Re: Wikipedia Tor
But now we're back to the question: how can Tor be improved to deal with this very serious and important problem? What are the steps that might be taken, however imperfect, to reduce the amount of abuse coming from Tor nodes? That's trivial: charge Tor-originated users for editing. That 0.0001% (all three of them) that actually contributes to Wikipedia will be resourceful enough to create untraceable payment accounts. end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Yahoo! Mail - PC Magazine Editors' Choice 2005 http://mail.yahoo.com
Re: Wikipedia Tor
But now we're back to the question: how can Tor be improved to deal with this very serious and important problem? What are the steps that might be taken, however imperfect, to reduce the amount of abuse coming from Tor nodes? That's trivial: charge Tor-originated users for editing. That 0.0001% (all three of them) that actually contributes to Wikipedia will be resourceful enough to create untraceable payment accounts. end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Yahoo! Mail - PC Magazine Editors' Choice 2005 http://mail.yahoo.com
spoofing for dyslexic
Just a tiny interesting operation found out via routine misspelling that can breed paranoia in idle minds: sprint has smtp to SMS gateway for its customers running at messaging.sprintpcs.com, so if you e-mail to [EMAIL PROTECTED] the user gets message on the phone. Interestingly enough, there is also valid domain messaging.sprintpsc.com (note the swapped last two letters) that resolves to no less than 8 IP addresses. Someone wants it really reliable: Addresses: 69.25.27.171, 66.150.161.141, 69.25.27.170, 69.25.27.172 66.150.161.133, 66.150.161.140, 66.150.161.134, 66.150.161.136 sprintpsc.com is operated by po-box identified entity: Registrant: Acme Mail Box 455 Miami, FL 33265 US 305-201-4774 and of course messages sent to [EMAIL PROTECTED] do not end up on sprint's subscriber handset. Could be completely coincidental, of course. end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Discover Yahoo! Find restaurants, movies, travel and more fun for the weekend. Check it out! http://discover.yahoo.com/weekend.html
Re: [IP] Google's Web Accelerator is a big privacy risk (fwd from dave@farber.net)
Google cookies last as long as possible -- until 2038. If you've And you are allowing cookies because ... ? And you are keeping cookies past the session because ... ? Too lazy not to? To lazy to login again? Inherent belief that commercial entity should make your life easy for purely philantropical reasons? Just plain dumb? end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Yahoo! Mail Mobile Take Yahoo! Mail with you! Check email on your mobile phone. http://mobile.yahoo.com/learn/mail
spoofing for dyslexic
Just a tiny interesting operation found out via routine misspelling that can breed paranoia in idle minds: sprint has smtp to SMS gateway for its customers running at messaging.sprintpcs.com, so if you e-mail to [EMAIL PROTECTED] the user gets message on the phone. Interestingly enough, there is also valid domain messaging.sprintpsc.com (note the swapped last two letters) that resolves to no less than 8 IP addresses. Someone wants it really reliable: Addresses: 69.25.27.171, 66.150.161.141, 69.25.27.170, 69.25.27.172 66.150.161.133, 66.150.161.140, 66.150.161.134, 66.150.161.136 sprintpsc.com is operated by po-box identified entity: Registrant: Acme Mail Box 455 Miami, FL 33265 US 305-201-4774 and of course messages sent to [EMAIL PROTECTED] do not end up on sprint's subscriber handset. Could be completely coincidental, of course. end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Discover Yahoo! Find restaurants, movies, travel and more fun for the weekend. Check it out! http://discover.yahoo.com/weekend.html
Re: [IP] Google's Web Accelerator is a big privacy risk (fwd from dave@farber.net)
Google cookies last as long as possible -- until 2038. If you've And you are allowing cookies because ... ? And you are keeping cookies past the session because ... ? Too lazy not to? To lazy to login again? Inherent belief that commercial entity should make your life easy for purely philantropical reasons? Just plain dumb? end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Yahoo! Mail Mobile Take Yahoo! Mail with you! Check email on your mobile phone. http://mobile.yahoo.com/learn/mail
zombied ypherpunks (Re: Email Certification?)
I'm still having trouble understanding your threat model. Just assume braindeath and it becomes obvious. No tla with any dignity left would bother e-mail providers or try to get your password. All it need to do is fill gforms and get access to tapped traffic at major nodes (say, 20 in US is sufficient?). Think packet reassembly - filter down - store everything forever - google on demand. Concerned about e-mail privacy? There is this obscure software called 'PGP', check it out. Too complicated? That's the good thing about evolution, not everyone makes it. end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com
Re: DTV Content Protection
This very likely means that someone already has MM figured out; the question is not whether it will be revealed, but when. All of these attacks focus on finding the master secret MM value; once that is found, the security of the system collapses. Given a KSV it is immediately possible to deduce the corresponding private key if you know the MM. Although both HDCP and DTCP have mechanisms for revocations of cracked keys, a total break like this cannot be rescued by revocation. end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Small Business - Try our new resources site! http://smallbusiness.yahoo.com/resources/
RE: What Will We Do With Innocent People's DNA?
The simplest solution is to systematically spread one's DNA everywhere, thus making 'discovery' of it meaningless. end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Mail - now with 250MB free storage. Learn more. http://info.mail.yahoo.com/mail_250
RE: What Will We Do With Innocent People's DNA?
The simplest solution is to systematically spread one's DNA everywhere, thus making 'discovery' of it meaningless. end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Mail - now with 250MB free storage. Learn more. http://info.mail.yahoo.com/mail_250
Re: [p2p-hackers] good-bye, Mnet, and good luck. I'm going commercial! plus my last design doc (fwd from zooko@zooko.com)
If you want to be invisible to lawyers, you have to use something else. Whoever wants to design something 'else' should first see Monty Python's How not to be seen sketch (or was it Importance of not being seen ?) It applies pretty well to all current techniques for moving unpaid copyrighted content. end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Make Yahoo! your home page http://www.yahoo.com/r/hs
Re: [p2p-hackers] good-bye, Mnet, and good luck. I'm going commercial! plus my last design doc (fwd from zooko@zooko.com)
If you want to be invisible to lawyers, you have to use something else. Whoever wants to design something 'else' should first see Monty Python's How not to be seen sketch (or was it Importance of not being seen ?) It applies pretty well to all current techniques for moving unpaid copyrighted content. end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Make Yahoo! your home page http://www.yahoo.com/r/hs
But does it pass Diehard?
