA!  http://www.freesklyarov.org
Geek for Hire  http://kmself.home.netcom.com/resume.html

 PGP signature


Re: [FREE] stratfor (fwd)

2001-09-30 Thread Karsten M. Self

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

on Sun, Sep 30, 2001 at 03:45:07PM -0700, Steve Schear ([EMAIL PROTECTED]) wrote:
 At 03:25 PM 9/30/2001 -0700, Karsten M. Self wrote:
  One of the most asinine arguments I've heard to date was a
  commentator on the BBC/PRI The World radio program a couple of
  weeks back.  Her statement was that by calling this a war, the US
  was validating the deaths at the WTC/P5 attacks as casualties of
  war.
  
  Bollox.
  
  Deaths aren't justified or not.  What declaring war (formally or
  otherwise) does is put both combatents and other parties on notice
  (as the US was most decidedly not prior to the attacks) that there
  is a state of armed hostilities.  Actions supportive of the
  (admittedly ill defined) enemy may be construed as acts of war
  against the US.  And innocents are best advised to stay out of the
  hot zone.
 
 This is IMHO naive.  Have you ever been in a brawl?  

Have you ever been in a brawl where one side (or both) has friends?

 Unlike most silver screen fights my experience is that the first
 person to get in a good one usually decks the opponent and its over.
 If the first one to throw the punch can sneak up on the opponent or
 create over confidence in the other party by getting them to think
 that no violent reply will be forthcoming if attacked (in New York we
 called that sucker punching) then the odds of success are that much
 more increased.  The Art of War is still a good source of combat
 advice.

Sucker punching tends to violate the norms of honorable conduct.  If you
down the first guy, but have to deal with three of his friends, the
issue becomes a bit less clear cut.  Concepts of unfair advantage tend
to escalate:  sucker punches lead to friends, knives, back alleys,
and/or heat.

That's more or less where the perps of the 9/11 attacks find themselves
at the moment.

The other side of the argument is the bee'n'the bull theory.  Sure, the
bee can get in the first lick, but you've now got one pissed-off bull.
If your sucker punch *doesn't* land the fellow, you've got consequences
to deal with.  I'd say the US is currently stung, but by no means
hurting in any diminished-capacity sense of the word.  This doesn't
strike be as good strategic thinking on our oponents' part.

I did make a halfhearted attempt to search through TAoW looking at
strategic guidelines.  I'll give it another shot and see what I turn up.

Peace.

- -- 
Karsten M. Self [EMAIL PROTECTED]http://kmself.home.netcom.com/
 What part of Gestalt don't you understand?  Home of the brave
  http://gestalt-system.sourceforge.net/Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA!  http://www.freesklyarov.org
Geek for Hire  http://kmself.home.netcom.com/resume.html
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE7t6X8OEeIn1XyubARApr5AJwPUGhTsll52UypCfAqua/WFAssIQCfUy1Z
iPG8lP8cqvwHdGTseIKXBc4=
=tMHU
-END PGP SIGNATURE-




Call for Presentations: CODECON 2002

2001-09-26 Thread Karsten M. Self
 developers from
each team. These developers may then individually demonstrate their
applications, followed by discussion among the panel and QA with the
other attendees as to differences in design goals, implementation, and
other aspects of the systems. If we receive multiple submissions from
related projects for papers or demos, we may suggest to the presenters
that they combine into a panel. Additionally, presenters are free to
submit jointly as a pre-selected panel.

There is some flexibility in requirements and formats for presentations;  
please enquire if you would like to use an alternate form.

FORMAT OF PRESENTATIONS (public session)

On the afternoon of Sunday 17 February, we will set aside a substantial
amount of time for 5 minute-or-less project public session presentations.
Other events on this day, including panels and main presentations, will be
targeted at members of the press and public, so brief presentations on
Sunday will reach a wide audience. Presenters from the first two days who
wish to make an additional public session presentation may do so.

