Re: Wikipedia & Tor
> But now we're back to the question: how can Tor be improved to deal with > this very serious and important problem? What are the steps that might > be taken, however imperfect, to reduce the amount of abuse coming from > Tor nodes? That's trivial: charge Tor-originated users for editing. That 0.0001% (all three of them) that actually contributes to Wikipedia will be resourceful enough to create untraceable payment accounts. end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Yahoo! Mail - PC Magazine Editors' Choice 2005 http://mail.yahoo.com
spoofing for dyslexic
Just a tiny interesting operation found out via routine misspelling that can breed paranoia in idle minds: sprint has smtp to SMS gateway for its customers running at messaging.sprintpcs.com, so if you e-mail to [EMAIL PROTECTED] the user gets message on the phone. Interestingly enough, there is also valid domain messaging.sprintpsc.com (note the swapped last two letters) that resolves to no less than 8 IP addresses. Someone wants it really reliable: Addresses: 69.25.27.171, 66.150.161.141, 69.25.27.170, 69.25.27.172 66.150.161.133, 66.150.161.140, 66.150.161.134, 66.150.161.136 sprintpsc.com is operated by po-box identified entity: Registrant: Acme Mail Box 455 Miami, FL 33265 US 305-201-4774 and of course messages sent to [EMAIL PROTECTED] do not end up on sprint's subscriber handset. Could be completely coincidental, of course. end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Discover Yahoo! Find restaurants, movies, travel and more fun for the weekend. Check it out! http://discover.yahoo.com/weekend.html
Re: [IP] Google's Web Accelerator is a big privacy risk (fwd from dave@farber.net)
> Google cookies last as long as possible -- until 2038. If you've And you are allowing cookies because ... ? And you are keeping cookies past the session because ... ? Too lazy not to? To lazy to login again? Inherent belief that commercial entity should make your life easy for purely philantropical reasons? Just plain dumb? end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Yahoo! Mail Mobile Take Yahoo! Mail with you! Check email on your mobile phone. http://mobile.yahoo.com/learn/mail
zombied ypherpunks (Re: Email Certification?)
> I'm still having trouble understanding your threat model. Just assume braindeath and it becomes obvious. No tla with any dignity left would bother e-mail providers or try to get your password. All it need to do is fill gforms and get access to tapped traffic at major nodes (say, 20 in US is sufficient?). Think packet reassembly -> filter down -> store everything forever -> google on demand. Concerned about e-mail privacy? There is this obscure software called 'PGP', check it out. Too complicated? That's the good thing about evolution, not everyone makes it. end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com
Re: DTV Content Protection
This very likely means that someone already has MM figured out; the question is not whether it will be revealed, but when. > All of these attacks focus on finding the master secret MM value; once > that is found, the security of the system collapses. Given a KSV it is > immediately possible to deduce the corresponding private key if you know > the MM. Although both HDCP and DTCP have mechanisms for revocations of > cracked keys, a total break like this cannot be rescued by revocation. end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Small Business - Try our new resources site! http://smallbusiness.yahoo.com/resources/
RE: What Will We Do With Innocent People's DNA?
The simplest solution is to systematically spread one's DNA everywhere, thus making 'discovery' of it meaningless. end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Mail - now with 250MB free storage. Learn more. http://info.mail.yahoo.com/mail_250
Re: [p2p-hackers] good-bye, Mnet, and good luck. I'm going commercial! plus my last design doc (fwd from zooko@zooko.com)
> If you want to be invisible to lawyers, you have to use something else. Whoever wants to design something 'else' should first see Monty Python's "How not to be seen" sketch (or was it "Importance of not being seen" ?) It applies pretty well to all current techniques for moving unpaid copyrighted content. end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Make Yahoo! your home page http://www.yahoo.com/r/hs
(un)intended anonymity feature of gmail
Unless I'm missing something obvious, it seems impossible to divine the origination IP address from gmail-sourced e-mail headers. The first IP (the last header) has 10.*.*.* form and is of course internal to google. This is not the case with any other e-mail service I know of (mixmaster excluded), the real originating IP is always included. So the recipient of gmail message has no way of determining what the sender's real IP is. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: ___ Do you Yahoo!? Declare Yourself - Register online to vote today! http://vote.yahoo.com
Re: Remailers an unsolveable paradox?
> What are the possible solutions for the remailers? Make all > remailers middleman only and adding the ability to opt-in for Open wireless access points. No one said you are entitled to mail anonymously from the comfort of your home/office. Stop whining. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? New and Improved Yahoo! Mail - 100MB free storage! http://promotions.yahoo.com/new_mail
Re: Forensics on PDAs, notes from the field
> A cool thing for this purpose could be a patch for gcc to produce unique > code every time, perhaps using some of the polymorphic methods used by > viruses. The purpose would be that they do not figure out that you are using some security program, so they don't suspect that noise in the file or look for stego, right? The last time I checked the total number of PDA programs ever offered to public in some way was around 10,000 (5,000 ? 100,000 ? Same thing.) That can be trivially checked for. Any custom-compiled executable will stand out as a sore thumb. You will suffer considerably less bodily damage inducing you to spit the passphrase than to produce the source and the complier. Just use the fucking PGP. It's good for your genitals. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Mail - 50x more storage than other providers! http://promotions.yahoo.com/new_mail
Re: On what the NSA does with its tech
>The impracticability of breaking symmetric ciphers is only a >comparatively small part of the overall problem. I see that "it can be done only by brute farce" myth is live and well. Hint: all major cryptanalytic advances, where governments broke a cypher and general public found out few *decades* later were not of brute-force kind. And if anyone thinks today's hobby/private cryptographers are any smarter (in a relative way) or more intelligent than their counterparts of 100 or 50 years ago (that were in dark for decades) ... well, you are an idiot. Today's crypto will be regarded in 2050 as Enigmas are regarded today. Development does not stop in any particular period just because you live in it and assume you're entitled to absolute knowledge. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Mail - 50x more storage than other providers! http://promotions.yahoo.com/new_mail
Nice pussy (was Re: [IP] more on more on E-mail intercept ruling - good grief!! )
> If VOIP gets no protection, then you'll see a lot of "digital" bugs in Protection of bits by legislation ??? Why is this a subject ? If you don't encrypt you will be listened to. Who the fuck cares if intercept is legal or not. That is irrelevant. It's like trying to obsolete summer clothing by making it illegal to watch pussies and dicks. And the discussion about it is similarly moronic. In olde times cypherpunks would applaud lack of legal bit protection as it stimulates sheeple to encrypt more. I mean wear panties. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Mail - 50x more storage than other providers! http://promotions.yahoo.com/new_mail
Re: [IP] When police ask your name, you must give it, Supreme Court says (fwd from dave@farber.net)
> incriminating, and the State has a substantial interest in knowing who you > are -- you may need medicating, or you may owe the government money, or Exactly ... and maybe you are on this "consumer" list: http://bmj.bmjjournals.com/cgi/content/full/328/7454/1458 >The president's commission found that "despite their prevalence, mental >disorders often go undiagnosed" and recommended comprehensive mental >health screening for "consumers of all ages," including preschool >children. According to the commission, "Each year, young children are >expelled from preschools and childcare facilities for severely >disruptive behaviours and emotional disorders." Schools, wrote the >commission, are in a "key position" to screen the 52 million students >and 6 million adults who work at the schools. > >The commission also recommended "Linkage [of screening] with treatment >and supports" including "state-of-the-art treatments" using "specific >medications for specific conditions." The commission commended the Texas >Medication Algorithm Project (TMAP) as a "model" medication treatment >plan that "illustrates an evidence-based practice that results in better >consumer outcomes." BTW, looks like designation "citizen" has been obsoleted by "consumer". = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Mail Address AutoComplete - You start. We finish. http://promotions.yahoo.com/new_mail
Re: Low-elevation skymapping at 2.45 Ghz
> However, it should be known that fiberglass (eg van) panels are > transparent > to uwaves AFAIK and that a van with soft tires is a 0th-order 0.25" glass will cost you 2-2.5 dB. > At sufficiently good mechanical stabilization and gain, you will > encounter perhaps The best way to do this is to mount the narrow-angle dish *and* video camera on the same mount, then use simple circuitry to superimpose white circle on the center of the image when signal exceeds some threshold (or vary the size with signal level.) The results could be startling. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Take Yahoo! Mail with you! Get it on your mobile phone. http://mobile.yahoo.com/maildemo
Re: Palm Hack?