Apologies for introducing crypto-related stuff: RNG that reads minds and predicts future: http://www.rednova.com/news/display/?id=126649 Can This Black Box See Into the Future? DEEP in the basement of a dusty university library in Edinburgh lies a small black box, roughly the size of two cigarette packets side by side, that churns out random numbers in an endless stream. At first glance it is an unremarkable piece of equipment. Encased in metal, it contains at its heart a microchip no more complex than the ones found in modern pocket calculators. But, according to a growing band of top scientists, this box has quite extraordinary powers. It is, they claim, the 'eye' of a machine that appears capable of peering into the future and predicting major world events. The machine apparently sensed the September 11 attacks on the World Trade Centre four hours before they happened - but in the fevered mood of conspiracy theories of the time, the claims were swiftly knocked back by sceptics. But last December, it also appeared to forewarn of the Asian tsunami just before the deep sea earthquake that precipitated the epic tragedy. Now, even the doubters are acknowledging that here is a small box with apparently inexplicable powers. 'It's Earth-shattering stuff,' says Dr Roger Nelson, emeritus researcher at Princeton University in the United States, who is heading the research project behind the 'black box' phenomenon. 'We're very early on in the process of trying to figure out what's going on here. At the moment we're stabbing in the dark.' Dr Nelson's investigations, called the Global Consciousness Project, were originally hosted by Princeton University and are centred on one of the most extraordinary experiments of all time. Its aim is to detect whether all of humanity shares a single subconscious mind that we can all tap into without realising. And machines like the Edinburgh black box have thrown up a tantalising possibility: that scientists may have unwittingly discovered a way of predicting the future. Although many would consider the project's aims to be little more than fools' gold, it has still attracted a roster of 75 respected scientists from 41 different nations. Researchers from Princeton - where Einstein spent much of his career - work alongside scientists from universities in Britain, the Netherlands, Switzerland and Germany. The project is also the most rigorous and longest-running investigation ever into the potential powers of the paranormal. 'Very often paranormal phenomena evaporate if you study them for long enough,' says physicist Dick Bierman of the University of Amsterdam. 'But this is not happening with the Global Consciousness Project. The effect is real. The only dispute is about what it means.' The project has its roots in the extraordinary work of Professor Robert Jahn of Princeton University during the late 1970s. He was one of the first modern scientists to take paranormal phenomena seriously. Intrigued by such things as telepathy, telekinesis - the supposed psychic power to move objects without the use of physical force - and extrasensory perception, he was determined to study the phenomena using the most up-to-date technology available. One of these new technologies was a humble-looking black box known was a Random Event Generator (REG). This used computer technology to generate two numbers - a one and a zero - in a totally random sequence, rather like an electronic coin-flipper. The pattern of ones and noughts - 'heads' and 'tails' as it were - could then be printed out as a graph. The laws of chance dictate that the generators should churn out equal numbers of ones and zeros - which would be represented by a nearly flat line on the graph. Any deviation from this equal number shows up as a gently rising curve. During the late 1970s, Prof Jahn decided to investigate whether the power of human thought alone could interfere in some way with the machine's usual readings. He hauled strangers off the street and asked them to concentrate their minds on his number generator. In effect, he was asking them to try to make it flip more heads than tails. It was a preposterous idea at the time. The results, however, were stunning and have never been satisfactorily explained. Again and again, entirely ordinary people proved that their minds could influence the machine and produce significant fluctuations on the graph, 'forcing it' to produce unequal numbers of 'heads' or 'tails'. According to all of the known laws of science, this should not have happened - but it did. And it kept on happening. Dr Nelson, also working at Princeton University, then extended Prof Jahn's work by taking random number machines to group meditations, which were very popular in America at the time. Again, the results were eyepopping. The groups were collectively able to cause dramatic shifts in the patterns of numbers. From then on, Dr Nelson was hooked. Using the internet, he connected up 40
(un)intended anonymity feature of gmail
Unless I'm missing something obvious, it seems impossible to divine the origination IP address from gmail-sourced e-mail headers. The first IP (the last header) has 10.*.*.* form and is of course internal to google. This is not the case with any other e-mail service I know of (mixmaster excluded), the real originating IP is always included. So the recipient of gmail message has no way of determining what the sender's real IP is. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: ___ Do you Yahoo!? Declare Yourself - Register online to vote today! http://vote.yahoo.com
Re: Remailers an unsolveable paradox?
What are the possible solutions for the remailers? Make all remailers middleman only and adding the ability to opt-in for Open wireless access points. No one said you are entitled to mail anonymously from the comfort of your home/office. Stop whining. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? New and Improved Yahoo! Mail - 100MB free storage! http://promotions.yahoo.com/new_mail
Re: Remailers an unsolveable paradox?
What are the possible solutions for the remailers? Make all remailers middleman only and adding the ability to opt-in for Open wireless access points. No one said you are entitled to mail anonymously from the comfort of your home/office. Stop whining. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? New and Improved Yahoo! Mail - 100MB free storage! http://promotions.yahoo.com/new_mail
Re: Forensics on PDAs, notes from the field
A cool thing for this purpose could be a patch for gcc to produce unique code every time, perhaps using some of the polymorphic methods used by viruses. The purpose would be that they do not figure out that you are using some security program, so they don't suspect that noise in the file or look for stego, right? The last time I checked the total number of PDA programs ever offered to public in some way was around 10,000 (5,000 ? 100,000 ? Same thing.) That can be trivially checked for. Any custom-compiled executable will stand out as a sore thumb. You will suffer considerably less bodily damage inducing you to spit the passphrase than to produce the source and the complier. Just use the fucking PGP. It's good for your genitals. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Mail - 50x more storage than other providers! http://promotions.yahoo.com/new_mail
Re: Forensics on PDAs, notes from the field
A cool thing for this purpose could be a patch for gcc to produce unique code every time, perhaps using some of the polymorphic methods used by viruses. The purpose would be that they do not figure out that you are using some security program, so they don't suspect that noise in the file or look for stego, right? The last time I checked the total number of PDA programs ever offered to public in some way was around 10,000 (5,000 ? 100,000 ? Same thing.) That can be trivially checked for. Any custom-compiled executable will stand out as a sore thumb. You will suffer considerably less bodily damage inducing you to spit the passphrase than to produce the source and the complier. Just use the fucking PGP. It's good for your genitals. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Mail - 50x more storage than other providers! http://promotions.yahoo.com/new_mail
Re: On what the NSA does with its tech
The impracticability of breaking symmetric ciphers is only a comparatively small part of the overall problem. I see that it can be done only by brute farce myth is live and well. Hint: all major cryptanalytic advances, where governments broke a cypher and general public found out few *decades* later were not of brute-force kind. And if anyone thinks today's hobby/private cryptographers are any smarter (in a relative way) or more intelligent than their counterparts of 100 or 50 years ago (that were in dark for decades) ... well, you are an idiot. Today's crypto will be regarded in 2050 as Enigmas are regarded today. Development does not stop in any particular period just because you live in it and assume you're entitled to absolute knowledge. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Mail - 50x more storage than other providers! http://promotions.yahoo.com/new_mail
Re: On what the NSA does with its tech
The impracticability of breaking symmetric ciphers is only a comparatively small part of the overall problem. I see that it can be done only by brute farce myth is live and well. Hint: all major cryptanalytic advances, where governments broke a cypher and general public found out few *decades* later were not of brute-force kind. And if anyone thinks today's hobby/private cryptographers are any smarter (in a relative way) or more intelligent than their counterparts of 100 or 50 years ago (that were in dark for decades) ... well, you are an idiot. Today's crypto will be regarded in 2050 as Enigmas are regarded today. Development does not stop in any particular period just because you live in it and assume you're entitled to absolute knowledge. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Mail - 50x more storage than other providers! http://promotions.yahoo.com/new_mail
Nice pussy (was Re: [IP] more on more on E-mail intercept ruling - good grief!! )