SUBMISSION DETAILS

Presentations must be performed by one of the active developers on the
project. That's the rule -- no code, no mike. Multiple people may be
involved in a presentation. You do get in free if you're part of a
presentation even if you don't speak during it, so creativity (within
reason) is encouraged.

The workshop language is English, for both presentations and papers.

Ideally, demonstrations should be usable by attendees with 802.11b
connected devices either via a web interface, or locally on Windows,
UNIX-like, or MacOS platforms. Cross-platform applications are most
desirable.

Our venue may be 21+. If you are submitting and are under 21, please
advise the program committee; we may consider alternate venues for one or
more days of the event. If you have a specific day on which you would
prefer to present, please advise us.

Main workshop submissions should include in the plain-text body of email
to [EMAIL PROTECTED] the following information:

 - Name of presenter
 - Name of others involved in project attending conference
 - Title of presentation
 - Brief summary of topic
 - URL or attachment of example code
   (must be received by the final submission deadline)
 - Brief project history
 - Brief summary of demo, or abstract of paper
 - Any other details considered relevant

Public session submissions should include in the plain-text body of email
to [EMAIL PROTECTED] the following information:

   - Name of presenter
   - Title of presentation
   - Brief summary of topic
   - URL or attachment with example code
   - Any other details

PROGRAM COMMITTEE

   Bram Cohen, BitTorrent
   Dan Egnor, ofb.net
   Jered Floyd, Permabit
   Ian Grigg, Systemics
   Ryan Lackey, HavenCo
   Don Marti, LinuxJournal
   Guido Sanchez, New Hack City
   Bill Stewart, ATT
   Brandon Wiley, Freenet
   Jamie Zawinski, DNA Lounge

COSTS

Recognizing that many of the developers of the most interesting cypherpunk
applications are unable to afford accommodations and other expenses in San
Francisco, CodeCon will attempt to locate housing and otherwise assist
with issues for presenters on a case-by-case basis. Please contact
[EMAIL PROTECTED] if your submission is accepted but you require
assistance to attend.

SPONSORSHIP

If your organization is interested in sponsoring CodeCon, we would love to
hear from you. In particular, we are looking for sponsors for social meals
and parties on any of the three days of the conference, as well as
sponsors of the conference as a whole, prizes or awards for quality
presentations, and assistance with transportation or accommodation for
presenters with limited resources. If you might be interested in
sponsoring any of these aspects, please contact the conference organizers
at [EMAIL PROTECTED]

QUESTIONS

If you have questions about CodeCon, or would like to contact the
organizers, please mail [EMAIL PROTECTED] Please note this
address is only for questions and administrative requests, and not for
workshop presentation submissions.

- -- 
Karsten M. Self [EMAIL PROTECTED]http://kmself.home.netcom.com/
 What part of Gestalt don't you understand?  Home of the brave
  http://gestalt-system.sourceforge.net/Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA!  http://www.freesklyarov.org
Geek for Hire  http://kmself.home.netcom.com/resume.html
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http

Re: MIME-encoded PGP / GPG signatures (again)

2001-09-26 Thread Karsten M. Self

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

on Wed, Sep 26, 2001 at 01:24:44PM -0700, Meyer Wolfsheim ([EMAIL PROTECTED]) wrote:

...

 For the most part, Mutt is an excellent email client. However, I'm
 actually going to correct myself, and say that it *is* Mutt that doesn't
 play well with others in this case. I have no problem with Mutt favoring
 RFC 2015/3156 for PGP handling. As someone else recently pointed out on
 one of the GnuPG lists, the flaw is in Mutt's inability to do normal PGP
 messages.

What's normal PGP messages?

There is an option to clearsign by default.  I've elected not to do
this.

Peace.