> If there's any kind of leakage bias, then a high-powered signal might get a > few bits through. After that, only a Palm OS expert will know if there's > some kind of signal that can tease the Palm awake and then get it to swallow > some kind of trojan. Bits are not marbles to exist outside receiver's experience. Bits are tokens of agreement between sender and receiver. If receiver (including analog PHY) is powered down/idle/inactive, it's hard to imagine that bits could be stored in the analog capture device to be retreived later. Actually, one bit can be stored, the Last Bit. That one is stored by shining few watts into the receiving element, blinding it forever. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Friends. Fun. Try the all-new Yahoo! Messenger. http://messenger.yahoo.com/
Re: 3. Proof-of-work analysis
> It seems we now have hard figures to support the notion that > proof-of-work cannot be a complete solution in itself. We will be making > that clearer in a revision of the paper (and fixing some errors). It seems that efforts to increase cost of e-mail by some heavy cycle burning fail on the assumption that it will always be painless for the "individual" and very inconvenient for "mass-mailer." Not to mention small issue of modifying all mail transport agents and/or end-user clients. Let me put it simply: it will never happen. What has far greater probability of success is taxing SMTP packets. Easy to implement (only ISPs are involved) and governments will love it. Basic subscription includes some quota. Each taxed packet is signed by taxing authority (new life for ICANN) - like stamps on cigarette packs, by placing a sealed stamping box on ISP's backbone connection. On national/state boundaries packets not signed by recognised authorities are dropped by Customs Mail Inspection Bridges. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Friends. Fun. Try the all-new Yahoo! Messenger. http://messenger.yahoo.com/
Re: Satellite eavesdropping of 802.11b traffic
>Does anyone know whether the low-power nature of wireless LANs protects >them from eavesdropping by satellite? GSM cell phones have been successfully tapped via sat. Power is greater (up to .5w) but antennas are worse, so effective radiated energy is very similar, as are frequencies. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Friends. Fun. Try the all-new Yahoo! Messenger. http://messenger.yahoo.com/
Re: [IP] One Internet provider's view of FBI's CALEA wiretap push
> underground railroad would have worked better, but your still black. Obviously you don't know about whitening properties of moder ciphers! Seriously, today the distingushing marks among classes, tribes and castes are far more informational than physical. So today crypto *can* make you white, or better to say discoloured. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Photos: High-quality 4x6 digital prints for 25¢ http://photos.yahoo.com/ph/print_splash
Re: [IP] One Internet provider's view of FBI's CALEA wiretap push
> The extreme ease of use of internet wiretapping and lack of accountability > is not a good situation to create. False. It is the best possible situation cpunk-wise I can imagine. It effectively deals away with bs artists (those who *argue* against this or that) and empowers mathematics. If one is so fucking stupid, lazy or both not to encrypt, anonymize and practice other safe-sex approaches then let's hope that whatever broad wiretapping results in will also have slight (but measurable) pressure in factoring those out from the gene pool. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Photos: High-quality 4x6 digital prints for 25¢ http://photos.yahoo.com/ph/print_splash
Re: Cypherpunks response to viral stimuli
Can a TLA please give some sign here, any sign - just ack that you know the list exists, otherwise the legitimacy of cpunks is definitely going down the drain. Looks like a Berlin wall syndrome. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free web site building tool. Try it! http://webhosting.yahoo.com/ps/sb/
Re: WiFi Repeater?
Forget about repeater. 13-15 db flat panel antenna will get you access to distant APs - up to one mile in favourable conditions. 18db grid dish will connect you to omnidirectional AP within 2 miles. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Hotjobs: Enter the "Signing Bonus" Sweepstakes http://hotjobs.sweepstakes.yahoo.com/signingbonus
RE: The killer app for encryption
> What I'd like to see is a P2P telephony that also supports end-user > gateways to the POTS. I'm not certain, but I think there are some MS I don't get what does this have to do with crypto. Outside crypto, this didn't quite work with (almost) public fax gateways of '90s. In theory, you could send e-mail that would be rasterized and faxed using gateway that was in local calling area and presumably did not incur any charge from the local POTS monopoly. However, I don't see people letting others use their POTS lines, nor I see them using their own for this purpose. Yes, this would essentially eliminate long distance charges for those so equipped ... but if A and B have these gateways and use them, what is the chance of them not being AT the gateway (ie. not having laptops) at any given moment - why bother using POTS in the loop in the first place ? VoIP companies are already doing this and the cost is quite low (calling cards) - why bother? = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? New Yahoo! Photos - easier uploading and sharing. http://photos.yahoo.com/
RE: The killer app for encryption
> Because it means you can complete call to the POTs with no > company-controlled switch involved, meaning no where to serve a court > order. Since the call could be routed through a few intermediate nodes and I see. So, in the real world, X uses this to make telephone threats, your POTS gets picked up by random selection as the outgoing node, and gets traced back to from the victim's telephone, LEA visits you and you say ... "I know nothing". Yes, I can see it working and widely adopted. Looks like someone is pumping dumbing gas into cpunks homes. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? New Yahoo! Photos - easier uploading and sharing. http://photos.yahoo.com/
Re:Textual analysis
> Its like steganalysis. Its an arms race between measuring your own > signatures vs. what the Adversary can measure. If sentence length > is a metric known to you, you can write filters that warn you. > Similarly for the Adversary. You end up in an arms race > over metrics ---who has the more sensitive ones that the other > does not control for? But unlike stego, where the issue is faking the noise, personal fingerprints can be removed from the message more reliably. You just need the right gloves. One way is to use automated translators. They all have an "internal language" and modules that translate to and from it. The internal language is far more restricted than the natural one, so it doesn't leak many aspects of the linguistic fingerprint. Going to the internal form is "lossy" compression. There is no way to recreate the original. The simplest method is an englih-to-english translator. Better method, and thicker gloves, can be used by going through several from/to modules for different languages. In commercial engines the meaning starts to suffer after 3-4 steps but just before that happens the word ordering and use gets completely skewed. Of course, you have to buy the translator and not use the online google/babelfish access. It's the small things that get you ... = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? New Yahoo! Photos - easier uploading and sharing. http://photos.yahoo.com/
Re: cpunk-like meeting report
> http://lists.cryptnet.net/mailman/listinfo/cpunx-news > > Be sure and check the archive before posting. It is still small. Cookies, "members only" archive access. Bad deal. Will not happen. Very few consumers here. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? New Yahoo! Photos - easier uploading and sharing. http://photos.yahoo.com/
Re: Has this photo been de-stegoed?