If VOIP gets no protection, then you'll see a lot of digital bugs in Protection of bits by legislation ??? Why is this a subject ? If you don't encrypt you will be listened to. Who the fuck cares if intercept is legal or not. That is irrelevant. It's like trying to obsolete summer clothing by making it illegal to watch pussies and dicks. And the discussion about it is similarly moronic. In olde times cypherpunks would applaud lack of legal bit protection as it stimulates sheeple to encrypt more. I mean wear panties. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Mail - 50x more storage than other providers! http://promotions.yahoo.com/new_mail
Nice pussy (was Re: [IP] more on more on E-mail intercept ruling - good grief!! )
If VOIP gets no protection, then you'll see a lot of digital bugs in Protection of bits by legislation ??? Why is this a subject ? If you don't encrypt you will be listened to. Who the fuck cares if intercept is legal or not. That is irrelevant. It's like trying to obsolete summer clothing by making it illegal to watch pussies and dicks. And the discussion about it is similarly moronic. In olde times cypherpunks would applaud lack of legal bit protection as it stimulates sheeple to encrypt more. I mean wear panties. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Mail - 50x more storage than other providers! http://promotions.yahoo.com/new_mail
Re: [IP] When police ask your name, you must give it, Supreme Court says (fwd from dave@farber.net)
incriminating, and the State has a substantial interest in knowing who you are -- you may need medicating, or you may owe the government money, or Exactly ... and maybe you are on this consumer list: http://bmj.bmjjournals.com/cgi/content/full/328/7454/1458 The president's commission found that despite their prevalence, mental disorders often go undiagnosed and recommended comprehensive mental health screening for consumers of all ages, including preschool children. According to the commission, Each year, young children are expelled from preschools and childcare facilities for severely disruptive behaviours and emotional disorders. Schools, wrote the commission, are in a key position to screen the 52 million students and 6 million adults who work at the schools. The commission also recommended Linkage [of screening] with treatment and supports including state-of-the-art treatments using specific medications for specific conditions. The commission commended the Texas Medication Algorithm Project (TMAP) as a model medication treatment plan that illustrates an evidence-based practice that results in better consumer outcomes. BTW, looks like designation citizen has been obsoleted by consumer. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Mail Address AutoComplete - You start. We finish. http://promotions.yahoo.com/new_mail
Re: [IP] When police ask your name, you must give it, Supreme Court says (fwd from dave@farber.net)
incriminating, and the State has a substantial interest in knowing who you are -- you may need medicating, or you may owe the government money, or Exactly ... and maybe you are on this consumer list: http://bmj.bmjjournals.com/cgi/content/full/328/7454/1458 The president's commission found that despite their prevalence, mental disorders often go undiagnosed and recommended comprehensive mental health screening for consumers of all ages, including preschool children. According to the commission, Each year, young children are expelled from preschools and childcare facilities for severely disruptive behaviours and emotional disorders. Schools, wrote the commission, are in a key position to screen the 52 million students and 6 million adults who work at the schools. The commission also recommended Linkage [of screening] with treatment and supports including state-of-the-art treatments using specific medications for specific conditions. The commission commended the Texas Medication Algorithm Project (TMAP) as a model medication treatment plan that illustrates an evidence-based practice that results in better consumer outcomes. BTW, looks like designation citizen has been obsoleted by consumer. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Mail Address AutoComplete - You start. We finish. http://promotions.yahoo.com/new_mail
Re: Low-elevation skymapping at 2.45 Ghz
However, it should be known that fiberglass (eg van) panels are transparent to uwaves AFAIK and that a van with soft tires is a 0th-order 0.25 glass will cost you 2-2.5 dB. At sufficiently good mechanical stabilization and gain, you will encounter perhaps The best way to do this is to mount the narrow-angle dish *and* video camera on the same mount, then use simple circuitry to superimpose white circle on the center of the image when signal exceeds some threshold (or vary the size with signal level.) The results could be startling. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Take Yahoo! Mail with you! Get it on your mobile phone. http://mobile.yahoo.com/maildemo
Re: Low-elevation skymapping at 2.45 Ghz
However, it should be known that fiberglass (eg van) panels are transparent to uwaves AFAIK and that a van with soft tires is a 0th-order 0.25 glass will cost you 2-2.5 dB. At sufficiently good mechanical stabilization and gain, you will encounter perhaps The best way to do this is to mount the narrow-angle dish *and* video camera on the same mount, then use simple circuitry to superimpose white circle on the center of the image when signal exceeds some threshold (or vary the size with signal level.) The results could be startling. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Take Yahoo! Mail with you! Get it on your mobile phone. http://mobile.yahoo.com/maildemo
Re: Palm Hack?
If there's any kind of leakage bias, then a high-powered signal might get a few bits through. After that, only a Palm OS expert will know if there's some kind of signal that can tease the Palm awake and then get it to swallow some kind of trojan. Bits are not marbles to exist outside receiver's experience. Bits are tokens of agreement between sender and receiver. If receiver (including analog PHY) is powered down/idle/inactive, it's hard to imagine that bits could be stored in the analog capture device to be retreived later. Actually, one bit can be stored, the Last Bit. That one is stored by shining few watts into the receiving element, blinding it forever. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Friends. Fun. Try the all-new Yahoo! Messenger. http://messenger.yahoo.com/
Re: Palm Hack?
If there's any kind of leakage bias, then a high-powered signal might get a few bits through. After that, only a Palm OS expert will know if there's some kind of signal that can tease the Palm awake and then get it to swallow some kind of trojan. Bits are not marbles to exist outside receiver's experience. Bits are tokens of agreement between sender and receiver. If receiver (including analog PHY) is powered down/idle/inactive, it's hard to imagine that bits could be stored in the analog capture device to be retreived later. Actually, one bit can be stored, the Last Bit. That one is stored by shining few watts into the receiving element, blinding it forever. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Friends. Fun. Try the all-new Yahoo! Messenger. http://messenger.yahoo.com/
Re: Satellite eavesdropping of 802.11b traffic
Does anyone know whether the low-power nature of wireless LANs protects them from eavesdropping by satellite? GSM cell phones have been successfully tapped via sat. Power is greater (up to .5w) but antennas are worse, so effective radiated energy is very similar, as are frequencies. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Friends. Fun. Try the all-new Yahoo! Messenger. http://messenger.yahoo.com/
Re: [IP] One Internet provider's view of FBI's CALEA wiretap push
underground railroad would have worked better, but your still black. Obviously you don't know about whitening properties of moder ciphers! Seriously, today the distingushing marks among classes, tribes and castes are far more informational than physical. So today crypto *can* make you white, or better to say discoloured. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Photos: High-quality 4x6 digital prints for 25¢ http://photos.yahoo.com/ph/print_splash
Re: [IP] One Internet provider's view of FBI's CALEA wiretap push
underground railroad would have worked better, but your still black. Obviously you don't know about whitening properties of moder ciphers! Seriously, today the distingushing marks among classes, tribes and castes are far more informational than physical. So today crypto *can* make you white, or better to say discoloured. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Photos: High-quality 4x6 digital prints for 25¢ http://photos.yahoo.com/ph/print_splash
Re: [IP] One Internet provider's view of FBI's CALEA wiretap push
The extreme ease of use of internet wiretapping and lack of accountability is not a good situation to create. False. It is the best possible situation cpunk-wise I can imagine. It effectively deals away with bs artists (those who *argue* against this or that) and empowers mathematics. If one is so fucking stupid, lazy or both not to encrypt, anonymize and practice other safe-sex approaches then let's hope that whatever broad wiretapping results in will also have slight (but measurable) pressure in factoring those out from the gene pool. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Photos: High-quality 4x6 digital prints for 25¢ http://photos.yahoo.com/ph/print_splash
Re: Cypherpunks response to viral stimuli
Can a TLA please give some sign here, any sign - just ack that you know the list exists, otherwise the legitimacy of cpunks is definitely going down the drain. Looks like a Berlin wall syndrome. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free web site building tool. Try it! http://webhosting.yahoo.com/ps/sb/
Re: WiFi Repeater?
Forget about repeater. 13-15 db flat panel antenna will get you access to distant APs - up to one mile in favourable conditions. 18db grid dish will connect you to omnidirectional AP within 2 miles. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Hotjobs: Enter the Signing Bonus Sweepstakes http://hotjobs.sweepstakes.yahoo.com/signingbonus
Re: WiFi Repeater?
