Re: Wikipedia Tor

2005-09-30 Thread Morlock Elloi
 But now we're back to the question: how can Tor be improved to deal with
 this very serious and important problem?  What are the steps that might
 be taken, however imperfect, to reduce the amount of abuse coming from
 Tor nodes?

That's trivial: charge Tor-originated users for editing. That 0.0001% (all
three of them) that actually contributes to Wikipedia will be resourceful
enough to create untraceable payment accounts.



end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__ 
Yahoo! Mail - PC Magazine Editors' Choice 2005 
http://mail.yahoo.com



Re: Wikipedia Tor

2005-09-29 Thread Morlock Elloi
 But now we're back to the question: how can Tor be improved to deal with
 this very serious and important problem?  What are the steps that might
 be taken, however imperfect, to reduce the amount of abuse coming from
 Tor nodes?

That's trivial: charge Tor-originated users for editing. That 0.0001% (all
three of them) that actually contributes to Wikipedia will be resourceful
enough to create untraceable payment accounts.



end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__ 
Yahoo! Mail - PC Magazine Editors' Choice 2005 
http://mail.yahoo.com



spoofing for dyslexic

2005-05-07 Thread Morlock Elloi
Just a tiny interesting operation found out via routine misspelling that can
breed paranoia in idle minds:

sprint has smtp to SMS gateway for its customers running at
messaging.sprintpcs.com, so if you e-mail to 
[EMAIL PROTECTED] the user gets message on the phone.


Interestingly enough, there is also valid domain messaging.sprintpsc.com (note
the swapped last two letters) that resolves to no less than 8 IP addresses.
Someone wants it really reliable:

Addresses:  69.25.27.171, 66.150.161.141, 69.25.27.170, 69.25.27.172
  66.150.161.133, 66.150.161.140, 66.150.161.134, 66.150.161.136

sprintpsc.com is operated by po-box identified entity:

Registrant:
 Acme Mail
 Box 455
 Miami, FL 33265
 US
 305-201-4774 
 

and of course messages sent to [EMAIL PROTECTED] do not
end up on sprint's subscriber handset.

Could be completely coincidental, of course.





end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



Discover Yahoo! 
Find restaurants, movies, travel and more fun for the weekend. Check it out! 
http://discover.yahoo.com/weekend.html 



Re: [IP] Google's Web Accelerator is a big privacy risk (fwd from dave@farber.net)

2005-05-06 Thread Morlock Elloi
 Google cookies last as long as possible -- until 2038.  If you've

And you are allowing cookies because ... ?

And you are keeping cookies past the session because ... ?


Too lazy not to?

To lazy to login again?

Inherent belief that commercial entity should make your life easy for purely
philantropical reasons?

Just plain dumb?





end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__ 
Yahoo! Mail Mobile 
Take Yahoo! Mail with you! Check email on your mobile phone. 
http://mobile.yahoo.com/learn/mail 



spoofing for dyslexic

2005-05-06 Thread Morlock Elloi
Just a tiny interesting operation found out via routine misspelling that can
breed paranoia in idle minds:

sprint has smtp to SMS gateway for its customers running at
messaging.sprintpcs.com, so if you e-mail to 
[EMAIL PROTECTED] the user gets message on the phone.


Interestingly enough, there is also valid domain messaging.sprintpsc.com (note
the swapped last two letters) that resolves to no less than 8 IP addresses.
Someone wants it really reliable:

Addresses:  69.25.27.171, 66.150.161.141, 69.25.27.170, 69.25.27.172
  66.150.161.133, 66.150.161.140, 66.150.161.134, 66.150.161.136

sprintpsc.com is operated by po-box identified entity:

Registrant:
 Acme Mail
 Box 455
 Miami, FL 33265
 US
 305-201-4774 
 

and of course messages sent to [EMAIL PROTECTED] do not
end up on sprint's subscriber handset.

Could be completely coincidental, of course.





end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



Discover Yahoo! 
Find restaurants, movies, travel and more fun for the weekend. Check it out! 
http://discover.yahoo.com/weekend.html 



Re: [IP] Google's Web Accelerator is a big privacy risk (fwd from dave@farber.net)

2005-05-06 Thread Morlock Elloi
 Google cookies last as long as possible -- until 2038.  If you've

And you are allowing cookies because ... ?

And you are keeping cookies past the session because ... ?


Too lazy not to?

To lazy to login again?

Inherent belief that commercial entity should make your life easy for purely
philantropical reasons?

Just plain dumb?





end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__ 
Yahoo! Mail Mobile 
Take Yahoo! Mail with you! Check email on your mobile phone. 
http://mobile.yahoo.com/learn/mail 



zombied ypherpunks (Re: Email Certification?)

2005-04-28 Thread Morlock Elloi
 I'm still having trouble understanding your threat model.

Just assume braindeath and it becomes obvious.

No tla with any dignity left would bother e-mail providers or try to get your
password. All it need to do is fill gforms and get access to tapped traffic at
major nodes (say, 20 in US is sufficient?). Think packet reassembly - filter
down - store everything forever - google on demand.

Concerned about e-mail privacy? There is this obscure software called 'PGP',
check it out. Too complicated? That's the good thing about evolution, not
everyone makes it.



end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 



Re: DTV Content Protection

2005-04-11 Thread Morlock Elloi
This very likely means that someone already has MM figured out; the question is
not whether it will be revealed, but when.


 

 All of these attacks focus on finding the master secret MM value; once
 that is found, the security of the system collapses.  Given a KSV it is
 immediately possible to deduce the corresponding private key if you know
 the MM.  Although both HDCP and DTCP have mechanisms for revocations of
 cracked keys, a total break like this cannot be rescued by revocation.


end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__ 
Do you Yahoo!? 
Yahoo! Small Business - Try our new resources site!
http://smallbusiness.yahoo.com/resources/



RE: What Will We Do With Innocent People's DNA?

2005-03-23 Thread Morlock Elloi
The simplest solution is to systematically spread one's DNA everywhere, thus
making 'discovery' of it meaningless.



end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__ 
Do you Yahoo!? 
Yahoo! Mail - now with 250MB free storage. Learn more. 
http://info.mail.yahoo.com/mail_250



RE: What Will We Do With Innocent People's DNA?

2005-03-23 Thread Morlock Elloi
The simplest solution is to systematically spread one's DNA everywhere, thus
making 'discovery' of it meaningless.



end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__ 
Do you Yahoo!? 
Yahoo! Mail - now with 250MB free storage. Learn more. 
http://info.mail.yahoo.com/mail_250



Re: [p2p-hackers] good-bye, Mnet, and good luck. I'm going commercial! plus my last design doc (fwd from zooko@zooko.com)

2005-03-13 Thread Morlock Elloi
 If you want to be invisible to lawyers, you have to use something else.

Whoever wants to design something 'else' should first see Monty Python's How
not to be seen sketch (or was it Importance of not being seen ?)

It applies pretty well to all current techniques for moving unpaid copyrighted
content.



end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__ 
Do you Yahoo!? 
Make Yahoo! your home page 
http://www.yahoo.com/r/hs



Re: [p2p-hackers] good-bye, Mnet, and good luck. I'm going commercial! plus my last design doc (fwd from zooko@zooko.com)

2005-03-11 Thread Morlock Elloi
 If you want to be invisible to lawyers, you have to use something else.

Whoever wants to design something 'else' should first see Monty Python's How
not to be seen sketch (or was it Importance of not being seen ?)

It applies pretty well to all current techniques for moving unpaid copyrighted
content.



end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__ 
Do you Yahoo!? 
Make Yahoo! your home page 
http://www.yahoo.com/r/hs



But does it pass Diehard?

2005-02-15 Thread Morlock Elloi
Apologies for introducing crypto-related stuff: 

RNG that reads minds and predicts future:


http://www.rednova.com/news/display/?id=126649



Can This Black Box See Into the Future?

DEEP in the basement of a dusty university library in Edinburgh lies a
small black box, roughly the size of two cigarette packets side by side,
that churns out random numbers in an endless stream.

At first glance it is an unremarkable piece of equipment. Encased in
metal, it contains at its heart a microchip no more complex than the
ones found in modern pocket calculators.

But, according to a growing band of top scientists, this box has quite
extraordinary powers. It is, they claim, the 'eye' of a machine that
appears capable of peering into the future and predicting major world
events.

The machine apparently sensed the September 11 attacks on the World
Trade Centre four hours before they happened - but in the fevered mood
of conspiracy theories of the time, the claims were swiftly knocked back
by sceptics. But last December, it also appeared to forewarn of the
Asian tsunami just before the deep sea earthquake that precipitated the
epic tragedy.

Now, even the doubters are acknowledging that here is a small box with
apparently inexplicable powers.

'It's Earth-shattering stuff,' says Dr Roger Nelson, emeritus researcher
at Princeton University in the United States, who is heading the
research project behind the 'black box' phenomenon.

