tastes like...

2004-06-25 Thread Major Variola (ret)
At 11:05 AM 6/24/04 -0400, Tyler Durden wrote:
Hum...perhaps some oregano needs to be laced with cy*n*de or something.
Let
that piece of shit sniff THAThe did, after all, literally ask for
it.
You could even say, Uh, you don't want to sniff that...

LD50 for KCN is about 3mg/Kg.  Not only a good way to eliminate
homeless people (leave a packet around) but if the cops still do
gum-numbing
tests you'd want to crush some Castor seeds and extract the water
soluable
protein.  A few days later his ribosomes stop working, no more proteins
mean no more fascism.  Also a good plan if you are a vendor to the
children
of D.C. fascists.







Re: [IP] When police ask your name,

2004-06-25 Thread Major Variola (ret)
At 05:16 AM 6/22/04 +0200, Eugen Leitl wrote:
- Forwarded message from [EMAIL PROTECTED] -
The court's 5-4 decision upholds laws in at least 21 states giving
police
the right to ask people their name and jail those who don't cooperate.

I'm out of it for a few weeks and this is what happens.

How many names can a person have?  Anyone can change
their name any number of times if not for fraudulent
purposes.  My brother changed his middle name from
something normal to Cariboo.  My dad's a lawyer so
the fees were zero.  Can I use Major Variola (ret)
as a nym since I use it?  Must I spell my last (real) name which
is hard to write as its from another language?  Can
I abbreviate?  Can I have a religious exemption
(We do not identify our religion to nonbelievers,
nor do we speak to government officials, in my
faith).  Can I use cyrillic or mandarin to write
it, a temporary bout of elective mutism?

Of course lying to a pig is illegal (but not vice
versa) but lying is subject to interpretation.

My name is yahway, ie I am.  Yours is go away,
ie fuck off.

Go for the head shot, they're wearing body armor.
Suicide by police is a noble cause, if you take one of them
out.








Re: [p2p-hackers] The Fifth HOPE in NYC (fwd from vab@cryptnet.net)

2004-06-25 Thread Greg Newby

On Fri, Jun 25, 2004 at 10:02:40AM +0200, Eugen Leitl wrote:
 - Forwarded message from V. Alex Brennen [EMAIL PROTECTED] -
 
 From: V. Alex Brennen [EMAIL PROTECTED]
 Date: Thu, 24 Jun 2004 09:24:56 -0400
 To: Peer-to-peer development. [EMAIL PROTECTED]
 Subject: [p2p-hackers] The Fifth HOPE in NYC
 User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7) Gecko/20040616
 Reply-To: Peer-to-peer development. [EMAIL PROTECTED]
 
 At The Fifth HOPE a talk will be given on how to break
 anonymity networks. Some commonly used p2p code such as
 Tor and the remailers will be covered.
 
 I cannot attend the conference.  Is anyone on the list going
 who could report back?  I'm interested to hear if anything
 other than what's already been widely published is covered
 in this talk.

Yes, I'm one of the 5H organizers.  We'll be audio  videotaping,
so eventually you'll be able to get the full story.  I'll try
to write something up afterwards, or email me directly.  From
the description, it's hard to tell whether this will be something
revealing, or just a review of the well-known.
  -- Greg

 I'm working on a p2p anonymity project.
 
 
 Thanks,
 
- VAB
 
 
 The Fifth HOPE, NYC July 9-11th, 2004
 http://www.the-fifth-hope.org/
 How To Break Anonymity Networks
 Nick Mathewson
 
 Today's anonymous communication software (such as Mixmaster, Mixminion, 
 Nymservers, JAP, Tor, Anonymizer, etc.) allows people to communicate 
 while concealing their identities from each other and from external 
 attackers. But no deployed system is strong enough to protect every 
 pattern of user behavior against a sufficiently resourceful adversary, 
 and many of them fall to far simpler attacks. In this talk, Nick will 
 discuss working attacks against today's anonymity networks, drawing from 
 past technical and social attacks on deployed networks and from recent 
 academic research in traffic analysis, stylometry, and mix-net design. 
 He will present defenses to these attacks when such defenses are known 
 to exist.
 
 Saturday 2300
 Area B
 ___
 p2p-hackers mailing list
 [EMAIL PROTECTED]
 http://zgp.org/mailman/listinfo/p2p-hackers
 ___
 Here is a web page listing P2P Conferences:
 http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences
 
 - End forwarded message -
 -- 
 Eugen* Leitl a href=http://leitl.org;leitl/a
 __
 ICBM: 48.07078, 11.61144http://www.leitl.org
 8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
 http://moleculardevices.org http://nanomachines.net




My name is !

