tastes like...
At 11:05 AM 6/24/04 -0400, Tyler Durden wrote: Hum...perhaps some oregano needs to be laced with cy*n*de or something. Let that piece of shit sniff THAThe did, after all, literally ask for it. You could even say, Uh, you don't want to sniff that... LD50 for KCN is about 3mg/Kg. Not only a good way to eliminate homeless people (leave a packet around) but if the cops still do gum-numbing tests you'd want to crush some Castor seeds and extract the water soluable protein. A few days later his ribosomes stop working, no more proteins mean no more fascism. Also a good plan if you are a vendor to the children of D.C. fascists.
Re: [IP] When police ask your name,
At 05:16 AM 6/22/04 +0200, Eugen Leitl wrote: - Forwarded message from [EMAIL PROTECTED] - The court's 5-4 decision upholds laws in at least 21 states giving police the right to ask people their name and jail those who don't cooperate. I'm out of it for a few weeks and this is what happens. How many names can a person have? Anyone can change their name any number of times if not for fraudulent purposes. My brother changed his middle name from something normal to Cariboo. My dad's a lawyer so the fees were zero. Can I use Major Variola (ret) as a nym since I use it? Must I spell my last (real) name which is hard to write as its from another language? Can I abbreviate? Can I have a religious exemption (We do not identify our religion to nonbelievers, nor do we speak to government officials, in my faith). Can I use cyrillic or mandarin to write it, a temporary bout of elective mutism? Of course lying to a pig is illegal (but not vice versa) but lying is subject to interpretation. My name is yahway, ie I am. Yours is go away, ie fuck off. Go for the head shot, they're wearing body armor. Suicide by police is a noble cause, if you take one of them out.
Re: [p2p-hackers] The Fifth HOPE in NYC (fwd from vab@cryptnet.net)
On Fri, Jun 25, 2004 at 10:02:40AM +0200, Eugen Leitl wrote: - Forwarded message from V. Alex Brennen [EMAIL PROTECTED] - From: V. Alex Brennen [EMAIL PROTECTED] Date: Thu, 24 Jun 2004 09:24:56 -0400 To: Peer-to-peer development. [EMAIL PROTECTED] Subject: [p2p-hackers] The Fifth HOPE in NYC User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7) Gecko/20040616 Reply-To: Peer-to-peer development. [EMAIL PROTECTED] At The Fifth HOPE a talk will be given on how to break anonymity networks. Some commonly used p2p code such as Tor and the remailers will be covered. I cannot attend the conference. Is anyone on the list going who could report back? I'm interested to hear if anything other than what's already been widely published is covered in this talk. Yes, I'm one of the 5H organizers. We'll be audio videotaping, so eventually you'll be able to get the full story. I'll try to write something up afterwards, or email me directly. From the description, it's hard to tell whether this will be something revealing, or just a review of the well-known. -- Greg I'm working on a p2p anonymity project. Thanks, - VAB The Fifth HOPE, NYC July 9-11th, 2004 http://www.the-fifth-hope.org/ How To Break Anonymity Networks Nick Mathewson Today's anonymous communication software (such as Mixmaster, Mixminion, Nymservers, JAP, Tor, Anonymizer, etc.) allows people to communicate while concealing their identities from each other and from external attackers. But no deployed system is strong enough to protect every pattern of user behavior against a sufficiently resourceful adversary, and many of them fall to far simpler attacks. In this talk, Nick will discuss working attacks against today's anonymity networks, drawing from past technical and social attacks on deployed networks and from recent academic research in traffic analysis, stylometry, and mix-net design. He will present defenses to these attacks when such defenses are known to exist. Saturday 2300 Area B ___ p2p-hackers mailing list [EMAIL PROTECTED] http://zgp.org/mailman/listinfo/p2p-hackers ___ Here is a web page listing P2P Conferences: http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences - End forwarded message - -- Eugen* Leitl a href=http://leitl.org;leitl/a __ ICBM: 48.07078, 11.61144http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net
My name is !
clicks are rare now but may have been common when humans hunted as they are more discrete. they are notated by modern linguists as !. Vietnamese has punctuation marks up the kazoo. Futurist types often pick new names for themselves. Is ESPN a name? Can I use unicode on my son's birth cert?