'We're very early on in the process of trying to figure out what's going
on here. At the moment we're stabbing in the dark.' Dr Nelson's
investigations, called the Global Consciousness Project, were originally
hosted by Princeton University and are centred on one of the most
extraordinary experiments of all time. Its aim is to detect whether all
of humanity shares a single subconscious mind that we can all tap into
without realising.

And machines like the Edinburgh black box have thrown up a tantalising
possibility: that scientists may have unwittingly discovered a way of
predicting the future.

Although many would consider the project's aims to be little more than
fools' gold, it has still attracted a roster of 75 respected scientists
from 41 different nations. Researchers from Princeton - where Einstein
spent much of his career - work alongside scientists from universities
in Britain, the Netherlands, Switzerland and Germany. The project is
also the most rigorous and longest-running investigation ever into the
potential powers of the paranormal.

'Very often paranormal phenomena evaporate if you study them for long
enough,' says physicist Dick Bierman of the University of Amsterdam.
'But this is not happening with the Global Consciousness Project. The
effect is real. The only dispute is about what it means.' The project
has its roots in the extraordinary work of Professor Robert Jahn of
Princeton University during the late 1970s. He was one of the first
modern scientists to take paranormal phenomena seriously. Intrigued by
such things as telepathy, telekinesis - the supposed psychic power to
move objects without the use of physical force - and extrasensory
perception, he was determined to study the phenomena using the most
up-to-date technology available.

One of these new technologies was a humble-looking black box known was a
Random Event Generator (REG). This used computer technology to generate
two numbers - a one and a zero - in a totally random sequence, rather
like an electronic coin-flipper.

The pattern of ones and noughts - 'heads' and 'tails' as it were - could
then be printed out as a graph. The laws of chance dictate that the
generators should churn out equal numbers of ones and zeros - which
would be represented by a nearly flat line on the graph. Any deviation
from this equal number shows up as a gently rising curve.

During the late 1970s, Prof Jahn decided to investigate whether the
power of human thought alone could interfere in some way with the
machine's usual readings. He hauled strangers off the street and asked
them to concentrate their minds on his number generator. In effect, he
was asking them to try to make it flip more heads than tails.

It was a preposterous idea at the time. The results, however, were
stunning and have never been satisfactorily explained.

Again and again, entirely ordinary people proved that their minds could
influence the machine and produce significant fluctuations on the graph,
'forcing it' to produce unequal numbers of 'heads' or 'tails'.

According to all of the known laws of science, this should not have
happened - but it did. And it kept on happening.

Dr Nelson, also working at Princeton University, then extended Prof
Jahn's work by taking random number machines to group meditations, which
were very popular in America at the time. Again, the results were
eyepopping. The groups were collectively able to cause dramatic shifts
in the patterns of numbers.

From then on, Dr Nelson was hooked.

Using the internet, he connected up 40 

(un)intended anonymity feature of gmail

2004-10-13 Thread Morlock Elloi
Unless I'm missing something obvious, it seems impossible to divine the
origination IP address from gmail-sourced e-mail headers. The first IP (the
last header) has 10.*.*.* form and is of course internal to google.

This is not the case with any other e-mail service I know of (mixmaster
excluded), the real originating IP is always included.

So the recipient of gmail message has no way of determining what the sender's
real IP is.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



___
Do you Yahoo!?
Declare Yourself - Register online to vote today!
http://vote.yahoo.com



Re: Remailers an unsolveable paradox?

2004-09-01 Thread Morlock Elloi
 What are the possible solutions for the remailers? Make all
 remailers middleman only and adding the ability to opt-in for

Open wireless access points. 

No one said you are entitled to mail anonymously from the comfort of your
home/office. Stop whining.




=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:




__
Do you Yahoo!?
New and Improved Yahoo! Mail - 100MB free storage!
http://promotions.yahoo.com/new_mail 



Re: Remailers an unsolveable paradox?

2004-09-01 Thread Morlock Elloi
 What are the possible solutions for the remailers? Make all
 remailers middleman only and adding the ability to opt-in for

Open wireless access points. 

No one said you are entitled to mail anonymously from the comfort of your
home/office. Stop whining.




=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:




__
Do you Yahoo!?
New and Improved Yahoo! Mail - 100MB free storage!
http://promotions.yahoo.com/new_mail 



Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Morlock Elloi
 A cool thing for this purpose could be a patch for gcc to produce unique 
 code every time, perhaps using some of the polymorphic methods used by 
 viruses.

The purpose would be that they do not figure out that you are using some
security program, so they don't suspect that noise in the file or look for
stego, right?

The last time I checked the total number of PDA programs ever offered to public
in some way was around 10,000 (5,000 ? 100,000 ? Same thing.) That can be
trivially checked for. Any custom-compiled executable will stand out as a sore
thumb.

You will suffer considerably less bodily damage inducing you to spit the
passphrase than to produce the source and the complier.

Just use the fucking PGP. It's good for your genitals.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__
Do you Yahoo!?
Yahoo! Mail - 50x more storage than other providers!
http://promotions.yahoo.com/new_mail



Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Morlock Elloi
 A cool thing for this purpose could be a patch for gcc to produce unique 
 code every time, perhaps using some of the polymorphic methods used by 
 viruses.

The purpose would be that they do not figure out that you are using some
security program, so they don't suspect that noise in the file or look for
stego, right?

The last time I checked the total number of PDA programs ever offered to public
in some way was around 10,000 (5,000 ? 100,000 ? Same thing.) That can be
trivially checked for. Any custom-compiled executable will stand out as a sore
thumb.

You will suffer considerably less bodily damage inducing you to spit the
passphrase than to produce the source and the complier.

Just use the fucking PGP. It's good for your genitals.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__
Do you Yahoo!?
Yahoo! Mail - 50x more storage than other providers!
http://promotions.yahoo.com/new_mail



Re: On what the NSA does with its tech

2004-08-05 Thread Morlock Elloi
The impracticability of breaking symmetric ciphers is only a
comparatively small part of the overall problem.

I see that it can be done only by brute farce myth is live and well.

Hint: all major cryptanalytic advances, where governments broke a cypher and
general public found out few *decades* later were not of brute-force kind.

And if anyone thinks today's hobby/private cryptographers are any smarter (in a
relative way) or more intelligent than their counterparts of 100 or 50 years
ago (that were in dark for decades) ... well, you are an idiot.

Today's crypto will be regarded in 2050 as Enigmas are regarded today.
Development does not stop in any particular period just because you live in it
and assume you're entitled to absolute knowledge.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__
Do you Yahoo!?
Yahoo! Mail - 50x more storage than other providers!
http://promotions.yahoo.com/new_mail



Re: On what the NSA does with its tech

2004-08-04 Thread Morlock Elloi
The impracticability of breaking symmetric ciphers is only a
comparatively small part of the overall problem.

I see that it can be done only by brute farce myth is live and well.

Hint: all major cryptanalytic advances, where governments broke a cypher and
general public found out few *decades* later were not of brute-force kind.

And if anyone thinks today's hobby/private cryptographers are any smarter (in a
relative way) or more intelligent than their counterparts of 100 or 50 years
ago (that were in dark for decades) ... well, you are an idiot.

Today's crypto will be regarded in 2050 as Enigmas are regarded today.
Development does not stop in any particular period just because you live in it
and assume you're entitled to absolute knowledge.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__
Do you Yahoo!?
Yahoo! Mail - 50x more storage than other providers!
http://promotions.yahoo.com/new_mail



Nice pussy (was Re: [IP] more on more on E-mail intercept ruling - good grief!! )

2004-07-03 Thread Morlock Elloi
 If VOIP gets no protection, then you'll see a lot of digital bugs in

Protection of bits by legislation ???

Why is this a subject ? If you don't encrypt you will be listened to. Who the
fuck cares if intercept is legal or not. That is irrelevant. It's like trying
to obsolete summer clothing by making it illegal to watch pussies and dicks.
And the discussion about it is similarly moronic.

In olde times cypherpunks would applaud lack of legal bit protection as it
stimulates sheeple to encrypt more. I mean wear panties.




=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__
Do you Yahoo!?
Yahoo! Mail - 50x more storage than other providers!
http://promotions.yahoo.com/new_mail



Nice pussy (was Re: [IP] more on more on E-mail intercept ruling - good grief!! )

2004-07-02 Thread Morlock Elloi
 If VOIP gets no protection, then you'll see a lot of digital bugs in

Protection of bits by legislation ???

Why is this a subject ? If you don't encrypt you will be listened to. Who the
fuck cares if intercept is legal or not. That is irrelevant. It's like trying
to obsolete summer clothing by making it illegal to watch pussies and dicks.
And the discussion about it is similarly moronic.

In olde times cypherpunks would applaud lack of legal bit protection as it
stimulates sheeple to encrypt more. I mean wear panties.