> If you spatially fft a random photo, you'll find that the image detail > energy largely occupies certain bands. These are not the bands that stego > uses (or so I assume...it really can't be otherwise). The stego-able > spectrum will indeed be noise, but this noise will have a certain spectrum. There is an obvious solution here ... you don't modulate into the noise band. You modulate the base bits. The image visibly changes but only possession of the original can prove that. Of course, it would have to be pictures of sand, grass, water, crowd from above. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? New Yahoo! Photos - easier uploading and sharing. http://photos.yahoo.com/
Re: Type III Anonymous message
> Does anyone have a reasonably complete cypherpunks archive available > for FTP? Perhaps I could host them on my server and let Google index > them. That might be useful. There are only two live ones. Someone knows more ? The second one is FTP-able: http://groups.yahoo.com/group/cypherpunks-lne-archive/ http://lists.lab.net/archive/cypherpunks-exploder/ = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? New Yahoo! Photos - easier uploading and sharing. http://photos.yahoo.com/
Re: Type III Anonymous message
> I've been wondering why I havent seen more discussion on > wireless networking (802.11a/b/g) and anon/mix /dark nets. > Is this a subject of interest to anyone? I am curious what > kinds of work has been done in this area... Check the archives. Wireless solves all crypto anonymity problems for the sender by making them completely irrelevant - it provides good old physical anonymity. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? New Yahoo! Photos - easier uploading and sharing. http://photos.yahoo.com/
Re: FOIA Data Mining
> One exception: the ***, which hand writes the address. Is Why do you assume that you can tell handwriting from machine-generated script? There are techniques far more advanced than static fonts, that can introduce randomness and be pretty much indistinguishable from the manual product. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Free Pop-Up Blocker - Get it now http://companion.yahoo.com/
Re: e voting (receipts, votebuying, brinworld)
> You might check out David Chaum's latest solution at > http://www.vreceipt.com/, there are more details in the whitepaper: > http://www.vreceipt.com/article.pdf That is irrelevant. Whatever the solution is it must be understandable and verifiable by the Standard high school dropout. Also, the trace must be mechanical in nature and readable sans computers, as there is no reason to trust anything that goes through gates for which one hasn't verifed masks, when stakes are high. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Free Pop-Up Blocker - Get it now http://companion.yahoo.com/
Re: Vivendi to Destroy MP3.com archive
> Somebody please tell me that this is a nightmare, and I am about to > wake up. Let's see ... was there a contract to keep things up ad infinitum ? This is a good step, part of waking up from the dream that there are free things on Internet. If there is no eyeball-catching value to be derived from offering "free" service the service will cease to exist. This may well happen with "free" e-mail accounts as well - I wonder who will be the first to eliminate the free service in face of diminishing advertizing revenue - Yahoo ? Hotmail ? = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Free Pop-Up Blocker - Get it now http://companion.yahoo.com/
Re: Freedomphone
> From what I've gathered from the diagrams in [1], it seems to be using > AES-256 > in counter-mode XORed together with Twofish counter-mode output, Twofish also > being keyed with a 256 bit value. I sense paranoia here - but being paranoid > myself sometimes I very much welcome this decision! Those two keys are All I'd ask for in addition is ability for both sides to type in 10-40 digit secret key that they communicated in any way they chose, and have that XORed as well ... = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Free Pop-Up Blocker - Get it now http://companion.yahoo.com/
Re: "If you use encryption, you help the terrorists win"
> I have a few friends like thisanyone have suggestions for ways to change > their minds? > > Basically they say things like "If you think the government can't break all > the encryption schemes that we have, you're nuts." This guy was a math major > too, so he understands the principles of crypto. It is impossible to rationalise long term consequences of data harvesting into immediate threat for most people. The only way to change behaviour in absence of the perceived threat is propaganda ... and those who have means for that have different agendas. What's left is a personal-level propaganda but the effects are negligible. You can't really save anyone. You can, however, make crypto tools that make things easier. Or surveillance tools that make things obvious. The latter, I think, is more effective. Time to open source Echelon ? = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Exclusive Video Premiere - Britney Spears http://launch.yahoo.com/promos/britneyspears/
Re: NSA Turns To Commercial Software For Encryption
Isn't it really simpler to use RSA and DH and ECC in series ? Why choose ONE ? There is no good reason for that. Looks like PSYOP to me. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Exclusive Video Premiere - Britney Spears http://launch.yahoo.com/promos/britneyspears/
Re: [mnet-devel] DOS in DHTs (fwd from amichrisde@yahoo.de)
> ignored by citizens, but I have yet to see a license for owning a > typewriter or PC proposed. They have already ruled numerous times that the > Internet is deserving of at least as free and access as print media and There are precedents. In Franko's Spain, all typewriters had to be registered with the state, and all had serial numbers. It was illegal and punishable to possess one without license. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? The New Yahoo! Shopping - with improved product search http://shopping.yahoo.com
Re: [mnet-devel] DOS in DHTs (fwd from amichrisde@yahoo.de)
Looks like the only way to shield from DOS is to raise the cost of DOS. This will eventually eliminate the low cost of Internet bandwidth, one way or another. You don't get nearly the same amount of DOS on your telephone as you do on Internet, right ? Because telephone call is not free and/or it's traceable. The only question is how and where will this cost be introduced. My guess is that it will happen on the sending side. Even today, assymmetric cheapo-consumer connectivity makes publishing hard (as in "you are not visible to the world".) But to handle DOS is harder, as major drive & money on internet is selling shit, and players want easy (say 800-number) access. Proposals a la net-driving-license (NDL) indicate the trend. NDL can happen. Compare it to the early situation with cars or guns. No regulation in the beginning, you could buy or make your own and do as you please. Then, when commerce began to depend on both (transport of goods and force monopolies) they got regulated. I see no difference between that and computer with an Internet link. NDL is a possible reality. It used to be normal to drive or carry a weapon without license. These days, they catch you sooner or later and beat you into pulp. Same thing. Dreaming about it not happening will get you nowhere. So what can be done to raise the cost of DOS without introducing NDL ? I have no answer to this. What kind of NDL is the least bad ? - requirement for something that requires human effort when opening a connection. You do want to let humans into the store, but will refuse entry to headless drones. OK, wrong analogy. But you get the idea. - simply raise the cost of outgoing bandwidth - add a cost to every SYN request or equivalent (have a decent number included in the basic bandwith fee.) This will make unsuspecting collaborators in DDoS more efficient in keeping their equipment clean ("whoever aids will be considered enemy combatant.) The future doesn't seem bright. I think that there is a short window - a year or two - in which some not-so-bad solution may preempt what They are trying to do. But I wouldn't hold my breath. It's far more likely that EFF and other wirehuggers will continue to be outraged (with zero effect as usual) and clampdown on 'net access will continue. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? The New Yahoo! Shopping - with improved product search http://shopping.yahoo.com
Re: Idea: Small-volume concealed data storage
And what is the purpose of connecting the key and data storage in the first place ? Data storage is data storage, concealed or not. You feed encrypted data to/from it. Key is required at human interface and has absolutely nothing to do with the storage. If you want better security than passphrase, then you need a mechanical key carrier. Indeed, that is where the word "key" comes from. You can store any number on bits on it and you'll hand it over before they beat the shit out of you - or you may want to be brave and destroy it instead (trivial with flash-on-chip and small battery cell), but, again, it has nothing to do with storage of data. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? The New Yahoo! Shopping - with improved product search http://shopping.yahoo.com
Re: EFF Report on Trusted Computing
It took less than a decade for EFF to make a full turn, from championing unrestricted uses of technology to censoring who can do what and in which way. In this regards EFF resembles technological empires - like Cisco, for example, that get born because of radically new ways to do things and then end up trying to stop any further change. At some point EFF left the course of enabling individuals and joined their adversaries in the sense that masses should be patronized and given this or that. Such EFF is likely to lose its support base and compete with others for generic feel-good support public. Anyone has right to offer anything. If there are enough imbeciles to take it, that's good. Imbeciles should be exploited as much as possible. Those who capitalize on imbecile protection racket are called politicians. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? The New Yahoo! Shopping - with improved product search http://shopping.yahoo.com
Re: Duck Freedom Fighter (Terrorists), Euler SUV Graffiti
And who will free the chicken ? Fucking racists. > Activists Take Ducks From Foie Gras Shed > > FARMINGTON, Calif. With only the dim light of a half-moon to guide > them, four self-proclaimed "duck freedom fighters" made their way early > Wednesday across an abandoned field, around dilapidated, foul-smelling > chicken pens, and over a narrow passage through a large manure-filled > pond. > > ... > Soon, four Peking-Muscovy ducks were free. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: Verisign's Wildcard A-Records and DNSSEC Plans?