- -- 
Karsten M. Self [EMAIL PROTECTED]http://kmself.home.netcom.com/
 What part of Gestalt don't you understand?  Home of the brave
  http://gestalt-system.sourceforge.net/Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA!  http://www.freesklyarov.org
Geek for Hire  http://kmself.home.netcom.com/resume.html
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE7skPmOEeIn1XyubARAg7WAJ9/iuaFoqSYcKjmp5SagNADWYx2EwCeJty9
abqIir0y+FgzH56WyAcjRww=
=l8hU
-END PGP SIGNATURE-




Re: Democracy is our enemy

2001-09-25 Thread Karsten M. Self

on Tue, Sep 25, 2001 at 03:22:34AM -, Anonymous ([EMAIL PROTECTED])
wrote:
 Thomas Leavitt writes:

 There was an article the other day about the terrorists, which made
 the point that capitalism and fundamentalism were much alike, in that
 both share a distrust of democracy.

I can think of a number of differences as well.

 The same can be said for the cypherpunks.  No wonder that so many here
 have expressed vitriolic criticism of the U.S. government response
 (which has been almost zero), while there has been little mention of
 the horrific evil of the terrorist acts themselves.

As trolls go, about a 6.5.

Terrorists are not in a direct position to deprive us of rights to
privacy, free speech, encryption, and computing platforms.  Should their
cause prevail I've no doubt access to such freedoms would be far starker
than under any regime pledged to the US Constitution, with little
recourse for appeal.

There is little on-charter discussion possible of the terrorists.  There
may be speculation of methods they did (or didn't) use.  Outcomes of
their actions are going to generally be abhorred.

The response of the US and other govnerments worldwide is a different
issue.  These are largely institutions of or answerable to their
peoples.  There's also a long tradition in democratic (both proper
democracies and republican governments) political experience of making
rash decisions, often curtailing the freedoms of democracy.

I see no problem with focussing discussion on these matters.

 The philosophical connection becomes even clearer with the frequent
 statements by cypherpunks that those who disagree need killing,

IMVAO we're cut from manifold different weaves of cloth.  None of us
speaks for all, self included.

Peace.

--
Karsten M. Self [EMAIL PROTECTED]http://kmself.home.netcom.com/
 What part of Gestalt don't you understand?  Home of the brave
  http://gestalt-system.sourceforge.net/Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA!  http://www.freesklyarov.org
Geek for Hire  http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: Expectation of privacy in public?

2001-09-24 Thread Karsten M. Self

on Mon, Sep 24, 2001 at 07:16:03AM +0200, Anonymous
([EMAIL PROTECTED]) wrote:
 For the lawyers and lawyer larvae out there...

 In an article in the San Francisco Bay Guardian this week, there is an
 article about MUNI's policy of making audio recordings of passengers.

 quote
 Nathan Ballard of the City Attorney's Office told the Bay Guardian that
 they were well aware of the policy and approved it. There are no
 expectations of privacy in public, he said. Ballard asserted that the
 policy was constitutional and did not fall under any wiretapping laws.
 When asked if all of the vehicles that employ this surveillance policy
 post signs to inform passengers that their conversations are being
 recorded, he said, This policy does not require signs.
 /quote

 Frankly, if I'm sitting in the back of an empty bus, talking to the person
 next to me, it's my opinion that there certainly is a reasonable expection
 of privacy. Does anyone more qualified than I care to tell me why I'm
 right or wrong?

Jeffrey Rosen's _The Unwanted Gaze:  the destruction of privacy in
America_ is a good general read on this topic, and is generally
recommended.

It doesn't cover the issue of privacy in public in depth, though the
issue is really more one of moving anonymously (or at least largely
unrecorded) through public spaces.

Rosen does discuss privacy at home and at work, and in cyberspace.  The
index doesn't specifically list public spaces, though there's some
discussion of anonymity.  Brandeis and Warren wrote a law review article
in 1890 in the _Harvard Law Review_.

Rosen does touch on expectations of privacy in public spaces:

In _The Unbearable Lightness of Being, Milan Kundera describes how
the police destroyed an important figure of the Prague Spring by
recording his conversations with a friend and then broadcasting them
as a radio serial.

The other interesting discussion is of the Olmstead case (the original
wiretap case).

I would raise objections on the basis of the Fourth and Forteenth
Amendments.

Peace.

