Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]]

2005-09-30 Thread sunder

Tyler Durden wrote:

Actually, depending on your App, this would seem to be th very 
OPPOSITE of a moot point.

-TD


Indeed!

I've been ignoring this list for a while, so sorry for the late posting.

I remember sometime in late 99, I had one of the early blackberry 
pagers, the small ones that ate a single AA battery which lasted about a 
week or so, and had email + a small web browser inside of it.  It wasn't 
the blackberry phone.  Anyway, long story short, one day, said pager 
crashed (it is a computer after all) and I was trying to figure out how 
to reboot it, so I thought, fuck it, and removed the battery, the fucker 
stayed ON!  For over 15 minutes!


Gee, I wonder why anyone would design a cell phone or pager to be able 
to stay on after its battery is pulled out.  Yeah, yeah, it's just a 
capacitor or an internal rechargeable battery, but why would you want 
such a feature?


Fast forward to 2005.  Most cell phones are after all small computers 
with a transceiver, microphone, and speaker, and recently GPS 
receivers.  And now we have reports of the GPS info being transmitted 
all the time, oops! it's a bug, we meant to turn it off. uh huh.  Just 
how much work would it be to reprogram the soft power off key, so it 
shuts off all the lights, and display, but still transmits GPS info, 
just less often?  Or also transmit audio?  What are the odds that the 
code on the phone already comes with this feature built in?


Of course, if it was legal to scan on cell phone frequencies, you might 
be able to confirm what it's sending and when, but of course, it's not 
legal to do that.  Even to your own phone.


Of course some phones are more equal than others.  For example, T-Mobile 
SideKick, which if you write an email and decide to cancel it, but 
you're out of range, exposes its evil self with Sorry, we can't let you 
delete the email you're composing, because it hasn't been sent to the 
server yet!  Gee, I wonder what that means?  Nah, it's just a bug.  (Of 
course, this is a totally owned platform, where T-Mobile owns your data, 
not you, oops, make that the hackers of a few months ago..)
Oh and if said phone is running out of batteries, it starts to complain 
loudly until you recharge it.  Um, yeah, it likes being on at all 
times.  You can hear it transmit occasionally when it's near amplified 
computer speakers or your car radio. 

Fun that, but could be useful.  Especially if you heard it transmit 
while it's supposedly off. (I've honestly not heard it transmit while 
it's off)


Are we just too paranoid?  Nah, that's just a bug in human firmware, 
we'll fix that in the next brainwashing session.


(BTW: what the fuck's up with all the weirdo subject lines?  There's a 
perfectly good From:  line in all SMTP headers, we don't need this 
shit in the subject line for fuck's sake!  What's this, the return of 
Jim Choate?)




Re: Well, they got what they want...

2005-07-28 Thread sunder

Steve Schear wrote:



The term 'securisimilitude' (from verisimilitude) comes to mind.

Steve

True, but I think the goal was FUD and it worked. 

On Tuesday (I think) both the Metro and AMNY free rags reported that all 
of a sudden there was a rash of suspicious packages being reported.  Ya 
think?  Another incident was of a homeless guy putting his luggage on a 
ticket counter and claiming it had a bomb in it.  Think someone yanked 
his chain to the point where he'd sarcasm himself into jail?  Of course 
the bright bulbs in charge evacuated all of Penn Station supposedly.


In another article, one that stated NYCLU was against the searches, but 
claimed most people were happy to open their bags and some even walked 
up to the cops, opened their bags and said here, look at mine, another 
gave a quote from a supposed police officer saying that July had a ~23% 
drop in crime.  Well, that's nice and all, but the bag searches started 
only 3 days before, so WTF does the crime rate for July (which hasn't 
yet ended) have anything to do with bag searches that just started? 

The funniest part are the letters to the editors thanking the police and 
saying how wonderful it is to be living in a country where you're safe.  
Of course, if you were to tell these folks 10 years ago, that you'll be 
subject to search when entering the subway, or that you couldn't bring a 
nail clipper with you when boarding an airplane, they'd go Shucks, no 
way that would happen in my country!


I love the smell of propaganda in the morning.  It smells like FUD.



Re: Well, they got what they want...

2005-07-24 Thread sunder

Tyler Durden wrote:

Saw a local security expert on the news, and he stated the obvious: 
Random searches and whatnot are going to do zero for someone 
determined, but might deter someone who was thinking about blowing 
up the A train. In other words, everyone here in NYC knows that we've 
given up a lot for the sake of the appearence of security, but no one 
seems to give a damn.


I wouldn't say we've given up at all - after all, we've had no choice 
in the matter. We weren't asked if we wanted to be searched, we weren't 
asked if we were willing to give up liberty for the appearance of 
security, we weren't asked if we were ok with atrocities such as the 
unpatriot act, or the national ID disguised as a standardized driver's 
license, we weren't asked if we were willing to pay lots of tax dollars 
to finance more police on every corner and all the toys that they have 
purchased for these tasks, or the various hollow cement flower pots, 
and other barricades.


It's not exactly a liberty that we have sacrificed, when it was taken 
away without consent.  There is another word for this: theft.




Re: /. [Intel Adds DRM to New Chips]

2005-06-07 Thread sunder

DiSToAGe wrote:


not a backdoor, we forget to much that every system is only 1 and 0
through electricity and physical circuits. If you can make them you can
watch them (with time and monney i agree). Perhaps thinking that datas
(certs, instructions) can be hidden behind a physical thing is only a
dream ? I ask myself if not every cryptosystem where you must have
something hidden or physically not accessible in point of the
process is not sure ?

 

In theory the above is absolutely correct.  In practice, it's extremely 
difficult to properly implement an accurate enough emulator, however as 
an emulator writer you have far more advantages than disadvantages 
despite the 10-100x in slowdown.  (Speaking from personal experience - 
no, nothing on the kind of scale we're talking about here.)  You can 
always have your virtual CPU decide that when it sees a certain 
instruction, to disobey it.  For example, when it sees a checksum check, 
to decide to jump around it and so forth.


Gotta love it when you can fool a program into thinking that 2+2=5 and 
that everything is still A-OK with that!  ;-)


If you can interface with real (protected) hardware, you might even be 
able to get around public key schemes with the emulator.  HP/Agilent 
made some wonderful logic analyzers, which are very useful against 
ancient hardware (think Motorola 68K chips at around 5MHz) too bad 
nothing in the GHz range is (cheaply?) available out there, but there's 
lots that can be done.


What can be done?  For example, if you have something like Palladium or 
whatever it's called these days, you an always build a machine that has 
custom RAM that can change at the flip of a switch - sort of like the 
old EEPROM emulators, but with RAM chips that can be flipped to a ROM 
instead.  You flip a switch after the DRM core has validated your BIOS 
and operating system, and at some point once the CPU cache gets drained, 
it winds up running code that it did not boot, code which you've written 
to do *OTHER* things for example - simply change the IRQ vectors to 
point to your code and you've taken over...  Mind you, all this is 
easier said that done, but it is possible to implement.


Remember, security is a chain, and each (media?) player out there is a 
link in that chain.  It only takes one broken player to wipe out your 
entire investment in that DRM pipe dream. 

Any employee with access can leak the master keys and the game is over.  
Any wily hardware hacker with plenty of time on his hands can take a 
shot at reverse engineering any (media) player to the point of cracking 
it, etc.  In the end, it's a waste of time and money for the makers of 
DRM as there's enough interest that someone somewhere will break it at 
some point in the near future. 