Forget about repeater. 13-15 db flat panel antenna will get you access to distant APs - up to one mile in favourable conditions. 18db grid dish will connect you to omnidirectional AP within 2 miles. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Hotjobs: Enter the Signing Bonus Sweepstakes http://hotjobs.sweepstakes.yahoo.com/signingbonus
RE: The killer app for encryption
Because it means you can complete call to the POTs with no company-controlled switch involved, meaning no where to serve a court order. Since the call could be routed through a few intermediate nodes and I see. So, in the real world, X uses this to make telephone threats, your POTS gets picked up by random selection as the outgoing node, and gets traced back to from the victim's telephone, LEA visits you and you say ... I know nothing. Yes, I can see it working and widely adopted. Looks like someone is pumping dumbing gas into cpunks homes. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? New Yahoo! Photos - easier uploading and sharing. http://photos.yahoo.com/
RE: The killer app for encryption
What I'd like to see is a P2P telephony that also supports end-user gateways to the POTS. I'm not certain, but I think there are some MS I don't get what does this have to do with crypto. Outside crypto, this didn't quite work with (almost) public fax gateways of '90s. In theory, you could send e-mail that would be rasterized and faxed using gateway that was in local calling area and presumably did not incur any charge from the local POTS monopoly. However, I don't see people letting others use their POTS lines, nor I see them using their own for this purpose. Yes, this would essentially eliminate long distance charges for those so equipped ... but if A and B have these gateways and use them, what is the chance of them not being AT the gateway (ie. not having laptops) at any given moment - why bother using POTS in the loop in the first place ? VoIP companies are already doing this and the cost is quite low (calling cards) - why bother? = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? New Yahoo! Photos - easier uploading and sharing. http://photos.yahoo.com/
RE: The killer app for encryption
What I'd like to see is a P2P telephony that also supports end-user gateways to the POTS. I'm not certain, but I think there are some MS I don't get what does this have to do with crypto. Outside crypto, this didn't quite work with (almost) public fax gateways of '90s. In theory, you could send e-mail that would be rasterized and faxed using gateway that was in local calling area and presumably did not incur any charge from the local POTS monopoly. However, I don't see people letting others use their POTS lines, nor I see them using their own for this purpose. Yes, this would essentially eliminate long distance charges for those so equipped ... but if A and B have these gateways and use them, what is the chance of them not being AT the gateway (ie. not having laptops) at any given moment - why bother using POTS in the loop in the first place ? VoIP companies are already doing this and the cost is quite low (calling cards) - why bother? = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? New Yahoo! Photos - easier uploading and sharing. http://photos.yahoo.com/
Re:Textual analysis
Its like steganalysis. Its an arms race between measuring your own signatures vs. what the Adversary can measure. If sentence length is a metric known to you, you can write filters that warn you. Similarly for the Adversary. You end up in an arms race over metrics ---who has the more sensitive ones that the other does not control for? But unlike stego, where the issue is faking the noise, personal fingerprints can be removed from the message more reliably. You just need the right gloves. One way is to use automated translators. They all have an internal language and modules that translate to and from it. The internal language is far more restricted than the natural one, so it doesn't leak many aspects of the linguistic fingerprint. Going to the internal form is lossy compression. There is no way to recreate the original. The simplest method is an englih-to-english translator. Better method, and thicker gloves, can be used by going through several from/to modules for different languages. In commercial engines the meaning starts to suffer after 3-4 steps but just before that happens the word ordering and use gets completely skewed. Of course, you have to buy the translator and not use the online google/babelfish access. It's the small things that get you ... = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? New Yahoo! Photos - easier uploading and sharing. http://photos.yahoo.com/
Re:Textual analysis
Its like steganalysis. Its an arms race between measuring your own signatures vs. what the Adversary can measure. If sentence length is a metric known to you, you can write filters that warn you. Similarly for the Adversary. You end up in an arms race over metrics ---who has the more sensitive ones that the other does not control for? But unlike stego, where the issue is faking the noise, personal fingerprints can be removed from the message more reliably. You just need the right gloves. One way is to use automated translators. They all have an internal language and modules that translate to and from it. The internal language is far more restricted than the natural one, so it doesn't leak many aspects of the linguistic fingerprint. Going to the internal form is lossy compression. There is no way to recreate the original. The simplest method is an englih-to-english translator. Better method, and thicker gloves, can be used by going through several from/to modules for different languages. In commercial engines the meaning starts to suffer after 3-4 steps but just before that happens the word ordering and use gets completely skewed. Of course, you have to buy the translator and not use the online google/babelfish access. It's the small things that get you ... = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? New Yahoo! Photos - easier uploading and sharing. http://photos.yahoo.com/
Re: cpunk-like meeting report
http://lists.cryptnet.net/mailman/listinfo/cpunx-news Be sure and check the archive before posting. It is still small. Cookies, members only archive access. Bad deal. Will not happen. Very few consumers here. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? New Yahoo! Photos - easier uploading and sharing. http://photos.yahoo.com/
Re: cpunk-like meeting report
http://lists.cryptnet.net/mailman/listinfo/cpunx-news Be sure and check the archive before posting. It is still small. Cookies, members only archive access. Bad deal. Will not happen. Very few consumers here. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? New Yahoo! Photos - easier uploading and sharing. http://photos.yahoo.com/
Re: Has this photo been de-stegoed?
If you spatially fft a random photo, you'll find that the image detail energy largely occupies certain bands. These are not the bands that stego uses (or so I assume...it really can't be otherwise). The stego-able spectrum will indeed be noise, but this noise will have a certain spectrum. There is an obvious solution here ... you don't modulate into the noise band. You modulate the base bits. The image visibly changes but only possession of the original can prove that. Of course, it would have to be pictures of sand, grass, water, crowd from above. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? New Yahoo! Photos - easier uploading and sharing. http://photos.yahoo.com/
Re: Has this photo been de-stegoed?
If you spatially fft a random photo, you'll find that the image detail energy largely occupies certain bands. These are not the bands that stego uses (or so I assume...it really can't be otherwise). The stego-able spectrum will indeed be noise, but this noise will have a certain spectrum. There is an obvious solution here ... you don't modulate into the noise band. You modulate the base bits. The image visibly changes but only possession of the original can prove that. Of course, it would have to be pictures of sand, grass, water, crowd from above. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? New Yahoo! Photos - easier uploading and sharing. http://photos.yahoo.com/
Re: Type III Anonymous message
Does anyone have a reasonably complete cypherpunks archive available for FTP? Perhaps I could host them on my server and let Google index them. That might be useful. There are only two live ones. Someone knows more ? The second one is FTP-able: http://groups.yahoo.com/group/cypherpunks-lne-archive/ http://lists.lab.net/archive/cypherpunks-exploder/ = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? New Yahoo! Photos - easier uploading and sharing. http://photos.yahoo.com/
Re: Type III Anonymous message
I've been wondering why I havent seen more discussion on wireless networking (802.11a/b/g) and anon/mix /dark nets. Is this a subject of interest to anyone? I am curious what kinds of work has been done in this area... Check the archives. Wireless solves all crypto anonymity problems for the sender by making them completely irrelevant - it provides good old physical anonymity. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? New Yahoo! Photos - easier uploading and sharing. http://photos.yahoo.com/
Re: Type III Anonymous message
Does anyone have a reasonably complete cypherpunks archive available for FTP? Perhaps I could host them on my server and let Google index them. That might be useful. There are only two live ones. Someone knows more ? The second one is FTP-able: http://groups.yahoo.com/group/cypherpunks-lne-archive/ http://lists.lab.net/archive/cypherpunks-exploder/ = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? New Yahoo! Photos - easier uploading and sharing. http://photos.yahoo.com/
Re: Type III Anonymous message
I've been wondering why I havent seen more discussion on wireless networking (802.11a/b/g) and anon/mix /dark nets. Is this a subject of interest to anyone? I am curious what kinds of work has been done in this area... Check the archives. Wireless solves all crypto anonymity problems for the sender by making them completely irrelevant - it provides good old physical anonymity. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? New Yahoo! Photos - easier uploading and sharing. http://photos.yahoo.com/
