Re: Wikipedia & Tor

2005-09-30 Thread Morlock Elloi
> But now we're back to the question: how can Tor be improved to deal with
> this very serious and important problem?  What are the steps that might
> be taken, however imperfect, to reduce the amount of abuse coming from
> Tor nodes?

That's trivial: charge Tor-originated users for editing. That 0.0001% (all
three of them) that actually contributes to Wikipedia will be resourceful
enough to create untraceable payment accounts.



end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__ 
Yahoo! Mail - PC Magazine Editors' Choice 2005 
http://mail.yahoo.com



spoofing for dyslexic

2005-05-07 Thread Morlock Elloi
Just a tiny interesting operation found out via routine misspelling that can
breed paranoia in idle minds:

sprint has smtp to SMS gateway for its customers running at
messaging.sprintpcs.com, so if you e-mail to 
[EMAIL PROTECTED] the user gets message on the phone.


Interestingly enough, there is also valid domain messaging.sprintpsc.com (note
the swapped last two letters) that resolves to no less than 8 IP addresses.
Someone wants it really reliable:

Addresses:  69.25.27.171, 66.150.161.141, 69.25.27.170, 69.25.27.172
  66.150.161.133, 66.150.161.140, 66.150.161.134, 66.150.161.136

sprintpsc.com is operated by po-box identified entity:

Registrant:
 Acme Mail
 Box 455
 Miami, FL 33265
 US
 305-201-4774 
 

and of course messages sent to [EMAIL PROTECTED] do not
end up on sprint's subscriber handset.

Could be completely coincidental, of course.





end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



Discover Yahoo! 
Find restaurants, movies, travel and more fun for the weekend. Check it out! 
http://discover.yahoo.com/weekend.html 



Re: [IP] Google's Web Accelerator is a big privacy risk (fwd from dave@farber.net)

2005-05-06 Thread Morlock Elloi
> Google cookies last as long as possible -- until 2038.  If you've

And you are allowing cookies because ... ?

And you are keeping cookies past the session because ... ?


Too lazy not to?

To lazy to login again?

Inherent belief that commercial entity should make your life easy for purely
philantropical reasons?

Just plain dumb?





end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__ 
Yahoo! Mail Mobile 
Take Yahoo! Mail with you! Check email on your mobile phone. 
http://mobile.yahoo.com/learn/mail 



zombied ypherpunks (Re: Email Certification?)

2005-04-28 Thread Morlock Elloi
> I'm still having trouble understanding your threat model.

Just assume braindeath and it becomes obvious.

No tla with any dignity left would bother e-mail providers or try to get your
password. All it need to do is fill gforms and get access to tapped traffic at
major nodes (say, 20 in US is sufficient?). Think packet reassembly -> filter
down -> store everything forever -> google on demand.

Concerned about e-mail privacy? There is this obscure software called 'PGP',
check it out. Too complicated? That's the good thing about evolution, not
everyone makes it.



end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 



Re: DTV Content Protection

2005-04-11 Thread Morlock Elloi
This very likely means that someone already has MM figured out; the question is
not whether it will be revealed, but when.


 

> All of these attacks focus on finding the master secret MM value; once
> that is found, the security of the system collapses.  Given a KSV it is
> immediately possible to deduce the corresponding private key if you know
> the MM.  Although both HDCP and DTCP have mechanisms for revocations of
> cracked keys, a total break like this cannot be rescued by revocation.


end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__ 
Do you Yahoo!? 
Yahoo! Small Business - Try our new resources site!
http://smallbusiness.yahoo.com/resources/



RE: What Will We Do With Innocent People's DNA?

2005-03-23 Thread Morlock Elloi
The simplest solution is to systematically spread one's DNA everywhere, thus
making 'discovery' of it meaningless.



end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__ 
Do you Yahoo!? 
Yahoo! Mail - now with 250MB free storage. Learn more. 
http://info.mail.yahoo.com/mail_250



Re: [p2p-hackers] good-bye, Mnet, and good luck. I'm going commercial! plus my last design doc (fwd from zooko@zooko.com)

2005-03-13 Thread Morlock Elloi
> If you want to be invisible to lawyers, you have to use something else.

Whoever wants to design something 'else' should first see Monty Python's "How
not to be seen" sketch (or was it "Importance of not being seen" ?)

It applies pretty well to all current techniques for moving unpaid copyrighted
content.



end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__ 
Do you Yahoo!? 
Make Yahoo! your home page 
http://www.yahoo.com/r/hs



(un)intended anonymity feature of gmail

2004-10-13 Thread Morlock Elloi
Unless I'm missing something obvious, it seems impossible to divine the
origination IP address from gmail-sourced e-mail headers. The first IP (the
last header) has 10.*.*.* form and is of course internal to google.

This is not the case with any other e-mail service I know of (mixmaster
excluded), the real originating IP is always included.

So the recipient of gmail message has no way of determining what the sender's
real IP is.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



___
Do you Yahoo!?
Declare Yourself - Register online to vote today!
http://vote.yahoo.com



Re: Remailers an unsolveable paradox?

2004-09-01 Thread Morlock Elloi
> What are the possible solutions for the remailers? Make all
> remailers middleman only and adding the ability to opt-in for

Open wireless access points. 

No one said you are entitled to mail anonymously from the comfort of your
home/office. Stop whining.




=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:




__
Do you Yahoo!?
New and Improved Yahoo! Mail - 100MB free storage!
http://promotions.yahoo.com/new_mail 



Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Morlock Elloi
> A cool thing for this purpose could be a patch for gcc to produce unique 
> code every time, perhaps using some of the polymorphic methods used by 
> viruses.

The purpose would be that they do not figure out that you are using some
security program, so they don't suspect that noise in the file or look for
stego, right?

The last time I checked the total number of PDA programs ever offered to public
in some way was around 10,000 (5,000 ? 100,000 ? Same thing.) That can be
trivially checked for. Any custom-compiled executable will stand out as a sore
thumb.

You will suffer considerably less bodily damage inducing you to spit the
passphrase than to produce the source and the complier.

Just use the fucking PGP. It's good for your genitals.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__
Do you Yahoo!?
Yahoo! Mail - 50x more storage than other providers!
http://promotions.yahoo.com/new_mail



Re: On what the NSA does with its tech

2004-08-05 Thread Morlock Elloi
>The impracticability of breaking symmetric ciphers is only a
>comparatively small part of the overall problem.

I see that "it can be done only by brute farce" myth is live and well.

Hint: all major cryptanalytic advances, where governments broke a cypher and
general public found out few *decades* later were not of brute-force kind.

And if anyone thinks today's hobby/private cryptographers are any smarter (in a
relative way) or more intelligent than their counterparts of 100 or 50 years
ago (that were in dark for decades) ... well, you are an idiot.

Today's crypto will be regarded in 2050 as Enigmas are regarded today.
Development does not stop in any particular period just because you live in it
and assume you're entitled to absolute knowledge.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__
Do you Yahoo!?
Yahoo! Mail - 50x more storage than other providers!
http://promotions.yahoo.com/new_mail



Nice pussy (was Re: [IP] more on more on E-mail intercept ruling - good grief!! )

2004-07-03 Thread Morlock Elloi
> If VOIP gets no protection, then you'll see a lot of "digital" bugs in

Protection of bits by legislation ???

Why is this a subject ? If you don't encrypt you will be listened to. Who the
fuck cares if intercept is legal or not. That is irrelevant. It's like trying
to obsolete summer clothing by making it illegal to watch pussies and dicks.
And the discussion about it is similarly moronic.

In olde times cypherpunks would applaud lack of legal bit protection as it
stimulates sheeple to encrypt more. I mean wear panties.




=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__
Do you Yahoo!?
Yahoo! Mail - 50x more storage than other providers!
http://promotions.yahoo.com/new_mail



Re: [IP] When police ask your name, you must give it, Supreme Court says (fwd from dave@farber.net)

2004-06-22 Thread Morlock Elloi
> incriminating, and the State has a substantial interest in knowing who you
> are -- you may need medicating, or you may owe the government money, or

Exactly ... and maybe you are on this "consumer" list:


http://bmj.bmjjournals.com/cgi/content/full/328/7454/1458

>The president's commission found that "despite their prevalence, mental
>disorders often go undiagnosed" and recommended comprehensive mental
>health screening for "consumers of all ages," including preschool
>children. According to the commission, "Each year, young children are
>expelled from preschools and childcare facilities for severely
>disruptive behaviours and emotional disorders." Schools, wrote the
>commission, are in a "key position" to screen the 52 million students
>and 6 million adults who work at the schools.
>
>The commission also recommended "Linkage [of screening] with treatment
>and supports" including "state-of-the-art treatments" using "specific
>medications for specific conditions." The commission commended the Texas
>Medication Algorithm Project (TMAP) as a "model" medication treatment
>plan that "illustrates an evidence-based practice that results in better
>consumer outcomes."