=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__
Do you Yahoo!?
Yahoo! Mail - 50x more storage than other providers!
http://promotions.yahoo.com/new_mail



Re: [IP] When police ask your name, you must give it, Supreme Court says (fwd from dave@farber.net)

2004-06-22 Thread Morlock Elloi
 incriminating, and the State has a substantial interest in knowing who you
 are -- you may need medicating, or you may owe the government money, or

Exactly ... and maybe you are on this consumer list:


http://bmj.bmjjournals.com/cgi/content/full/328/7454/1458

The president's commission found that despite their prevalence, mental
disorders often go undiagnosed and recommended comprehensive mental
health screening for consumers of all ages, including preschool
children. According to the commission, Each year, young children are
expelled from preschools and childcare facilities for severely
disruptive behaviours and emotional disorders. Schools, wrote the
commission, are in a key position to screen the 52 million students
and 6 million adults who work at the schools.

The commission also recommended Linkage [of screening] with treatment
and supports including state-of-the-art treatments using specific
medications for specific conditions. The commission commended the Texas
Medication Algorithm Project (TMAP) as a model medication treatment
plan that illustrates an evidence-based practice that results in better
consumer outcomes.


BTW, looks like designation citizen has been obsoleted by consumer.

=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__
Do you Yahoo!?
Yahoo! Mail Address AutoComplete - You start. We finish.
http://promotions.yahoo.com/new_mail 



Re: [IP] When police ask your name, you must give it, Supreme Court says (fwd from dave@farber.net)

2004-06-22 Thread Morlock Elloi
 incriminating, and the State has a substantial interest in knowing who you
 are -- you may need medicating, or you may owe the government money, or

Exactly ... and maybe you are on this consumer list:


http://bmj.bmjjournals.com/cgi/content/full/328/7454/1458

The president's commission found that despite their prevalence, mental
disorders often go undiagnosed and recommended comprehensive mental
health screening for consumers of all ages, including preschool
children. According to the commission, Each year, young children are
expelled from preschools and childcare facilities for severely
disruptive behaviours and emotional disorders. Schools, wrote the
commission, are in a key position to screen the 52 million students
and 6 million adults who work at the schools.

The commission also recommended Linkage [of screening] with treatment
and supports including state-of-the-art treatments using specific
medications for specific conditions. The commission commended the Texas
Medication Algorithm Project (TMAP) as a model medication treatment
plan that illustrates an evidence-based practice that results in better
consumer outcomes.


BTW, looks like designation citizen has been obsoleted by consumer.

=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__
Do you Yahoo!?
Yahoo! Mail Address AutoComplete - You start. We finish.
http://promotions.yahoo.com/new_mail 



Re: Low-elevation skymapping at 2.45 Ghz

2004-06-17 Thread Morlock Elloi
 However, it should be known that fiberglass (eg van) panels are
 transparent
 to uwaves AFAIK and that a van with soft tires is a 0th-order

0.25 glass will cost you 2-2.5 dB.

 At sufficiently good mechanical stabilization and gain, you will
 encounter perhaps

The best way to do this is to mount the narrow-angle dish *and* video camera on
the same mount, then use simple circuitry to superimpose white circle on the
center of the image when signal exceeds some threshold (or vary the size with
signal level.) The results could be startling.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__
Do you Yahoo!?
Take Yahoo! Mail with you! Get it on your mobile phone.
http://mobile.yahoo.com/maildemo 



Re: Low-elevation skymapping at 2.45 Ghz

2004-06-16 Thread Morlock Elloi
 However, it should be known that fiberglass (eg van) panels are
 transparent
 to uwaves AFAIK and that a van with soft tires is a 0th-order

0.25 glass will cost you 2-2.5 dB.

 At sufficiently good mechanical stabilization and gain, you will
 encounter perhaps

The best way to do this is to mount the narrow-angle dish *and* video camera on
the same mount, then use simple circuitry to superimpose white circle on the
center of the image when signal exceeds some threshold (or vary the size with
signal level.) The results could be startling.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__
Do you Yahoo!?
Take Yahoo! Mail with you! Get it on your mobile phone.
http://mobile.yahoo.com/maildemo 



Re: Palm Hack?

2004-06-05 Thread Morlock Elloi
 If there's any kind of leakage bias, then a high-powered signal might get a 
 few bits through. After that, only a Palm OS expert will know if there's 
 some kind of signal that can tease the Palm awake and then get it to swallow 
 some kind of trojan.

Bits are not marbles to exist outside receiver's experience. Bits are tokens of
agreement between sender and receiver.

If receiver (including analog PHY) is powered down/idle/inactive, it's hard to
imagine that bits could be stored in the analog capture device to be retreived
later. Actually, one bit can be stored, the Last Bit. That one is stored by
shining few watts into the receiving element, blinding it forever.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:




__
Do you Yahoo!?
Friends.  Fun.  Try the all-new Yahoo! Messenger.
http://messenger.yahoo.com/ 



Re: Palm Hack?

2004-06-04 Thread Morlock Elloi
 If there's any kind of leakage bias, then a high-powered signal might get a 
 few bits through. After that, only a Palm OS expert will know if there's 
 some kind of signal that can tease the Palm awake and then get it to swallow 
 some kind of trojan.

Bits are not marbles to exist outside receiver's experience. Bits are tokens of
agreement between sender and receiver.

If receiver (including analog PHY) is powered down/idle/inactive, it's hard to
imagine that bits could be stored in the analog capture device to be retreived
later. Actually, one bit can be stored, the Last Bit. That one is stored by
shining few watts into the receiving element, blinding it forever.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:




__
Do you Yahoo!?
Friends.  Fun.  Try the all-new Yahoo! Messenger.
http://messenger.yahoo.com/ 



Re: Satellite eavesdropping of 802.11b traffic

2004-05-27 Thread Morlock Elloi
Does anyone know whether the low-power nature of wireless LANs protects
them from eavesdropping by satellite?

GSM cell phones have been successfully tapped via sat. Power is greater (up to
.5w) but antennas are worse, so effective radiated energy is very similar, as
are frequencies.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:




__
Do you Yahoo!?
Friends.  Fun.  Try the all-new Yahoo! Messenger.
http://messenger.yahoo.com/ 



Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-24 Thread Morlock Elloi
 underground railroad would have worked better, but your still black.

Obviously you don't know about whitening properties of moder ciphers!

Seriously, today the distingushing marks among classes, tribes and castes are
far more informational than physical. So today crypto *can* make you white, or
better to say discoloured.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:




__
Do you Yahoo!?
Yahoo! Photos: High-quality 4x6 digital prints for 25¢
http://photos.yahoo.com/ph/print_splash



Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-23 Thread Morlock Elloi
 underground railroad would have worked better, but your still black.

Obviously you don't know about whitening properties of moder ciphers!

Seriously, today the distingushing marks among classes, tribes and castes are
far more informational than physical. So today crypto *can* make you white, or
better to say discoloured.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:




__
Do you Yahoo!?
Yahoo! Photos: High-quality 4x6 digital prints for 25¢
http://photos.yahoo.com/ph/print_splash



Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-22 Thread Morlock Elloi
 The extreme ease of use of internet wiretapping and lack of accountability
 is not a good situation to create.

False.

It is the best possible situation cpunk-wise I can imagine.

It effectively deals away with bs artists (those who *argue* against this or
that) and empowers mathematics. If one is so fucking stupid, lazy or both not
to encrypt, anonymize and practice other safe-sex approaches then let's hope
that whatever broad wiretapping results in will also have slight (but
measurable) pressure in factoring those out from the gene pool.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:




__
Do you Yahoo!?
Yahoo! Photos: High-quality 4x6 digital prints for 25¢
http://photos.yahoo.com/ph/print_splash



Re: Cypherpunks response to viral stimuli

2004-02-03 Thread Morlock Elloi
Can a TLA please give some sign here, any sign - just ack that you know the
list exists, otherwise the legitimacy of cpunks is definitely going down the
drain.

Looks like a Berlin wall syndrome.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free web site building tool. Try it!
http://webhosting.yahoo.com/ps/sb/



Re: WiFi Repeater?

2004-01-07 Thread Morlock Elloi
Forget about repeater.

13-15 db flat panel antenna will get you access to distant APs - up to one mile
in favourable conditions.

18db grid dish will connect you to omnidirectional AP within 2 miles.




=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! Hotjobs: Enter the Signing Bonus Sweepstakes
http://hotjobs.sweepstakes.yahoo.com/signingbonus



Re: WiFi Repeater?

2004-01-06 Thread Morlock Elloi
Forget about repeater.

13-15 db flat panel antenna will get you access to distant APs - up to one mile
in favourable conditions.

18db grid dish will connect you to omnidirectional AP within 2 miles.




=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! Hotjobs: Enter the Signing Bonus Sweepstakes
http://hotjobs.sweepstakes.yahoo.com/signingbonus



RE: The killer app for encryption

2003-12-19 Thread Morlock Elloi
 Because it means you can complete call to the POTs with no 
 company-controlled switch involved, meaning no where to serve a court 
 order.  Since the call could be routed through a few intermediate nodes and 

I see.

So, in the real world, X uses this to make telephone threats, your POTS gets
picked up by random selection as the outgoing node, and gets traced back to
from the victim's telephone, LEA visits you and you say ... I know nothing.

Yes, I can see it working and widely adopted.