You can play cat and mouse games by watermarking the output with the 
serial # of the player in order to lock out cracked players, but the 
attacker only has to break more than one player (perhaps two different 
models so they get both serial # and model #) and compare the resulting 
outputs from the same movie to figure out which bits contain the 
watermarks.  XOR is very nice for figuring this out. :-)


None of this worries me, because I don't give a rats ass about copying 
movies or what not.  Couldn't care less about it.  I'll wait for the 
shit to make it to HBO, it's usually not worth watching the waste of 
Hollywood plotless overhyped crud anyway, so why worry about copying 
it?  The few titles that are worth watching, are also well worth buying, 
and after a few months they can be had for under $20, so why bother?



What is cause for worry is that it's quite _possible_ for Intel or other 
chip manufacturers to insert backdoors in their hardware which someone 
will go through the trouble of discovering, which does put everyone at 
risk.  No matter how good your operating system and firewall rules, if 
your network card (and drivers) decide to bend over upon receiving a 
specially crafted packet, you're owned just the same. 

Mind you, I've never run across anything close to this, except perhaps 
the old F00FC7C8 bug in the original pentium (which really was a DOS, 
not a back door) and the old UltraSparc I in 64 bit mode multiuser 
hole.  The Pentium IV hyperthreading bug is something recent to worry 
about along the same line of thought.


Sadly, you haven't got much choice in this matter, you have to assume 
that you can trust the hardware that you run on (unless you're willing 
to make your own and have the resources to do so, etc.)




Re: Terrorist-controlled cessna nearly attacks washington

2005-05-12 Thread sunder
Bill Stewart wrote:
Sigh.  Terrified Student Pilot isn't the same as Terrorist.
Yeah, but they both start with the same four letters and sound alike, 
which seems to be the attention span of those who are afraid of the 
boogie man and consequentially imagine they see him under every rock, or 
bush.



Re: Secure erasing Info (fwd from richard@SCL.UTAH.EDU)

2005-05-02 Thread sunder
Yeah, but these days, I'd go with the largest flash drive I could 
afford.  USB2 or otherwise.  I don't believe you can recover data from 
these once you actually overwrite the bits (anyone out there know any 
different?).

They're either 1 or 0, there's no extra ferrite molecules to the left or 
the right of the track to pick up a signal from  ;-)  As always encrypt 
the data you write to the device. 

I wouldn't overwrite flash repeatedly (i.e. the Guttman method of 35 
writes) though, there's a limit on the number of writes, after which it 
goes bad.  I'd overwrite it once with random data.

Eugen Leitl wrote:
- Forwarded message from Richard Glaser [EMAIL PROTECTED] -
From: Richard Glaser [EMAIL PROTECTED]
Date: Wed, 27 Apr 2005 12:17:43 -0600
To: [EMAIL PROTECTED]
Subject: Secure erasing Info
Reply-To: Mac OS X enterprise deployment project
[EMAIL PROTECTED]
FYI:
Rendering Drives Completely Unreadable Can be Difficult
---
 




Theory of Secure Computation - Joe Killian, NEC Labs

2005-02-18 Thread sunder
http://www.uwtv.org/programs/displayevent.asp?rid=2233
A bit sparse on details, but a good overview of all sorts of secure 
protocols.  Our friends Alice and Bob are of course present in various 
orgies of secure protocols.  :)



Re: new egold phisher - this time it's a malware executable

2005-01-23 Thread sunder
Got another one today with a RAR attachment claiming it was a screen 
shot.  Text is:

Dear Sir
Yesterday you have arrived the amount of $1000 into my account. Of 
course, I do not object, but you probably were mistaken number of the 
account when transferred, and it happens not first time. Please look an 
attached screenshot of all your transfers into my account. I have no 
idea why you transfer money to me, as I do not know you, and I need no 
money. If you were mistaken, I'll return this money to you!
Sincerely.

Nice... what's next?  an egold transfer from a lawyer claiming a long 
lost uncle kicked the bucket and left me a fortune? :-D

Wheee!
sunder wrote:
So, the e-gold phishers are at it again... received a very nice email 
this morning with an attachment.  The Received-From header showed this 
beauty: from 195.56.214.184 
([EMAIL PROTECTED] [195.56.214.184] 
(may be forged))

Indeed!
Don't know if it's a trojan, spyware, virus, or worm, and I couldn't 
care less since I don't use egold, but would be interesting (just for 
curiosity's sake) if someone were to disassemble it to see what it does. 
 It's probably a password grabber of some kind, so falls under spyware, 
but who knows what other evil payloads were in the attachment.

ROTFL!
-
Text said:
Dear E-gold Customer,
Herewith we strongly recommend you to install this Service Pack to your 
PC, as lately we have received a lot of complains regarding unauthorized 
cash withdrawals from our customers' accounts. This upgrade blocks all 
currently known Trojan modules and eliminates the possibility of cash 
withdrawals without your authorization. We highly recommend to install 
this Service Pack to secure your accounts.
Please note, that E-gold doesn't take any responsibility and doesn't 
accept any claims regarding losses caused by fraudulent actions, if your 
account has not been duly protected by the present Service Pack.

Please find enclosed the archive of the Service Pack installation file 
in the attachment to this message.




new egold phisher - this time it's a malware executable

2005-01-21 Thread sunder
So, the e-gold phishers are at it again... received a very nice email 
this morning with an attachment.  The Received-From header showed this 
beauty: from 195.56.214.184 
([EMAIL PROTECTED] [195.56.214.184] 
(may be forged))

Indeed!
Don't know if it's a trojan, spyware, virus, or worm, and I couldn't 
care less since I don't use egold, but would be interesting (just for 
curiosity's sake) if someone were to disassemble it to see what it does. 
 It's probably a password grabber of some kind, so falls under spyware, 
but who knows what other evil payloads were in the attachment.

ROTFL!
-
Text said:
Dear E-gold Customer,
Herewith we strongly recommend you to install this Service Pack to your 
PC, as lately we have received a lot of complains regarding unauthorized 
cash withdrawals from our customers' accounts. This upgrade blocks all 
currently known Trojan modules and eliminates the possibility of cash 
withdrawals without your authorization. We highly recommend to install 
this Service Pack to secure your accounts.
Please note, that E-gold doesn't take any responsibility and doesn't 
accept any claims regarding losses caused by fraudulent actions, if your 
account has not been duly protected by the present Service Pack.

Please find enclosed the archive of the Service Pack installation file 
in the attachment to this message.



Gait advances in emerging biometrics

2004-12-14 Thread Sunder

Original URL: http://www.theregister.co.uk/2004/12/14/alt_biometrics/
Gait advances in emerging biometrics

By John Leyden (john.leyden at theregister.co.uk)
Published Tuesday 14th December 2004 15:07 GMT

Great Juno comes; I know her by her gait.
William Shakespeare, The Tempest

Retinal scans, finger printing or facial recognition get most of the 
publicity but researchers across the world are quietly labouring away at 
alternative types of biometrics.

Recognition by the way someone walk (their gait), the shape of their ears, 
the rhythm they make when they tap and the involuntary response of ears to 
sounds all have the potential to raise the stock of biometric techniques. 
According to Professor Mark Nixon, of the Image Speech and Recognition 
Research Group at the University of Southampton, each has unique 
advantages which makes them worth exploring.

SNIP

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



RE: Optical Tempest FAQ

2004-12-05 Thread Sunder
IMHO, if you light up two or more other identical CRT's and have them 
display random junk it should throw enough noise to make it worthless - 
(and would put out enough similar RF to mess with RF tempest) there might 
be ways to filter the photons from the other monitors out, but, it would 
be difficult.