BTW, looks like designation "citizen" has been obsoleted by "consumer".

=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__
Do you Yahoo!?
Yahoo! Mail Address AutoComplete - You start. We finish.
http://promotions.yahoo.com/new_mail 



Re: Low-elevation skymapping at 2.45 Ghz

2004-06-17 Thread Morlock Elloi
> However, it should be known that fiberglass (eg van) panels are
> transparent
> to uwaves AFAIK and that a van with soft tires is a 0th-order

0.25" glass will cost you 2-2.5 dB.

> At sufficiently good mechanical stabilization and gain, you will
> encounter perhaps

The best way to do this is to mount the narrow-angle dish *and* video camera on
the same mount, then use simple circuitry to superimpose white circle on the
center of the image when signal exceeds some threshold (or vary the size with
signal level.) The results could be startling.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:



__
Do you Yahoo!?
Take Yahoo! Mail with you! Get it on your mobile phone.
http://mobile.yahoo.com/maildemo 



Re: Palm Hack?

2004-06-05 Thread Morlock Elloi
> If there's any kind of leakage bias, then a high-powered signal might get a 
> few bits through. After that, only a Palm OS expert will know if there's 
> some kind of signal that can tease the Palm awake and then get it to swallow 
> some kind of trojan.

Bits are not marbles to exist outside receiver's experience. Bits are tokens of
agreement between sender and receiver.

If receiver (including analog PHY) is powered down/idle/inactive, it's hard to
imagine that bits could be stored in the analog capture device to be retreived
later. Actually, one bit can be stored, the Last Bit. That one is stored by
shining few watts into the receiving element, blinding it forever.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:




__
Do you Yahoo!?
Friends.  Fun.  Try the all-new Yahoo! Messenger.
http://messenger.yahoo.com/ 



Re: 3. Proof-of-work analysis

2004-06-03 Thread Morlock Elloi
> It seems we now have hard figures to support the notion that 
> proof-of-work cannot be a complete solution in itself. We will be making 
> that clearer in a revision of the paper (and fixing some errors).

It seems that efforts to increase cost of e-mail by some heavy cycle burning
fail on the assumption that it will always be painless for the "individual" and
very inconvenient for "mass-mailer."

Not to mention small issue of modifying all mail transport agents and/or
end-user clients.

Let me put it simply: it will never happen.

What has far greater probability of success is taxing SMTP packets. Easy to
implement (only ISPs are involved) and governments will love it. Basic
subscription includes some quota. Each taxed packet is signed by taxing
authority (new life for ICANN) - like stamps on cigarette packs, by placing a
sealed stamping box on ISP's backbone connection. On national/state boundaries
packets not signed by recognised authorities are dropped by Customs Mail
Inspection Bridges. 

=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:




__
Do you Yahoo!?
Friends.  Fun.  Try the all-new Yahoo! Messenger.
http://messenger.yahoo.com/ 



Re: Satellite eavesdropping of 802.11b traffic

2004-05-27 Thread Morlock Elloi
>Does anyone know whether the low-power nature of wireless LANs protects
>them from eavesdropping by satellite?

GSM cell phones have been successfully tapped via sat. Power is greater (up to
.5w) but antennas are worse, so effective radiated energy is very similar, as
are frequencies.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:




__
Do you Yahoo!?
Friends.  Fun.  Try the all-new Yahoo! Messenger.
http://messenger.yahoo.com/ 



Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-24 Thread Morlock Elloi
> underground railroad would have worked better, but your still black.

Obviously you don't know about whitening properties of moder ciphers!

Seriously, today the distingushing marks among classes, tribes and castes are
far more informational than physical. So today crypto *can* make you white, or
better to say discoloured.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:




__
Do you Yahoo!?
Yahoo! Photos: High-quality 4x6 digital prints for 25¢
http://photos.yahoo.com/ph/print_splash



Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-22 Thread Morlock Elloi
> The extreme ease of use of internet wiretapping and lack of accountability
> is not a good situation to create.

False.

It is the best possible situation cpunk-wise I can imagine.

It effectively deals away with bs artists (those who *argue* against this or
that) and empowers mathematics. If one is so fucking stupid, lazy or both not
to encrypt, anonymize and practice other safe-sex approaches then let's hope
that whatever broad wiretapping results in will also have slight (but
measurable) pressure in factoring those out from the gene pool.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:




__
Do you Yahoo!?
Yahoo! Photos: High-quality 4x6 digital prints for 25¢
http://photos.yahoo.com/ph/print_splash



Re: Cypherpunks response to viral stimuli

2004-02-03 Thread Morlock Elloi
Can a TLA please give some sign here, any sign - just ack that you know the
list exists, otherwise the legitimacy of cpunks is definitely going down the
drain.

Looks like a Berlin wall syndrome.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free web site building tool. Try it!
http://webhosting.yahoo.com/ps/sb/



Re: WiFi Repeater?

2004-01-07 Thread Morlock Elloi
Forget about repeater.

13-15 db flat panel antenna will get you access to distant APs - up to one mile
in favourable conditions.

18db grid dish will connect you to omnidirectional AP within 2 miles.




=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! Hotjobs: Enter the "Signing Bonus" Sweepstakes
http://hotjobs.sweepstakes.yahoo.com/signingbonus



RE: The killer app for encryption

2003-12-19 Thread Morlock Elloi
> What I'd like to see is a P2P telephony that also supports end-user 
> gateways to the POTS.  I'm not certain, but I think there are some MS 

I don't get what does this have to do with crypto.

Outside crypto, this didn't quite work with (almost) public fax gateways of
'90s. In theory, you could send e-mail that would be rasterized and faxed using
gateway that was in local calling area and presumably did not incur any charge
from the local POTS monopoly.

However, I don't see people letting others use their POTS lines, nor I see them
using their own for this purpose. Yes, this would essentially eliminate long
distance charges for those so equipped ... but if A and B have these gateways
and use them, what is the chance of them not being AT the gateway (ie. not
having laptops) at any given moment - why bother using POTS in the loop in the
first place ?

VoIP companies are already doing this and the cost is quite low (calling cards)
- why bother?



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
New Yahoo! Photos - easier uploading and sharing.
http://photos.yahoo.com/



RE: The killer app for encryption

2003-12-19 Thread Morlock Elloi
> Because it means you can complete call to the POTs with no 
> company-controlled switch involved, meaning no where to serve a court 
> order.  Since the call could be routed through a few intermediate nodes and 

I see.

So, in the real world, X uses this to make telephone threats, your POTS gets
picked up by random selection as the outgoing node, and gets traced back to
from the victim's telephone, LEA visits you and you say ... "I know nothing".

Yes, I can see it working and widely adopted.

Looks like someone is pumping dumbing gas into cpunks homes.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
New Yahoo! Photos - easier uploading and sharing.
http://photos.yahoo.com/



Re:Textual analysis

2003-12-16 Thread Morlock Elloi
> Its like steganalysis.  Its an arms race between measuring your own
> signatures vs. what the Adversary can measure.  If sentence length
> is a metric known to you, you can write filters that warn you.
> Similarly for the Adversary.   You end up in an arms race
> over metrics ---who has the more sensitive ones that the other
> does not control for?

But unlike stego, where the issue is faking the noise, personal fingerprints
can be removed from the message more reliably. You just need the right gloves.

One way is to use automated translators. They all have an "internal language"
and modules that translate to and from it. The internal language is far more
restricted than the natural one, so it doesn't leak many aspects of the
linguistic fingerprint. Going to the internal form is "lossy" compression.
There is no way to recreate the original.

The simplest method is an englih-to-english translator. Better method, and
thicker gloves, can be used by going through several from/to modules for
different languages. In commercial engines the meaning starts to suffer after
3-4 steps but just before that happens the word ordering and use gets
completely skewed.

Of course, you have to buy the translator and not use the online
google/babelfish access. It's the small things that get you ...



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
New Yahoo! Photos - easier uploading and sharing.
http://photos.yahoo.com/



Re: cpunk-like meeting report

2003-12-15 Thread Morlock Elloi
> http://lists.cryptnet.net/mailman/listinfo/cpunx-news
> 
> Be sure and check the archive before posting.  It is still small.