--
Karsten M. Self [EMAIL PROTECTED]http://kmself.home.netcom.com/
 What part of Gestalt don't you understand?  Home of the brave
  http://gestalt-system.sourceforge.net/Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA!  http://www.freesklyarov.org
Geek for Hire  http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: CDR Anonymizer cpunks_anon@einstein.ssz.com ?

2001-09-23 Thread Karsten M. Self

on Sun, Sep 23, 2001 at 12:23:27AM -0700, Tim May ([EMAIL PROTECTED]) wrote:
 On Saturday, September 22, 2001, at 11:44 PM, Karsten M. Self wrote:

  IF you are a United States Citizen or Resident and YOU HAVE SUFFERED
  A FINANCIAL LOSS write Financial Loss - Contact Me ASAP on the
  documents you have received and Fax them to the Task Force at
  202-406-6930 and give Your telephone number(s).  A Secret Service
  Agent will call you back as soon as possible to discuss the matter
  with you (don't worry, you're Not in any trouble).

 Or you can just use the Short Form:

 I'm a greedy fool ...

...neatly sidestepping the fact that fraud is a crime, stupidity isn't.

Relevance, please.

--
Karsten M. Self [EMAIL PROTECTED]http://kmself.home.netcom.com/
 What part of Gestalt don't you understand?  Home of the brave
  http://gestalt-system.sourceforge.net/Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA!  http://www.freesklyarov.org
Geek for Hire  http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: CDR Anonymizer cpunks_anon@einstein.ssz.com ?

2001-09-23 Thread Karsten M. Self

on Sat, Sep 22, 2001 at 08:32:46PM -0700, CDR Anonymizer
([EMAIL PROTECTED]) wrote:
 The cypherpunks list received yet another copy of the
 Nigerian Corrupt Official's Bank Account scam spam.
 No surprise, though lne.com's filters usually block them.
 The interesting thing was that this claims to be sent by the
  CDR Anonymizer [EMAIL PROTECTED]

FYI, info on the scam.  This is the tenth instance I've seen this year.

Please feel free to distribute the following if you encounter the scam
on other NGs or mailing lists.

I've compiled a set of rants (frequently repeated essays/posts) at

http://kmself.home.netcom.com/Download/rant-o-matic.tar.gz


This is an example of the Nigerian Scam, also called 419 Letters, or
just plain 419.  Most 419 letters and emails originate from or are
traceable back to Nigeria. However, some originate from other nations,
mostly also West African nations such as Ghana, Togo, Liberia, Sierra
Leone, Ivory Coast ( Cote D'Ivoire ) etc.

It's the current wrinkle of a decades-old scam that nets tens of
millions of dollars per year, and may be the third largest industry in
Nigeria.  The 419 Coalition believes that it is the elites from which
successive governments of Nigeria have been drawn who are the scammers.
Expect little cooperation from Nigerian authorities.

Information in this notice is compiled from various sources, links
below.  Keep reading for reporting information.


The Scam operates as follows: the target receives an unsolicited fax,
email, or letter concerning Nigeria containing either a money laundering
or other illegal proposal OR you may receive a Legal and Legitimate
business proposal by normal means.  Invariably, the proposition involves
resources which are somehow locked up:  oil or other invoice problems, a
bequest, money cleaning, or misallocated funds.

At some point, the victim is asked to pay up front an Advance Fee of
some sort.  If the victim pays the Fee, there are many Complications
which require still more advance payments until the victim either quits,
runs out of money, or both.


To report the scam:

If you are a United States Citizen or Resident and have suffered NO
Financial Loss, write No Financial Loss - For Your Database on the
documents you received and Fax them to the US Secret Service Task
Force handling Scam matters at 202-406-6930.

Documents may be emailed to

mailto:[EMAIL PROTECTED]?subject: No Loss -- 419 Scam

IF you are a United States Citizen or Resident and YOU HAVE SUFFERED
A FINANCIAL LOSS write Financial Loss - Contact Me ASAP on the
documents you have received and Fax them to the Task Force at
202-406-6930 and give Your telephone number(s).  A Secret Service
Agent will call you back as soon as possible to discuss the matter
with you (don't worry, you're Not in any trouble).