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Thu, 2 Dec 2004, Tyler Durden wrote:

 Interesting.
 Contrary to what I thought (or what has been discussed here), only a 
 'scalar' of detected light is needed, not a vector. In other words, merely 
 measuring overall radiated intensity over time seems to be sufficient to 
 recover the message. This means that certain types of diffusive materials 
 will not necessarily mitigate against this kind of eavesdropping.
 
 However, his discussion would indicate that the various practical concerns 
 and limitations probably limit this to very niche-type applications...I'd 
 bet that it's very rare when such a trechnique is both needed as well as 
 useful, given the time, the subject and the place.
 
 -TD
 
 From: Sunder [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Subject: Optical Tempest FAQ
 Date: Thu, 2 Dec 2004 10:27:04 -0500 (est)
 
 http://www.cl.cam.ac.uk/~mgk25/emsec/optical-faq.html
 
 Along with tips and examples.
 
 Enjoy, and don't use a CRT in the dark. :-)



Optical Tempest FAQ

2004-12-02 Thread Sunder
http://www.cl.cam.ac.uk/~mgk25/emsec/optical-faq.html

Along with tips and examples.

Enjoy, and don't use a CRT in the dark. :-)

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Re: Broward machines count backward

2004-11-07 Thread Sunder
It sounds suspiciously like an int16 issue.

32K is close enough to 32767 after which a 16 bit integer goes negative 
when incremented.  Which is odd because it should roll over, not count 
backwards.

perhaps they did something like this:

note the use of abs on reporting.


int16 votes[MAX_CANDIDATES];

void add_a_vote(uint8 candidate)
{
 if (candidateMAX_CANDIDATES) return;
 votes[candidate]++;
}

void report(void)
{
 int i;

 for (i=0; iMAX_CANDIDATES; i++)
 {
  printf(Candidate %s got %d votes\n,candidates[i],abs(votes[i]));
 }

}

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Sat, 6 Nov 2004, R.A. Hettinga wrote:

 http://www.palmbeachpost.com/politics/content/news/epaper/2004/11/05/a29a_BROWVOTE_1105.html
 
 
 Palm Beach Post
 
 Broward machines count backward
 
  By Eliot Kleinberg
 
 Palm Beach Post Staff Writer
 
 Friday, November 05, 2004
 
 
 FORT LAUDERDALE - It had to happen. Things were just going too smoothly.
 
 Early Thursday, as Broward County elections officials wrapped up after a
 long day of canvassing votes, something unusual caught their eye. Tallies
 should go up as more votes are counted. That's simple math. But in some
 races, the numbers had gone . . . down.
 
 
 Officials found the software used in Broward can handle only 32,000 votes
 per precinct. After that, the system starts counting backward.



Re: bin Laden gets a Promotion

2004-10-30 Thread Sunder
As usual, South Park is a great source of wisdom.  So, are you voting for 
the Giant Douche or the Turd Sandwich?

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Re: bin Laden gets a Promotion

2004-10-30 Thread Sunder
No! You must vote for the Giant Douche!  Or the Terrorists Win!

But won't someone think of the chldren!  If you vote for the Douche, 
the ChllLdren will die!


ROTFL!

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Sat, 30 Oct 2004, R.A. Hettinga wrote:

 At 2:42 PM -0400 10/30/04, Sunder wrote:
 the Turd Sandwich?
 
 Turd Sandwich, of course.
 
 Cheers,
 RAH
 
 -- 
 -
 R. A. Hettinga mailto: [EMAIL PROTECTED]
 The Internet Bearer Underwriting Corporation http://www.ibuc.com/
 44 Farquhar Street, Boston, MA 02131 USA
 ... however it may deserve respect for its usefulness and antiquity,
 [predicting the end of the world] has not been found agreeable to
 experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
 



Re: James A. Donald's insanity

2004-10-22 Thread Sunder

Where did I write to you that it's horrible thing to lock people up in
Gitmo, or that we (whomever that is) deserve to be attacked?  Show me
the email, with headers that says such a thing.

Oh, wait, you can't, because I never wrote such.  


Let's see, so you've got lots of people questioning your version of 
various events, and you've got claims that various people wrote things 
that they did not, and lots of people challenging the accuracy and indeed, 
truth of your statements.

Hmmm... So what is the obvious conclusion there?  The whole world must be
against you?  Nah, you're not important enough to be paranoid.  

So, what is the obvious conclusion?  No, no, 2+2 is not 5, even for
extremely large values of 2...  

Come on, come on, out with it, say it, say it...  That's right!  *Ding*
you're reality challenged.


Ah!  There, doesn't that feel better?  Now, please, go back and take your
meds before the nice men in the white coats come to take you to the funny
farm.



--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Thu, 21 Oct 2004, James A. Donald wrote:

 --
 On 21 Oct 2004 at 13:41, Sunder wrote:
  No you imbecile, I'm telling no one anything, other than you 
  to get a clue.  Where did I tell people who are under attack 
  to suck it up?
 
 When you tell us it is horrible to lock up in Gautenamo people 
 who show every sign of trying to kill us , and that we deserve 
 their past efforts to kill us, efforts that some of them 
 promptly resumed on release.  We are under attack, and you are
 telling us to suck it up. 



Re: Printers betray document secrets

2004-10-21 Thread Sunder
Simple way to test.  Get two printers of the same make and model.  Print 
identical documents on both printers, scan them, diff the scans.  Some 
will be noise, repeat several times, see which noise repeats and you get 
closer and closer to the serial #'s.

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Wed, 20 Oct 2004, Steve Thompson wrote:

 I seem to recall hearing a rumour that suggested that for years now, photocopiers 
 have been leaving their serial number on the copies they produce.  If true, and I am 
 inclined to believe it, it follows naturally that something similar might happen 
 with laser-printers and ink-jet printers.
 
 Ian Grigg [EMAIL PROTECTED] wrote: R.A. Hettinga wrote:
  
 
  US scientists have discovered that every desktop printer has a signature
  style that it invisibly leaves on all the documents it produces.
 
 I don't think this is new - I'm pretty sure it was
 published about 6 or 7 years back as a technique.
 
 iang
 
 
 
 
 
 -
 Post your free ad now! Yahoo! Canada Personals
 



Re: Airport insanity

2004-10-21 Thread Sunder

I made no claims, you did, rather I asked you sarcastically to validate
your claims, after which you further assumed on top of other mistaken
assumptions, that I made claims countering yours, which I did not.

Perhaps you should examine your own words.

IMHO, you are a misguided armchair general who sees yourself as equal to 
those scumbags that have risen in power to lead or enslave nations since 
you seem to constantly say they should have done X, and not Y and are 
constantly seeking to go against with reality with W should be the case, 
not X even though W cannot happen while X does.  Yes, that is my 
unprofessional opinion.  And yet, while impotent to achive your views of 
reality, you insist on sharing it, as if anyone gives a rats ass.

It was entertaining, but it's getting old.


I doubt that it would be long before you'll be sporting a tin foil hat.


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Thu, 21 Oct 2004, James A. Donald wrote:

 --
 On 20 Oct 2004 at 21:27, Sunder wrote:
 
  I repeat:
 
  And you were there and kept an eye on each and every guard, 
  interrogator, and prisoner to make sure that the POW's 
  weren't tortured?
 
 We know torture did not occur, because lots of people have been 
 released who were and are extremely hostile to the US, and who 
 do not claim torture.
 
  And you were there and witnessed the attrocities that said 
  prisoners committed in order to be placed in Gitmo?
 