Cookies, "members only" archive access. Bad deal. Will not happen. Very few
consumers here.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
New Yahoo! Photos - easier uploading and sharing.
http://photos.yahoo.com/



Re: Has this photo been de-stegoed?

2003-12-11 Thread Morlock Elloi
> If you spatially fft a random photo, you'll find that the image detail 
> energy largely occupies certain bands. These are not the bands that stego 
> uses (or so I assume...it really can't be otherwise). The stego-able 
> spectrum will indeed be noise, but this noise will have a certain spectrum.

There is an obvious solution here ... you don't modulate into the noise band.
You modulate the base bits. The image visibly changes but only possession of
the original can prove that. Of course, it would have to be pictures of sand,
grass, water, crowd from above.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
New Yahoo! Photos - easier uploading and sharing.
http://photos.yahoo.com/



Re: Type III Anonymous message

2003-12-09 Thread Morlock Elloi
> Does anyone have a reasonably complete cypherpunks archive available
> for FTP?  Perhaps I could host them on my server and let Google index
> them. That might be useful.

There are only two live ones. Someone knows more ?

The second one is FTP-able:

http://groups.yahoo.com/group/cypherpunks-lne-archive/

http://lists.lab.net/archive/cypherpunks-exploder/



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
New Yahoo! Photos - easier uploading and sharing.
http://photos.yahoo.com/



Re: Type III Anonymous message

2003-12-08 Thread Morlock Elloi
> I've been wondering why I havent seen more discussion on
> wireless networking (802.11a/b/g) and anon/mix /dark nets.
> Is this a subject of interest to anyone?  I am curious what
> kinds of work has been done in this area...

Check the archives.

Wireless solves all crypto anonymity problems for the sender by making them
completely irrelevant - it provides good old physical anonymity.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
New Yahoo! Photos - easier uploading and sharing.
http://photos.yahoo.com/



Re: FOIA Data Mining

2003-11-30 Thread Morlock Elloi
> One exception: the ***, which hand writes the address. Is 

Why do you assume that you can tell handwriting from machine-generated script?

There are techniques far more advanced than static fonts, that can introduce
randomness and be pretty much indistinguishable from the manual product.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Free Pop-Up Blocker - Get it now
http://companion.yahoo.com/



Re: e voting (receipts, votebuying, brinworld)

2003-11-25 Thread Morlock Elloi
> You might check out David Chaum's latest solution at
> http://www.vreceipt.com/, there are more details in the whitepaper:
> http://www.vreceipt.com/article.pdf

That is irrelevant. Whatever the solution is it must be understandable and
verifiable by the Standard high school dropout. Also, the trace must be
mechanical in nature and readable sans computers, as there is no reason to
trust anything that goes through gates for which one hasn't verifed masks, when
stakes are high.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Free Pop-Up Blocker - Get it now
http://companion.yahoo.com/



Re: Vivendi to Destroy MP3.com archive

2003-11-22 Thread Morlock Elloi
> Somebody please tell me that this is a nightmare, and I am about to
> wake up.

Let's see ... was there a contract to keep things up ad infinitum ?

This is a good step, part of waking up from the dream that there are free
things on Internet. If there is no eyeball-catching value to be derived from
offering "free" service the service will cease to exist. This may well happen
with "free" e-mail accounts as well - I wonder who will be the first to
eliminate the free service in face of diminishing advertizing revenue - Yahoo ?
Hotmail ?



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Free Pop-Up Blocker - Get it now
http://companion.yahoo.com/



Re: Freedomphone

2003-11-21 Thread Morlock Elloi
> From what I've gathered from the diagrams in [1], it seems to be using
> AES-256
> in counter-mode XORed together with Twofish counter-mode output, Twofish also
> being keyed with a 256 bit value. I sense paranoia here - but being paranoid
> myself sometimes I very much welcome this decision! Those two keys are

All I'd ask for in addition is ability for both sides to type in 10-40 digit
secret key that they communicated in any way they chose, and have that XORed as
well ...


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Free Pop-Up Blocker - Get it now
http://companion.yahoo.com/



Re: "If you use encryption, you help the terrorists win"

2003-10-27 Thread Morlock Elloi
> I have a few friends like thisanyone have suggestions for ways to change
> their minds?
> 
> Basically they say things like "If you think the government can't break all
> the encryption schemes that we have, you're nuts."  This guy was a math major
> too, so he understands the principles of crypto.

It is impossible to rationalise long term consequences of data harvesting into
immediate threat for most people. The only way to change behaviour in absence
of the perceived threat is propaganda ... and those who have means for that
have different agendas. What's left is a personal-level propaganda but the
effects are negligible.

You can't really save anyone.

You can, however, make crypto tools that make things easier. Or surveillance
tools that make things obvious. The latter, I think, is more effective. Time to
open source Echelon ?







=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Exclusive Video Premiere - Britney Spears
http://launch.yahoo.com/promos/britneyspears/



Re: NSA Turns To Commercial Software For Encryption

2003-10-27 Thread Morlock Elloi
Isn't it really simpler to use RSA and DH and ECC in series ? Why choose ONE ?
There is no good reason for that.

Looks like PSYOP to me.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Exclusive Video Premiere - Britney Spears
http://launch.yahoo.com/promos/britneyspears/



Re: [mnet-devel] DOS in DHTs (fwd from amichrisde@yahoo.de)

2003-10-23 Thread Morlock Elloi
> ignored by citizens, but I have yet to see a license for owning a 
> typewriter or PC proposed.  They have already ruled numerous times that the 
> Internet is deserving of at least as free and access as print media and 


There are precedents. In Franko's Spain, all typewriters had to be registered
with the state, and all had serial numbers. It was illegal and punishable to
possess one without license.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
The New Yahoo! Shopping - with improved product search
http://shopping.yahoo.com



Re: [mnet-devel] DOS in DHTs (fwd from amichrisde@yahoo.de)

2003-10-20 Thread Morlock Elloi
Looks like the only way to shield from DOS is to raise the cost of DOS. This
will eventually eliminate the low cost of Internet bandwidth, one way or
another. You don't get nearly the same amount of DOS on your telephone as you
do on Internet, right ? Because telephone call is not free and/or it's
traceable.

The only question is how and where will this cost be introduced. My guess is
that it will happen on the sending side. Even today, assymmetric
cheapo-consumer connectivity makes publishing hard (as in "you are not visible
to the world".) But to handle DOS is harder, as major drive & money on internet
is selling shit, and players want easy (say 800-number) access. Proposals a la
net-driving-license (NDL) indicate the trend.

NDL can happen. Compare it to the early situation with cars or guns. No
regulation in the beginning, you could buy or make your own and do as you
please. Then, when commerce began to depend on both (transport of goods and
force monopolies) they got regulated. I see no difference between that and
computer with an Internet link. NDL is a possible reality. It used to be normal
to drive or carry a weapon without license. These days, they catch you sooner
or later and beat you into pulp. Same thing. Dreaming about it not happening
will get you nowhere.

So what can be done to raise the cost of DOS without introducing NDL ? I have
no answer to this.

What kind of NDL is the least bad ?

- requirement for something that requires human effort when opening a
connection. You do want to let humans into the store, but will refuse entry to
headless drones. OK, wrong analogy. But you get the idea.

- simply raise the cost of outgoing bandwidth - add a cost to every SYN request
or equivalent (have a decent number included in the basic bandwith fee.) This
will make unsuspecting collaborators in DDoS more efficient in keeping their
equipment clean  ("whoever aids  will be considered enemy combatant.)

The future doesn't seem bright. I think that there is a short window - a year
or two - in which some not-so-bad solution may preempt what They are trying to
do. But I wouldn't hold my breath. It's far more likely that EFF and other
wirehuggers will continue to be outraged (with zero effect as usual) and
clampdown on 'net access will continue.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
The New Yahoo! Shopping - with improved product search
http://shopping.yahoo.com



Re: Idea: Small-volume concealed data storage

2003-10-11 Thread Morlock Elloi
And what is the purpose of connecting the key and data storage in the first
place ?

Data storage is data storage, concealed or not. You feed encrypted data to/from
it.

Key is required at human interface and has absolutely nothing to do with the
storage.

If you want better security than passphrase, then you need a mechanical key
carrier. Indeed, that is where the word "key" comes from. You can store any
number on bits on it and you'll hand it over before they beat the shit out of
you - or  you may want to be brave and destroy it instead (trivial with
flash-on-chip and small battery cell), but, again, it has nothing to do with
storage of data.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
The New Yahoo! Shopping - with improved product search
http://shopping.yahoo.com



Re: EFF Report on Trusted Computing

2003-10-09 Thread Morlock Elloi
It took less than a decade for EFF to make a full turn, from championing
unrestricted uses of technology to censoring who can do what and in which way.