Looks like someone is pumping dumbing gas into cpunks homes.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
New Yahoo! Photos - easier uploading and sharing.
http://photos.yahoo.com/



RE: The killer app for encryption

2003-12-19 Thread Morlock Elloi
 What I'd like to see is a P2P telephony that also supports end-user 
 gateways to the POTS.  I'm not certain, but I think there are some MS 

I don't get what does this have to do with crypto.

Outside crypto, this didn't quite work with (almost) public fax gateways of
'90s. In theory, you could send e-mail that would be rasterized and faxed using
gateway that was in local calling area and presumably did not incur any charge
from the local POTS monopoly.

However, I don't see people letting others use their POTS lines, nor I see them
using their own for this purpose. Yes, this would essentially eliminate long
distance charges for those so equipped ... but if A and B have these gateways
and use them, what is the chance of them not being AT the gateway (ie. not
having laptops) at any given moment - why bother using POTS in the loop in the
first place ?

VoIP companies are already doing this and the cost is quite low (calling cards)
- why bother?



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
New Yahoo! Photos - easier uploading and sharing.
http://photos.yahoo.com/



RE: The killer app for encryption

2003-12-18 Thread Morlock Elloi
 What I'd like to see is a P2P telephony that also supports end-user 
 gateways to the POTS.  I'm not certain, but I think there are some MS 

I don't get what does this have to do with crypto.

Outside crypto, this didn't quite work with (almost) public fax gateways of
'90s. In theory, you could send e-mail that would be rasterized and faxed using
gateway that was in local calling area and presumably did not incur any charge
from the local POTS monopoly.

However, I don't see people letting others use their POTS lines, nor I see them
using their own for this purpose. Yes, this would essentially eliminate long
distance charges for those so equipped ... but if A and B have these gateways
and use them, what is the chance of them not being AT the gateway (ie. not
having laptops) at any given moment - why bother using POTS in the loop in the
first place ?

VoIP companies are already doing this and the cost is quite low (calling cards)
- why bother?



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
New Yahoo! Photos - easier uploading and sharing.
http://photos.yahoo.com/



Re:Textual analysis

2003-12-16 Thread Morlock Elloi
 Its like steganalysis.  Its an arms race between measuring your own
 signatures vs. what the Adversary can measure.  If sentence length
 is a metric known to you, you can write filters that warn you.
 Similarly for the Adversary.   You end up in an arms race
 over metrics ---who has the more sensitive ones that the other
 does not control for?

But unlike stego, where the issue is faking the noise, personal fingerprints
can be removed from the message more reliably. You just need the right gloves.

One way is to use automated translators. They all have an internal language
and modules that translate to and from it. The internal language is far more
restricted than the natural one, so it doesn't leak many aspects of the
linguistic fingerprint. Going to the internal form is lossy compression.
There is no way to recreate the original.

The simplest method is an englih-to-english translator. Better method, and
thicker gloves, can be used by going through several from/to modules for
different languages. In commercial engines the meaning starts to suffer after
3-4 steps but just before that happens the word ordering and use gets
completely skewed.

Of course, you have to buy the translator and not use the online
google/babelfish access. It's the small things that get you ...



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
New Yahoo! Photos - easier uploading and sharing.
http://photos.yahoo.com/



Re:Textual analysis

2003-12-16 Thread Morlock Elloi
 Its like steganalysis.  Its an arms race between measuring your own
 signatures vs. what the Adversary can measure.  If sentence length
 is a metric known to you, you can write filters that warn you.
 Similarly for the Adversary.   You end up in an arms race
 over metrics ---who has the more sensitive ones that the other
 does not control for?

But unlike stego, where the issue is faking the noise, personal fingerprints
can be removed from the message more reliably. You just need the right gloves.

One way is to use automated translators. They all have an internal language
and modules that translate to and from it. The internal language is far more
restricted than the natural one, so it doesn't leak many aspects of the
linguistic fingerprint. Going to the internal form is lossy compression.
There is no way to recreate the original.

The simplest method is an englih-to-english translator. Better method, and
thicker gloves, can be used by going through several from/to modules for
different languages. In commercial engines the meaning starts to suffer after
3-4 steps but just before that happens the word ordering and use gets
completely skewed.

Of course, you have to buy the translator and not use the online
google/babelfish access. It's the small things that get you ...



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
New Yahoo! Photos - easier uploading and sharing.
http://photos.yahoo.com/



Re: cpunk-like meeting report

2003-12-15 Thread Morlock Elloi
 http://lists.cryptnet.net/mailman/listinfo/cpunx-news
 
 Be sure and check the archive before posting.  It is still small.

Cookies, members only archive access. Bad deal. Will not happen. Very few
consumers here.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
New Yahoo! Photos - easier uploading and sharing.
http://photos.yahoo.com/



Re: cpunk-like meeting report

2003-12-14 Thread Morlock Elloi
 http://lists.cryptnet.net/mailman/listinfo/cpunx-news
 
 Be sure and check the archive before posting.  It is still small.

Cookies, members only archive access. Bad deal. Will not happen. Very few
consumers here.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
New Yahoo! Photos - easier uploading and sharing.
http://photos.yahoo.com/



Re: Has this photo been de-stegoed?

2003-12-11 Thread Morlock Elloi
 If you spatially fft a random photo, you'll find that the image detail 
 energy largely occupies certain bands. These are not the bands that stego 
 uses (or so I assume...it really can't be otherwise). The stego-able 
 spectrum will indeed be noise, but this noise will have a certain spectrum.

There is an obvious solution here ... you don't modulate into the noise band.
You modulate the base bits. The image visibly changes but only possession of
the original can prove that. Of course, it would have to be pictures of sand,
grass, water, crowd from above.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
New Yahoo! Photos - easier uploading and sharing.
http://photos.yahoo.com/



Re: Has this photo been de-stegoed?

2003-12-10 Thread Morlock Elloi
 If you spatially fft a random photo, you'll find that the image detail 
 energy largely occupies certain bands. These are not the bands that stego 
 uses (or so I assume...it really can't be otherwise). The stego-able 
 spectrum will indeed be noise, but this noise will have a certain spectrum.

There is an obvious solution here ... you don't modulate into the noise band.
You modulate the base bits. The image visibly changes but only possession of
the original can prove that. Of course, it would have to be pictures of sand,
grass, water, crowd from above.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
New Yahoo! Photos - easier uploading and sharing.
http://photos.yahoo.com/



Re: Type III Anonymous message

2003-12-09 Thread Morlock Elloi
 Does anyone have a reasonably complete cypherpunks archive available
 for FTP?  Perhaps I could host them on my server and let Google index
 them. That might be useful.

There are only two live ones. Someone knows more ?

The second one is FTP-able:

http://groups.yahoo.com/group/cypherpunks-lne-archive/

http://lists.lab.net/archive/cypherpunks-exploder/



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
New Yahoo! Photos - easier uploading and sharing.
http://photos.yahoo.com/



Re: Type III Anonymous message

2003-12-08 Thread Morlock Elloi
 I've been wondering why I havent seen more discussion on
 wireless networking (802.11a/b/g) and anon/mix /dark nets.
 Is this a subject of interest to anyone?  I am curious what
 kinds of work has been done in this area...

Check the archives.

Wireless solves all crypto anonymity problems for the sender by making them
completely irrelevant - it provides good old physical anonymity.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
New Yahoo! Photos - easier uploading and sharing.
http://photos.yahoo.com/



Re: Type III Anonymous message

2003-12-08 Thread Morlock Elloi
 Does anyone have a reasonably complete cypherpunks archive available
 for FTP?  Perhaps I could host them on my server and let Google index
 them. That might be useful.

There are only two live ones. Someone knows more ?

The second one is FTP-able:

http://groups.yahoo.com/group/cypherpunks-lne-archive/

http://lists.lab.net/archive/cypherpunks-exploder/



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
New Yahoo! Photos - easier uploading and sharing.
http://photos.yahoo.com/



Re: Type III Anonymous message

2003-12-08 Thread Morlock Elloi
 I've been wondering why I havent seen more discussion on
 wireless networking (802.11a/b/g) and anon/mix /dark nets.
 Is this a subject of interest to anyone?  I am curious what
 kinds of work has been done in this area...

Check the archives.

Wireless solves all crypto anonymity problems for the sender by making them
completely irrelevant - it provides good old physical anonymity.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
New Yahoo! Photos - easier uploading and sharing.
http://photos.yahoo.com/



Re: FOIA Data Mining

2003-11-30 Thread Morlock Elloi
 One exception: the ***, which hand writes the address. Is 

Why do you assume that you can tell handwriting from machine-generated script?