[p2p-hackers] The Fifth HOPE in NYC (fwd from vab@cryptnet.net)
- Forwarded message from V. Alex Brennen [EMAIL PROTECTED] - From: V. Alex Brennen [EMAIL PROTECTED] Date: Thu, 24 Jun 2004 09:24:56 -0400 To: Peer-to-peer development. [EMAIL PROTECTED] Subject: [p2p-hackers] The Fifth HOPE in NYC User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7) Gecko/20040616 Reply-To: Peer-to-peer development. [EMAIL PROTECTED] At The Fifth HOPE a talk will be given on how to break anonymity networks. Some commonly used p2p code such as Tor and the remailers will be covered. I cannot attend the conference. Is anyone on the list going who could report back? I'm interested to hear if anything other than what's already been widely published is covered in this talk. I'm working on a p2p anonymity project. Thanks, - VAB The Fifth HOPE, NYC July 9-11th, 2004 http://www.the-fifth-hope.org/ How To Break Anonymity Networks Nick Mathewson Today's anonymous communication software (such as Mixmaster, Mixminion, Nymservers, JAP, Tor, Anonymizer, etc.) allows people to communicate while concealing their identities from each other and from external attackers. But no deployed system is strong enough to protect every pattern of user behavior against a sufficiently resourceful adversary, and many of them fall to far simpler attacks. In this talk, Nick will discuss working attacks against today's anonymity networks, drawing from past technical and social attacks on deployed networks and from recent academic research in traffic analysis, stylometry, and mix-net design. He will present defenses to these attacks when such defenses are known to exist. Saturday 2300 Area B ___ p2p-hackers mailing list [EMAIL PROTECTED] http://zgp.org/mailman/listinfo/p2p-hackers ___ Here is a web page listing P2P Conferences: http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences - End forwarded message - -- Eugen* Leitl a href=http://leitl.org;leitl/a __ ICBM: 48.07078, 11.61144http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net pgp2g7nV2p8vt.pgp Description: PGP signature
Agent Smith
Don't citizens have to have an english-alphabet transliteration of their name to use for legal purposes (birth certificate, green card, social security record)? Not in the US. In Japan and some nordic countries, only established names can be registered. The DMV differentiates same-name people by SSN, right? Is it very far-fetched to imagine that state courts and federal appeals courts will uphold state laws requiring SSN disclosure for identification purposes? I'm sorry, I only have a memory capacity of 7 plus or minus 2. I can deny my memory, particulary under stress of interrogation. Or I could use J. Edgar Hoovers which I sometimes mistake for mine.
Re: my name is Doe, John Doe
How about Mr. Null Void? That should be plenty of fun for data-entry clerks and the like..
Re: My name is !
At 09:47 PM 6/24/2004, Major Variola (ret) wrote: Subject: My name is ! I had parsed the Major's Subject line diffently, and was expecting this to be followed by My name is ! My name is ! My name is ! Slim Shady I'm Slim Shady! I'm the _real_ Slim Shady! All you other Slim Shady's are just imitatin! etc. etc. and while a cop might not expect you to break out into song when asked a straightforward question, cops these days who aren't doing extortion are mostly doing political theater, so why not a bit of musical theater, at least as long as you convince the RIAA that what you're doing is _advertising_, not plagiarism...
Re: [IP] When police ask your name,
On Thu, Jun 24, 2004 at 09:45:09PM -0700, Major Variola (ret) wrote: How many names can a person have? Anyone can change their name any number of times if not for fraudulent purposes. My brother changed his middle name from It is precisely for these reasons that changing your name in Germany is a major undertaking (costs money, too), and is associated with a background check (clean rap sheet requried). The transcription rules for furriner names are strict, too. No Phn'glui M'gl wna'f, Cthulhu R'lyeh Wgha Nagl Ftaghn for you. Such legislation, of course, is easy to introduce in the U.S. as well. I'd be really surprised of you US cpunks didn't have a national ID cum biometrics issued (er, make that rammed down your throat) a few years downstream. Unless the general populace wakes up to the fact what's been going on since the 1970s. Fat chance. -- Eugen* Leitl a href=http://leitl.org;leitl/a __ ICBM: 48.07078, 11.61144http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net pgpiddksA3fPD.pgp Description: PGP signature