In this regards EFF resembles technological empires - like Cisco, for example,
that get born because of radically new ways to do things and then end up trying
to stop any further change.

At some point EFF left the course of enabling individuals and joined their
adversaries in the sense that masses should be patronized and given this or
that. Such EFF is likely to lose its support base and compete with others for
generic feel-good support public.

Anyone has right to offer anything. If there are enough imbeciles to take it,
that's good. Imbeciles should be exploited as much as possible. Those who
capitalize on imbecile protection racket are called politicians.





=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
The New Yahoo! Shopping - with improved product search
http://shopping.yahoo.com



Re: Duck Freedom Fighter (Terrorists), Euler SUV Graffiti

2003-09-18 Thread Morlock Elloi
And who will free the chicken ?

Fucking racists.


> Activists Take Ducks From Foie Gras Shed
> 
> FARMINGTON, Calif.  With only the dim light of a half-moon to guide
> them, four self-proclaimed "duck freedom fighters" made their way early
> Wednesday across an abandoned field, around dilapidated, foul-smelling
> chicken pens, and over a narrow passage through a large manure-filled
> pond.
> 
> ...
> Soon, four Peking-Muscovy ducks were free.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: Verisign's Wildcard A-Records and DNSSEC Plans?

2003-09-17 Thread Morlock Elloi
> What does it mean to say that "64.94.110.11" is or is not
> certified by .com as the address for bad-example-12345.com ,
> or that something else is?  Is it really the same as a
> wild-card that points to real sites?  Your Best Practices says that

At this point it is immaterial what Verisign will or will not do. They followed
the predictable course based on their capabilities and the assessment that the
response from some imaginary "community" is irrelevant.

The actual damage is breaking network diagnostic procedures and spam filtering,
increasing chance of undetected lost e-mail (their SMTP does not always bounce)
and increased danger of mistyped domain names - as now such typo in http client
leads to exposure to possibly adversarial html (which is why they started it
all in the first place.)

By this time it should be obvious to everyone that in the near future they will
establish targeted advertizing depending on what the mistyped URL looks like -
and probably sell or rent the "typo name space" - ie. Airborne Express could
buy *f?*e?*d?*e?*x?*.com address space, so fredex.com would lead to airborne's
web site.

And then there is a very small step from there to schemes where, for instance,
for basic $15-25/yr name rental your domain will be yours only in 90% of cases.
Other 10% will be sold. For $100/yr you will be guaranteed 99.5% of the
ownership. Of course, only platinum premium accounts, at $100K/yr, will have
100% ownership.

That is the problem when a centralized technical solution relies on the legal
system (and they almost always do.)

What is important is how and if will this accelerate alternate solutions for
name space management.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: [p2p-hackers] Project Announcement: P2P Sockets

2003-09-12 Thread Morlock Elloi
> infrastructure for these.  "Everyone" knows about them
> by using a common boostrap server to bootstrap into
> the Jxta network to gain the addresses of a few
> Rendezvous nodes.  Rendezvous nodes then propagate

So they are subject to lawsuits. Anyone running them can be traced and
persuaded by the local force monopoly to stop running them.

I see this just as shifting vulnerability point from the current one (ISPs,
ICANN) to a new one, equally traceable. What this can buy is few months of
confusion.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: [p2p-hackers] Project Announcement: P2P Sockets (fwd from bradneuberg@yahoo.com)

2003-09-10 Thread Morlock Elloi
> stable IP address. Super-peers on the Jxta network run
> application-level routers which store special
> information such as how to reach peers, how to join

So these super peers are reliable, non-vulnerable, although everyone knows
where they are, because  ?



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: cats

2003-09-10 Thread Morlock Elloi
Well, cats *do* have a quite strict hierarchy which is far from ad-hoc
establishment of the pecking order. So the analogy dosn't hold with cat
behavioral experts.

However, if cats could perform anonymized hissing, biting and scratching, then
I'm sure that cypherpunk maillist would be a good analogy for cat behavior.



> Second, if you examine the context of the original post, the statement
> was a metaphor about leaderless ("anarchic") assemblies such
> as this list.  In particular, the Feds (dogs) haven't historically
> understood that this list is the equivalent of a grad lounge or spontaneous
> beach party:
> there are multiple conversations, no one is moderating or otherwise
> choreographing
> squat.  When cats encounter each other by chance, they may assert
> dominance,
> (linguistic pissing contests are not unheard of here :-)
> but their lives are not structured around following, or smelling the
> higher-up's ass.




=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Charted death of cypherpunks

2003-09-09 Thread Morlock Elloi
http://recall.archive.org/?query=cypherpunks&search=go&afterMonth=1&afterYear=1996&beforeMonth=Today&beforeYear=%A0

(the above URL should be all in one line, of course)

=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: Searching for uncopyable key made of sparkles in plastic

2003-09-03 Thread Morlock Elloi
> Several months ago, I read about someone who was making a key that 
> was difficult if not "impossible" to copy. They mixed sparkly things 
> into a plastic resin and let them set. A camera would take a picture 

This boils down to difficulty of faking the analog interface.

Anything that regular camera captures the attacker can also capture and
reproduce it for the benefit of the camera. This means that camera has to be
able to distinguish between the real thing and images of the real thing. This
probably means going beyond optical image and somehow detecting 3D coordinates
of particles, forcing the attacker to actually construct a new physical key
carrier.

At the current level of technology and economy, it's cheaper to hire an
unemployed hardware engineer (no, s/w engs are not qualified,) to look at the
key than to construct a 3D particle-sensing camera.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: Responding to orders which include a secrecy requirement

2003-09-02 Thread Morlock Elloi
What Tim is (correctly) observing here is that a working challenge to the force
monopoly is a very effective way to modify behaviour.

Where Tim is wrong, though, is that he may have anything resembling a working
challenge.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: traffix analysis

2003-08-30 Thread Morlock Elloi
> as a solid dish.  (The uwaves see the screen as solid, however.)  With
> that much gain (ie directionality) wind could mess with your (albeit brief)
> connection.

This one has 30 degree coverage and is perfect for connecting to consumer APs
up to a mile: http://www.tranzeo.com/products.php?cmd=viewpage&id=102

Car window glass will cost you about 1.5-2 dB.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: traffix analysis

2003-08-29 Thread Morlock Elloi
> Yes, but remember to wear a disguise/cloak and be careful how you
> arrive there.  If you threaten King George, Who Worships Mars God of
> War, they will seize all the surveillance camera videos (public and private)
> near the AP you exploit.  Don't stop for gas anywhere nearby.

A 18-24" 2.4Ghz grid dish (available for less than $70-90) with 18-21 dB gain
will associate at 11 Mb/s with consumer-grade APs with diversity antennas at
2-3 miles.

You can also use it to offer free connectivity to a cafe 2 miles away, but
that's another maillist.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: JAP back doored

2003-08-21 Thread Morlock Elloi
> This is a terrible day for privacy advocates that used the once (perhaps

This is the great day for *true* privacy advocates worldwide.

In face of huge difficulties and dangers in providing real anonymity, some
human rights/wrongs organisations capitalised (in several ways) on the need for
anonymity by providing non-solutions with cosmetic appearance of anonymity.
They captured the  gullible public with this "service" and dealt another blow
to the real anonymity.

Who needs complicated mixmaster when there are cool cretin-friendly
java/web/whatever solutions ?

One would hope that users of other centralised "anonymity" services will learn
from this, if one is incurable optimist, that is.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: paradoxes of randomness

2003-08-19 Thread Morlock Elloi
> Is this sequence random? Compressible?  How could you tell whether this
> sequence is random or not, if you didn't know the key?

This is the a way to describe so-called randomness.

One simply has no adequate access to the Key and/or the Algorithm.

Both coin flipping and quantum noise fall into this category.

Actually, it's a pretty good method of authenticating Allah.






=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: paradoxes of randomness

2003-08-16 Thread Morlock Elloi
> - N+1 is the smallest integer that's not interesting.
>   But that's interesting in itself - so N+1 is interesting.


It breaks down after few consequtive non-interesting integers.

In fact, there is a proof somewhere that 17, 18 and 19 are not interesting at
all.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: They never learn: "Omniva Policy Systems"

2003-08-14 Thread Morlock Elloi
> seems horribly limiting. What of those using Entourage, or Mail, or any 
> of the dozens of platforms and news readers in existence. The site 
> mentions that they are now Blackberry-compliant. Well, does this mean 
> employees of the companies using "Omniva Policy Manager" cannot read 
> their mail on their Palms, or their laptops running other mail 
> programs, and so on?