 Why do you assert that the US must be guilty unless it can be
 proven innocent by extraordinary evidence, but the detainees
 must be innocent unless they can be proven guilty by
 extraordinary evidence?
 
 Doubtless there are some innocents in Gautenamo - but the usual 
 reason they are there is for being foreigners in Afghanistan in 
 the middle of a war with no adequate explanation. 
 
 --digsig
  James A. Donald
  6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
  PwxWpHJKrzapMUAE8Xc1hvpY0CWDO780ZY/6zW7b
  4b9RBklMS97dzSSANw7jVcZlASDxbNnLMhwLptK+Z
 



Re: Airport insanity

2004-10-21 Thread Sunder
No you imbecile, I'm telling no one anything, other than you to get a 
clue.  Where did I tell people who are under attack to suck it up?

All I did was point out that you weren't there and therefore any comment 
you care to make about it is bound to be flawed.

Please find yourself a clue store and open your wallet - wide.

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Thu, 21 Oct 2004, James A. Donald wrote:

 --
 On 21 Oct 2004 at 10:26, Sunder wrote:
  IMHO, you are a misguided armchair general who sees yourself 
  as equal to those scumbags that have risen in power to lead 
  or enslave nations since you seem to constantly say they 
  should have done X, and not Y
 
 When people are under attack, you cannot tell them to suck it 
 up, which is what you are doing.  If we had no government, we 
 might well be doing pogroms against american muslims - and a 
 good thing to.
 
 War causes governments, and causes governments to gain power, 
 but the US government was not the aggressor in this war.   US 
 government meddling in the middle east was unwise and 
 unnecessary, but it did not provoke, nor does it justify, this 
 war.
 
 The intent of a large minority of muslims was to start a holy 
 war between the west and Islam, and the majority of muslims 
 lack the will or courage to stop them, or even criticize them. 
 That was not the intent of Americans, or the American 
 government.  They started it, they meant to start it. Americans
 tried to avoid it, some of them are still trying to avoid it. 
 All Americans are still trying to conduct the war on the
 smallest possible scale, against the smallest possible subset
 of Islam, disagreeing only on how small that subset can be. 
 
 --digsig
  James A. Donald
  6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
  YeXgmiDN23gKNejAXLPSgfGxzFPVqFa/9pEDbWNr
  41sYVdSvXQCEQniQVEIYWhWw2HjtvpvuHtQ0QXUaI
 



Re: Airport insanity

2004-10-20 Thread Sunder
I repeat:

And you were there and kept an eye on each and every guard, interrogator, 
and prisoner to make sure that the POW's weren't tortured?

And I add:

And you were there and witnessed the attrocities that said prisoners 
committed in order to be placed in Gitmo?

No? to both questions?  Then your comment is worthless.

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Wed, 20 Oct 2004, James A. Donald wrote:

 --
 On 20 Oct 2004 at 13:05, Sunder wrote:
  Re: Gitmo
 
  And you were there and kept an eye on each and every guard, 
  interrogator, and prisoner to make sure that the POW's 
  weren't tortured?
 
 Lots of murderous terrorists have been released from Guatanamo, 
 and in the nearly all cases the most serious of their 
 complaints make it sound like a beach resort, except for the 
 fact that they could not leave.
 
 A few have more serious complaints.  Either they are lying or, 
 those who say they were well treated apart from being held 
 captive are lying. It is hard to believe that people like 
 Slimane Hadj Abderrahmane (who after release announced his 
 intention to resume terrorist activities and that he would
 attempt to murder his hosts who lobbied to get him release) are
 lying to cover up torture by the US army.



Re: Airport insanity

2004-10-20 Thread Sunder


On Tue, 19 Oct 2004, James A. Donald wrote:

 Here is my prescription for winning the war on terrorism
 
 We SHOULD rely on shock and awe, administered by men in white 
 coats far from the scene.

SNIP 

 The US government should expose and condemn these objectionable 
 practices, subvert moderately objectionable regimes, and 
 annihilate more objectionable regimes.  The pentagon should 
 deprive moderately objectionable regimes of economic resources, 
 by stealing their oil, destroying their water systems, and 
 cutting off their trade and population movements with the 
 outside world.
 
 Syria should suffer annihilation, Iran subversion, Sudan some 
 combination of annihilation and subversion, Saudi Arabia and 
 similar less objectionable regimes should suffer confiscation 
 of oil, destruction of water resources, and loss of contact 
 with the outside world. 

I see.  I'm sure that Dubbya has his own agenda filled with Shoulds, as
does Bin Ladin, as did Lenin, as did Hitler, as did Nero, as do you.  
Each saw (or see) their views as the way to Utopia.  Trouble is, which one
of you megalomaniacs is/was right?

Further to the point, reality is, and what clearly should and makes
sense to to you, clearly doesn't to another.  The only difference
between you and the others above is that you lack the power to bend
reality to your whims, and IMHO, that is a very good thing.  It is sad the
the above list contained megalomaniacs who did possess that power and used
it to cause great misery to others, and had to be removed from inflicting
their whims on the world at great expense.  Perhaps in a couple of weeks,
US Citizens will vote one of those out the list as he's already done
plenty of damage in the last four years, and save us another miserable 
four years.

So yes, perhaps, in the fine tradition of what should be instead of what
is, you, sir, should go fuck yourself.



--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-




Re: Airport insanity

2004-10-20 Thread Sunder
Re: Gitmo

And you were there and kept an eye on each and every guard, interrogator, 
and prisoner to make sure that the POW's weren't tortured?

Wow, you are good...  or phrased another way, what brand of crack are you 
smokin' 'cause the rest of us thin it's some really good shit and would 
like to have some too...

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Mon, 18 Oct 2004, James A. Donald wrote:

 I expected them to be KEPT in Guantanamo.
 
 Furthermore, they were not tortured, though they should have
 been. 



Re: Airport insanity

2004-10-18 Thread Sunder

There is still of course the matter of the unexploded bombs in that 
building that were dug out, and that the ATF received a Don't come in to 
work page on their beepers, and the seize and classification of all 
surveilance video tapes from things like ATM's across the street.


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Sat, 16 Oct 2004, James A. Donald wrote:

 Mc Veigh did not target innocents, and if he did target a plane 
 full of innocents, perhaps in order to kill one guilty man on 
 board, there is no way in hell he himself would be on that 
 plane. 



RE: Airport insanity

2004-10-18 Thread Sunder
I think you need to read this remake of the First they came for the 
commies poem.  Short translation - whenever anyone's rights are being 
trampled upon, whether it affects you or not, you should protest.

Goes along with one of the unsaid credos about cypherpunks: I absolutely 
disagree with what she said, but I'll defend to the death her right to say 
it. which along with Cypherpunks write code fell quite short of its 
goal.


http://buffaloreport.com/021123rohde.html

Here I'll save you the trouble.

- - -

They came for the Muslims, and I didn't speak up...

By Stephen Rohde
 
(Author's Note:  The USA Patriot Act became law a little over one year 
ago.)
 
First they came for the Muslims, and I didn't speak up because I wasn't a  
Muslim.
 
Then they came for the immigrants, detaining them indefinitely solely on 
the certification of the attorney general, and I didn't speak up because I  
wasn't an immigrant.
 
Then they came to eavesdrop on suspects consulting with their attorneys, 
and I didn't speak up because I wasn't a suspect.
 
Then they came to prosecute noncitizens before secret military 
commissions, and I didn't speak up because I wasn't a noncitizen.
 