Re: FOIA Data Mining
One exception: the ***, which hand writes the address. Is Why do you assume that you can tell handwriting from machine-generated script? There are techniques far more advanced than static fonts, that can introduce randomness and be pretty much indistinguishable from the manual product. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Free Pop-Up Blocker - Get it now http://companion.yahoo.com/
Re: e voting (receipts, votebuying, brinworld)
You might check out David Chaum's latest solution at http://www.vreceipt.com/, there are more details in the whitepaper: http://www.vreceipt.com/article.pdf That is irrelevant. Whatever the solution is it must be understandable and verifiable by the Standard high school dropout. Also, the trace must be mechanical in nature and readable sans computers, as there is no reason to trust anything that goes through gates for which one hasn't verifed masks, when stakes are high. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Free Pop-Up Blocker - Get it now http://companion.yahoo.com/
Re: e voting (receipts, votebuying, brinworld)
You might check out David Chaum's latest solution at http://www.vreceipt.com/, there are more details in the whitepaper: http://www.vreceipt.com/article.pdf That is irrelevant. Whatever the solution is it must be understandable and verifiable by the Standard high school dropout. Also, the trace must be mechanical in nature and readable sans computers, as there is no reason to trust anything that goes through gates for which one hasn't verifed masks, when stakes are high. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Free Pop-Up Blocker - Get it now http://companion.yahoo.com/
Re: Vivendi to Destroy MP3.com archive
Somebody please tell me that this is a nightmare, and I am about to wake up. Let's see ... was there a contract to keep things up ad infinitum ? This is a good step, part of waking up from the dream that there are free things on Internet. If there is no eyeball-catching value to be derived from offering free service the service will cease to exist. This may well happen with free e-mail accounts as well - I wonder who will be the first to eliminate the free service in face of diminishing advertizing revenue - Yahoo ? Hotmail ? = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Free Pop-Up Blocker - Get it now http://companion.yahoo.com/
Re: Vivendi to Destroy MP3.com archive
Somebody please tell me that this is a nightmare, and I am about to wake up. Let's see ... was there a contract to keep things up ad infinitum ? This is a good step, part of waking up from the dream that there are free things on Internet. If there is no eyeball-catching value to be derived from offering free service the service will cease to exist. This may well happen with free e-mail accounts as well - I wonder who will be the first to eliminate the free service in face of diminishing advertizing revenue - Yahoo ? Hotmail ? = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Free Pop-Up Blocker - Get it now http://companion.yahoo.com/
Re: Freedomphone
From what I've gathered from the diagrams in [1], it seems to be using AES-256 in counter-mode XORed together with Twofish counter-mode output, Twofish also being keyed with a 256 bit value. I sense paranoia here - but being paranoid myself sometimes I very much welcome this decision! Those two keys are All I'd ask for in addition is ability for both sides to type in 10-40 digit secret key that they communicated in any way they chose, and have that XORed as well ... = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Free Pop-Up Blocker - Get it now http://companion.yahoo.com/
Re: Freedomphone
From what I've gathered from the diagrams in [1], it seems to be using AES-256 in counter-mode XORed together with Twofish counter-mode output, Twofish also being keyed with a 256 bit value. I sense paranoia here - but being paranoid myself sometimes I very much welcome this decision! Those two keys are All I'd ask for in addition is ability for both sides to type in 10-40 digit secret key that they communicated in any way they chose, and have that XORed as well ... = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Free Pop-Up Blocker - Get it now http://companion.yahoo.com/
Re: NSA Turns To Commercial Software For Encryption
Isn't it really simpler to use RSA and DH and ECC in series ? Why choose ONE ? There is no good reason for that. Looks like PSYOP to me. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Exclusive Video Premiere - Britney Spears http://launch.yahoo.com/promos/britneyspears/
Re: If you use encryption, you help the terrorists win
I have a few friends like thisanyone have suggestions for ways to change their minds? Basically they say things like If you think the government can't break all the encryption schemes that we have, you're nuts. This guy was a math major too, so he understands the principles of crypto. It is impossible to rationalise long term consequences of data harvesting into immediate threat for most people. The only way to change behaviour in absence of the perceived threat is propaganda ... and those who have means for that have different agendas. What's left is a personal-level propaganda but the effects are negligible. You can't really save anyone. You can, however, make crypto tools that make things easier. Or surveillance tools that make things obvious. The latter, I think, is more effective. Time to open source Echelon ? = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Exclusive Video Premiere - Britney Spears http://launch.yahoo.com/promos/britneyspears/
Re: NSA Turns To Commercial Software For Encryption
Isn't it really simpler to use RSA and DH and ECC in series ? Why choose ONE ? There is no good reason for that. Looks like PSYOP to me. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Exclusive Video Premiere - Britney Spears http://launch.yahoo.com/promos/britneyspears/
Re: [mnet-devel] DOS in DHTs (fwd from amichrisde@yahoo.de)
ignored by citizens, but I have yet to see a license for owning a typewriter or PC proposed. They have already ruled numerous times that the Internet is deserving of at least as free and access as print media and There are precedents. In Franko's Spain, all typewriters had to be registered with the state, and all had serial numbers. It was illegal and punishable to possess one without license. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? The New Yahoo! Shopping - with improved product search http://shopping.yahoo.com
Re: [mnet-devel] DOS in DHTs (fwd from amichrisde@yahoo.de)
Looks like the only way to shield from DOS is to raise the cost of DOS. This will eventually eliminate the low cost of Internet bandwidth, one way or another. You don't get nearly the same amount of DOS on your telephone as you do on Internet, right ? Because telephone call is not free and/or it's traceable. The only question is how and where will this cost be introduced. My guess is that it will happen on the sending side. Even today, assymmetric cheapo-consumer connectivity makes publishing hard (as in you are not visible to the world.) But to handle DOS is harder, as major drive money on internet is selling shit, and players want easy (say 800-number) access. Proposals a la net-driving-license (NDL) indicate the trend. NDL can happen. Compare it to the early situation with cars or guns. No regulation in the beginning, you could buy or make your own and do as you please. Then, when commerce began to depend on both (transport of goods and force monopolies) they got regulated. I see no difference between that and computer with an Internet link. NDL is a possible reality. It used to be normal to drive or carry a weapon without license. These days, they catch you sooner or later and beat you into pulp. Same thing. Dreaming about it not happening will get you nowhere. So what can be done to raise the cost of DOS without introducing NDL ? I have no answer to this. What kind of NDL is the least bad ? - requirement for something that requires human effort when opening a connection. You do want to let humans into the store, but will refuse entry to headless drones. OK, wrong analogy. But you get the idea. - simply raise the cost of outgoing bandwidth - add a cost to every SYN request or equivalent (have a decent number included in the basic bandwith fee.) This will make unsuspecting collaborators in DDoS more efficient in keeping their equipment clean (whoever aids will be considered enemy combatant.) The future doesn't seem bright. I think that there is a short window - a year or two - in which some not-so-bad solution may preempt what They are trying to do. But I wouldn't hold my breath. It's far more likely that EFF and other wirehuggers will continue to be outraged (with zero effect as usual) and clampdown on 'net access will continue. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? The New Yahoo! Shopping - with improved product search http://shopping.yahoo.com
Re: [mnet-devel] DOS in DHTs (fwd from amichrisde@yahoo.de)
Looks like the only way to shield from DOS is to raise the cost of DOS. This will eventually eliminate the low cost of Internet bandwidth, one way or another. You don't get nearly the same amount of DOS on your telephone as you do on Internet, right ? Because telephone call is not free and/or it's traceable. The only question is how and where will this cost be introduced. My guess is that it will happen on the sending side. Even today, assymmetric cheapo-consumer connectivity makes publishing hard (as in you are not visible to the world.) But to handle DOS is harder, as major drive money on internet is selling shit, and players want easy (say 800-number) access. Proposals a la net-driving-license (NDL) indicate the trend. NDL can happen. Compare it to the early situation with cars or guns. No regulation in the beginning, you could buy or make your own and do as you please. Then, when commerce began to depend on both (transport of goods and force monopolies) they got regulated. I see no difference between that and computer with an Internet link. NDL is a possible reality. It used to be normal to drive or carry a weapon without license. These days, they catch you sooner or later and beat you into pulp. Same thing. Dreaming about it not happening will get you nowhere. So what can be done to raise the cost of DOS without introducing NDL ? I have no answer to this. What kind of NDL is the least bad ? - requirement for something that requires human effort when opening a connection. You do want to let humans into the store, but will refuse entry to headless drones. OK, wrong analogy. But you get the idea. - simply raise the cost of outgoing bandwidth - add a cost to every SYN request or equivalent (have a decent number included in the basic bandwith fee.) This will make unsuspecting collaborators in DDoS more efficient in keeping their equipment clean (whoever aids will be considered enemy combatant.) The future doesn't seem bright. I think that there is a short window - a year or two - in which some not-so-bad solution may preempt what They are trying to do. But I wouldn't hold my breath. It's far more likely that EFF and other wirehuggers will continue to be outraged (with zero effect as usual) and clampdown on 'net access will continue. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? The New Yahoo! Shopping - with improved product search http://shopping.yahoo.com