> What does it mean to say that "64.94.110.11" is or is not > certified by .com as the address for bad-example-12345.com , > or that something else is? Is it really the same as a > wild-card that points to real sites? Your Best Practices says that At this point it is immaterial what Verisign will or will not do. They followed the predictable course based on their capabilities and the assessment that the response from some imaginary "community" is irrelevant. The actual damage is breaking network diagnostic procedures and spam filtering, increasing chance of undetected lost e-mail (their SMTP does not always bounce) and increased danger of mistyped domain names - as now such typo in http client leads to exposure to possibly adversarial html (which is why they started it all in the first place.) By this time it should be obvious to everyone that in the near future they will establish targeted advertizing depending on what the mistyped URL looks like - and probably sell or rent the "typo name space" - ie. Airborne Express could buy *f?*e?*d?*e?*x?*.com address space, so fredex.com would lead to airborne's web site. And then there is a very small step from there to schemes where, for instance, for basic $15-25/yr name rental your domain will be yours only in 90% of cases. Other 10% will be sold. For $100/yr you will be guaranteed 99.5% of the ownership. Of course, only platinum premium accounts, at $100K/yr, will have 100% ownership. That is the problem when a centralized technical solution relies on the legal system (and they almost always do.) What is important is how and if will this accelerate alternate solutions for name space management. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: [p2p-hackers] Project Announcement: P2P Sockets
> infrastructure for these. "Everyone" knows about them > by using a common boostrap server to bootstrap into > the Jxta network to gain the addresses of a few > Rendezvous nodes. Rendezvous nodes then propagate So they are subject to lawsuits. Anyone running them can be traced and persuaded by the local force monopoly to stop running them. I see this just as shifting vulnerability point from the current one (ISPs, ICANN) to a new one, equally traceable. What this can buy is few months of confusion. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: [p2p-hackers] Project Announcement: P2P Sockets (fwd from bradneuberg@yahoo.com)
> stable IP address. Super-peers on the Jxta network run > application-level routers which store special > information such as how to reach peers, how to join So these super peers are reliable, non-vulnerable, although everyone knows where they are, because ? = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: cats
Well, cats *do* have a quite strict hierarchy which is far from ad-hoc establishment of the pecking order. So the analogy dosn't hold with cat behavioral experts. However, if cats could perform anonymized hissing, biting and scratching, then I'm sure that cypherpunk maillist would be a good analogy for cat behavior. > Second, if you examine the context of the original post, the statement > was a metaphor about leaderless ("anarchic") assemblies such > as this list. In particular, the Feds (dogs) haven't historically > understood that this list is the equivalent of a grad lounge or spontaneous > beach party: > there are multiple conversations, no one is moderating or otherwise > choreographing > squat. When cats encounter each other by chance, they may assert > dominance, > (linguistic pissing contests are not unheard of here :-) > but their lives are not structured around following, or smelling the > higher-up's ass. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Charted death of cypherpunks
http://recall.archive.org/?query=cypherpunks&search=go&afterMonth=1&afterYear=1996&beforeMonth=Today&beforeYear=%A0 (the above URL should be all in one line, of course) = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: Searching for uncopyable key made of sparkles in plastic
> Several months ago, I read about someone who was making a key that > was difficult if not "impossible" to copy. They mixed sparkly things > into a plastic resin and let them set. A camera would take a picture This boils down to difficulty of faking the analog interface. Anything that regular camera captures the attacker can also capture and reproduce it for the benefit of the camera. This means that camera has to be able to distinguish between the real thing and images of the real thing. This probably means going beyond optical image and somehow detecting 3D coordinates of particles, forcing the attacker to actually construct a new physical key carrier. At the current level of technology and economy, it's cheaper to hire an unemployed hardware engineer (no, s/w engs are not qualified,) to look at the key than to construct a 3D particle-sensing camera. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: Responding to orders which include a secrecy requirement
What Tim is (correctly) observing here is that a working challenge to the force monopoly is a very effective way to modify behaviour. Where Tim is wrong, though, is that he may have anything resembling a working challenge. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: traffix analysis
> as a solid dish. (The uwaves see the screen as solid, however.) With > that much gain (ie directionality) wind could mess with your (albeit brief) > connection. This one has 30 degree coverage and is perfect for connecting to consumer APs up to a mile: http://www.tranzeo.com/products.php?cmd=viewpage&id=102 Car window glass will cost you about 1.5-2 dB. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: traffix analysis
> Yes, but remember to wear a disguise/cloak and be careful how you > arrive there. If you threaten King George, Who Worships Mars God of > War, they will seize all the surveillance camera videos (public and private) > near the AP you exploit. Don't stop for gas anywhere nearby. A 18-24" 2.4Ghz grid dish (available for less than $70-90) with 18-21 dB gain will associate at 11 Mb/s with consumer-grade APs with diversity antennas at 2-3 miles. You can also use it to offer free connectivity to a cafe 2 miles away, but that's another maillist. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: JAP back doored
> This is a terrible day for privacy advocates that used the once (perhaps This is the great day for *true* privacy advocates worldwide. In face of huge difficulties and dangers in providing real anonymity, some human rights/wrongs organisations capitalised (in several ways) on the need for anonymity by providing non-solutions with cosmetic appearance of anonymity. They captured the gullible public with this "service" and dealt another blow to the real anonymity. Who needs complicated mixmaster when there are cool cretin-friendly java/web/whatever solutions ? One would hope that users of other centralised "anonymity" services will learn from this, if one is incurable optimist, that is. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: paradoxes of randomness
> Is this sequence random? Compressible? How could you tell whether this > sequence is random or not, if you didn't know the key? This is the a way to describe so-called randomness. One simply has no adequate access to the Key and/or the Algorithm. Both coin flipping and quantum noise fall into this category. Actually, it's a pretty good method of authenticating Allah. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: paradoxes of randomness
> - N+1 is the smallest integer that's not interesting. > But that's interesting in itself - so N+1 is interesting. It breaks down after few consequtive non-interesting integers. In fact, there is a proof somewhere that 17, 18 and 19 are not interesting at all. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: They never learn: "Omniva Policy Systems"
> seems horribly limiting. What of those using Entourage, or Mail, or any > of the dozens of platforms and news readers in existence. The site > mentions that they are now Blackberry-compliant. Well, does this mean > employees of the companies using "Omniva Policy Manager" cannot read > their mail on their Palms, or their laptops running other mail > programs, and so on? My experience with ordinary "Joe Six Suits" users is that they are progressively dumber and understand less and less tools they use to powerpoint on. The gap between reality and their understanding of "computers" is widening. Computers have finally adapted to idiots. At this point snake oils as the mentioned one is perfectly fundable and marketable. There is a significant user base that it will work for. Remember all discussions about single DES being good enough only for braindead ? Well, now they are past that. Layer 7 interface obstacles are now good enough. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Re: Idea: Homemade Passive Radar System (GNU/Radar)