My experience with ordinary "Joe Six Suits" users is that they are
progressively dumber and understand less and less tools they use to powerpoint
on. The gap between reality and their understanding of "computers" is widening.
Computers have finally adapted to idiots.

At this point snake oils as the mentioned one is perfectly fundable and
marketable. There is a significant user base that it will work for. Remember
all discussions about single DES being good enough only for braindead ? Well,
now they are past that. Layer 7 interface obstacles are now good enough.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: Idea: Homemade Passive Radar System (GNU/Radar)

2003-08-14 Thread Morlock Elloi
> As an active twist, we can also use a separate unit, Illuminating
> Transceiver (IT), periodically broadcasting a pulse of known
> characteristics, easy to recognize by the LPs when it bounces from an
> aerial target. This unit has to be cheap and expendable - it's easy to
> locate and to destroy by a HARM missile. As a bonus, forcing the adversary
> to waste a $250,000+ AGM-88 missile on a sub-$100 transmitter may be quite
> demoralizing. There can be a whole hierarchy of ITs; when one of them

Microwave oven.

This has been done in recent years in various theatres.

> Even other sources can serve as involuntary ITs. The landscape is littered
> with cellular base stations and civilian TV and radio transmitters. Just
> pick the suitable frequency and listen on.

There is enough wideband power in the ether above inhabited areas to make
passive detection from reflected EM possible in theory (without any EM
emanating from the target.) The space is illuminated, but the "eyes" are not
good enough, yet. Signal levels are extremely low, but it's likely that a
flying jet reflects back enough from hundreds of cellphone/celltower
transmissions to be few dB above the background noise. However, without knowing
where to "look" the receiver cannot use typical narrow beam high-gain antennas.
What is needed is an array, like an insect's eye, and that will be a sizeable
contraption - passive, but not small. In other words, the size of a passive eye
is proportional to the wavelength. To get human eye resolution in 10cm band the
size gets to 2km across. Big eye.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



cooperative evil bit

2003-04-03 Thread Morlock Elloi
ftp://ftp.rfc-editor.org/in-notes/rfc3514.txt

excerpt:

1. Introduction

   Firewalls [CBR03], packet filters, intrusion detection systems, and
   the like often have difficulty distinguishing between packets that
   have malicious intent and those that are merely unusual.  The problem
   is that making such determinations is hard.  To solve this problem,
   we define a security flag, known as the "evil" bit, in the IPv4
   [RFC791] header.  Benign packets have this bit set to 0; those that
   are used for an attack will have the bit set to 1.

=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Tax Center - File online, calculators, forms, and more
http://tax.yahoo.com



Re: Logging of Web Usage

2003-04-02 Thread Morlock Elloi
Frankly, it seems that some brains around here are softening. Relying on httpd
operators to protect those who access is plain silly, even if echelon (funny
how that word dropped below radar lately) did not exist.

The proper way is, of course, self-protection. Start with tight control of
outgoing info from the end-user machine (remove or fake all fields that are not
essential, such as referrer, client application, client OS). Use proxies. If
you own a multi-IP subnet randomly switch the originating IP - this fucks up
most automated tracking.

What doesn't exist is mixmaster-grade anon re-httpers. I guess that ones that
would let just text through (no images/scripting etc.) would be repulsive
enough for wide public and therefore useful.

Once you provide your data, it is always retained forever. Learn to live with
it.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Tax Center - File online, calculators, forms, and more
http://tax.yahoo.com



Re: pgp in internet cafe (webpgp)

2003-03-23 Thread Morlock Elloi
> why not just use ssh? you can scp the text to your host, encrypt/decrypt it
> *there* then scp it back if needs be. you also then don't need to use
> webmail - just have a mailbox on that server that you forward your webmail
> to, and that you send email in the name of the webmail account from.
> its easy enough to grab down puTTY whenever you need it.

Ever tried to install a ssh client on a random internet cafe computer ?


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Platinum - Watch CBS' NCAA March Madness, live on your desktop!
http://platinum.yahoo.com



Re: The practical reason the U.S. is starting a war

2003-02-16 Thread Morlock Elloi
> Yeah, yeah, all ideological tripe is the same: mine is right, yours is wrong.
> However, ideologues are a tribe on the prowl for victims, so beware
> media-addiction. Like this distortion mirror. What you fail to see incoming
> can splatter your guts.

The loop is closed; majority accepts the rule of might - from braindead to
"intellectuals". Everything, every thought, gets developed within this
framework. The alternative is to scream with horror throughout the day. And
therefore they depend.

We are smart, we will make philosophical systems that absorb the rule and build
on it. That is why most thinkers are so dependent on the state, the might of
the state. They depend on it because the basis of their mental constructs
depend on it. It is so easy and convenient not to see the gunpower and dead
bodies that are nurturing their systems.

The mere wide acceptance today of the idea that some are entitled to weapons
and some are not illustrates the above. If one simply counts killed per capita,
capita of the domiciles of the state doing killing, it is clear which state
destructs the most. The mere horror of acceptance of switching one target for
the other demonstrates the blindness of addicts. Who is next ? That they don't
ask.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Shopping - Send Flowers for Valentine's Day
http://shopping.yahoo.com




Re: Crypto anarchy now more than ever

2003-02-15 Thread Morlock Elloi
> This is what we need to fight. And this was, and perhaps still is, the 
> promises of unlinkable credentials, of untraceable digital cash, and of 
> "True Names." Crypto anarchy is needed now more than ever.

There are hardly battlegrounds available. Software runs on machines big ones
make, bits travel on wires owned by the big few, and DMCA/TCPA/BLAHBLAH or not,
it is harder and harder for any crypto to parasite on top of that, at least
when sheeple is concerned.

Crypto has deferred benefits and thus is beyond grasp in the world of short
attention span where immediate gratification rules. The *only* way to impose
crypto on the masses is not through anarchy but by organised force - a state
could do it. Guess when it will happen.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Shopping - Send Flowers for Valentine's Day
http://shopping.yahoo.com




Re: The practical reason the U.S. is starting a war

2003-02-15 Thread Morlock Elloi
> I'm wondering why Cryptome decided to place thisB particular piece of
> opinion.B 
> It is not inkeeping w/ the type of stuff I've read here before, in terms of 
> it being a straightB opinion piece, not a document,B federal register entry, 
> etc..B Why did "you" (who is that exactly, anyway?) choose to includeB it?B I

On a purely theoretical plane, there is no straight opinion. When one mentiones
word "France", for example, it assumes a lot - that the french state is a
legitimate state, that "state" is a valid entity in the first place, and that
term France is a legitimate name for that particular territory.

Language is a distillate of past propaganda. The newcomers and dissenters have
no advantage of "legitimate" words to support their case. They must use
elaborate descriptions or define new macros. That you see nothing wrong with
word "federal" but see something wrong with word "mutant" is a display of your
own bias.

And the mere notion that "valid" stuff ("facts") can be smeared by "racist"
stuff illustrates that you are not looking for facts, but for granfallooning
with something, with a group or idea.

(Along those lines, *anything* a politician thug ever mentioned would become
smeared and invalid. OK, bad example.)



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Shopping - Send Flowers for Valentine's Day
http://shopping.yahoo.com




Re: Putting the "NSA Data Overwrite Standard" Legend to Death... (fwd)

2003-02-05 Thread Morlock Elloi
> From the OSI 7-layer model, which took it from the fact that the number 7 is

It's simpler than that. Russians wanted 6, americans 8.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com




RE: the news from bush's speech

2003-01-29 Thread Morlock Elloi
> "...and this year, for the first time, every American will be weighed, and
> measured,  and given a free yearly Rabies shot."

"From now on, you will be wearing your underwear outside, so that we can check
it's clean."

=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com




Re: Fresh Hell

2003-01-18 Thread Morlock Elloi
>>1) Fucks up the prevailing religion doctrine.
>>
>Funny, but I can't seem to find the passage in the Bible where it talks 
>about cloning.  In fact, I can't find any passage that even remotely 
>impinges on the subject.

Provided that I had the christian cult in mind (where I am not an connoisseur),
wasn't there something about exclusivity of conceiving without fucking ?



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com




Re: Fresh Hell

2003-01-17 Thread Morlock Elloi
>What would be the valid reason for the government to claim power 
>to regulate her egg, her skin DNA, and her uterus?

1) Fucks up the prevailing religion doctrine.

