Re: [EMAIL PROTECTED]: [Politech] Montana Supreme Court justice warns Orwell's 1984 has arrived [priv]]
On 8/23/05, J.A. Terranson [EMAIL PROTECTED] wrote: On Tue, 23 Aug 2005, Tyler Durden wrote: Yes, but the old question needs to be asked: How much of this crime would go away if crystal meth were legal? agreed; though i'd rather see them taking something less neurotoxic, like dex or racemic amphetamine. Lets not forget the lessons of the NYC Methadone Maintenance Programs either... Along with legalization must come the removal of monopoly practices such a single sourcing of the drug and prescriptions to dispense. Only then does the free market take over and keep the price, and the crime, low. fortunately stimulants are some of the cheapest drugs to produce minus all the regulatory overhead. I like the idea of belief in drug-prohibition as a religion in that it is a strongly held belief based on grossly insufficient evidence and bolstered by faith born of intuitions flowing from the very beliefs they are intended to support. don zweig, M.D. i'm saving this quote :)
Re: [EMAIL PROTECTED]: [Politech] Montana Supreme Court justice warns Orwell's 1984 has arrived [priv]]
On 8/21/05, Tyler Durden [EMAIL PROTECTED] wrote: ... As for crystal meth, I know I'm preaching to the choir here, but if I want to pour something from my chemistry set down my throat that shouldn't be anybody's business. The fact that it doesn't accidentally kill me and indeed gives me a buzz shouldn't be the sole provence of the pharmaceutical companies. After that, if you want to make laws about selling the stuff well that's a different matter. the state of oregon just passed a law (yet to be put into effect) that requires a prescription from a doctor for all sudafed (pseudo ephedrine) purchases. the problem isn't drug addicts killing themselves with corrosive fluids, as this would be a problem that solves itself in short order, but rather that meth heads are idiotic crime machines. i've had numerous friends and acquaintances affected by this (vehicles stolen or broken into, property damaged and/or stolen, tweakers robbing at knife point, etc, etc) and it's getting ridiculous*. big brother isn't the answer, but when you get a lot of pissed off citizens and overwhelmed police involved the solutions they settle for are going to be ugly and invasive. what a fucking mess... * last week a tweaker out of jail for only a few weeks went around to our hay growers neighbors and stole all sorts of random crap from homes up and down the road he lived on. everything from elk antlers to hand made arrows for bow hunting, power tools loaded into a wheel barrow, the most random crap. the only reason he didn't hit our hay grower was that last time he stole from them they went to his parents house and told him the next time your son steals from my home you'll be attending a funeral. now that's closer to an effective solution. :)
Re: Textual analysis
Adam Shostack wrote: ... | It's not obvious to me how you'd change your writing style to defeat these | textual analysis schemes--would it really be as simple as changing the | average length of sentences and getting rid of the big words, or would | there still be ways to determine your identity from that text? So, the question boils down to economics. There's how much you need to communicate, how much someone is willing to spend to tag you, and how good their proof needs to be. I suspect that for most purposes, proof does not need to be very strong in relation to your need to communicate. An interesting ad-hoc test subject might be Eleusis/ZWITTERION from a.d.c.; I've wanted to see someone apply these techniques against his writing after following his posts and being amused/surprised myself. http://groups.google.com/groups?safe=offq=Eleusis+group%3Aalt.drugs.chemistry http://groups.google.com/groups?safe=offq=ZWITTERION+group%3Aalt.drugs.chemistry Strangely enough, the powers that be showed little interest in his electronic trail ... [ http://www.rhodium.ws/chemistry/eleusis/memoirs.html ]
Re: Type III Anonymous message
Eugen Leitl wrote: Not that there is much discussion, the cyherpunk meme doesn't seem to draw fresh blood too effectively. I've been wondering why I havent seen more discussion on wireless networking (802.11a/b/g) and anon/mix /dark nets. Is this a subject of interest to anyone? I am curious what kinds of work has been done in this area... A few examples: - cryptographic dead drop or anonymous broadcast: wifi broadcasts with clients monitoring for tagged packets. Anonymous transport for a number of miles. (probably requires amps) - (encrypted) wireless hops in a mix network for additional attack resistance, and/or all wireless (mesh?) routing. Is the mapping of existing cryptographic techniques to wireless transport straighforward and uninteresting, or is there additional capabilities in a wireless envrionment that open up new uses for secure and/or anonymous communication?
RE: C3 Nehemia C5P with better hardware RNG and AES support
.. delayed response From: Peter Gutmann Lucky Green [EMAIL PROTECTED] writes: ... I fail to understand why VIA bothered adding AES support into the CPU. When was AES last the bottleneck on a general-purpose CPU? Apart from the obvious what cool thing can we fit in - - this much spare die space?, the obvious target is SOHO routers/firewall boxes. My spies tell me that it's already being used in a number of products like this, and the addition of AES will help the process. I am working on a linux distribution that is using the hardware RNG for seeding/rng in number of things (IPSEC, ssh, ssl, gpg, etc) and this is definitely the angle I am excited about. A 1Ghz proc goes a long way, but in a media intensive system (video, audio, streaming over wireless) you want to keep CPU load as light as possible so that latency is minimal. With the C5P you can now do VPN with AES, rng via the hardware entropy, and video offload via the CLE266. This leaves the CPU free to handle various interrupts for the wireless network, disk i/o, etc. Very nice move, I think. I have written some poor code and info regarding the C5XL (nehemiah) and linux: http://peertech.org/hardware/viarng/ [ I'll be cleaning code up and releasing new patches/srcs soon ] Hardware SHA-1 in the next rev makes it even better, since you can now do IPsec and SSL tunneling purely in hardware (and then you lose it all again in the crappy Rhine II NIC, but that's another story). A lot of peer networking applications use SHA digests for securely identifying resources in a network. The overhead of this for large volumes of content will make this a welcome addition :-) Also, Centaur indicated that with the SHA on die, they can produce statistically perfect RNG output. The von neumann whitener does let a small bias through for very large data sets IIRC (i.e. a statistical bias is detectable in 1G or more data) If you are using the hardware rng via a user space daemon feeding /dev/random then this is no longer an issue. The bottleneck tends to be modular exponentiations, yet VIA failed to include a modular exponentiation engine. Strange. Not for SOHO use it isn't, the initial handshake overhead is negligible compared to the constant link encryption overhead. The alternative is to do the crypto externally, for which you're paying for an expensive and power- hungry crypto core capable of doing a zillion DH/RSA ops/sec that gets used once every few hours. The alternative is to load or load your standard firewall firmware into a Nehemiah and offload all the crypto and RNG stuff. I am also curious about crypto-loop file system acceleration / CPU offload. There are a number of uses I am anxious to try with this hardware. Best regards,