Then they came to enter homes and offices for unannounced sneak and peak  
searches, and I didn't speak up because I had nothing to hide.
 
Then they came to reinstate Cointelpro and resume the infiltration and  
surveillance of domestic religious and political groups, and I didn't 
speak up because I no longer participated in any groups.
 
Then they came to arrest American citizens and hold them indefinitely  
without any charges and without access to lawyers, and I didn't speak up 
because I would never be arrested.
 
Then they came to institute TIPS (Terrorism Information and Prevention  
System) recruiting citizens to spy on other citizens and I didn't speak up 
because I was afraid.
 
Then they came for anyone who objected to government policy because it 
only aided the terrorists and gave ammunition to America's enemies, and I 
didn't  speak up ... because I didn't speak up.
 
Then they came for me, and by that time, no one was left to speak up.

Forum Column (from the Daily Journal, 11/20/02). Stephen Rohde is an 
attorney. He edited American Words of Freedom and was was president of the 
American Civil Liberties Union of Southern California.


Does Rohde's text seem familiar? It should. He based it on one of the 
web's most widely-circulated texts about silence in the face of evil:

In Germany, the Nazis first came for the communists, and I didn't 
speak up because I wasn't a communist. Then they came for the Jews, and I 
didn't speak up because I wasn't a Jew. Then they came for the trade 
unionists, and I didn't speak up because I wasn't a trade unionist. Then 
they came for the Catholics, but I didn't speak up because I was a 
protestant. Then they came for me, and by that time there was no one left 
to speak for me.


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Mon, 18 Oct 2004, James A. Donald wrote:

 I know when it will happen.  It will happen when people 
 interested in anon ecash go on suicide missions.   :-)
 
 People who are, for the most part, not like us are trying to 
 kill people like us. Let us chuck all those people not-like-us 
 off those planes where most of the passengers are people like 
 us.  This really is not rocket science. 



Re: Congress Close to Establishing Rules for Driver's Licenses

2004-10-12 Thread Sunder

Right, just because your Passport or driver's license expired, doesn't 
mean that you got any younger and therefore shouldn't drink.

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Tue, 12 Oct 2004, Riad S. Wahby wrote:

 Tangentially, I was once told that, at least in Massachusetts liquor
 stores, even an _expired_ passport was useful identification.  Can
 anyone confirm that this is true other than at Sav-Mor Liquors?



cryptome.org down?

2004-10-12 Thread Sunder
DNS seems to resolve, but never get to the web server.


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Most Disturbing Yet - Senate Wants Database Dragnet

2004-10-07 Thread Sunder
http://www.wired.com/news/privacy/0,1848,65242,00.html
http://www.wired.com/news/print/0,1294,65242,00.html

Senate Wants Database Dragnet 

By Ryan Singel  

02:00 AM Oct. 06, 2004 PT

The Senate could pass a bill as early as Wednesday evening that would let 
government counter-terrorist investigators instantly query a massive 
system of interconnected commercial and government databases that hold 
billions of records on Americans.

The proposed network is based on the Markle Foundation Task Force's 
December 2003 report, which envisioned a system that would allow FBI and 
CIA agents, as well as police officers and some companies, to quickly 
search intelligence, criminal and commercial databases. The proposal is so 
radical, the bill allocates $50 million just to fund the system's 
specifications and privacy policies. 

SNIP

To prevent abuses of the system, the Markle task force recommended 
anonymized technology, graduated levels of permission-based access and 
automated auditing software constantly hunting for abuses.

{Huh?  How would anonimized access PREVENT abuses?}

An appendix to the report went so far as to suggest that the system should 
identify known associates of the terrorist suspect, within 30 seconds, 
using shared addressees, records of phone calls to and from the suspect's 
phone, e-mails to and from the suspect's accounts, financial transactions, 
travel history and reservations, and common memberships in organizations, 
including (with appropriate safeguards) religious and expressive 
organizations.

SNIP



--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Federal program to monitor everyone on the road

2004-10-01 Thread Sunder
http://www.boingboing.net/2004/10/01/federal_program_to_m.html

 Federal program to monitor everyone on the road

Interesting article about the Fed's plans to develop an all-knowing 
intelligent highway system.

Most people have probably never heard of the agency, called the 
Intelligent Transportation Systems Joint Program Office. And they haven't 
heard of its plans to add another dimension to our national road system, 
one that uses tracking and sensor technology to erase the lines between 
cars, the road and the government transportation management centers from 
which every aspect of transportation will be observed and managed.

For 13 years, a powerful group of car manufacturers, technology 
companies and government interests has fought to bring this system to 
life. They envision a future in which massive databases will track the 
comings and goings of everyone who travels by car or mass transit. The 
only way for people to evade the national transportation tracking system 
they're creating will be to travel on foot. Drive your car, and your every 
movement could be recorded and archived. The federal government will know 
the exact route you drove to work, how many times you braked along the 
way, the precise moment you arrived -- and that every other Tuesday you 
opt to ride the bus.


Link to actual story: http://charlotte.creativeloafing.com/news_cover.html

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



How to fuck with airports - a 1 step guide for (Redmond) terrorists.

2004-09-28 Thread Sunder
Q: How do you cause an 800-plane pile-up at a major airport?
A: Replace working Unix systems with Microsoft Windows 2000!

Details: http://www.techworld.com/opsys/news/index.cfm?NewsID=2275


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



stegedetect - looks like we need better mice

2004-09-07 Thread Sunder
http://freshmeat.net/projects/stegdetect/?branch_id=52957release_id=172055

http://www.outguess.org/detection.php

Steganography Detection with Stegdetect
Stegdetect is an automated tool for detecting steganographic content in 
images. It is capable of detecting several different steganographic 
methods to embed hidden information in JPEG images. Currently, the 
detectable schemes are

* jsteg,
* jphide (unix and windows),
* invisible secrets,
* outguess 01.3b,
* F5 (header analysis),
* appendX and camouflage.

Stegbreak is used to launch dictionary attacks against JSteg-Shell, JPHide 
and OutGuess 0.13b.

Stegdetect and Stegbreak have been developed by Niels Provos. 


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Re: Maths holy grail could bring disaster for internet

2004-09-07 Thread Sunder
Forgive my ignorance, but would other PK schemes that don't rely on prime
numbers such as Elliptic Curve be affected?

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Tue, 7 Sep 2004, Matt Crawford wrote:

 On Sep 6, 2004, at 21:52, R. A. Hettinga wrote:
 
 This would be a good thing.  Because to rebuild the infrastructure 
 based on symmetric crypto would bring the trusted third party 
 (currently the CA) out of the shadows and into the light.



RE: stegedetect Variola's Suitcase

2004-09-07 Thread Sunder

The answer to that question depends on some leg work which involves 
converting the source code to stegetect into hardware and seeing how fast 
that hardware runs, then multiplying by X where X is how many of the chips 
you can afford to build.

I'd image that it's a lot faster to have some hw that gives you a yea/nay 
on each JPG, than to say, attempt to crack DES.

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Tue, 7 Sep 2004, Tyler Durden wrote:

 So here's the 'obvious' question:
 
 How fast can dedicated hardware run if it were a dedicated Stegedetect 
 processor?
 
 In other words, how easy would it be for NSA, et al to scan 'every' photo on 
 the internet for Stego traces? (And then, every photo being emailed?)
 
 And then, how fast can someone write a worm that will make every photo 
 stored on a harddrive look like it's been stegoed?