Re: Idea: Small-volume concealed data storage
And what is the purpose of connecting the key and data storage in the first place ? Data storage is data storage, concealed or not. You feed encrypted data to/from it. Key is required at human interface and has absolutely nothing to do with the storage. If you want better security than passphrase, then you need a mechanical key carrier. Indeed, that is where the word key comes from. You can store any number on bits on it and you'll hand it over before they beat the shit out of you - or you may want to be brave and destroy it instead (trivial with flash-on-chip and small battery cell), but, again, it has nothing to do with storage of data. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? The New Yahoo! Shopping - with improved product search http://shopping.yahoo.com
Re: Idea: Small-volume concealed data storage
And what is the purpose of connecting the key and data storage in the first place ? Data storage is data storage, concealed or not. You feed encrypted data to/from it. Key is required at human interface and has absolutely nothing to do with the storage. If you want better security than passphrase, then you need a mechanical key carrier. Indeed, that is where the word key comes from. You can store any number on bits on it and you'll hand it over before they beat the shit out of you - or you may want to be brave and destroy it instead (trivial with flash-on-chip and small battery cell), but, again, it has nothing to do with storage of data. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? The New Yahoo! Shopping - with improved product search http://shopping.yahoo.com
Re: EFF Report on Trusted Computing
It took less than a decade for EFF to make a full turn, from championing unrestricted uses of technology to censoring who can do what and in which way. In this regards EFF resembles technological empires - like Cisco, for example, that get born because of radically new ways to do things and then end up trying to stop any further change. At some point EFF left the course of enabling individuals and joined their adversaries in the sense that masses should be patronized and given this or that. Such EFF is likely to lose its support base and compete with others for generic feel-good support public. Anyone has right to offer anything. If there are enough imbeciles to take it, that's good. Imbeciles should be exploited as much as possible. Those who capitalize on imbecile protection racket are called politicians. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? The New Yahoo! Shopping - with improved product search http://shopping.yahoo.com
Re: EFF Report on Trusted Computing
It took less than a decade for EFF to make a full turn, from championing unrestricted uses of technology to censoring who can do what and in which way. In this regards EFF resembles technological empires - like Cisco, for example, that get born because of radically new ways to do things and then end up trying to stop any further change. At some point EFF left the course of enabling individuals and joined their adversaries in the sense that masses should be patronized and given this or that. Such EFF is likely to lose its support base and compete with others for generic feel-good support public. Anyone has right to offer anything. If there are enough imbeciles to take it, that's good. Imbeciles should be exploited as much as possible. Those who capitalize on imbecile protection racket are called politicians. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? The New Yahoo! Shopping - with improved product search http://shopping.yahoo.com
Re: Duck Freedom Fighter (Terrorists), Euler SUV Graffiti
And who will free the chicken ? Fucking racists. Activists Take Ducks From Foie Gras Shed FARMINGTON, Calif. With only the dim light of a half-moon to guide them, four self-proclaimed duck freedom fighters made their way early Wednesday across an abandoned field, around dilapidated, foul-smelling chicken pens, and over a narrow passage through a large manure-filled pond. ... Soon, four Peking-Muscovy ducks were free. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: Verisign's Wildcard A-Records and DNSSEC Plans?
What does it mean to say that 64.94.110.11 is or is not certified by .com as the address for bad-example-12345.com , or that something else is? Is it really the same as a wild-card that points to real sites? Your Best Practices says that At this point it is immaterial what Verisign will or will not do. They followed the predictable course based on their capabilities and the assessment that the response from some imaginary community is irrelevant. The actual damage is breaking network diagnostic procedures and spam filtering, increasing chance of undetected lost e-mail (their SMTP does not always bounce) and increased danger of mistyped domain names - as now such typo in http client leads to exposure to possibly adversarial html (which is why they started it all in the first place.) By this time it should be obvious to everyone that in the near future they will establish targeted advertizing depending on what the mistyped URL looks like - and probably sell or rent the typo name space - ie. Airborne Express could buy *f?*e?*d?*e?*x?*.com address space, so fredex.com would lead to airborne's web site. And then there is a very small step from there to schemes where, for instance, for basic $15-25/yr name rental your domain will be yours only in 90% of cases. Other 10% will be sold. For $100/yr you will be guaranteed 99.5% of the ownership. Of course, only platinum premium accounts, at $100K/yr, will have 100% ownership. That is the problem when a centralized technical solution relies on the legal system (and they almost always do.) What is important is how and if will this accelerate alternate solutions for name space management. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: [p2p-hackers] Project Announcement: P2P Sockets
infrastructure for these. Everyone knows about them by using a common boostrap server to bootstrap into the Jxta network to gain the addresses of a few Rendezvous nodes. Rendezvous nodes then propagate So they are subject to lawsuits. Anyone running them can be traced and persuaded by the local force monopoly to stop running them. I see this just as shifting vulnerability point from the current one (ISPs, ICANN) to a new one, equally traceable. What this can buy is few months of confusion. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: [p2p-hackers] Project Announcement: P2P Sockets
infrastructure for these. Everyone knows about them by using a common boostrap server to bootstrap into the Jxta network to gain the addresses of a few Rendezvous nodes. Rendezvous nodes then propagate So they are subject to lawsuits. Anyone running them can be traced and persuaded by the local force monopoly to stop running them. I see this just as shifting vulnerability point from the current one (ISPs, ICANN) to a new one, equally traceable. What this can buy is few months of confusion. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: [p2p-hackers] Project Announcement: P2P Sockets (fwd from bradneuberg@yahoo.com)
stable IP address. Super-peers on the Jxta network run application-level routers which store special information such as how to reach peers, how to join So these super peers are reliable, non-vulnerable, although everyone knows where they are, because ? = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: cats
Well, cats *do* have a quite strict hierarchy which is far from ad-hoc establishment of the pecking order. So the analogy dosn't hold with cat behavioral experts. However, if cats could perform anonymized hissing, biting and scratching, then I'm sure that cypherpunk maillist would be a good analogy for cat behavior. Second, if you examine the context of the original post, the statement was a metaphor about leaderless (anarchic) assemblies such as this list. In particular, the Feds (dogs) haven't historically understood that this list is the equivalent of a grad lounge or spontaneous beach party: there are multiple conversations, no one is moderating or otherwise choreographing squat. When cats encounter each other by chance, they may assert dominance, (linguistic pissing contests are not unheard of here :-) but their lives are not structured around following, or smelling the higher-up's ass. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: [p2p-hackers] Project Announcement: P2P Sockets (fwd from bradneuberg@yahoo.com)
stable IP address. Super-peers on the Jxta network run application-level routers which store special information such as how to reach peers, how to join So these super peers are reliable, non-vulnerable, although everyone knows where they are, because ? = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: cats