(Above from http://home.rica.net/alphae/419coal/index.htm)

Other countries have their own reporting methods, see above for more
info.


Additional information:

Google search:
http://www.google.com/search?q=nigeria+scam

Federal Republic of Nigeria, Embassy:
http://www.embassy.org/embassies/ng.html

Sierra Leone:  Nigerian 419 Scam:
http://www.sierra-leone.org/scams.html

Sample letters are archives as no's 01 - 33:
http://www.sierra-leone.org/scam01.html -
http://www.sierra-leone.org/scam33.html

Nigeria Scam Letter Archive
http://www.scamorama.com/

Nigeria - The 419 Coalition Website
http://home.rica.net/alphae/419coal/index.htm

U.S. Postal Authorities crack down on Nigerian Spam
http://www.usps.gov/websites/depart/inspect/pressrel.htm

Nigeria - The 419 Coalition Website
http://home.rica.net/alphae/419coal/index.htm

Urban Legends:  Nigerian Scam
http://www.snopes2.com/inboxer/scams/nigeria.htm

Salon: I crave your distinguished indulgence (and all your cash)
http://www.salon.com/people/feature/2001/08/07/419scams/print.html

Nigerian 419 Scam Game Over!
http://home.pacbell.net/jpaladin/
Book describes how the scam plays out.

Thank you.

Peace.

--
Karsten M. Self [EMAIL PROTECTED]http://kmself.home.netcom.com/
 What part of Gestalt don't you understand?  Home of the brave
  http://gestalt-system.sourceforge.net/Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA!  http://www.freesklyarov.org
Geek for Hire  http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




419 letter (was Re: CDR Anonymizer cpunks_anon@einstein.ssz.com ?)

2001-09-23 Thread Karsten M. Self

on Sun, Sep 23, 2001 at 07:35:58AM -0400, Steve Furlong ([EMAIL PROTECTED]) wrote:
 Karsten M. Self wrote:
 
  ...neatly sidestepping the fact that fraud is a crime, stupidity isn't.
 
 Stupidity _is_ a natural crime. Mommy states have attempted to repeal
 that law, but succeed mainly in redirecting the costs of stupidity from
 the stupid to society as a whole.

Oh.  So it *is* legitmate to swindle senile dowagers of their
investments?

Interesting sidelight of my 419 research:  one likely target are Utah
Mormans:

  - Helpful intentions.
  - Not averse to making a buck.
  - Highly insulated from the real world.

Peace.

-- 
Karsten M. Self [EMAIL PROTECTED]http://kmself.home.netcom.com/
 What part of Gestalt don't you understand?  Home of the brave
  http://gestalt-system.sourceforge.net/Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA!  http://www.freesklyarov.org
Geek for Hire  http://kmself.home.netcom.com/resume.html

 PGP signature


(off-list) Re: Cypherpunks List Info

2001-09-23 Thread Karsten M. Self

on Sun, Sep 23, 2001 at 08:00:00PM -0700, [EMAIL PROTECTED] ([EMAIL PROTECTED]) wrote:
 Cypherpunks Distributed Remailers list info.
 
 Last updated: 8/22/01
 
 This message is also available at http://www.lne.com/cpunk
 
 Instructions on unsubscribing from the list can be found below.
 
 The Cypherpunks list is a mailing list for discussing cryptography and
 its effect on soceity.  It is not a moderated list (but see exceptions
^^^
sp: society.

Peace.

-- 
Karsten M. Self [EMAIL PROTECTED]http://kmself.home.netcom.com/
 What part of Gestalt don't you understand?  Home of the brave
  http://gestalt-system.sourceforge.net/Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA!  http://www.freesklyarov.org
Geek for Hire  http://kmself.home.netcom.com/resume.html

 PGP signature


Re: Preparedness (ultralight attack on statue of liberty)

2001-09-23 Thread Karsten M. Self

on Sat, Sep 22, 2001 at 08:08:06AM -0700, David Honig ([EMAIL PROTECTED])
wrote:
 At 09:45 PM 9/21/01 -0700, Tim May wrote:
 Any attack with VX or similar nerve gas would kill tens of thousands
 fairly quickly. Gas masks of no use, due to lack of coverage of all
 exposed skin, and leakage. Gas masks mainly useful for mustard gas, that
 sort of thing.