Re: The cages on the Hudson, AKA Little Guantanamo (fwd)

2004-09-02 Thread Sunder
Um, don't know what you've been smoking but:

a. there is no we, except individuals with the freedom to chose their
own actions. 

b. cops have guns. 

c. some cops have armor and semi (or full?) automatics along with the
non-lethal weaponry. 

d. non-cops don't and aren't allowed to carry the same weaponry. (Unless
your version of we includes some arsenal and has been watching lots of
A-Team reruns, I doubt that there's not much the cops can't do and mostly
get away with it.)

Yeah, Not totally. Just like Red China isn't a total totalitarian state,
and it allowed the students at Tienamen Sq to demonstrate.  We're not too
far away from that, except these cops don't (yet?) have tanks and as far
as has been reported in the media, haven't murdered anyone in the
protests, and that the arrested have been let out a few days later rather
than tortured.


It's certainly inching towards totalitarianism and away from the right of
the people peaceably to assemble, and to petition the government for a
redress (not, there's nothing in that text about protest pens, open your
bag searches, show me your ID, or protest permits.)


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Wed, 1 Sep 2004, Tyler Durden wrote:

 Not totally. That cop on a scooter rightfully got the crap kicked out of him 
 for mowing down demonstrators.
 
 They can gain local, temporary control but if we take to the streets en 
 masse then there's not much they can do, and they know it.



Re: The cages on the Hudson, AKA Little Guantanamo (fwd)

2004-09-01 Thread Sunder
Wheee!  NYC==Police State for the last week for those of you living under 
rocks...

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

-- Forwarded message --
Date: Wed, 1 Sep 2004 15:26:13 -0400
From: Edward Potter
To: grimmwerks
Cc: wwwac [EMAIL PROTECTED]
Subject: Re: [wwwac] Yes, it's relevent!  The cages on the Hudson,
 AKA Little Guantanamo

He's out.

You can't get near the place today. I tell people what happened and 
they can't believe it. I would not have believed it either, except I 
was there for 11 hours. Then another 15 hours downtown. Excellent first 
hand account here:
http://nyc.indymedia.org/newswire/display/107675/index.php

If I had not been arrested, I would not have known anything like this 
was going on. 1000- 2000 people, in barb-wire cages, at this very 
moment on the Hudson River. No joke. Totally surrounded by police.

ACLU lawyers, Reporters, everyone being denied access. Just starting to 
hit the media.

-ed

On Sep 1, 2004, at 2:57 PM, grimmwerks wrote:

 I read the same thing - and the guy with the bike is STILL there? And 
 held
 on what grounds?   Has any pics surfaced yet?


 On 9/1/04 2:51 PM, Edward Potter [EMAIL PROTECTED] wrote:

 I cross posted this to the Politics list, just getting so little media
 coverage, and yes, I met a few Java Programmers there, plus the guy
 that has the bike that writes messages by WifI got nailed by the 
 police
 too (writing America Home of the Free) ... so I guess hopefully the
 word gets out.
 ---

 Does anyone on this list know there are now up to 2000 people
 imprisoned in barb-wire cages on the Hudson River that don't know what
 their charges are, have not had any rights read to them and are being
 denied any access to any legal representation?

 I was there, it was real. It would blow your mind. YOU HAVE NEVER SEEN
 ANYTHING LIKE IT IN AMERICA BEFORE.

 Or as the police call it:  Little Guantanamo  

 Keep up with the news here:
 http://nyc.indymedia.org






##  The World Wide Web Artists' Consortium  -  http://www.wwwac.org/  ##
##  To Unsubscribe, send email to: [EMAIL PROTECTED]  ##





Re: Backdoor found in Diebold Voting Tabulators

2004-08-31 Thread Sunder
 allotted. 
Though the demonstration takes only 3 minutes, the panel refused to allow 
it and would not look. They did, however, meet privately with Diebold 
afterwards, without informing the public or issuing any report of what 
transpired.

On Aug. 18, 2004, Harris and Stephenson, together with computer security 
expert Dr. Hugh Thompson, and former King County Elections Supervisor 
Julie Anne Kempf, met with members of the California Voting Systems Panel 
and the California Secretary of State's office to demonstrate the double 
set of books. The officials declined to allow a camera crew from 60 
Minutes to film or attend.

The Secretary of State's office halted the meeting, called in the general 
counsel for their office, and a defense attorney from the California 
Attorney General's office. They refused to allow Black Box Voting to 
videotape its own demonstration. They prohibited any audiotape and 
specified that no notes of the meeting could be requested in public 
records requests.

The undersecretary of state, Mark Kyle, left the meeting early, and one 
voting panel member, John Mott Smith, appeared to sleep through the 
presentation.

On Aug. 23, 2004, CBC TV came to California and filmed the demonstration.

On Aug 30 and 31, Harris and Stephenson will be in New York City to 
demonstrate the double set of books for any public official and any TV 
crews who wish to see it.

On Sept. 1, another event is planned in New York City, and on Sept. 21, 
Harris and Stephenson intend to demonstrate the problem for members and 
congress and the press in Washington D.C.

Diebold has known of the problem, or should have known, because it did a 
cease and desist on the web site when Harris originally reported the 
problem in 2003. On Aug. 11, 2004, Harris also offered to show the problem 
to Marvin Singleton, Diebold's damage control expert, and to other Diebold 
execs. They refused to look.

Why don't people want to look? Suppose you are formally informed that the 
gas tank tends to explode on the car you are telling people to use. If you 
KNOW about it, but do nothing, you are liable.

LET US HOLD DIEBOLD, AND OUR PUBLIC OFFICIALS, ACCOUNTABLE.

1) Let there be no one who can say I didn't know.

2) Let there be no election jurisdiction using GEMS that fails to 
implement all of the proper corrective procedures, this fall, to mitigate 
risk. 


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Tue, 31 Aug 2004 [EMAIL PROTECTED] wrote:

 Quoting Eric Murray [EMAIL PROTECTED]:
 
  On Tue, Aug 31, 2004 at 11:30:35AM -0400, Sunder wrote:
   Oops! Is that a cat exiting the bag?
   
   
   http://www.blackboxvoting.org/?q=node/view/78
  
  
  Apparently so.  Going to www.blackboxvoting.org now just gives:
 
 Don't break out the tinfoil hats yet. Maybe they exceeded their
 bandwidth because that link was spread around.
 



Wired: Attacking the 4th Estate

2004-08-25 Thread Sunder

http://www.wired.com/news/politics/0,1283,64680,00.html?tw=wn_tophead_6

or, the HTML crap free version:

http://www.wired.com/news/print/0,1294,64680,00.html



Attacking the Fourth Estate 

By Adam L. Penenberg  |   Also by this reporter Page 1 of 2 next 

02:00 AM Aug. 25, 2004 PT

John Ashcroft and the Department of Justice must be stopped.

There, I've said it. Of course, now I half expect federal agents to drag 
me off to prison for violating the No One Dare Question the Government 
While We Are Engaged in the War Against Terror Act. (Duration: perhaps 
forever.) 

Sure, you say, no such act exists. But Ashcroft himself once testified 
that bellyaching over what he called phantoms of lost liberty only 
serves to aid terrorists and give ammunition to America's enemies. And 
recently FBI agents attempted to intimidate political activists by 
visiting them at their homes to warn about causing trouble at the upcoming 
Republican convention.

More to the point, under Justice Department guidelines, Ashcroft must 
approve any subpoena of a journalist, so how do you explain the rash of 
subpoenas that Special Prosecutor Patrick J. Fitzgerald, the U.S. attorney 
from Chicago, has doled out to Time magazine, The New York Times, The 
Washington Post and NBC? Already one reporter -- Matthew Cooper from Time 
-- has been held in contempt by a federal judge for refusing to appear 
before the grand jury that Fitzgerald convened to investigate which Bush 
administration senior official(s) leaked a covert spy's identity to 
columnist Robert Novak. 