> As an active twist, we can also use a separate unit, Illuminating > Transceiver (IT), periodically broadcasting a pulse of known > characteristics, easy to recognize by the LPs when it bounces from an > aerial target. This unit has to be cheap and expendable - it's easy to > locate and to destroy by a HARM missile. As a bonus, forcing the adversary > to waste a $250,000+ AGM-88 missile on a sub-$100 transmitter may be quite > demoralizing. There can be a whole hierarchy of ITs; when one of them Microwave oven. This has been done in recent years in various theatres. > Even other sources can serve as involuntary ITs. The landscape is littered > with cellular base stations and civilian TV and radio transmitters. Just > pick the suitable frequency and listen on. There is enough wideband power in the ether above inhabited areas to make passive detection from reflected EM possible in theory (without any EM emanating from the target.) The space is illuminated, but the "eyes" are not good enough, yet. Signal levels are extremely low, but it's likely that a flying jet reflects back enough from hundreds of cellphone/celltower transmissions to be few dB above the background noise. However, without knowing where to "look" the receiver cannot use typical narrow beam high-gain antennas. What is needed is an array, like an insect's eye, and that will be a sizeable contraption - passive, but not small. In other words, the size of a passive eye is proportional to the wavelength. To get human eye resolution in 10cm band the size gets to 2km across. Big eye. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
cooperative evil bit
ftp://ftp.rfc-editor.org/in-notes/rfc3514.txt excerpt: 1. Introduction Firewalls [CBR03], packet filters, intrusion detection systems, and the like often have difficulty distinguishing between packets that have malicious intent and those that are merely unusual. The problem is that making such determinations is hard. To solve this problem, we define a security flag, known as the "evil" bit, in the IPv4 [RFC791] header. Benign packets have this bit set to 0; those that are used for an attack will have the bit set to 1. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Tax Center - File online, calculators, forms, and more http://tax.yahoo.com
Re: Logging of Web Usage
Frankly, it seems that some brains around here are softening. Relying on httpd operators to protect those who access is plain silly, even if echelon (funny how that word dropped below radar lately) did not exist. The proper way is, of course, self-protection. Start with tight control of outgoing info from the end-user machine (remove or fake all fields that are not essential, such as referrer, client application, client OS). Use proxies. If you own a multi-IP subnet randomly switch the originating IP - this fucks up most automated tracking. What doesn't exist is mixmaster-grade anon re-httpers. I guess that ones that would let just text through (no images/scripting etc.) would be repulsive enough for wide public and therefore useful. Once you provide your data, it is always retained forever. Learn to live with it. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Tax Center - File online, calculators, forms, and more http://tax.yahoo.com
Re: pgp in internet cafe (webpgp)
> why not just use ssh? you can scp the text to your host, encrypt/decrypt it > *there* then scp it back if needs be. you also then don't need to use > webmail - just have a mailbox on that server that you forward your webmail > to, and that you send email in the name of the webmail account from. > its easy enough to grab down puTTY whenever you need it. Ever tried to install a ssh client on a random internet cafe computer ? = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Platinum - Watch CBS' NCAA March Madness, live on your desktop! http://platinum.yahoo.com
Re: The practical reason the U.S. is starting a war
> Yeah, yeah, all ideological tripe is the same: mine is right, yours is wrong. > However, ideologues are a tribe on the prowl for victims, so beware > media-addiction. Like this distortion mirror. What you fail to see incoming > can splatter your guts. The loop is closed; majority accepts the rule of might - from braindead to "intellectuals". Everything, every thought, gets developed within this framework. The alternative is to scream with horror throughout the day. And therefore they depend. We are smart, we will make philosophical systems that absorb the rule and build on it. That is why most thinkers are so dependent on the state, the might of the state. They depend on it because the basis of their mental constructs depend on it. It is so easy and convenient not to see the gunpower and dead bodies that are nurturing their systems. The mere wide acceptance today of the idea that some are entitled to weapons and some are not illustrates the above. If one simply counts killed per capita, capita of the domiciles of the state doing killing, it is clear which state destructs the most. The mere horror of acceptance of switching one target for the other demonstrates the blindness of addicts. Who is next ? That they don't ask. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Shopping - Send Flowers for Valentine's Day http://shopping.yahoo.com
Re: Crypto anarchy now more than ever
> This is what we need to fight. And this was, and perhaps still is, the > promises of unlinkable credentials, of untraceable digital cash, and of > "True Names." Crypto anarchy is needed now more than ever. There are hardly battlegrounds available. Software runs on machines big ones make, bits travel on wires owned by the big few, and DMCA/TCPA/BLAHBLAH or not, it is harder and harder for any crypto to parasite on top of that, at least when sheeple is concerned. Crypto has deferred benefits and thus is beyond grasp in the world of short attention span where immediate gratification rules. The *only* way to impose crypto on the masses is not through anarchy but by organised force - a state could do it. Guess when it will happen. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Shopping - Send Flowers for Valentine's Day http://shopping.yahoo.com
Re: The practical reason the U.S. is starting a war
> I'm wondering why Cryptome decided to place thisB particular piece of > opinion.B > It is not inkeeping w/ the type of stuff I've read here before, in terms of > it being a straightB opinion piece, not a document,B federal register entry, > etc..B Why did "you" (who is that exactly, anyway?) choose to includeB it?B I On a purely theoretical plane, there is no straight opinion. When one mentiones word "France", for example, it assumes a lot - that the french state is a legitimate state, that "state" is a valid entity in the first place, and that term France is a legitimate name for that particular territory. Language is a distillate of past propaganda. The newcomers and dissenters have no advantage of "legitimate" words to support their case. They must use elaborate descriptions or define new macros. That you see nothing wrong with word "federal" but see something wrong with word "mutant" is a display of your own bias. And the mere notion that "valid" stuff ("facts") can be smeared by "racist" stuff illustrates that you are not looking for facts, but for granfallooning with something, with a group or idea. (Along those lines, *anything* a politician thug ever mentioned would become smeared and invalid. OK, bad example.) = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Shopping - Send Flowers for Valentine's Day http://shopping.yahoo.com
Re: Putting the "NSA Data Overwrite Standard" Legend to Death... (fwd)
> From the OSI 7-layer model, which took it from the fact that the number 7 is It's simpler than that. Russians wanted 6, americans 8. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com
RE: the news from bush's speech
> "...and this year, for the first time, every American will be weighed, and > measured, and given a free yearly Rabies shot." "From now on, you will be wearing your underwear outside, so that we can check it's clean." = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com
Re: Fresh Hell