 Leakage yes, but I think a lot of people get sick or die (eg in a
 subway attack) because of inhaling the gas phase.  Of course if you
 touch the liquid you're toast.  I'd think an alkali decontaminizing
 layer in the filter would help with the nerve agents.

You fail to understand.

Nerve gas is absorbed through the skin.  A containment suit is required,
a gas mask, alkali or otherwise, is worthless of itself.

Peace.

--
Karsten M. Self [EMAIL PROTECTED]http://kmself.home.netcom.com/
 What part of Gestalt don't you understand?  Home of the brave
  http://gestalt-system.sourceforge.net/Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA!  http://www.freesklyarov.org
Geek for Hire  http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: PGP author under fire for terrorist use of crypto

2001-09-21 Thread Karsten M. Self

on Fri, Sep 21, 2001 at 01:12:27PM -0400, Matthew Gaylor ([EMAIL PROTECTED])
wrote:
 Date: Fri, 21 Sep 2001 12:57:18 -0400 (EDT)
 From: Craig Phillips [EMAIL PROTECTED]
 To: Matthew Gaylor [EMAIL PROTECTED]
 Subject: PGP author under fire for terrorist use of crypto

 Matt:

 Don't know if this is of interest or not.  It appears that Phil Zimmermann
 is taking heat directly over the whole crypto - terrorist thing.

 Details at:

 http://www.washingtonpost.com/wp-dyn/articles/A1234-2001Sep20.html

Terrorism is the art of what's now known as asymmetric warfare.  It
uses the enemy's own strengths against itself.  With the very barest of
resources:  a few score operatives, basic training, minimal
communications.  It can achieve impressive amounts of damage,
particularly against soft targets, taken unawares.

My own assessment of 9/11 is that the attacks were likely only 1/3 to
1/4 effective.  Three of four known aircraft reached their targets.  A
fourth was disabled by an unarmed, unprepared, civilian force.
Appearances are that another two to four aircraft were originally
planned to be involveed in the attacks, as well as other possible
incidents based on other modalities.

The truth is that within an hour of the initial incidents, the country
was on a war footing.  Stories now indicate that Air Force fighter
intercepts were scrambled against the two planes targeted for the WTC
and were 12 minutes from intercept at the time of the attacks.
Shoot-to-kill appears to have been ordered against Flight 93.  Warnings
are now circulating for possible incidents on Saturday.

Our resources were used against us:  aircraft, freedoms, communications
networks, cars, highways.  Crypto is yet another tool.  It may be used
for good or evil, and in balance I suspect it does far more good than
otherwise.

Phil has no more cause than any of the rest of us to feel regret.

Peace.

--
Karsten M. Self [EMAIL PROTECTED]http://kmself.home.netcom.com/
 What part of Gestalt don't you understand?  Home of the brave
  http://gestalt-system.sourceforge.net/Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA!  http://www.freesklyarov.org
Geek for Hire  http://kmself.home.netcom.com/resume.html

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: Pentagon said to eye nuclear attack against terrorists

2001-09-20 Thread Karsten M. Self

on Thu, Sep 20, 2001 at 11:14:08PM -0500, Jim Choate ([EMAIL PROTECTED]) wrote:
 http://www.japantimes.co.jp/cgi-bin/getarticle.pl5?nn20010920a6.htm

Speculation intended for third-party consumption, largely in the
vicinity of 44.500 E, 33.300 N.

-- 
Karsten M. Self [EMAIL PROTECTED]http://kmself.home.netcom.com/
 What part of Gestalt don't you understand?  Home of the brave
  http://gestalt-system.sourceforge.net/Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA!  http://www.freesklyarov.org
Geek for Hire  http://kmself.home.netcom.com/resume.html

 PGP signature