Well, cats *do* have a quite strict hierarchy which is far from ad-hoc establishment of the pecking order. So the analogy dosn't hold with cat behavioral experts. However, if cats could perform anonymized hissing, biting and scratching, then I'm sure that cypherpunk maillist would be a good analogy for cat behavior. Second, if you examine the context of the original post, the statement was a metaphor about leaderless (anarchic) assemblies such as this list. In particular, the Feds (dogs) haven't historically understood that this list is the equivalent of a grad lounge or spontaneous beach party: there are multiple conversations, no one is moderating or otherwise choreographing squat. When cats encounter each other by chance, they may assert dominance, (linguistic pissing contests are not unheard of here :-) but their lives are not structured around following, or smelling the higher-up's ass. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Charted death of cypherpunks
http://recall.archive.org/?query=cypherpunkssearch=goafterMonth=1afterYear=1996beforeMonth=TodaybeforeYear=%A0 (the above URL should be all in one line, of course) = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: Searching for uncopyable key made of sparkles in plastic
Several months ago, I read about someone who was making a key that was difficult if not impossible to copy. They mixed sparkly things into a plastic resin and let them set. A camera would take a picture This boils down to difficulty of faking the analog interface. Anything that regular camera captures the attacker can also capture and reproduce it for the benefit of the camera. This means that camera has to be able to distinguish between the real thing and images of the real thing. This probably means going beyond optical image and somehow detecting 3D coordinates of particles, forcing the attacker to actually construct a new physical key carrier. At the current level of technology and economy, it's cheaper to hire an unemployed hardware engineer (no, s/w engs are not qualified,) to look at the key than to construct a 3D particle-sensing camera. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: Responding to orders which include a secrecy requirement
What Tim is (correctly) observing here is that a working challenge to the force monopoly is a very effective way to modify behaviour. Where Tim is wrong, though, is that he may have anything resembling a working challenge. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: Responding to orders which include a secrecy requirement
What Tim is (correctly) observing here is that a working challenge to the force monopoly is a very effective way to modify behaviour. Where Tim is wrong, though, is that he may have anything resembling a working challenge. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: traffix analysis
as a solid dish. (The uwaves see the screen as solid, however.) With that much gain (ie directionality) wind could mess with your (albeit brief) connection. This one has 30 degree coverage and is perfect for connecting to consumer APs up to a mile: http://www.tranzeo.com/products.php?cmd=viewpageid=102 Car window glass will cost you about 1.5-2 dB. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: traffix analysis
as a solid dish. (The uwaves see the screen as solid, however.) With that much gain (ie directionality) wind could mess with your (albeit brief) connection. This one has 30 degree coverage and is perfect for connecting to consumer APs up to a mile: http://www.tranzeo.com/products.php?cmd=viewpageid=102 Car window glass will cost you about 1.5-2 dB. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: JAP back doored
This is a terrible day for privacy advocates that used the once (perhaps This is the great day for *true* privacy advocates worldwide. In face of huge difficulties and dangers in providing real anonymity, some human rights/wrongs organisations capitalised (in several ways) on the need for anonymity by providing non-solutions with cosmetic appearance of anonymity. They captured the gullible public with this service and dealt another blow to the real anonymity. Who needs complicated mixmaster when there are cool cretin-friendly java/web/whatever solutions ? One would hope that users of other centralised anonymity services will learn from this, if one is incurable optimist, that is. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: paradoxes of randomness
Is this sequence random? Compressible? How could you tell whether this sequence is random or not, if you didn't know the key? This is the a way to describe so-called randomness. One simply has no adequate access to the Key and/or the Algorithm. Both coin flipping and quantum noise fall into this category. Actually, it's a pretty good method of authenticating Allah. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: paradoxes of randomness
- N+1 is the smallest integer that's not interesting. But that's interesting in itself - so N+1 is interesting. It breaks down after few consequtive non-interesting integers. In fact, there is a proof somewhere that 17, 18 and 19 are not interesting at all. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: Idea: Homemade Passive Radar System (GNU/Radar)
As an active twist, we can also use a separate unit, Illuminating Transceiver (IT), periodically broadcasting a pulse of known characteristics, easy to recognize by the LPs when it bounces from an aerial target. This unit has to be cheap and expendable - it's easy to locate and to destroy by a HARM missile. As a bonus, forcing the adversary to waste a $250,000+ AGM-88 missile on a sub-$100 transmitter may be quite demoralizing. There can be a whole hierarchy of ITs; when one of them Microwave oven. This has been done in recent years in various theatres. Even other sources can serve as involuntary ITs. The landscape is littered with cellular base stations and civilian TV and radio transmitters. Just pick the suitable frequency and listen on. There is enough wideband power in the ether above inhabited areas to make passive detection from reflected EM possible in theory (without any EM emanating from the target.) The space is illuminated, but the eyes are not good enough, yet. Signal levels are extremely low, but it's likely that a flying jet reflects back enough from hundreds of cellphone/celltower transmissions to be few dB above the background noise. However, without knowing where to look the receiver cannot use typical narrow beam high-gain antennas. What is needed is an array, like an insect's eye, and that will be a sizeable contraption - passive, but not small. In other words, the size of a passive eye is proportional to the wavelength. To get human eye resolution in 10cm band the size gets to 2km across. Big eye. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: They never learn: Omniva Policy Systems
seems horribly limiting. What of those using Entourage, or Mail, or any of the dozens of platforms and news readers in existence. The site mentions that they are now Blackberry-compliant. Well, does this mean employees of the companies using Omniva Policy Manager cannot read their mail on their Palms, or their laptops running other mail programs, and so on? My experience with ordinary Joe Six Suits users is that they are progressively dumber and understand less and less tools they use to powerpoint on. The gap between reality and their understanding of computers is widening. Computers have finally adapted to idiots. At this point snake oils as the mentioned one is perfectly fundable and marketable. There is a significant user base that it will work for. Remember all discussions about single DES being good enough only for braindead ? Well, now they are past that. Layer 7 interface obstacles are now good enough. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: A 'Funky A.T.M.' Lets You Pay for Purchases Made Online
If the digicash isn't anonymous, it's worthless. I'd argue to the contrary. First, most people have nothing to hide. The folks will want digicash for reasons other than anonymity, as argued You are misusing the term cash. What you are describing are essentially internet debit cards. While it is attractive to insert word cash into any harebrained net money scheme, exactly because of positive associations with CASH, it is misleading and deceptive. Cash means off-line clearing and anonymous. If it is complicated to understand, open your wallet, take a banknote out of it and ponder what it is for a minute. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: idea: brinworld meets the credit card
Those are the hard problems. No one in biometrics has yet been able to solve them in a general way. And the merchant example is the wrong application. The merchant doesn't care WHO you are - that's a false premise. Merchant cares if you can pay. Now, that's a completely solvable issue. Of course, we know who and why is trying to misrepresent this. All other applications of biometrics boil down to threatening with punishment (we know who you are, behave or else ...) - and then the biometrics ceases to be in the interest of the eyeball holder. Even granting door access to employees fits this category. You don't let any qualified mathematician willing to work to enter the lab - you let in only those that you know where they live, have signed contracts with them, etc. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? SBC Yahoo! DSL - Now only $29.95 per month! http://sbc.yahoo.com
Re: Idea: The ultimate CD/DVD auditing tool
There's a good reason why, viz: it would cost the drive developer to allow or export this flexibility. Since very few customers are sick enough This will go the same way as radio. First, you have hundreds of separate boxes, each doing some custom modulation/frequency gig (am, fm, shortwave, TV, cell, spread spectrum, whatever) and you had to have a separate apparatus for each instance. With software radio, you just have one box that can do it all (and it made all protection-by-custom-modulation obsolete ... I've seen it playing protected HDTV signals.) So it's easy to imagine universal software disc player/recorder that let's one do any modulation technique. Not that it would provide protection, because the same tools will be available to attackers, but at least the crypto may become more fun, going back to physical domain. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? SBC Yahoo! DSL - Now only $29.95 per month! http://sbc.yahoo.com
Re: Attacking networks using DHCP, DNS - probably kills DNSSEC