There are techniques far more advanced than static fonts, that can introduce
randomness and be pretty much indistinguishable from the manual product.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Free Pop-Up Blocker - Get it now
http://companion.yahoo.com/



Re: e voting (receipts, votebuying, brinworld)

2003-11-25 Thread Morlock Elloi
 You might check out David Chaum's latest solution at
 http://www.vreceipt.com/, there are more details in the whitepaper:
 http://www.vreceipt.com/article.pdf

That is irrelevant. Whatever the solution is it must be understandable and
verifiable by the Standard high school dropout. Also, the trace must be
mechanical in nature and readable sans computers, as there is no reason to
trust anything that goes through gates for which one hasn't verifed masks, when
stakes are high.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Free Pop-Up Blocker - Get it now
http://companion.yahoo.com/



Re: e voting (receipts, votebuying, brinworld)

2003-11-25 Thread Morlock Elloi
 You might check out David Chaum's latest solution at
 http://www.vreceipt.com/, there are more details in the whitepaper:
 http://www.vreceipt.com/article.pdf

That is irrelevant. Whatever the solution is it must be understandable and
verifiable by the Standard high school dropout. Also, the trace must be
mechanical in nature and readable sans computers, as there is no reason to
trust anything that goes through gates for which one hasn't verifed masks, when
stakes are high.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Free Pop-Up Blocker - Get it now
http://companion.yahoo.com/



Re: Vivendi to Destroy MP3.com archive

2003-11-22 Thread Morlock Elloi
 Somebody please tell me that this is a nightmare, and I am about to
 wake up.

Let's see ... was there a contract to keep things up ad infinitum ?

This is a good step, part of waking up from the dream that there are free
things on Internet. If there is no eyeball-catching value to be derived from
offering free service the service will cease to exist. This may well happen
with free e-mail accounts as well - I wonder who will be the first to
eliminate the free service in face of diminishing advertizing revenue - Yahoo ?
Hotmail ?



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Free Pop-Up Blocker - Get it now
http://companion.yahoo.com/



Re: Vivendi to Destroy MP3.com archive

2003-11-21 Thread Morlock Elloi
 Somebody please tell me that this is a nightmare, and I am about to
 wake up.

Let's see ... was there a contract to keep things up ad infinitum ?

This is a good step, part of waking up from the dream that there are free
things on Internet. If there is no eyeball-catching value to be derived from
offering free service the service will cease to exist. This may well happen
with free e-mail accounts as well - I wonder who will be the first to
eliminate the free service in face of diminishing advertizing revenue - Yahoo ?
Hotmail ?



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Free Pop-Up Blocker - Get it now
http://companion.yahoo.com/



Re: Freedomphone

2003-11-21 Thread Morlock Elloi
 From what I've gathered from the diagrams in [1], it seems to be using
 AES-256
 in counter-mode XORed together with Twofish counter-mode output, Twofish also
 being keyed with a 256 bit value. I sense paranoia here - but being paranoid
 myself sometimes I very much welcome this decision! Those two keys are

All I'd ask for in addition is ability for both sides to type in 10-40 digit
secret key that they communicated in any way they chose, and have that XORed as
well ...


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Free Pop-Up Blocker - Get it now
http://companion.yahoo.com/



Re: Freedomphone

2003-11-20 Thread Morlock Elloi
 From what I've gathered from the diagrams in [1], it seems to be using
 AES-256
 in counter-mode XORed together with Twofish counter-mode output, Twofish also
 being keyed with a 256 bit value. I sense paranoia here - but being paranoid
 myself sometimes I very much welcome this decision! Those two keys are

All I'd ask for in addition is ability for both sides to type in 10-40 digit
secret key that they communicated in any way they chose, and have that XORed as
well ...


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Free Pop-Up Blocker - Get it now
http://companion.yahoo.com/



Re: NSA Turns To Commercial Software For Encryption

2003-10-27 Thread Morlock Elloi
Isn't it really simpler to use RSA and DH and ECC in series ? Why choose ONE ?
There is no good reason for that.

Looks like PSYOP to me.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Exclusive Video Premiere - Britney Spears
http://launch.yahoo.com/promos/britneyspears/



Re: If you use encryption, you help the terrorists win

2003-10-27 Thread Morlock Elloi
 I have a few friends like thisanyone have suggestions for ways to change
 their minds?
 
 Basically they say things like If you think the government can't break all
 the encryption schemes that we have, you're nuts.  This guy was a math major
 too, so he understands the principles of crypto.

It is impossible to rationalise long term consequences of data harvesting into
immediate threat for most people. The only way to change behaviour in absence
of the perceived threat is propaganda ... and those who have means for that
have different agendas. What's left is a personal-level propaganda but the
effects are negligible.

You can't really save anyone.

You can, however, make crypto tools that make things easier. Or surveillance
tools that make things obvious. The latter, I think, is more effective. Time to
open source Echelon ?







=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Exclusive Video Premiere - Britney Spears
http://launch.yahoo.com/promos/britneyspears/



Re: NSA Turns To Commercial Software For Encryption

2003-10-27 Thread Morlock Elloi
Isn't it really simpler to use RSA and DH and ECC in series ? Why choose ONE ?
There is no good reason for that.

Looks like PSYOP to me.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Exclusive Video Premiere - Britney Spears
http://launch.yahoo.com/promos/britneyspears/



Re: [mnet-devel] DOS in DHTs (fwd from amichrisde@yahoo.de)

2003-10-23 Thread Morlock Elloi
 ignored by citizens, but I have yet to see a license for owning a 
 typewriter or PC proposed.  They have already ruled numerous times that the 
 Internet is deserving of at least as free and access as print media and 


There are precedents. In Franko's Spain, all typewriters had to be registered
with the state, and all had serial numbers. It was illegal and punishable to
possess one without license.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
The New Yahoo! Shopping - with improved product search
http://shopping.yahoo.com



Re: [mnet-devel] DOS in DHTs (fwd from amichrisde@yahoo.de)

2003-10-20 Thread Morlock Elloi
Looks like the only way to shield from DOS is to raise the cost of DOS. This
will eventually eliminate the low cost of Internet bandwidth, one way or
another. You don't get nearly the same amount of DOS on your telephone as you
do on Internet, right ? Because telephone call is not free and/or it's
traceable.

The only question is how and where will this cost be introduced. My guess is
that it will happen on the sending side. Even today, assymmetric
cheapo-consumer connectivity makes publishing hard (as in you are not visible
to the world.) But to handle DOS is harder, as major drive  money on internet
is selling shit, and players want easy (say 800-number) access. Proposals a la
net-driving-license (NDL) indicate the trend.

NDL can happen. Compare it to the early situation with cars or guns. No
regulation in the beginning, you could buy or make your own and do as you
please. Then, when commerce began to depend on both (transport of goods and
force monopolies) they got regulated. I see no difference between that and
computer with an Internet link. NDL is a possible reality. It used to be normal
to drive or carry a weapon without license. These days, they catch you sooner
or later and beat you into pulp. Same thing. Dreaming about it not happening
will get you nowhere.

So what can be done to raise the cost of DOS without introducing NDL ? I have
no answer to this.

What kind of NDL is the least bad ?

- requirement for something that requires human effort when opening a
connection. You do want to let humans into the store, but will refuse entry to
headless drones. OK, wrong analogy. But you get the idea.

- simply raise the cost of outgoing bandwidth - add a cost to every SYN request
or equivalent (have a decent number included in the basic bandwith fee.) This
will make unsuspecting collaborators in DDoS more efficient in keeping their
equipment clean  (whoever aids  will be considered enemy combatant.)

The future doesn't seem bright. I think that there is a short window - a year
or two - in which some not-so-bad solution may preempt what They are trying to
do. But I wouldn't hold my breath. It's far more likely that EFF and other
wirehuggers will continue to be outraged (with zero effect as usual) and
clampdown on 'net access will continue.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
The New Yahoo! Shopping - with improved product search
http://shopping.yahoo.com



Re: [mnet-devel] DOS in DHTs (fwd from amichrisde@yahoo.de)

2003-10-20 Thread Morlock Elloi
Looks like the only way to shield from DOS is to raise the cost of DOS. This
will eventually eliminate the low cost of Internet bandwidth, one way or
another. You don't get nearly the same amount of DOS on your telephone as you
do on Internet, right ? Because telephone call is not free and/or it's
traceable.

The only question is how and where will this cost be introduced. My guess is
that it will happen on the sending side. Even today, assymmetric
cheapo-consumer connectivity makes publishing hard (as in you are not visible
to the world.) But to handle DOS is harder, as major drive  money on internet
is selling shit, and players want easy (say 800-number) access. Proposals a la
net-driving-license (NDL) indicate the trend.

NDL can happen. Compare it to the early situation with cars or guns. No
regulation in the beginning, you could buy or make your own and do as you
please. Then, when commerce began to depend on both (transport of goods and
force monopolies) they got regulated. I see no difference between that and
computer with an Internet link. NDL is a possible reality. It used to be normal
to drive or carry a weapon without license. These days, they catch you sooner
or later and beat you into pulp. Same thing. Dreaming about it not happening
will get you nowhere.

So what can be done to raise the cost of DOS without introducing NDL ? I have
no answer to this.

What kind of NDL is the least bad ?

- requirement for something that requires human effort when opening a
connection. You do want to let humans into the store, but will refuse entry to
headless drones. OK, wrong analogy. But you get the idea.