SNIP


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



RE: Another John Young Sighting

2004-08-25 Thread Sunder
All Hail Cthulhu!  Why worship the lesser evil?  
Vote for Cthulhu!   Why vote for the lesser evil?


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Wed, 25 Aug 2004, kawaii ryuko wrote:

  Hail Eris.
  
 
 All hail Discordia!



Reason on Gilmore VS Ashcroft

2004-08-25 Thread Sunder
http://www.reason.com/links/links082404.shtml


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Re: Digital camera fingerprinting...

2004-08-25 Thread Sunder

Yes, your holiness, but how much of that will survive jpeg compression,
photshop (or GIMP) cleanups, and shrinking down to lower resolutions, and 
insertion of stego?

Or what about those disposable digital cameras that are hackable?  
Perhaps there should be a cypherpunks pool to swap disposable digital 
cameras?

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Wed, 25 Aug 2004, Major Variola (ret) wrote:

 Very relevant, traffic analysis and fingerprinting (intentional or not)
 are
 always tasty subjects.  One question for the court would be, how many
 *other* cameras have column 67 disabled?   One of every thousand?
 And how many thousand cameras were sold?
 
 Pope Major Variola (ret)



T. Kennedy == Terrorist says TSA

2004-08-20 Thread Sunder
http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2004/08/20/MNGQ28BM1O1.DTL

Washington -- Sen. Edward Ted Kennedy said Thursday that he was stopped 
and questioned at airports on the East Coast five times in March because 
his name appeared on the government's secret no-fly list.

SNIP

That a clerical error could lend one of the most powerful people in 
Washington to the list -- it makes one wonder just how many others who are 
not terrorists are on the list, said Reggie Shuford, a senior ACLU 
counsel. Someone of Sen. Kennedy's stature can simply call a friend to 
have his name removed, but a regular American citizen does not have that 
ability. He had to call three times himself.

SNIP

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Excerpts from Rudy Rucker's new Book

2004-08-19 Thread Sunder
From Rudy Rucker's new book: The Lifebox, the Seashell and the Soul.

(The interesting bits to which Tim fantasizes to.)


As seen on:

http://www.boingboing.net/text/guestbar.html

SNIP

Rant at Start of Chapter on Society

I write this book during a dark time. America.s government is in the hands 
of criminals and morons.

I.d like to break through to a radically different way of talking about 
society, to throw a bucket of ice-water in the face of the sleep-walking 
sheep who think that history is about presidents and kings.

A baby filling a diaper is infinitely more significant than a congress 
placing a movement on the floor.

SNIP


Twin Towers

Facts: The twin towers fell. The terrorists were Saudis. Bush invaded 
Iraq.

.Ah,. someone might say, .if nobody wanted to fight, we.d be invaded. Look 
at the twin towers. The world.s not safe... And I would submit that the 
administration.s reaction to the twin towers was exactly the wrong one. 
Instead of jumping into the repetitive tit-for-tat class two 
Israelis-versus-Palestinians mode, the government should have gone class 
four. What would make men kill themselves while destroying a part of our 
lovely New York City? What system produced them? Isn.t there a way to get 
in and jolt it in some totally unexpected way, something more original 
than rocket fire vs. car bombs?

Emigration

Before virtually every American presidential election, I.ve heard people 
say, .If so and so wins, I.m leaving the country.. But they never do. The 
only time my friends eve remigrated was during the Viet Nam war, a time 
when the hive mind was undertaking the wholesale slaughter of a 
generation. But most of the time, for most of us, things aren.t bad enough 
to make emigration seem reasonable.

If the election is stolen again in Fall, 2004, the answer could be armed 
revolution, not emigration. If the Bush faction tries to retain power, a 
significant number of people may feel compelled to go to D.C. and fight in 
the streets until the tyrant is deposed. However long it takes, however 
dearly it costs. Would it be worth it?

Hopefully he'll lose the election by too great a margin to fudge. But for 
that to happen, we have to vote. The popular vote margin matters, if not 
in the electoral college, then in the hearts and minds of our oppressed 
populace. If the margin were big enough, the house of cards could 
collapse.

SNIP

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Gilmore VS Ashcroft opens today

2004-08-16 Thread Sunder
http://www.papersplease.org/gilmore/

In this corner we have John Gilmore. He's a 49 year-old philanthropist who 
lives in San Francisco, California. Through a lot of hard work (and a 
little luck), John made his fortune as a programmer and entrepreneur in 
the software industry. Whereas most people in his position would have 
moved to a tropical island and lived a life of luxury, John chose to use 
his fortune to protect and defend the US Constitution. 

He's challenging the unconstitutionally evil stench of the Asscruftinator!

Who will win?  Place your bets, place your bets, the courtroom showdown
begins today:

http://www.boingboing.net/2004/08/16/john_gilmore_vs_ashc.html

Ding!



--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Sunder
On Fri, 13 Aug 2004, Morlock Elloi wrote:

 The purpose would be that they do not figure out that you are using some
 security program, so they don't suspect that noise in the file or look for
 stego, right?
 
 The last time I checked the total number of PDA programs ever offered to public
 in some way was around 10,000 (5,000 ? 100,000 ? Same thing.) That can be
 trivially checked for. Any custom-compiled executable will stand out as a sore
 thumb.

How? Not if you get something like a Sharp Zaurus and compile your own
environment.  Hey, I want to get as much performance out of this shitty
little ARM chip as I can.

 You will suffer considerably less bodily damage inducing you to spit the
 passphrase than to produce the source and the complier.

What makes you think they'll have enough of a clue as to how to read the 
files off your PDA without booting it in the first place?  99% of these 
dorks use very expensive automated hardware tools that do nothing more 
than dd your data to their device, then run a scanner on it which looks 
for well known jpg's of kiddie porn.  

If you're suspected of something really big, or you're middle eastern,
then you need to worry about PDA forensics.  Otherwise, you're just
another geek with a case of megalomania thinking you're important enough 
for the FedZ to give a shit about you.
 
 Just use the fucking PGP. It's good for your genitals.

And PGP won't stand out because ?


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Sunder
Right, in which case GPG (or any other decent crypto system) is just fine,
or you wouldn't be looking for stego'ing it inside of binaries in the
first place.

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Fri, 13 Aug 2004, Thomas Shaddack wrote:

 In the world of industrial espionage and divorce lawyers, the FedZ aren't 
 the only threat model.



Re: A Billion for Bin Laden

2004-08-12 Thread Sunder
Yeah, about as brilliant as a turd.  Didn't they recently call Al-Qaeda's 
network a hydra?  correct me if I don't recall my Ancient Greek myths, but 
when you cut off one head on the hydra, two more grow back, so are we to 
assume that future heads that grow back will carry such bounties?

A billion here, a billion there, and pretty soon you're talking real 
money.

I guess they do realize that these guys are idologists and the allmighty 
dollar is anathema to them, so they have to raise the bounty in order to 
get someone to betray him...   Never discount greed, no matter how 
ideological someone may be, at some ridiculous sum, someone somewhere will 
rat him out... perhaps just before the elections.

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Wed, 11 Aug 2004, Major Variola (ret) wrote:

 This is brilliant, worthy of being called channelling Tim M.  As it
 relies entirely on free association and the rational marketplace.
 Nevermind
 that the reward is stolen from the sheeple.
 