2) Gives subjects an extra degree of freedom - imagine black ghetto females
giving birth to whities, uninfluenced by the local Bell curve ? There's a
concept for undermining the society.

3) removes exclusiveness - powerful will get cloned regardless ow "laws".



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com




Re: Fear and Loathing in Afghanistan

2003-01-17 Thread Morlock Elloi
>Holy Fuck I love this! Were it a novel, I'd be willing to steal it a la file 
>sharing.

Some things, like general education and breadth of interests, one just can't
fake. Redneckpunk, a very woody kind of word.

HST


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com




Re: Brinworld: Samsung SCH-V310 camcorder phone

2003-01-16 Thread Morlock Elloi
>The whole "Cell Phones - The Next Generation" thing
>has been a pure marketing scam from the beginning.

Experience demonstrates that any term with "generation" in it is pure BS,
technically and financially.

Most advances in technology are illusions created by dumbing down of the
populace.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com




Re: QM, Bell's Inequality and Quantum Cryptosystems

2003-01-02 Thread Morlock Elloi
> But in the end, as strange and unreasonable as this action-at-a-distance may
> be, it's now regularly seen in the laboratory. (Even wierder are the 'quantum
> eraser' and other bizarre behaviors). 

Is there any practical way to translate this into doll-and-needles method of
punishing modelled targets at a distance ?


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com




Re: Make antibiotic resistant pathogens at home! (Re: Policing Bioterror Research)

2002-12-24 Thread Morlock Elloi
> Expect to hear not of a hausfrau being busted, but of the roundup (so 
> to speak) of Mohammed Sayeed, Hariq Azaz, and other thought criminals 
> for buying two many gallons of Roundup at the local Walmart.

I'd guess that the credit card usage among People With Wrong Sounding Names is
falling sharply. Will cash survive ?



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com




Re: BigBrotherWare

2002-12-19 Thread Morlock Elloi
> Speculation: I expect the battles over cyberspace to shift to the OS, 
> with the leading private (non open source) OS makers "enlisted" in the 
> War Against Illegal Thoughts. The easiest initial front in this war, 
> one the OS companies like Apple and Microsoft have a corporate interest 
> in, is for the OS to more aggressively check for hacks or products not 

All one has to do is to refuse to upgrade. Unless you get over the upgrade hype
there is no cure - it's unlikely that home-manufactured computers for the
masses will be a reality any time soon.

The short life span of hw/sw platforms gives tremenduous power to mass
manufacturers. It becomes like food industry. Only this one is not base on need
for carbohydrates and proteins (and fat, of course), but on manufactured hype
about value of "new" vs. "old".

Most of the stuff (except games) works perfectly functionally today in hw/sw
combinations from 1997. E-mail, http clients, ftp, usenet, graphic design/DTP,
wordprocessors. This is not a long-term solution, but it's the best there is.

What kind of effort is required to make computers (=hw+sw) have longevity of
books, and therefore eliminate the power of "publishers" ?


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com




Re: West Coast...Galileo..."decent NSA dudes?"

2002-12-18 Thread Morlock Elloi
> But what I don't fully "get" is why stance matters, per se. For instance,
> take p2p. We can actually argue all we want about what government should/not
> do about "the problem", but in the end file sharing is just about
> unstoppable.
> 
> If I write or release an app, then, that will facilitate "seamless" (ie,
> within the Kazaa browser, for instance) transmision and storage of shared
> files in an encrypted format, it kinda doesn't matter what my personal
> philosophy is, does it? I can claim to be a libertarian or say that Ayn Rand
...
> In other words, I'm not particularly pro- or anti-government per se. Frankly,
> I don't care a ton what the government does on this issue (for instance). By
> writing and releasing apps (or simply conceiving of and discussing new apps

Changing the method (or introducing a new one) of communication between
subjects is inherently anti-government.

Government is that by control, and requiring it to do extra work to retain that
control is generally viewed as unpleasant. French resisted introduction of
telegraph for several decades - the government insisted on soldier-guarded
signalling tower system.

I can not think of any current government that would not be shit scared at the
prospect of all subjects suddenly acquiring method for secret or untraceable
(or both) communication.

So your releasing of that p2p app is and will be viewed as pushing arms (free
guns, imagine the possibilities) and will be dealt with accordingly. Especially
if you make it to operate as simply as .45

 

=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com




Re: Extradition, Snatching, and the Danger of Traveling to Other Countries

2002-12-13 Thread Morlock Elloi
> Interesting approach. But exactly how does that hinder the FBI 
> demanding a booksellers customer list, or a library's patron 
> check out record, or a black bag job on a personal computer, or 
> thousands of CALEA taps, or the Total Information Awareness 
> project, or the process of designating a US citizen as an enemy 
> combatant, or the suspension of habeas corpus, etc.
> 
> I was not aware that simple management of my own eyeballs could 
> have such dramatic, widespread, external effects on gangs of 
> thugs with guns and high tech surveillance gear all carrying a 
> "do-whatever-you-like, get-out-of-jail-free card from the US 
> Congress, and essentially no oversight. Is this kind of like 
> mind control, or what?

Do not underestimate the power of detox.

Guns et al are just symbols, 99.999% of proles are kept at bay with software.
It is economically unfeasible to use hardware for that.

Take a look at happenings in the last decade in europe - anti-comm uprisings
had one and only one focal point - TV stations.

They live.





=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com




Re: Extradition, Snatching, and the Danger of Traveling to Other Countries

2002-12-13 Thread Morlock Elloi
> society, what can the regular person do to strike a blow in 
> opposition to the direct attack on the Constitution and civil 
> liberties and civil rights?

Stop watching TV ?


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com




Re: Anonymous blogging

2002-12-11 Thread Morlock Elloi
> In a way, Mathew's and Choate's attack upon the list has done
> us a favour.  The list is now effectively restricted to those
> with the will and ability to use filters, which raises the
> required intelligence level.

Does this vindicate homeopathy ?



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com




Re: The trend toward "signing away rights"

2002-12-10 Thread Morlock Elloi
> I'm watching a New York television news show reporting on one of the 
> recent cases where people sign away their rights. This is about 
> requests sent out by schools that parents of students sign a pledge 
> that alcohol, loud parties, and late night activities will not be 
> permitted at their homes and that schools and local police will be 
> permitted to inspect the houses without warrants for violations. The 
> news report says that most parents have signed the pledge. So, what of 

Sooner or later you'll figure out that there are no "rights" without
appropriate defenses. You only own what you can defend. If you are dumb enough
to believe that some document is your defense, you are in for a surprise.

Compare this to issuing cat-repellant charms to mice. Call them
"constitutions". See mouse walking bravely. See cat feed.

On the other hand, observe a mouse with a .50 catgun.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com




Re: If this be terrorism make the most of it!

2002-12-08 Thread Morlock Elloi
> >But we will always have phone booths and acoustic couplers.
> 
> Phone booths already don't accept calls, by State Fiat.  You think
> detecting and dropping modem calls from a CO is tough?

It's just a matter of designing a (software ?) modem that will, instead of
whisling and peeping, emulate soccer mom chatter. Lower rates, but
undetectable.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com




Re: If this be terrorism make the most of it!

2002-12-07 Thread Morlock Elloi
This, with obligatory cameras in cybercafes, is just plugging the anonymity
holes.

Also, one of unmentioned consenquences is that any "security" will make
self-organising networks harder to implement. Guess who benefits.

But we will always have phone booths and acoustic couplers.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com




Re: CNN.com - WiFi activists on free Web crusade - Nov. 29, 2002

2002-12-04 Thread Morlock Elloi
> cards with external antenna port.  For cell phones the entire instrument 
> could be placed in at the reflector's focus and operated via a mic/headset 
> adapter (some older Nokia models have an external antenna port behind a 
> small rubber plug on the rear.)

Cellphone taped in focal point of a 18" directv dish hits cell stations 10
miles away. With 80% signal strenth.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com




Re: CNN.com - WiFi activists on free Web crusade - Nov. 29, 2002 (fwd)

2002-11-30 Thread Morlock Elloi
> 1. large wifi networks start to hit scaling problems - they start to need
> routers and name services that are relatively expensive, and ip address
> ranges start to become a scarce resource.

Not so. Self-organasing mesh networks appear to have some interesting
properties. There is a number of open solutions and at least one startup I know
about based on this.