- simply raise the cost of outgoing bandwidth - add a cost to every SYN request
or equivalent (have a decent number included in the basic bandwith fee.) This
will make unsuspecting collaborators in DDoS more efficient in keeping their
equipment clean  (whoever aids  will be considered enemy combatant.)

The future doesn't seem bright. I think that there is a short window - a year
or two - in which some not-so-bad solution may preempt what They are trying to
do. But I wouldn't hold my breath. It's far more likely that EFF and other
wirehuggers will continue to be outraged (with zero effect as usual) and
clampdown on 'net access will continue.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
The New Yahoo! Shopping - with improved product search
http://shopping.yahoo.com



Re: Idea: Small-volume concealed data storage

2003-10-11 Thread Morlock Elloi
And what is the purpose of connecting the key and data storage in the first
place ?

Data storage is data storage, concealed or not. You feed encrypted data to/from
it.

Key is required at human interface and has absolutely nothing to do with the
storage.

If you want better security than passphrase, then you need a mechanical key
carrier. Indeed, that is where the word key comes from. You can store any
number on bits on it and you'll hand it over before they beat the shit out of
you - or  you may want to be brave and destroy it instead (trivial with
flash-on-chip and small battery cell), but, again, it has nothing to do with
storage of data.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
The New Yahoo! Shopping - with improved product search
http://shopping.yahoo.com



Re: Idea: Small-volume concealed data storage

2003-10-11 Thread Morlock Elloi
And what is the purpose of connecting the key and data storage in the first
place ?

Data storage is data storage, concealed or not. You feed encrypted data to/from
it.

Key is required at human interface and has absolutely nothing to do with the
storage.

If you want better security than passphrase, then you need a mechanical key
carrier. Indeed, that is where the word key comes from. You can store any
number on bits on it and you'll hand it over before they beat the shit out of
you - or  you may want to be brave and destroy it instead (trivial with
flash-on-chip and small battery cell), but, again, it has nothing to do with
storage of data.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
The New Yahoo! Shopping - with improved product search
http://shopping.yahoo.com



Re: EFF Report on Trusted Computing

2003-10-09 Thread Morlock Elloi
It took less than a decade for EFF to make a full turn, from championing
unrestricted uses of technology to censoring who can do what and in which way.

In this regards EFF resembles technological empires - like Cisco, for example,
that get born because of radically new ways to do things and then end up trying
to stop any further change.

At some point EFF left the course of enabling individuals and joined their
adversaries in the sense that masses should be patronized and given this or
that. Such EFF is likely to lose its support base and compete with others for
generic feel-good support public.

Anyone has right to offer anything. If there are enough imbeciles to take it,
that's good. Imbeciles should be exploited as much as possible. Those who
capitalize on imbecile protection racket are called politicians.





=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
The New Yahoo! Shopping - with improved product search
http://shopping.yahoo.com



Re: EFF Report on Trusted Computing

2003-10-09 Thread Morlock Elloi
It took less than a decade for EFF to make a full turn, from championing
unrestricted uses of technology to censoring who can do what and in which way.

In this regards EFF resembles technological empires - like Cisco, for example,
that get born because of radically new ways to do things and then end up trying
to stop any further change.

At some point EFF left the course of enabling individuals and joined their
adversaries in the sense that masses should be patronized and given this or
that. Such EFF is likely to lose its support base and compete with others for
generic feel-good support public.

Anyone has right to offer anything. If there are enough imbeciles to take it,
that's good. Imbeciles should be exploited as much as possible. Those who
capitalize on imbecile protection racket are called politicians.





=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
The New Yahoo! Shopping - with improved product search
http://shopping.yahoo.com



Re: Duck Freedom Fighter (Terrorists), Euler SUV Graffiti

2003-09-18 Thread Morlock Elloi
And who will free the chicken ?

Fucking racists.


 Activists Take Ducks From Foie Gras Shed
 
 FARMINGTON, Calif.  With only the dim light of a half-moon to guide
 them, four self-proclaimed duck freedom fighters made their way early
 Wednesday across an abandoned field, around dilapidated, foul-smelling
 chicken pens, and over a narrow passage through a large manure-filled
 pond.
 
 ...
 Soon, four Peking-Muscovy ducks were free.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: Verisign's Wildcard A-Records and DNSSEC Plans?

2003-09-17 Thread Morlock Elloi
 What does it mean to say that 64.94.110.11 is or is not
 certified by .com as the address for bad-example-12345.com ,
 or that something else is?  Is it really the same as a
 wild-card that points to real sites?  Your Best Practices says that

At this point it is immaterial what Verisign will or will not do. They followed
the predictable course based on their capabilities and the assessment that the
response from some imaginary community is irrelevant.

The actual damage is breaking network diagnostic procedures and spam filtering,
increasing chance of undetected lost e-mail (their SMTP does not always bounce)
and increased danger of mistyped domain names - as now such typo in http client
leads to exposure to possibly adversarial html (which is why they started it
all in the first place.)

By this time it should be obvious to everyone that in the near future they will
establish targeted advertizing depending on what the mistyped URL looks like -
and probably sell or rent the typo name space - ie. Airborne Express could
buy *f?*e?*d?*e?*x?*.com address space, so fredex.com would lead to airborne's
web site.

And then there is a very small step from there to schemes where, for instance,
for basic $15-25/yr name rental your domain will be yours only in 90% of cases.
Other 10% will be sold. For $100/yr you will be guaranteed 99.5% of the
ownership. Of course, only platinum premium accounts, at $100K/yr, will have
100% ownership.

That is the problem when a centralized technical solution relies on the legal
system (and they almost always do.)

What is important is how and if will this accelerate alternate solutions for
name space management.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: [p2p-hackers] Project Announcement: P2P Sockets

2003-09-12 Thread Morlock Elloi
 infrastructure for these.  Everyone knows about them
 by using a common boostrap server to bootstrap into
 the Jxta network to gain the addresses of a few
 Rendezvous nodes.  Rendezvous nodes then propagate

So they are subject to lawsuits. Anyone running them can be traced and
persuaded by the local force monopoly to stop running them.

I see this just as shifting vulnerability point from the current one (ISPs,
ICANN) to a new one, equally traceable. What this can buy is few months of
confusion.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: [p2p-hackers] Project Announcement: P2P Sockets

2003-09-11 Thread Morlock Elloi
 infrastructure for these.  Everyone knows about them
 by using a common boostrap server to bootstrap into
 the Jxta network to gain the addresses of a few
 Rendezvous nodes.  Rendezvous nodes then propagate

So they are subject to lawsuits. Anyone running them can be traced and
persuaded by the local force monopoly to stop running them.

I see this just as shifting vulnerability point from the current one (ISPs,
ICANN) to a new one, equally traceable. What this can buy is few months of
confusion.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: [p2p-hackers] Project Announcement: P2P Sockets (fwd from bradneuberg@yahoo.com)

2003-09-10 Thread Morlock Elloi
 stable IP address. Super-peers on the Jxta network run
 application-level routers which store special
 information such as how to reach peers, how to join

So these super peers are reliable, non-vulnerable, although everyone knows
where they are, because  ?



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: cats

2003-09-10 Thread Morlock Elloi
Well, cats *do* have a quite strict hierarchy which is far from ad-hoc
establishment of the pecking order. So the analogy dosn't hold with cat
behavioral experts.

However, if cats could perform anonymized hissing, biting and scratching, then
I'm sure that cypherpunk maillist would be a good analogy for cat behavior.



 Second, if you examine the context of the original post, the statement
 was a metaphor about leaderless (anarchic) assemblies such
 as this list.  In particular, the Feds (dogs) haven't historically
 understood that this list is the equivalent of a grad lounge or spontaneous
 beach party:
 there are multiple conversations, no one is moderating or otherwise
 choreographing
 squat.  When cats encounter each other by chance, they may assert
 dominance,
 (linguistic pissing contests are not unheard of here :-)
 but their lives are not structured around following, or smelling the
 higher-up's ass.




=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: [p2p-hackers] Project Announcement: P2P Sockets (fwd from bradneuberg@yahoo.com)

2003-09-10 Thread Morlock Elloi
 stable IP address. Super-peers on the Jxta network run
 application-level routers which store special
 information such as how to reach peers, how to join

So these super peers are reliable, non-vulnerable, although everyone knows
where they are, because  ?



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: cats

2003-09-09 Thread Morlock Elloi
Well, cats *do* have a quite strict hierarchy which is far from ad-hoc
establishment of the pecking order. So the analogy dosn't hold with cat
behavioral experts.

However, if cats could perform anonymized hissing, biting and scratching, then
I'm sure that cypherpunk maillist would be a good analogy for cat behavior.



 Second, if you examine the context of the original post, the statement
 was a metaphor about leaderless (anarchic) assemblies such
 as this list.  In particular, the Feds (dogs) haven't historically
 understood that this list is the equivalent of a grad lounge or spontaneous
 beach party:
 there are multiple conversations, no one is moderating or otherwise
 choreographing
 squat.  When cats encounter each other by chance, they may assert
 dominance,
 (linguistic pissing contests are not unheard of here :-)
 but their lives are not structured around following, or smelling the
 higher-up's ass.