>>1) Fucks up the prevailing religion doctrine. >> >Funny, but I can't seem to find the passage in the Bible where it talks >about cloning. In fact, I can't find any passage that even remotely >impinges on the subject. Provided that I had the christian cult in mind (where I am not an connoisseur), wasn't there something about exclusivity of conceiving without fucking ? = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com
Re: Fresh Hell
>What would be the valid reason for the government to claim power >to regulate her egg, her skin DNA, and her uterus? 1) Fucks up the prevailing religion doctrine. 2) Gives subjects an extra degree of freedom - imagine black ghetto females giving birth to whities, uninfluenced by the local Bell curve ? There's a concept for undermining the society. 3) removes exclusiveness - powerful will get cloned regardless ow "laws". = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com
Re: Fear and Loathing in Afghanistan
>Holy Fuck I love this! Were it a novel, I'd be willing to steal it a la file >sharing. Some things, like general education and breadth of interests, one just can't fake. Redneckpunk, a very woody kind of word. HST = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com
Re: Brinworld: Samsung SCH-V310 camcorder phone
>The whole "Cell Phones - The Next Generation" thing >has been a pure marketing scam from the beginning. Experience demonstrates that any term with "generation" in it is pure BS, technically and financially. Most advances in technology are illusions created by dumbing down of the populace. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com
Re: QM, Bell's Inequality and Quantum Cryptosystems
> But in the end, as strange and unreasonable as this action-at-a-distance may > be, it's now regularly seen in the laboratory. (Even wierder are the 'quantum > eraser' and other bizarre behaviors). Is there any practical way to translate this into doll-and-needles method of punishing modelled targets at a distance ? = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com
Re: Make antibiotic resistant pathogens at home! (Re: Policing Bioterror Research)
> Expect to hear not of a hausfrau being busted, but of the roundup (so > to speak) of Mohammed Sayeed, Hariq Azaz, and other thought criminals > for buying two many gallons of Roundup at the local Walmart. I'd guess that the credit card usage among People With Wrong Sounding Names is falling sharply. Will cash survive ? = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com
Re: BigBrotherWare
> Speculation: I expect the battles over cyberspace to shift to the OS, > with the leading private (non open source) OS makers "enlisted" in the > War Against Illegal Thoughts. The easiest initial front in this war, > one the OS companies like Apple and Microsoft have a corporate interest > in, is for the OS to more aggressively check for hacks or products not All one has to do is to refuse to upgrade. Unless you get over the upgrade hype there is no cure - it's unlikely that home-manufactured computers for the masses will be a reality any time soon. The short life span of hw/sw platforms gives tremenduous power to mass manufacturers. It becomes like food industry. Only this one is not base on need for carbohydrates and proteins (and fat, of course), but on manufactured hype about value of "new" vs. "old". Most of the stuff (except games) works perfectly functionally today in hw/sw combinations from 1997. E-mail, http clients, ftp, usenet, graphic design/DTP, wordprocessors. This is not a long-term solution, but it's the best there is. What kind of effort is required to make computers (=hw+sw) have longevity of books, and therefore eliminate the power of "publishers" ? = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com
Re: West Coast...Galileo..."decent NSA dudes?"
> But what I don't fully "get" is why stance matters, per se. For instance, > take p2p. We can actually argue all we want about what government should/not > do about "the problem", but in the end file sharing is just about > unstoppable. > > If I write or release an app, then, that will facilitate "seamless" (ie, > within the Kazaa browser, for instance) transmision and storage of shared > files in an encrypted format, it kinda doesn't matter what my personal > philosophy is, does it? I can claim to be a libertarian or say that Ayn Rand ... > In other words, I'm not particularly pro- or anti-government per se. Frankly, > I don't care a ton what the government does on this issue (for instance). By > writing and releasing apps (or simply conceiving of and discussing new apps Changing the method (or introducing a new one) of communication between subjects is inherently anti-government. Government is that by control, and requiring it to do extra work to retain that control is generally viewed as unpleasant. French resisted introduction of telegraph for several decades - the government insisted on soldier-guarded signalling tower system. I can not think of any current government that would not be shit scared at the prospect of all subjects suddenly acquiring method for secret or untraceable (or both) communication. So your releasing of that p2p app is and will be viewed as pushing arms (free guns, imagine the possibilities) and will be dealt with accordingly. Especially if you make it to operate as simply as .45 = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com
Re: Extradition, Snatching, and the Danger of Traveling to Other Countries
> Interesting approach. But exactly how does that hinder the FBI > demanding a booksellers customer list, or a library's patron > check out record, or a black bag job on a personal computer, or > thousands of CALEA taps, or the Total Information Awareness > project, or the process of designating a US citizen as an enemy > combatant, or the suspension of habeas corpus, etc. > > I was not aware that simple management of my own eyeballs could > have such dramatic, widespread, external effects on gangs of > thugs with guns and high tech surveillance gear all carrying a > "do-whatever-you-like, get-out-of-jail-free card from the US > Congress, and essentially no oversight. Is this kind of like > mind control, or what? Do not underestimate the power of detox. Guns et al are just symbols, 99.999% of proles are kept at bay with software. It is economically unfeasible to use hardware for that. Take a look at happenings in the last decade in europe - anti-comm uprisings had one and only one focal point - TV stations. They live. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com
Re: Extradition, Snatching, and the Danger of Traveling to Other Countries
> society, what can the regular person do to strike a blow in > opposition to the direct attack on the Constitution and civil > liberties and civil rights? Stop watching TV ? = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com
Re: Anonymous blogging
> In a way, Mathew's and Choate's attack upon the list has done > us a favour. The list is now effectively restricted to those > with the will and ability to use filters, which raises the > required intelligence level. Does this vindicate homeopathy ? = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com
Re: The trend toward "signing away rights"
> I'm watching a New York television news show reporting on one of the > recent cases where people sign away their rights. This is about > requests sent out by schools that parents of students sign a pledge > that alcohol, loud parties, and late night activities will not be > permitted at their homes and that schools and local police will be > permitted to inspect the houses without warrants for violations. The > news report says that most parents have signed the pledge. So, what of Sooner or later you'll figure out that there are no "rights" without appropriate defenses. You only own what you can defend. If you are dumb enough to believe that some document is your defense, you are in for a surprise. Compare this to issuing cat-repellant charms to mice. Call them "constitutions". See mouse walking bravely. See cat feed. On the other hand, observe a mouse with a .50 catgun. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com
Re: If this be terrorism make the most of it!
> >But we will always have phone booths and acoustic couplers. > > Phone booths already don't accept calls, by State Fiat. You think > detecting and dropping modem calls from a CO is tough? It's just a matter of designing a (software ?) modem that will, instead of whisling and peeping, emulate soccer mom chatter. Lower rates, but undetectable. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com
Re: If this be terrorism make the most of it!