Real stuff ...

http://w3.antd.nist.gov/wctg/manet/manet_bibliog.html
http://locustworld.com/
http://www.mitre.org/tech_transfer/mobilemesh/

... and rants:

http://www.wirelessanarchy.com/
http://www.gldialtone.com/whyP2Pwireless.htm
http://slashdot.org/articles/02/10/01/2220255.shtml?tid=126



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com




Re: CNN.com - WiFi activists on free Web crusade - Nov. 29, 2002 (fwd)

2002-11-30 Thread Morlock Elloi
> > Geographic routing completely eliminates need for expensive routing
> > and admin traffic. Name services? Who needs name services? Localhost
> > is sufficient for a prefix to an address namepace.
> without routing and name services, you have what amounts to a propriatory
> NAT solution - no way to address an interior node on the cloud from the


The importance of geographic routing is that the cataloguing system is public.

Imagine that city streets had absolutely no signs and no house numbers. In
order to get to, say, "quality whorehouse", you need to pay for someone to
guide you, and ultimately that someone may choose not to. If, however, streets
were marked, you could use maps from many sources - or even create your own -
to guide you.

Localities put up the addressing infrastructure and they get aggregated on
global levels in any desireable/sellable form.

Compare this to Internet, where you essentially have to pay to get routed via
closed systems. >These characters< were routed based on decisions and policies
of no more than 2-3 corporations. We all know what the consequences are.

Self-routing mesh networks have potential to sidestep this. Transistors are
small and cheap enough even today - the centralised communication
infrastructure is there so that you can be charged, not because technology
dictates that any more. With wireless there is a potential that everyone paves
(and marks street number) in front of their house. The only way to subvert this
would be to erase "santa monica" from minds of everyone. I don't see that
happening. 

The day that I can send a packet from LAX to SFO via non-ISP-ed network will be
the beginning of the end of telco/telecom monopolies. Or, should I say,
directory monopolies.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com




Re: Video Mules: (Was: Re: Psuedo-Private Key (eJazeera) )

2002-11-24 Thread Morlock Elloi
> couldn't be used to record video  and then (after appropriate protection) 
> swallowed.

Eventually this will happen. Maybe a video recorded into a DNA of a bacteria
synthesized in a portable device ("diamond age", anyone ?)

Ne protocols will be required ("if I infect this east coast girl, how long it
will take for the message to get to south africa ?")

Which will have interesting consequences. For the time being the state is
comfortable sifting through wired internet (after winning the crypto war) and
listening to airwaves. Maybe body-size state-inspected condoms will be required
at all public places.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus  Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com




Re: Video Mules: (Was: Re: Psuedo-Private Key (eJazeera) )

2002-11-24 Thread Morlock Elloi
> Lousy latency. Just put your DNA-encoded message in a microdot on your
> dead tree letter, and PCR/sequence on arrival.

Isn't all snail mail already irradiated ? Then soon.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus  Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com




Re: Microsoft on Darknet

2002-11-23 Thread Morlock Elloi
>Mojo was intended to do this but it failed, I think it failed
>because they failed to monetize mojo before it was introduced
>as service management mechanism.

I think that there is a generic failure of systems that expect some
pre-determined benevolence and cooperation from end users. Contrary to wishful
thinking, people miss firmware for non-hierarchical self-organising via purely
technical means (internet). There is not one example that it works. The worst
side of this is that it means that there will always be choke points in
effective organisations, which pretty much sends cyberpunkish net anarchy ideas
down the drain.

I'm waiting to see what will happen with self-organsing 2.4ghz mesh networks,
if it is possible to misuse the fabric - maybe by establishing fat IPSec-ed
pipes accross the town to avoid leased line expenses ?



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus  Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com




Re: The End of the Golden Age of Crypto

2002-11-15 Thread Morlock Elloi
> It's a state of mind wich  can only be compared with mental ilness...
> (I've read that there are even some neurological similarities between the 
> faithful and the mentaly ill)

The belief (faith) center is somewhere in the frontal cortex and that mutation
was essential for development of the civilisation as we know it, which
basically boils down to brainwashing believers into beating the shit out of
nonbelievers (and these, being independent individuals, never managed to
properly organise to resist), which is evolutionary sustainable (when the shit
gets beaten out of you it takes your mind of sex.)

So, technically speaking, it's more specialisation than mental illness.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Web Hosting - Let the expert host your site
http://webhosting.yahoo.com




Re: eJazeera?

2002-11-11 Thread Morlock Elloi
> Other methods seek to eliminate the need for various levels of pre-knowledge 
> between Bob and Alice, and to also stave off the "round up" scenario where a 
> large group is examined and cleansed of all electronica, before data can 

Live streaming is out of question as it would make detection trivial (not with
triangulation but by looking at the live video.)

So the mode would be

1) capture

2) move to the edge of the arena

3) stream via standardised protocol using (camouflaged) 8" 3db omni stick
antenna. Do this in AP mode.

4) go to 1


Relayers could just point their 18 dB dishes from places as far as 3-4 miles
and capture (3). You can bet that every single news crew would be also dishing
for signal.

The countermeasure would be jamming 2.4 GHz, but this just means positioning
(2) farther away.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
U2 on LAUNCH - Exclusive greatest hits videos
http://launch.yahoo.com/u2




Re: Photos in transport plane of prisoners: Time for eJazeera?

2002-11-10 Thread Morlock Elloi
Any wide-dissemination system must be distributed. Usenet used to fill this
role, but due to aggregation of major nodes and feeds it is not that any more.

Anything on the "web" has fixed pointers and already is or soon will be become
chokable. I'd be surprised if there is no development in progress to install
real time packet sniffin' and droppin' silicon on major exchange nodes,
remotely loaded with patterns that identify the undesireables. Suddenly you get
disappeared and invisible.

Forget crypto and stego - it's not happening for the critical mass. Bootleg
entertainment exchange P2P software offers some window, but it is progressively
being hamstringed with TOS agreements and upcoming metered access (pay per Gb),
and once freebies are gone, how many will bother to maintain and develop P2P
networks for the old fashioned purpose of political activism ?

We need to look beyond internet as it is today.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
U2 on LAUNCH - Exclusive greatest hits videos
http://launch.yahoo.com/u2




Re: Aussies to censor web

2002-11-08 Thread Morlock Elloi
> A police ministers meeting in Darwin this week
> agreed it was "unacceptable websites advocating or facilitating violent
protest
> action be accessible from  Australia".

This is just a CIA psyop to make US look good. USA and China.





=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
U2 on LAUNCH - Exclusive greatest hits videos
http://launch.yahoo.com/u2




Re: Integrated crypto sounds useful, but it's fragile and ultimately a lose

2002-11-03 Thread Morlock Elloi
One solution that would work:

1. keep the text paradigm - cyphertext is just a text for everyone involved.

2. Extract encrypt/decrypt functionality into a device (D) with longer lifetime
than OS/MUA/hw combo (C).

(2) assumes text interface between (C) and (D). (D) could be a PDA that can OCR
computer screen and inject traffic into the keyboard cable. PDAs are personal
and have longer lifetime potential than 3 constantly upgrading components (C)
consists of.




=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
HotJobs - Search new jobs daily now
http://hotjobs.yahoo.com/




Re: Fwd: Asbestos ban again cited as the real cause of WTC collapse

2002-11-02 Thread Morlock Elloi
> building I inspect, my own work not excepted. You have to battle to get
> contractors to do it right. And owners to pay for quality work and
> maintenance
> rather than wait for vicitms and insurance companies to pay the tithe of
> negligence.

This is the same problem as with other expenses without immediate gratification
and uncertain effectiveness (to the laymen) - use of hi-fi cryptography, for
example.

Too often the mere *existance* of a technology is used as an excuse to build
systems which *require* such technology (and maintenance) and then do the token
application of the technology and forget about it.

I wonder if anyone used asbestos-steel-WTC meme (R) (TM) (C) to promote strong
crypto ...



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
HotJobs - Search new jobs daily now
http://hotjobs.yahoo.com/




Re: ISP Utilty To Cypherpunks?

2002-10-31 Thread Morlock Elloi
I see an open search engine as the most important server project. Limit the
engine to cpunkish issues and similar to control the popularity (bandwidth).
Run your own harvesters/spiders. This would help limit the google monopoly and
power and provide a search engine of choice for the (gasp) "community".

The question is, how does one construct a censorship-free search engine.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
HotJobs - Search new jobs daily now
http://hotjobs.yahoo.com/




Re: Listening vs. Note-Taking

2002-10-29 Thread Morlock Elloi
> Item: At most Cypherpunks meetings someone is sitting with their laptop 
> open, recording notes (or whatever). I usually wonder what they plan to 
> do with the notes...not in any paranoid sense, just wondering if 
> they'll ever look at the notes again, and why.