2004-06-25 Thread Major Variola (ret)
clicks are rare now but may have been common when humans hunted
as they are more discrete.  they are notated by modern linguists as
!.  Vietnamese has punctuation marks up the kazoo.  Futurist types
often pick new names for themselves.  Is ESPN a name?   Can
I use unicode on my son's birth cert?





[p2p-hackers] The Fifth HOPE in NYC (fwd from vab@cryptnet.net)

2004-06-25 Thread Eugen Leitl
- Forwarded message from V. Alex Brennen [EMAIL PROTECTED] -

From: V. Alex Brennen [EMAIL PROTECTED]
Date: Thu, 24 Jun 2004 09:24:56 -0400
To: Peer-to-peer development. [EMAIL PROTECTED]
Subject: [p2p-hackers] The Fifth HOPE in NYC
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7) Gecko/20040616
Reply-To: Peer-to-peer development. [EMAIL PROTECTED]

At The Fifth HOPE a talk will be given on how to break
anonymity networks. Some commonly used p2p code such as
Tor and the remailers will be covered.

I cannot attend the conference.  Is anyone on the list going
who could report back?  I'm interested to hear if anything
other than what's already been widely published is covered
in this talk.

I'm working on a p2p anonymity project.


Thanks,

   - VAB


The Fifth HOPE, NYC July 9-11th, 2004
http://www.the-fifth-hope.org/
How To Break Anonymity Networks
Nick Mathewson

Today's anonymous communication software (such as Mixmaster, Mixminion, 
Nymservers, JAP, Tor, Anonymizer, etc.) allows people to communicate 
while concealing their identities from each other and from external 
attackers. But no deployed system is strong enough to protect every 
pattern of user behavior against a sufficiently resourceful adversary, 
and many of them fall to far simpler attacks. In this talk, Nick will 
discuss working attacks against today's anonymity networks, drawing from 
past technical and social attacks on deployed networks and from recent 
academic research in traffic analysis, stylometry, and mix-net design. 
He will present defenses to these attacks when such defenses are known 
to exist.

Saturday 2300
Area B
___
p2p-hackers mailing list
[EMAIL PROTECTED]
http://zgp.org/mailman/listinfo/p2p-hackers
___
Here is a web page listing P2P Conferences:
http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgp2g7nV2p8vt.pgp
Description: PGP signature


Agent Smith

2004-06-25 Thread Major Variola (ret)
Don't citizens have to have an english-alphabet transliteration of
their
name to use for legal purposes (birth certificate, green card, social
security record)?

Not in the US.  In Japan and some nordic countries, only established
names can be registered.

The DMV differentiates same-name people by SSN, right?  Is it very
far-fetched to imagine that state courts and federal appeals courts
will
uphold state laws requiring SSN disclosure for identification purposes?

I'm sorry, I only have a memory capacity of 7 plus or minus 2.  I can
deny
my memory, particulary under stress of interrogation.

Or I could use J. Edgar Hoovers which I sometimes mistake for mine.





Re: my name is Doe, John Doe

2004-06-25 Thread Major Variola (ret)
How about Mr. Null Void?  That should be plenty of fun
for data-entry clerks and the like..





Re: My name is !

2004-06-25 Thread Bill Stewart
At 09:47 PM 6/24/2004, Major Variola (ret) wrote:
 Subject: My name is !
I had parsed the Major's Subject line diffently,
and was expecting this to be followed by
My name is ! My name is ! My name is ! Slim Shady
I'm Slim Shady!  I'm the _real_ Slim Shady!
All you other Slim Shady's are just imitatin!
etc. etc.
and while a cop might not expect you to break out into song
when asked a straightforward question,
cops these days who aren't doing extortion are
mostly doing political theater, so why not a bit of musical theater,
at least as long as you convince the RIAA that what you're
doing is _advertising_, not plagiarism...



Re: [IP] When police ask your name,

2004-06-25 Thread Eugen Leitl
On Thu, Jun 24, 2004 at 09:45:09PM -0700, Major Variola (ret) wrote:

 How many names can a person have?  Anyone can change
 their name any number of times if not for fraudulent
 purposes.  My brother changed his middle name from

It is precisely for these reasons that changing your name in Germany is a
major undertaking (costs money, too), and is associated with a background
check (clean rap sheet requried). The transcription rules for furriner names
are strict, too. No Phn'glui M'gl wna'f, Cthulhu R'lyeh Wgha Nagl Ftaghn for
you.

Such legislation, of course, is easy to introduce in the U.S. as well.
I'd be really surprised of you US cpunks didn't have a national ID cum
biometrics issued (er, make that rammed down your throat) a few years 
downstream. Unless the general populace wakes up to the fact what's 
been going on since the 1970s. Fat chance.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpiddksA3fPD.pgp
Description: PGP signature