Re: [EMAIL PROTECTED]: [Politech] Montana Supreme Court justice warns Orwell's 1984 has arrived [priv]]

2005-08-23 Thread coderman
On 8/23/05, J.A. Terranson [EMAIL PROTECTED] wrote:
 On Tue, 23 Aug 2005, Tyler Durden wrote:
  Yes, but the old question needs to be asked: How much of this crime would go
  away if crystal meth were legal? 

agreed; though i'd rather see them taking something less neurotoxic,
like dex or racemic amphetamine.


 Lets not forget the lessons of the NYC Methadone Maintenance Programs
 either...  Along with legalization
 must come the removal of monopoly practices such a single sourcing of the
 drug and prescriptions to dispense.  Only then does the free market take
 over and keep the price, and the crime, low.

fortunately stimulants are some of the cheapest drugs to produce minus
all the regulatory overhead.


 I like the idea of belief in drug-prohibition as a religion in that it is
 a strongly held belief based on grossly insufficient evidence and
 bolstered by faith born of intuitions flowing from the very beliefs they
 are intended to support.
 
 don zweig, M.D.

i'm saving this quote :)



Re: [EMAIL PROTECTED]: [Politech] Montana Supreme Court justice warns Orwell's 1984 has arrived [priv]]

2005-08-23 Thread coderman
On 8/21/05, Tyler Durden [EMAIL PROTECTED] wrote:
 ...
 As for crystal meth, I know I'm preaching to the choir here, but if I want
 to pour something from my chemistry set down my throat that shouldn't be
 anybody's business. The fact that it doesn't accidentally kill me and indeed
 gives me a buzz shouldn't be the sole provence of the pharmaceutical
 companies. After that, if you want to make laws about selling the stuff well
 that's a different matter.

the state of oregon just passed a law (yet to be put into effect) that
requires a prescription from a doctor for all sudafed (pseudo
ephedrine) purchases.  the problem isn't drug addicts killing
themselves with corrosive fluids, as this would be a problem that
solves itself in short order, but rather that meth heads are idiotic
crime machines.  i've had numerous friends and acquaintances affected
by this (vehicles stolen or broken into, property damaged and/or
stolen, tweakers robbing at knife point, etc, etc) and it's getting
ridiculous*.

big brother isn't the answer, but when you get a lot of pissed off
citizens and overwhelmed police involved the solutions they settle for
are going to be ugly and invasive.

what a fucking mess...



* last week a tweaker out of jail for only a few weeks went around to
our hay growers neighbors and stole all sorts of random crap from
homes up and down the road he lived on.  everything from elk antlers
to hand made arrows for bow hunting, power tools loaded into a wheel
barrow, the most random crap.  the only reason he didn't hit our hay
grower was that last time he stole from them they went to his parents
house and told him the next time your son steals from my home you'll
be attending a funeral.  now that's closer to an effective solution.
:)



Re: Textual analysis

2003-12-16 Thread coderman
Adam Shostack wrote:

...
| It's not obvious to me how you'd change your writing style to defeat these 
| textual analysis schemes--would it really be as simple as changing the 
| average length of sentences and getting rid of the big words, or would 
| there still be ways to determine your identity from that text?

So, the question boils down to economics.  There's how much you need
to communicate, how much someone is willing to spend to tag you, and
how good their proof needs to be.  I suspect that for most purposes,
proof does not need to be very strong in relation to your need to
communicate.
An interesting ad-hoc test subject might be Eleusis/ZWITTERION from
a.d.c.; I've wanted to see someone apply these techniques against his
writing after following his posts and being amused/surprised myself.
http://groups.google.com/groups?safe=offq=Eleusis+group%3Aalt.drugs.chemistry
http://groups.google.com/groups?safe=offq=ZWITTERION+group%3Aalt.drugs.chemistry
Strangely enough, the powers that be showed little interest in his
electronic trail ...
[ http://www.rhodium.ws/chemistry/eleusis/memoirs.html ]



Re: Type III Anonymous message

2003-12-08 Thread coderman
Eugen Leitl wrote:

Not that there is much discussion, the cyherpunk meme doesn't seem
to draw fresh blood too effectively.
I've been wondering why I havent seen more discussion on
wireless networking (802.11a/b/g) and anon/mix /dark nets.
Is this a subject of interest to anyone?  I am curious what
kinds of work has been done in this area...
A few examples:
- cryptographic dead drop or anonymous broadcast: wifi
 broadcasts with clients monitoring for tagged packets.
 Anonymous transport for a number of miles. (probably
 requires amps)
- (encrypted) wireless hops in a mix network for additional
 attack resistance, and/or all wireless (mesh?) routing.
Is the mapping of existing cryptographic techniques to
wireless transport straighforward and uninteresting, or
is there additional capabilities in a wireless envrionment
that open up new uses for secure and/or anonymous
communication?


RE: C3 Nehemia C5P with better hardware RNG and AES support

2003-11-26 Thread coderman
.. delayed response

 From: Peter Gutmann

Lucky Green [EMAIL PROTECTED] writes:
...
I fail to understand why VIA bothered adding AES support into the CPU. When
was AES last the bottleneck on a general-purpose CPU? 

Apart from the obvious what cool thing can we fit in - - this much spare
die space?, the obvious target is SOHO routers/firewall boxes.  My spies tell
me that it's already being used in a number of products like this, and the
addition of AES will help the process.
I am working on a linux distribution that is using the hardware RNG for
seeding/rng in number of things (IPSEC, ssh, ssl, gpg, etc) and this is
definitely the angle I am excited about.
A 1Ghz proc goes a long way, but in a media intensive system (video,
audio, streaming over wireless) you want to keep CPU load as light as
possible so that latency is minimal.
With the C5P you can now do VPN with AES, rng via the hardware entropy,
and video offload via the CLE266.  This leaves the CPU free to handle
various interrupts for the wireless network, disk i/o, etc.
Very nice move, I think.

I have written some poor code and info regarding the C5XL (nehemiah)
and linux:
   http://peertech.org/hardware/viarng/

[ I'll be cleaning code up and releasing new patches/srcs soon ]



Hardware SHA-1 in the next rev makes
it even better, since you can now do IPsec and SSL tunneling purely in
hardware (and then you lose it all again in the crappy Rhine II NIC, but
that's another story).
A lot of peer networking applications use SHA digests for securely
identifying resources in a network.  The overhead of this for large
volumes of content will make this a welcome addition :-)
Also, Centaur indicated that with the SHA on die, they can produce
statistically perfect RNG output.  The von neumann whitener does let
a small bias through for very large data sets IIRC (i.e. a
statistical bias is detectable in 1G or more data)
If you are using the hardware rng via a user space daemon feeding
/dev/random then this is no longer an issue.


The bottleneck tends to be modular exponentiations, yet VIA failed to include
a modular exponentiation engine. Strange.
Not for SOHO use it isn't, the initial handshake overhead is negligible
compared to the constant link encryption overhead.  The alternative is to do
the crypto externally, for which you're paying for an expensive and power-
hungry crypto core capable of doing a zillion DH/RSA ops/sec that gets used
once every few hours.  The alternative is to load or load your standard
firewall firmware into a Nehemiah and offload all the crypto and RNG stuff.
I am also curious about crypto-loop file system acceleration / CPU offload.
There are a number of uses I am anxious to try with this hardware.
Best regards,