=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Charted death of cypherpunks

2003-09-09 Thread Morlock Elloi
http://recall.archive.org/?query=cypherpunkssearch=goafterMonth=1afterYear=1996beforeMonth=TodaybeforeYear=%A0

(the above URL should be all in one line, of course)

=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: Searching for uncopyable key made of sparkles in plastic

2003-09-03 Thread Morlock Elloi
 Several months ago, I read about someone who was making a key that 
 was difficult if not impossible to copy. They mixed sparkly things 
 into a plastic resin and let them set. A camera would take a picture 

This boils down to difficulty of faking the analog interface.

Anything that regular camera captures the attacker can also capture and
reproduce it for the benefit of the camera. This means that camera has to be
able to distinguish between the real thing and images of the real thing. This
probably means going beyond optical image and somehow detecting 3D coordinates
of particles, forcing the attacker to actually construct a new physical key
carrier.

At the current level of technology and economy, it's cheaper to hire an
unemployed hardware engineer (no, s/w engs are not qualified,) to look at the
key than to construct a 3D particle-sensing camera.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: Responding to orders which include a secrecy requirement

2003-09-02 Thread Morlock Elloi
What Tim is (correctly) observing here is that a working challenge to the force
monopoly is a very effective way to modify behaviour.

Where Tim is wrong, though, is that he may have anything resembling a working
challenge.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: Responding to orders which include a secrecy requirement

2003-09-01 Thread Morlock Elloi
What Tim is (correctly) observing here is that a working challenge to the force
monopoly is a very effective way to modify behaviour.

Where Tim is wrong, though, is that he may have anything resembling a working
challenge.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: traffix analysis

2003-08-30 Thread Morlock Elloi
 as a solid dish.  (The uwaves see the screen as solid, however.)  With
 that much gain (ie directionality) wind could mess with your (albeit brief)
 connection.

This one has 30 degree coverage and is perfect for connecting to consumer APs
up to a mile: http://www.tranzeo.com/products.php?cmd=viewpageid=102

Car window glass will cost you about 1.5-2 dB.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: traffix analysis

2003-08-30 Thread Morlock Elloi
 as a solid dish.  (The uwaves see the screen as solid, however.)  With
 that much gain (ie directionality) wind could mess with your (albeit brief)
 connection.

This one has 30 degree coverage and is perfect for connecting to consumer APs
up to a mile: http://www.tranzeo.com/products.php?cmd=viewpageid=102

Car window glass will cost you about 1.5-2 dB.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: JAP back doored

2003-08-21 Thread Morlock Elloi
 This is a terrible day for privacy advocates that used the once (perhaps

This is the great day for *true* privacy advocates worldwide.

In face of huge difficulties and dangers in providing real anonymity, some
human rights/wrongs organisations capitalised (in several ways) on the need for
anonymity by providing non-solutions with cosmetic appearance of anonymity.
They captured the  gullible public with this service and dealt another blow
to the real anonymity.

Who needs complicated mixmaster when there are cool cretin-friendly
java/web/whatever solutions ?

One would hope that users of other centralised anonymity services will learn
from this, if one is incurable optimist, that is.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: paradoxes of randomness

2003-08-19 Thread Morlock Elloi
 Is this sequence random? Compressible?  How could you tell whether this
 sequence is random or not, if you didn't know the key?

This is the a way to describe so-called randomness.

One simply has no adequate access to the Key and/or the Algorithm.

Both coin flipping and quantum noise fall into this category.

Actually, it's a pretty good method of authenticating Allah.






=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: paradoxes of randomness

2003-08-16 Thread Morlock Elloi
 - N+1 is the smallest integer that's not interesting.
   But that's interesting in itself - so N+1 is interesting.


It breaks down after few consequtive non-interesting integers.

In fact, there is a proof somewhere that 17, 18 and 19 are not interesting at
all.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: Idea: Homemade Passive Radar System (GNU/Radar)

2003-08-14 Thread Morlock Elloi
 As an active twist, we can also use a separate unit, Illuminating
 Transceiver (IT), periodically broadcasting a pulse of known
 characteristics, easy to recognize by the LPs when it bounces from an
 aerial target. This unit has to be cheap and expendable - it's easy to
 locate and to destroy by a HARM missile. As a bonus, forcing the adversary
 to waste a $250,000+ AGM-88 missile on a sub-$100 transmitter may be quite
 demoralizing. There can be a whole hierarchy of ITs; when one of them

Microwave oven.

This has been done in recent years in various theatres.

 Even other sources can serve as involuntary ITs. The landscape is littered
 with cellular base stations and civilian TV and radio transmitters. Just
 pick the suitable frequency and listen on.

There is enough wideband power in the ether above inhabited areas to make
passive detection from reflected EM possible in theory (without any EM
emanating from the target.) The space is illuminated, but the eyes are not
good enough, yet. Signal levels are extremely low, but it's likely that a
flying jet reflects back enough from hundreds of cellphone/celltower
transmissions to be few dB above the background noise. However, without knowing
where to look the receiver cannot use typical narrow beam high-gain antennas.
What is needed is an array, like an insect's eye, and that will be a sizeable
contraption - passive, but not small. In other words, the size of a passive eye
is proportional to the wavelength. To get human eye resolution in 10cm band the
size gets to 2km across. Big eye.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: They never learn: Omniva Policy Systems

2003-08-14 Thread Morlock Elloi
 seems horribly limiting. What of those using Entourage, or Mail, or any 
 of the dozens of platforms and news readers in existence. The site 
 mentions that they are now Blackberry-compliant. Well, does this mean 
 employees of the companies using Omniva Policy Manager cannot read 
 their mail on their Palms, or their laptops running other mail 
 programs, and so on?

My experience with ordinary Joe Six Suits users is that they are
progressively dumber and understand less and less tools they use to powerpoint
on. The gap between reality and their understanding of computers is widening.
Computers have finally adapted to idiots.

At this point snake oils as the mentioned one is perfectly fundable and
marketable. There is a significant user base that it will work for. Remember
all discussions about single DES being good enough only for braindead ? Well,
now they are past that. Layer 7 interface obstacles are now good enough.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: A 'Funky A.T.M.' Lets You Pay for Purchases Made Online

2003-07-22 Thread Morlock Elloi
 If the digicash isn't anonymous, it's worthless.
 
 I'd argue to the contrary. First, most people have nothing to hide.
 The folks will want digicash for reasons other than anonymity, as argued

You are misusing the term cash. What you are describing are essentially
internet debit cards. While it is attractive to insert word cash into any
harebrained net money scheme, exactly because of positive associations with
CASH, it is misleading and deceptive.

Cash means off-line clearing and anonymous. If it is complicated to understand,
open your wallet, take a banknote out of it and ponder what it is for a minute.
 



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: idea: brinworld meets the credit card

2003-07-08 Thread Morlock Elloi
 Those are the hard problems.  No one in biometrics
 has yet been able to solve them in a general way.

And the merchant example is the wrong application.

The merchant doesn't care WHO you are - that's a false premise.

Merchant cares if you can pay. Now, that's a completely solvable issue.

Of course, we know who and why is trying to misrepresent this.

All other applications of biometrics boil down to threatening with punishment
(we know who you are, behave or else ...) - and then the biometrics ceases to
be in the interest of the eyeball holder. Even granting door access to
employees fits this category. You don't let any qualified mathematician
willing to work to enter the lab - you let in only those that you know where
they live, have signed contracts with them, etc.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
SBC Yahoo! DSL - Now only $29.95 per month!
http://sbc.yahoo.com



Re: Idea: The ultimate CD/DVD auditing tool

2003-07-06 Thread Morlock Elloi
 There's a good reason why, viz: it would cost the drive developer to allow
 or export this flexibility.  Since very few customers are sick enough

This will go the same way as radio. First, you have hundreds of separate boxes,
each doing some custom modulation/frequency gig (am, fm, shortwave, TV, cell,
spread spectrum, whatever) and you had to have a separate apparatus for each
instance.

With software radio, you just have one box that can do it all (and it made all
protection-by-custom-modulation obsolete ... I've seen it playing protected
HDTV signals.)

So it's easy to imagine universal software disc player/recorder that let's
one do any modulation technique. Not that it would provide protection, because
the same tools will be available to attackers, but at least the crypto may
become more fun, going back to physical domain.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
SBC Yahoo! DSL - Now only $29.95 per month!
http://sbc.yahoo.com



Re: Attacking networks using DHCP, DNS - probably kills DNSSEC

2003-06-30 Thread Morlock Elloi
 security, but having both the user and administrator configure a per
 host secret was apparently out of the question.

There is no such thing as automatic security. That's an oxymoron.

Any system that is secure without the ongoing burn of end-user brain cycles
is subject to more-or-less easy subversion [a corollary of this is that
masses will never be in situation to be both (1) end users and (2) secure.
One can be a product and secure at the same time without effort, though.]