This, with obligatory cameras in cybercafes, is just plugging the anonymity holes. Also, one of unmentioned consenquences is that any "security" will make self-organising networks harder to implement. Guess who benefits. But we will always have phone booths and acoustic couplers. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com
Re: CNN.com - WiFi activists on free Web crusade - Nov. 29, 2002
> cards with external antenna port. For cell phones the entire instrument > could be placed in at the reflector's focus and operated via a mic/headset > adapter (some older Nokia models have an external antenna port behind a > small rubber plug on the rear.) Cellphone taped in focal point of a 18" directv dish hits cell stations 10 miles away. With 80% signal strenth. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com
Re: CNN.com - WiFi activists on free Web crusade - Nov. 29, 2002 (fwd)
> 1. large wifi networks start to hit scaling problems - they start to need > routers and name services that are relatively expensive, and ip address > ranges start to become a scarce resource. Not so. Self-organasing mesh networks appear to have some interesting properties. There is a number of open solutions and at least one startup I know about based on this. Real stuff ... http://w3.antd.nist.gov/wctg/manet/manet_bibliog.html http://locustworld.com/ http://www.mitre.org/tech_transfer/mobilemesh/ ... and rants: http://www.wirelessanarchy.com/ http://www.gldialtone.com/whyP2Pwireless.htm http://slashdot.org/articles/02/10/01/2220255.shtml?tid=126 = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com
Re: CNN.com - WiFi activists on free Web crusade - Nov. 29, 2002 (fwd)
> > Geographic routing completely eliminates need for expensive routing > > and admin traffic. Name services? Who needs name services? Localhost > > is sufficient for a prefix to an address namepace. > without routing and name services, you have what amounts to a propriatory > NAT solution - no way to address an interior node on the cloud from the The importance of geographic routing is that the cataloguing system is public. Imagine that city streets had absolutely no signs and no house numbers. In order to get to, say, "quality whorehouse", you need to pay for someone to guide you, and ultimately that someone may choose not to. If, however, streets were marked, you could use maps from many sources - or even create your own - to guide you. Localities put up the addressing infrastructure and they get aggregated on global levels in any desireable/sellable form. Compare this to Internet, where you essentially have to pay to get routed via closed systems. >These characters< were routed based on decisions and policies of no more than 2-3 corporations. We all know what the consequences are. Self-routing mesh networks have potential to sidestep this. Transistors are small and cheap enough even today - the centralised communication infrastructure is there so that you can be charged, not because technology dictates that any more. With wireless there is a potential that everyone paves (and marks street number) in front of their house. The only way to subvert this would be to erase "santa monica" from minds of everyone. I don't see that happening. The day that I can send a packet from LAX to SFO via non-ISP-ed network will be the beginning of the end of telco/telecom monopolies. Or, should I say, directory monopolies. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com
Re: Video Mules: (Was: Re: Psuedo-Private Key (eJazeera) )
> couldn't be used to record video and then (after appropriate protection) > swallowed. Eventually this will happen. Maybe a video recorded into a DNA of a bacteria synthesized in a portable device ("diamond age", anyone ?) Ne protocols will be required ("if I infect this east coast girl, how long it will take for the message to get to south africa ?") Which will have interesting consequences. For the time being the state is comfortable sifting through wired internet (after winning the crypto war) and listening to airwaves. Maybe body-size state-inspected condoms will be required at all public places. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Mail Plus Powerful. Affordable. Sign up now. http://mailplus.yahoo.com
Re: Video Mules: (Was: Re: Psuedo-Private Key (eJazeera) )
> Lousy latency. Just put your DNA-encoded message in a microdot on your > dead tree letter, and PCR/sequence on arrival. Isn't all snail mail already irradiated ? Then soon. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Mail Plus Powerful. Affordable. Sign up now. http://mailplus.yahoo.com
Re: Microsoft on Darknet
>Mojo was intended to do this but it failed, I think it failed >because they failed to monetize mojo before it was introduced >as service management mechanism. I think that there is a generic failure of systems that expect some pre-determined benevolence and cooperation from end users. Contrary to wishful thinking, people miss firmware for non-hierarchical self-organising via purely technical means (internet). There is not one example that it works. The worst side of this is that it means that there will always be choke points in effective organisations, which pretty much sends cyberpunkish net anarchy ideas down the drain. I'm waiting to see what will happen with self-organsing 2.4ghz mesh networks, if it is possible to misuse the fabric - maybe by establishing fat IPSec-ed pipes accross the town to avoid leased line expenses ? = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Mail Plus Powerful. Affordable. Sign up now. http://mailplus.yahoo.com
Re: The End of the Golden Age of Crypto
> It's a state of mind wich can only be compared with mental ilness... > (I've read that there are even some neurological similarities between the > faithful and the mentaly ill) The belief (faith) center is somewhere in the frontal cortex and that mutation was essential for development of the civilisation as we know it, which basically boils down to brainwashing believers into beating the shit out of nonbelievers (and these, being independent individuals, never managed to properly organise to resist), which is evolutionary sustainable (when the shit gets beaten out of you it takes your mind of sex.) So, technically speaking, it's more specialisation than mental illness. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Web Hosting - Let the expert host your site http://webhosting.yahoo.com
Re: eJazeera?
> Other methods seek to eliminate the need for various levels of pre-knowledge > between Bob and Alice, and to also stave off the "round up" scenario where a > large group is examined and cleansed of all electronica, before data can Live streaming is out of question as it would make detection trivial (not with triangulation but by looking at the live video.) So the mode would be 1) capture 2) move to the edge of the arena 3) stream via standardised protocol using (camouflaged) 8" 3db omni stick antenna. Do this in AP mode. 4) go to 1 Relayers could just point their 18 dB dishes from places as far as 3-4 miles and capture (3). You can bet that every single news crew would be also dishing for signal. The countermeasure would be jamming 2.4 GHz, but this just means positioning (2) farther away. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: U2 on LAUNCH - Exclusive greatest hits videos http://launch.yahoo.com/u2
Re: Photos in transport plane of prisoners: Time for eJazeera?
Any wide-dissemination system must be distributed. Usenet used to fill this role, but due to aggregation of major nodes and feeds it is not that any more. Anything on the "web" has fixed pointers and already is or soon will be become chokable. I'd be surprised if there is no development in progress to install real time packet sniffin' and droppin' silicon on major exchange nodes, remotely loaded with patterns that identify the undesireables. Suddenly you get disappeared and invisible. Forget crypto and stego - it's not happening for the critical mass. Bootleg entertainment exchange P2P software offers some window, but it is progressively being hamstringed with TOS agreements and upcoming metered access (pay per Gb), and once freebies are gone, how many will bother to maintain and develop P2P networks for the old fashioned purpose of political activism ? We need to look beyond internet as it is today. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: U2 on LAUNCH - Exclusive greatest hits videos http://launch.yahoo.com/u2
Re: Aussies to censor web
> A police ministers meeting in Darwin this week > agreed it was "unacceptable websites advocating or facilitating violent protest > action be accessible from Australia". This is just a CIA psyop to make US look good. USA and China. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: U2 on LAUNCH - Exclusive greatest hits videos http://launch.yahoo.com/u2
Re: Integrated crypto sounds useful, but it's fragile and ultimately a lose
One solution that would work: 1. keep the text paradigm - cyphertext is just a text for everyone involved. 2. Extract encrypt/decrypt functionality into a device (D) with longer lifetime than OS/MUA/hw combo (C). (2) assumes text interface between (C) and (D). (D) could be a PDA that can OCR computer screen and inject traffic into the keyboard cable. PDAs are personal and have longer lifetime potential than 3 constantly upgrading components (C) consists of. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: HotJobs - Search new jobs daily now http://hotjobs.yahoo.com/
Re: Fwd: Asbestos ban again cited as the real cause of WTC collapse
> building I inspect, my own work not excepted. You have to battle to get > contractors to do it right. And owners to pay for quality work and > maintenance > rather than wait for vicitms and insurance companies to pay the tithe of > negligence. This is the same problem as with other expenses without immediate gratification and uncertain effectiveness (to the laymen) - use of hi-fi cryptography, for example. Too often the mere *existance* of a technology is used as an excuse to build systems which *require* such technology (and maintenance) and then do the token application of the technology and forget about it. I wonder if anyone used asbestos-steel-WTC meme (R) (TM) (C) to promote strong crypto ... = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: HotJobs - Search new jobs daily now http://hotjobs.yahoo.com/
Re: ISP Utilty To Cypherpunks?