security, but having both the user and administrator configure a per host secret was apparently out of the question. There is no such thing as automatic security. That's an oxymoron. Any system that is secure without the ongoing burn of end-user brain cycles is subject to more-or-less easy subversion [a corollary of this is that masses will never be in situation to be both (1) end users and (2) secure. One can be a product and secure at the same time without effort, though.] And any system that (in theory) makes DNS foolproof will inevitably exclude any parallel name services. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? SBC Yahoo! DSL - Now only $29.95 per month! http://sbc.yahoo.com
Re: Senators from Utah being Southern
Religions are essentially collections of stories about the latter method Religions are artificial shortcuts to knowledge and excellent method to neutralize congenital human curiosity. If you can't comprehend it, fake it. They all offer explanations of various phenomena by using familiar human memes (fathers, mothers, children, birth, death.) It works most of the time. The major difference between politics and religion is that politics is streamlined, it doesn't count on the internal consistency (and related effort to grasp it) but instead uses (via media) brute force of repetition. It all boils down to getting masses to farm out the inquisitivness and then servicing it. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? SBC Yahoo! DSL - Now only $29.95 per month! http://sbc.yahoo.com
Re: An attack on paypal -- secure UI for browsers
The solution to this is Palladium (NGSCB). You'd want each ecommerce site to download a Nexus Computing Agent into the client. This should be no more difficult than downloading an Active-X control or some other DLL. The NCA has a manifest file associated with it No shit? This is moronic. But then it reflects the impaired cognitive abilities of corpdrones in mintel. I pay for the computer, and then all these corporations start downloading shit to my computer in order to make it safe for me to use it, right ? I am lay person and need to trust these people, as I am clueless about stuff they download. But their web page says it's good. This all happens *after* I buy the computer. So, to recap, I pay several $K for the computer and then have to customize it so that it becomes safe. The computer, as malladium authenticates the computer. Why do I want $3,000 authentication token ? No, mintel making money is not the right answer. Try again. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Calendar - Free online calendar with sync to Outlook(TM). http://calendar.yahoo.com
Re: IQ, g, flying
Just FYI, if you read up on G (general intelligence factor), you will learn that the *only* cause of death that increases with G is dying in airplanes. Surviving flying is very much similar to exercising safe crypto practices; you must examine the source and recompile PGP for each message. Once you start to _believe_ that it's a sound code, you are on your way out of the gene pool. Hint to Tim: 99.7% of flyers, including all instructors, believe. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Calendar - Free online calendar with sync to Outlook(TM). http://calendar.yahoo.com
cooperative evil bit
ftp://ftp.rfc-editor.org/in-notes/rfc3514.txt excerpt: 1. Introduction Firewalls [CBR03], packet filters, intrusion detection systems, and the like often have difficulty distinguishing between packets that have malicious intent and those that are merely unusual. The problem is that making such determinations is hard. To solve this problem, we define a security flag, known as the evil bit, in the IPv4 [RFC791] header. Benign packets have this bit set to 0; those that are used for an attack will have the bit set to 1. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Tax Center - File online, calculators, forms, and more http://tax.yahoo.com
Re: Logging of Web Usage
Frankly, it seems that some brains around here are softening. Relying on httpd operators to protect those who access is plain silly, even if echelon (funny how that word dropped below radar lately) did not exist. The proper way is, of course, self-protection. Start with tight control of outgoing info from the end-user machine (remove or fake all fields that are not essential, such as referrer, client application, client OS). Use proxies. If you own a multi-IP subnet randomly switch the originating IP - this fucks up most automated tracking. What doesn't exist is mixmaster-grade anon re-httpers. I guess that ones that would let just text through (no images/scripting etc.) would be repulsive enough for wide public and therefore useful. Once you provide your data, it is always retained forever. Learn to live with it. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Tax Center - File online, calculators, forms, and more http://tax.yahoo.com
Re: pgp in internet cafe (webpgp)
why not just use ssh? you can scp the text to your host, encrypt/decrypt it *there* then scp it back if needs be. you also then don't need to use webmail - just have a mailbox on that server that you forward your webmail to, and that you send email in the name of the webmail account from. its easy enough to grab down puTTY whenever you need it. Ever tried to install a ssh client on a random internet cafe computer ? = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Platinum - Watch CBS' NCAA March Madness, live on your desktop! http://platinum.yahoo.com
Re: Crypto anarchy now more than ever
This is what we need to fight. And this was, and perhaps still is, the promises of unlinkable credentials, of untraceable digital cash, and of True Names. Crypto anarchy is needed now more than ever. There are hardly battlegrounds available. Software runs on machines big ones make, bits travel on wires owned by the big few, and DMCA/TCPA/BLAHBLAH or not, it is harder and harder for any crypto to parasite on top of that, at least when sheeple is concerned. Crypto has deferred benefits and thus is beyond grasp in the world of short attention span where immediate gratification rules. The *only* way to impose crypto on the masses is not through anarchy but by organised force - a state could do it. Guess when it will happen. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Shopping - Send Flowers for Valentine's Day http://shopping.yahoo.com
Re: The practical reason the U.S. is starting a war
I'm wondering why Cryptome decided to place thisB particular piece of opinion.B It is not inkeeping w/ the type of stuff I've read here before, in terms of it being a straightB opinion piece, not a document,B federal register entry, etc..B Why did you (who is that exactly, anyway?) choose to includeB it?B I On a purely theoretical plane, there is no straight opinion. When one mentiones word France, for example, it assumes a lot - that the french state is a legitimate state, that state is a valid entity in the first place, and that term France is a legitimate name for that particular territory. Language is a distillate of past propaganda. The newcomers and dissenters have no advantage of legitimate words to support their case. They must use elaborate descriptions or define new macros. That you see nothing wrong with word federal but see something wrong with word mutant is a display of your own bias. And the mere notion that valid stuff (facts) can be smeared by racist stuff illustrates that you are not looking for facts, but for granfallooning with something, with a group or idea. (Along those lines, *anything* a politician thug ever mentioned would become smeared and invalid. OK, bad example.) = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Shopping - Send Flowers for Valentine's Day http://shopping.yahoo.com
Re: The practical reason the U.S. is starting a war
I'm wondering why Cryptome decided to place thisB particular piece of opinion.B It is not inkeeping w/ the type of stuff I've read here before, in terms of it being a straightB opinion piece, not a document,B federal register entry, etc..B Why did you (who is that exactly, anyway?) choose to includeB it?B I On a purely theoretical plane, there is no straight opinion. When one mentiones word France, for example, it assumes a lot - that the french state is a legitimate state, that state is a valid entity in the first place, and that term France is a legitimate name for that particular territory. Language is a distillate of past propaganda. The newcomers and dissenters have no advantage of legitimate words to support their case. They must use elaborate descriptions or define new macros. That you see nothing wrong with word federal but see something wrong with word mutant is a display of your own bias. And the mere notion that valid stuff (facts) can be smeared by racist stuff illustrates that you are not looking for facts, but for granfallooning with something, with a group or idea. (Along those lines, *anything* a politician thug ever mentioned would become smeared and invalid. OK, bad example.) = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Shopping - Send Flowers for Valentine's Day http://shopping.yahoo.com
Re: Crypto anarchy now more than ever
This is what we need to fight. And this was, and perhaps still is, the promises of unlinkable credentials, of untraceable digital cash, and of True Names. Crypto anarchy is needed now more than ever. There are hardly battlegrounds available. Software runs on machines big ones make, bits travel on wires owned by the big few, and DMCA/TCPA/BLAHBLAH or not, it is harder and harder for any crypto to parasite on top of that, at least when sheeple is concerned. Crypto has deferred benefits and thus is beyond grasp in the world of short attention span where immediate gratification rules. The *only* way to impose crypto on the masses is not through anarchy but by organised force - a state could do it. Guess when it will happen. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Shopping - Send Flowers for Valentine's Day http://shopping.yahoo.com
Re: Putting the NSA Data Overwrite Standard Legend to Death... (fwd)
From the OSI 7-layer model, which took it from the fact that the number 7 is It's simpler than that. Russians wanted 6, americans 8. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com
Re: Putting the NSA Data Overwrite Standard Legend to Death... (fwd)
From the OSI 7-layer model, which took it from the fact that the number 7 is It's simpler than that. Russians wanted 6, americans 8. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com