Taking notes ???

We're just checking mail and chatting on adult IRCs. Beats meeting content most
of the time.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
HotJobs - Search new jobs daily now
http://hotjobs.yahoo.com/




Re: Confiscation of Anti-War Video

2002-10-28 Thread Morlock Elloi
> My notion was that Bob, who receives Alice's WiFi signal, is also using 
> a laptop, which he simply walks off with. He doesn't need a DSL or 
> cablemodem or whatever.

Could be an interesting exercise for the next cpunk meeting. The goal is to
leave the meeting with some content on the laptop anonymously, ie. no one knows
*who* left the meeting with that content. The content should be made available
by one or two insiders via 802.11b. They don't even say which protocol they are
using (except windoze-proprietary shit which is out of question ... appletalk
is OK :-)

The LEA agents then post a list of suspects.

The Morpheus agents then post the content.

If there is no match, it means that fully anonymous cooperative dissemination
is doable. You broadcast, and you don't know who will relay it.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Y! Web Hosting - Let the expert host your web site
http://webhosting.yahoo.com/




RE: What is the truth of the anti war rallys?

2002-10-28 Thread Morlock Elloi
> Does anyone know the truth from his own eyes, or a more 
> complete set of images?

The Civic Center Plaza was practically filled. It's about 150 x 100 meters,
assuming 2 people per m2 it comes to around 30,000, and there were lots of
people around as well.

=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Y! Web Hosting - Let the expert host your web site
http://webhosting.yahoo.com/




Re: FC: Privacy villain of the week: DARPA's gait surveillance tech

2002-10-27 Thread Morlock Elloi
> There are potential medical uses of this sort of technology -
> enough computer abusers and other desk-job workers with bad backs
> or similar health problems that could benefit from analyzing how they walk,
> but obviously Darpa's not going to find that.  Perhaps we can get

There are expensive, complicated computer-controlled contraptions that attach
to the body, analyze walk, forces that you exert, and tell you exactly which of
40-50 muscles engaged in the walk need tuning. They can also *make* you walk
"right", by limiting/forcing movements. Since people do manage to correct the
gait with them, I see no reason that gait can be modified, lond-term, in any
desireable direction. 

That is, unless these devices become a controlled technology.

Do-it-yourself emergency gait scramblers include thumbtacks in both shoes
(amazingly how quickly the body learns how to avoid the pain) and anal inserts
that require active squeezing to remain in place. 


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Y! Web Hosting - Let the expert host your web site
http://webhosting.yahoo.com/




Re: FC: Privacy villain of the week: DARPA's gait surveillance tech (fwd)

2002-10-27 Thread Morlock Elloi
> No technical solution will work in absence of laws making it legal.

Sanity villain statement of the month.

=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Y! Web Hosting - Let the expert host your web site
http://webhosting.yahoo.com/




Re: Implantable Chip, On Sale Now

2002-10-26 Thread Morlock Elloi
> sector offices or nuclear power plants. Instead of swiping a smart card, 
> employees could swipe the arm containing the chip.

A new must-have item for terrorists: cleaver.

This is sillier than biometrics ... while you may talk the attacker out of
plucking your eyeballs or cutting off fingers ("the scanner detects blood flow,
Mr. Terrorist"), this is a no brainer.

Granted, it may give government employees more incentive to resist, by
implanting into scrotum (the authentication procedure may look funny, though.)



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Y! Web Hosting - Let the expert host your web site
http://webhosting.yahoo.com/




Re: internet radio - broadcast without incurring royalty fees

2002-10-25 Thread Morlock Elloi
> - queueing the track for download via kazaa

Napster clones, kazaa, gnutella et al. rely on end-users to upload stuff. These
end users simply have no bandwidth available for that. Cheapo DSL lines have
hundred or few hundreds of kbit/sec unguaranteed upload capacity. No one is
going to pay T1 to serve free stuff in breach of copyright laws.

The net result is - and anyone can try it for themselves - that average success
rate is less than 40%, the speed is miserable - most of the time it takes hour
or more for 5-6 minute mp3, and then you need to be lucky so that content
matches the title.

This makes it impractical for situations where many look for the same content,
in near real time.

shoutcast/icecast systems have 40-60K simultaneous users planetwide, with 2-3K
simultaneous broadcasts. Most stations have 1-5 listeners, popular ones up to a
hundred or even more (I have no idea who pays bandwidth for those ... some 128
kbit/sec jazz ones are really good, and have 200-300 users).

All in all, this is negligible, a don't-care at this point. The broadcast tax
is a preemptive move that is supposed to influence the future.

While there always will be pathological cases that will spend tens of hours
online to get few mp3s for free (that is, until local telco decides that flat
rate is no more viable), for most napsters are unusable. Usable serving costs
money, is stationary and therefore taxable. Until all 802.11bs automesh
networks get connected independently of "internet".


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Y! Web Hosting - Let the expert host your web site
http://webhosting.yahoo.com/




Re: One of Brinworld's uglier moments, no rights for immies

2002-10-22 Thread Morlock Elloi
> surrounding a white van near a Richmond gas station.

Toyota, GM and Ford all reported huge drop in white van sales, to a virtual
zero. Ford also asked dealers to remove white vans from "highly visible"
locations.

Unrelated, several body shops are advertising discounts on "white van
conversion" jobs.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Y! Web Hosting - Let the expert host your web site
http://webhosting.yahoo.com/




Re: One time pads

2002-10-19 Thread Morlock Elloi
> Also, can your tool use floppies instead of USB keys?

It's a freakin' C program that works on a file - but carrying a floppy around
is so ... ordinary.

> There are problems with KGB-quality attackers recovering overwritten data
> which are probably much more serious for disks than flash rom,
> but they're nearly universal and good shredders work well on them.

Bits are overwritten by running PRNG output on them 128 times, PRNG being
seeded by the data that has just been erased. We use DES in counter mode as
PRNG.

> You need to use each bit twice - once to encrypt, and once to decrypt.
> Destroying them after the first use is a bad idea

Why would sender need to decrypt known plaintext is beyond me ... sender XORs
and destroys bits, recipient XORs and destroys bits. Each in their respective
dongles, once.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Y! Web Hosting - Let the expert host your web site
http://webhosting.yahoo.com/




Re: One time pads

2002-10-17 Thread Morlock Elloi
> Pretty much, yes.  at least one "real world" OTP system assumes you will
> be using three CDRW disks; the three are xored (as you say) together,

I have a working OTP system on $40 64 Mb USB flash disk on my keychain.

The disk mounts on windoze and macs, and also contains all s/w required to
encrypt/decrypt, on both platforms.

30Mbs are filled with distilled randomness (two video digitizers at high gain
looking into open input noise, compressed first with LZW then again compressed
8:1 by taking only byte parity, then XORed together - takes several hours and
passes diehard) and judging by the current use it will last us for decades for
text messages. OTP is now shared among group but it's trivial to have
subpartitions for 1:1. Used bits are securely deleted. Works on any USB-capable
win/mac.

The whole USB disk can be additionally protected by either scramdisk (cryptdisk
for mac) passphrase, but it limits operating platforms.

The custom software was trivial to make (less than 200 C lines) and complile
under codewarrior for multi-platform executables.

To conclude, OTPs are easy to make and use. Plugging in the dongle to read
e-mailo is extra sexy (and attracts chicks, this has been documented.)

Unlike ad nauseam discussions on OTP feasibility. You guys must really be
bored.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Faith Hill - Exclusive Performances, Videos & More
http://faith.yahoo.com




RE: For everything else, there's MasterCard.

2002-10-16 Thread Morlock Elloi

> I fail to see how anyone, anytime, anywhere, can support 
> the hunting of random non-consenting humans for sport.

This is a favourite bipedal pastime. We all support it. It's good and fills one
with joy and satisfaction. 

Major tournaments are called "wars" and we hardly can wait for the next big
one. 

Lower castes and serfs are brainwashed to refrain from it; it's the sport only
for nobility (and wide-spread games would ruin the profits.)

Therefore your failure to understand is understandable.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Faith Hill - Exclusive Performances, Videos & More
http://faith.yahoo.com




Re: commericial software defined radio (to 30 Mhz, RX only)

2002-10-16 Thread Morlock Elloi

>Does this run on linux? 

Also, if regular cheapo PC sounboards can digitize 30 MHz (and Nyquist says
this requires 60 MHz sampling rate) then some product managers need ...
flogging.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Faith Hill - Exclusive Performances, Videos & More
http://faith.yahoo.com




  1   2   >