I see an open search engine as the most important server project. Limit the engine to cpunkish issues and similar to control the popularity (bandwidth). Run your own harvesters/spiders. This would help limit the google monopoly and power and provide a search engine of choice for the (gasp) "community". The question is, how does one construct a censorship-free search engine. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: HotJobs - Search new jobs daily now http://hotjobs.yahoo.com/
Re: Listening vs. Note-Taking
> Item: At most Cypherpunks meetings someone is sitting with their laptop > open, recording notes (or whatever). I usually wonder what they plan to > do with the notes...not in any paranoid sense, just wondering if > they'll ever look at the notes again, and why. Taking notes ??? We're just checking mail and chatting on adult IRCs. Beats meeting content most of the time. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: HotJobs - Search new jobs daily now http://hotjobs.yahoo.com/
Re: Confiscation of Anti-War Video
> My notion was that Bob, who receives Alice's WiFi signal, is also using > a laptop, which he simply walks off with. He doesn't need a DSL or > cablemodem or whatever. Could be an interesting exercise for the next cpunk meeting. The goal is to leave the meeting with some content on the laptop anonymously, ie. no one knows *who* left the meeting with that content. The content should be made available by one or two insiders via 802.11b. They don't even say which protocol they are using (except windoze-proprietary shit which is out of question ... appletalk is OK :-) The LEA agents then post a list of suspects. The Morpheus agents then post the content. If there is no match, it means that fully anonymous cooperative dissemination is doable. You broadcast, and you don't know who will relay it. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Y! Web Hosting - Let the expert host your web site http://webhosting.yahoo.com/
RE: What is the truth of the anti war rallys?
> Does anyone know the truth from his own eyes, or a more > complete set of images? The Civic Center Plaza was practically filled. It's about 150 x 100 meters, assuming 2 people per m2 it comes to around 30,000, and there were lots of people around as well. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Y! Web Hosting - Let the expert host your web site http://webhosting.yahoo.com/
Re: FC: Privacy villain of the week: DARPA's gait surveillance tech
> There are potential medical uses of this sort of technology - > enough computer abusers and other desk-job workers with bad backs > or similar health problems that could benefit from analyzing how they walk, > but obviously Darpa's not going to find that. Perhaps we can get There are expensive, complicated computer-controlled contraptions that attach to the body, analyze walk, forces that you exert, and tell you exactly which of 40-50 muscles engaged in the walk need tuning. They can also *make* you walk "right", by limiting/forcing movements. Since people do manage to correct the gait with them, I see no reason that gait can be modified, lond-term, in any desireable direction. That is, unless these devices become a controlled technology. Do-it-yourself emergency gait scramblers include thumbtacks in both shoes (amazingly how quickly the body learns how to avoid the pain) and anal inserts that require active squeezing to remain in place. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Y! Web Hosting - Let the expert host your web site http://webhosting.yahoo.com/
Re: FC: Privacy villain of the week: DARPA's gait surveillance tech (fwd)
> No technical solution will work in absence of laws making it legal. Sanity villain statement of the month. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Y! Web Hosting - Let the expert host your web site http://webhosting.yahoo.com/
Re: Implantable Chip, On Sale Now
> sector offices or nuclear power plants. Instead of swiping a smart card, > employees could swipe the arm containing the chip. A new must-have item for terrorists: cleaver. This is sillier than biometrics ... while you may talk the attacker out of plucking your eyeballs or cutting off fingers ("the scanner detects blood flow, Mr. Terrorist"), this is a no brainer. Granted, it may give government employees more incentive to resist, by implanting into scrotum (the authentication procedure may look funny, though.) = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Y! Web Hosting - Let the expert host your web site http://webhosting.yahoo.com/
Re: internet radio - broadcast without incurring royalty fees
> - queueing the track for download via kazaa Napster clones, kazaa, gnutella et al. rely on end-users to upload stuff. These end users simply have no bandwidth available for that. Cheapo DSL lines have hundred or few hundreds of kbit/sec unguaranteed upload capacity. No one is going to pay T1 to serve free stuff in breach of copyright laws. The net result is - and anyone can try it for themselves - that average success rate is less than 40%, the speed is miserable - most of the time it takes hour or more for 5-6 minute mp3, and then you need to be lucky so that content matches the title. This makes it impractical for situations where many look for the same content, in near real time. shoutcast/icecast systems have 40-60K simultaneous users planetwide, with 2-3K simultaneous broadcasts. Most stations have 1-5 listeners, popular ones up to a hundred or even more (I have no idea who pays bandwidth for those ... some 128 kbit/sec jazz ones are really good, and have 200-300 users). All in all, this is negligible, a don't-care at this point. The broadcast tax is a preemptive move that is supposed to influence the future. While there always will be pathological cases that will spend tens of hours online to get few mp3s for free (that is, until local telco decides that flat rate is no more viable), for most napsters are unusable. Usable serving costs money, is stationary and therefore taxable. Until all 802.11bs automesh networks get connected independently of "internet". = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Y! Web Hosting - Let the expert host your web site http://webhosting.yahoo.com/
Re: One of Brinworld's uglier moments, no rights for immies
> surrounding a white van near a Richmond gas station. Toyota, GM and Ford all reported huge drop in white van sales, to a virtual zero. Ford also asked dealers to remove white vans from "highly visible" locations. Unrelated, several body shops are advertising discounts on "white van conversion" jobs. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Y! Web Hosting - Let the expert host your web site http://webhosting.yahoo.com/
Re: One time pads
> Also, can your tool use floppies instead of USB keys? It's a freakin' C program that works on a file - but carrying a floppy around is so ... ordinary. > There are problems with KGB-quality attackers recovering overwritten data > which are probably much more serious for disks than flash rom, > but they're nearly universal and good shredders work well on them. Bits are overwritten by running PRNG output on them 128 times, PRNG being seeded by the data that has just been erased. We use DES in counter mode as PRNG. > You need to use each bit twice - once to encrypt, and once to decrypt. > Destroying them after the first use is a bad idea Why would sender need to decrypt known plaintext is beyond me ... sender XORs and destroys bits, recipient XORs and destroys bits. Each in their respective dongles, once. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Y! Web Hosting - Let the expert host your web site http://webhosting.yahoo.com/
Re: One time pads
> Pretty much, yes. at least one "real world" OTP system assumes you will > be using three CDRW disks; the three are xored (as you say) together, I have a working OTP system on $40 64 Mb USB flash disk on my keychain. The disk mounts on windoze and macs, and also contains all s/w required to encrypt/decrypt, on both platforms. 30Mbs are filled with distilled randomness (two video digitizers at high gain looking into open input noise, compressed first with LZW then again compressed 8:1 by taking only byte parity, then XORed together - takes several hours and passes diehard) and judging by the current use it will last us for decades for text messages. OTP is now shared among group but it's trivial to have subpartitions for 1:1. Used bits are securely deleted. Works on any USB-capable win/mac. The whole USB disk can be additionally protected by either scramdisk (cryptdisk for mac) passphrase, but it limits operating platforms. The custom software was trivial to make (less than 200 C lines) and complile under codewarrior for multi-platform executables. To conclude, OTPs are easy to make and use. Plugging in the dongle to read e-mailo is extra sexy (and attracts chicks, this has been documented.) Unlike ad nauseam discussions on OTP feasibility. You guys must really be bored. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Faith Hill - Exclusive Performances, Videos & More http://faith.yahoo.com
RE: For everything else, there's MasterCard.
> I fail to see how anyone, anytime, anywhere, can support > the hunting of random non-consenting humans for sport. This is a favourite bipedal pastime. We all support it. It's good and fills one with joy and satisfaction. Major tournaments are called "wars" and we hardly can wait for the next big one. Lower castes and serfs are brainwashed to refrain from it; it's the sport only for nobility (and wide-spread games would ruin the profits.) Therefore your failure to understand is understandable. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Faith Hill - Exclusive Performances, Videos & More http://faith.yahoo.com
Re: commericial software defined radio (to 30 Mhz, RX only)
>Does this run on linux? Also, if regular cheapo PC sounboards can digitize 30 MHz (and Nyquist says this requires 60 MHz sampling rate) then some product managers need ... flogging. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Faith Hill - Exclusive Performances, Videos & More http://faith.yahoo.com