And any system that (in theory) makes DNS foolproof will inevitably exclude any
parallel name services.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
SBC Yahoo! DSL - Now only $29.95 per month!
http://sbc.yahoo.com



Re: Senators from Utah being Southern

2003-06-23 Thread Morlock Elloi
Religions are essentially collections of stories about the latter method

Religions are artificial shortcuts to knowledge and excellent method to
neutralize congenital human curiosity. If you can't comprehend it, fake it.
They all offer explanations of various phenomena by using familiar human memes
(fathers, mothers, children, birth, death.) It works most of the time.

The major difference between politics and religion is that politics is
streamlined, it doesn't count on the internal consistency (and related effort
to grasp it) but instead uses (via media) brute force of repetition.

It all boils down to getting masses to farm out the inquisitivness and then
servicing it.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
SBC Yahoo! DSL - Now only $29.95 per month!
http://sbc.yahoo.com



Re: An attack on paypal -- secure UI for browsers

2003-06-10 Thread Morlock Elloi
 The solution to this is Palladium (NGSCB).
 
 You'd want each ecommerce site to download a Nexus Computing Agent into
 the client.  This should be no more difficult than downloading an Active-X
 control or some other DLL.  The NCA has a manifest file associated with it

No shit? This is moronic. But then it reflects the impaired cognitive abilities
of corpdrones in mintel.

I pay for the computer, and then all these corporations start downloading
shit to my computer in order to make it safe for me to use it, right ? I am
lay person and need to trust these people, as I am clueless about stuff they
download. But their web page says it's good.

This all happens *after* I buy the computer.

So, to recap, I pay several $K for the computer and then have to customize it
so that it becomes safe. The computer, as malladium authenticates the
computer. 

Why do I want $3,000 authentication token ?

No, mintel making money is not the right answer. Try again.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! Calendar - Free online calendar with sync to Outlook(TM).
http://calendar.yahoo.com



Re: IQ, g, flying

2003-06-01 Thread Morlock Elloi
 Just FYI, if you read up on G (general intelligence factor), you will
 learn that the *only* cause of death that increases with G is dying in
 airplanes.

Surviving flying is very much similar to exercising safe crypto practices; you
must examine the source and recompile PGP for each message. Once you start to
_believe_ that it's a sound code, you are on your way out of the gene pool.

Hint to Tim: 99.7% of flyers, including all instructors, believe.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! Calendar - Free online calendar with sync to Outlook(TM).
http://calendar.yahoo.com



cooperative evil bit

2003-04-03 Thread Morlock Elloi
ftp://ftp.rfc-editor.org/in-notes/rfc3514.txt

excerpt:

1. Introduction

   Firewalls [CBR03], packet filters, intrusion detection systems, and
   the like often have difficulty distinguishing between packets that
   have malicious intent and those that are merely unusual.  The problem
   is that making such determinations is hard.  To solve this problem,
   we define a security flag, known as the evil bit, in the IPv4
   [RFC791] header.  Benign packets have this bit set to 0; those that
   are used for an attack will have the bit set to 1.

=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Tax Center - File online, calculators, forms, and more
http://tax.yahoo.com



Re: Logging of Web Usage

2003-04-02 Thread Morlock Elloi
Frankly, it seems that some brains around here are softening. Relying on httpd
operators to protect those who access is plain silly, even if echelon (funny
how that word dropped below radar lately) did not exist.

The proper way is, of course, self-protection. Start with tight control of
outgoing info from the end-user machine (remove or fake all fields that are not
essential, such as referrer, client application, client OS). Use proxies. If
you own a multi-IP subnet randomly switch the originating IP - this fucks up
most automated tracking.

What doesn't exist is mixmaster-grade anon re-httpers. I guess that ones that
would let just text through (no images/scripting etc.) would be repulsive
enough for wide public and therefore useful.

Once you provide your data, it is always retained forever. Learn to live with
it.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Tax Center - File online, calculators, forms, and more
http://tax.yahoo.com



Re: pgp in internet cafe (webpgp)

2003-03-23 Thread Morlock Elloi
 why not just use ssh? you can scp the text to your host, encrypt/decrypt it
 *there* then scp it back if needs be. you also then don't need to use
 webmail - just have a mailbox on that server that you forward your webmail
 to, and that you send email in the name of the webmail account from.
 its easy enough to grab down puTTY whenever you need it.

Ever tried to install a ssh client on a random internet cafe computer ?


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Platinum - Watch CBS' NCAA March Madness, live on your desktop!
http://platinum.yahoo.com



Re: Crypto anarchy now more than ever

2003-02-15 Thread Morlock Elloi
 This is what we need to fight. And this was, and perhaps still is, the 
 promises of unlinkable credentials, of untraceable digital cash, and of 
 True Names. Crypto anarchy is needed now more than ever.

There are hardly battlegrounds available. Software runs on machines big ones
make, bits travel on wires owned by the big few, and DMCA/TCPA/BLAHBLAH or not,
it is harder and harder for any crypto to parasite on top of that, at least
when sheeple is concerned.

Crypto has deferred benefits and thus is beyond grasp in the world of short
attention span where immediate gratification rules. The *only* way to impose
crypto on the masses is not through anarchy but by organised force - a state
could do it. Guess when it will happen.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Shopping - Send Flowers for Valentine's Day
http://shopping.yahoo.com




Re: The practical reason the U.S. is starting a war

2003-02-15 Thread Morlock Elloi
 I'm wondering why Cryptome decided to place thisB particular piece of
 opinion.B 
 It is not inkeeping w/ the type of stuff I've read here before, in terms of 
 it being a straightB opinion piece, not a document,B federal register entry, 
 etc..B Why did you (who is that exactly, anyway?) choose to includeB it?B I

On a purely theoretical plane, there is no straight opinion. When one mentiones
word France, for example, it assumes a lot - that the french state is a
legitimate state, that state is a valid entity in the first place, and that
term France is a legitimate name for that particular territory.

Language is a distillate of past propaganda. The newcomers and dissenters have
no advantage of legitimate words to support their case. They must use
elaborate descriptions or define new macros. That you see nothing wrong with
word federal but see something wrong with word mutant is a display of your
own bias.

And the mere notion that valid stuff (facts) can be smeared by racist
stuff illustrates that you are not looking for facts, but for granfallooning
with something, with a group or idea.

(Along those lines, *anything* a politician thug ever mentioned would become
smeared and invalid. OK, bad example.)



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Shopping - Send Flowers for Valentine's Day
http://shopping.yahoo.com




Re: The practical reason the U.S. is starting a war

2003-02-15 Thread Morlock Elloi
 I'm wondering why Cryptome decided to place thisB particular piece of
 opinion.B 
 It is not inkeeping w/ the type of stuff I've read here before, in terms of 
 it being a straightB opinion piece, not a document,B federal register entry, 
 etc..B Why did you (who is that exactly, anyway?) choose to includeB it?B I

On a purely theoretical plane, there is no straight opinion. When one mentiones
word France, for example, it assumes a lot - that the french state is a
legitimate state, that state is a valid entity in the first place, and that
term France is a legitimate name for that particular territory.

Language is a distillate of past propaganda. The newcomers and dissenters have
no advantage of legitimate words to support their case. They must use
elaborate descriptions or define new macros. That you see nothing wrong with
word federal but see something wrong with word mutant is a display of your
own bias.

And the mere notion that valid stuff (facts) can be smeared by racist
stuff illustrates that you are not looking for facts, but for granfallooning
with something, with a group or idea.

(Along those lines, *anything* a politician thug ever mentioned would become
smeared and invalid. OK, bad example.)



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Shopping - Send Flowers for Valentine's Day
http://shopping.yahoo.com




Re: Crypto anarchy now more than ever

2003-02-15 Thread Morlock Elloi
 This is what we need to fight. And this was, and perhaps still is, the 
 promises of unlinkable credentials, of untraceable digital cash, and of 
 True Names. Crypto anarchy is needed now more than ever.

There are hardly battlegrounds available. Software runs on machines big ones
make, bits travel on wires owned by the big few, and DMCA/TCPA/BLAHBLAH or not,
it is harder and harder for any crypto to parasite on top of that, at least
when sheeple is concerned.

Crypto has deferred benefits and thus is beyond grasp in the world of short
attention span where immediate gratification rules. The *only* way to impose
crypto on the masses is not through anarchy but by organised force - a state
could do it. Guess when it will happen.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Shopping - Send Flowers for Valentine's Day
http://shopping.yahoo.com




Re: Putting the NSA Data Overwrite Standard Legend to Death... (fwd)

2003-02-05 Thread Morlock Elloi
 From the OSI 7-layer model, which took it from the fact that the number 7 is

It's simpler than that. Russians wanted 6, americans 8.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com




Re: Putting the NSA Data Overwrite Standard Legend to Death... (fwd)

2003-02-04 Thread Morlock Elloi
 From the OSI 7-layer model, which took it from the fact that the number 7 is

It's simpler than that. Russians wanted 6, americans 8.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com




  1   2   3   >