 What the DC future-corpses don't grok is that the Sheik's network
 is not financially or career motivated, unlike themselves.
 And xianity (or even amerikan patriotism which sometimes
 substitutes) is too neutered to counter it.



2+2=5 and mention of cryptome

2004-08-12 Thread Sunder

Original URL: 
http://www.theregister.co.uk/2004/08/11/al_q_geek_us_overthrow_plot/

Al-Qaeda computer geek nearly overthrew US
By Thomas C Greene (thomas.greene at theregister.co.uk)
Published Wednesday 11th August 2004 16:45 GMT

Update A White House with a clear determination to draw paranoid 
conclusions from ambiguous data has finally gone over the top. It has now 
implied that the al-Qaeda computer geek arrested last month in Pakistan 
was involved in a plot to destabilize the USA around election time.

Two and two is five

As we reported here 
(http://www.theregister.co.uk/2004/08/03/us_terror_alert_political_football) 
and here 
(http://www.theregister.co.uk/2004/08/02/al_qaeda_cyber_terror_panic), 
so-called al-Qaeda computer expert Muhammad Naeem Noor Khan, a 
Pakistani, was arrested on 13 July in possession of detailed but rather 
old surveillance documents related to major financial institutions in New 
York, Newark, and Washington.

Since that time, other intelligence has led the US security apparatus to 
imagine that a plot to attack the USA might be in the works. (No doubt 
there are scores of plots in the works, but we digress.) Therefore, last 
week, the ever-paranoid Bush Administration decided that Khan's building 
surveillance documents, and the hints of imminent danger, had to be 
connected. Indeed, if al Qaeda is to strike at all, it is most likely to 
strike the targets mentioned in Khan's documents, as opposed to thousands 
of others, the Bushies reasoned.

New York, Newark and Washington were immediately put on high alert, at 
great expense, and to the inconvenience of millions of residents.

SNIP

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Re: maybe he would cash himself in? (Re: A Billion for Bin Laden)

2004-08-12 Thread Sunder

Nah, if Bush already had him in a hole somewhere to produce him just in 
time for the elections, he'd collect the billion for himself as his 
personal reward.

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Thu, 12 Aug 2004, Dave Howe wrote:

 of course someone *really* cynical might think they already had him, but 
 needed to spring a billion towards shrub's reelection campaign



Don't smile for UK Big Brother's passport pix

2004-08-06 Thread Sunder
http://www.theregister.co.uk/2004/08/06/passport_scanners/print.html

Original URL: http://www.theregister.co.uk/2004/08/06/passport_scanners/
Home Office prohibits happy biometric passports
By Lucy Sherriff (lucy.sherriff at theregister.co.uk)
Published Friday 6th August 2004 10:08 GMT

The Home Office says all new passport photographs must be of an unsmiling 
face with its gob firmly shut because open mouths can confuse facial 
recognition systems.

SNIP


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Ridge: The Terrorists are comming! The Terrorists are coming! (wag the media)

2004-08-05 Thread Sunder


http://www.theregister.co.uk/2004/08/03/us_terror_alert_political_football/print.html

US terror alert becomes political football
By Thomas C Greene (thomas.greene at theregister.co.uk)
Published Tuesday 3rd August 2004 15:15 GMT

Update As we reported recently 
(http://www.theregister.co.uk/2004/08/02/al_qaeda_cyber_terror_panic), the 
latest ratcheting up of the terror threat level in the United States was 
based on captured documents dating back some time. In that article, we 
observed that it was not clear whether any of the information recently 
obtained relates to current or future schemes.

SNIP

much of the information that led the authorities to raise the terror 
alert at several large financial institutions in the New York City and 
Washington areas was three or four years old, intelligence and law 
enforcement officials said on Monday. They reported that they had not yet 
found concrete evidence that a terrorist plot or preparatory surveillance 
operations were still under way.

SNIP

Why now?

If anyone is wondering why terrorism, and especially attacks at home, 
should have been so fully hyped on such thin evidence, it's useful to 
consider the news cycle.

Last week, John Kerry did a surprisingly good job of introducing himself 
to the nation as a plausible replacement for Bush. 

SNIP

Politics

But this rain dance was not undertaken from a security point of view. It 
was concocted with a political motive, and its purpose was to distract the 
public from the additive disasters in Iraq, and the unexpectedly strong 
showing by the Democrats in Boston last week. It was designed to make 
Junior look like the strong leader that his cheerleaders insist, against 
all evidence, that he really is. (We note that the true Prince of 
Darkness, Dick Cheney, has been dutifully silent, and conspicuously 
absent, during the recent national security festivities, to vouchsafe the 
limelight to Junior.)

SNIP

--Kaos-Keraunos-Kybernetos---
 + ^ + :War is Peace/|\
  \|/  : Freedom is Slavery /\|/\
--*--: Ignorance is Strength  \/|\/
  /|\  : Bush is President - Bret Feinblatt \|/
 + v + :
-- http://www.sunder.net 



Wired on Navy's new version of Onion Routing

2004-08-05 Thread Sunder


http://www.wired.com/news/print/0,1294,64464,00.html
Onion Routing Averts Prying Eyes
By Ann Harrison

Story location: http://www.wired.com/news/privacy/0,1848,64464,00.html

02:00 AM Aug. 05, 2004 PT

Computer programmers are modifying a communications system, originally
developed by the U.S. Naval Research Lab, to help Internet users surf the
Web anonymously and shield their online activities from corporate or
government eyes.

SNIP

The Navy is financing the development of a second-generation onion-routing
system called Tor, which addresses many of the flaws in the original
design and makes it easier to use. The Tor client behaves like a SOCKS
proxy (a common protocol for developing secure communication services),
allowing applications like Mozilla, SSH and FTP clients to talk directly
to Tor and route data streams through a network of onion routers, without
long delays.

SNIP


--Kaos-Keraunos-Kybernetos---
 + ^ + :War is Peace/|\
  \|/  : Freedom is Slavery /\|/\
--*--: Ignorance is Strength  \/|\/
  /|\  : Bush is President - Bret Feinblatt \|/
 + v + :
-- http://www.sunder.net 



RE: On how the NSA can be generations ahead

2004-08-04 Thread Sunder
Some interesting URL's on how this can be technologically achieved.  These 
are just from various news sources, nothing indicating one way or another 
that the boys in Ft. Meade are using any of this stuff - though DARPA is 
mentioned in the first link. :)

http://news.com.com/Sun+chips+away+at+wireless+chip+connections/2100-1006_3-5291289.html

http://www.uwtv.org/programs/displayevent.asp?rid=1844

So this gets around some of the limits of chip to chip interconnects, etc.


--Kaos-Keraunos-Kybernetos---
 + ^ + :I find it ironic that, on an amendment designed to protect  /|\
  \|/  :American democracy and our constitutional rights, the   /\|/\
--*--:Republican leadership in the House had to rig the vote and  \/|\/
  /|\  :subvert the democratic process in order to prevail  \|/
 + v + :  -- Rep. Sanders re vote to ammend the US PATRIOT ACT. 
-- http://www.sunder.net 



Welcome to 1984 - almost.

2004-08-04 Thread Sunder
This speaks volumes as to where intentions lie.


http://scoop.agonist.org/story/2004/8/3/84635/46365

 Justice Department attempting to remove public documents from libraries

American Library Association
July 30, 2004

CHICAGO -- The following statement has been issued by President-Elect 
Michael Gorman, representing President Carol Brey-Casiano, who is 
currently in Guatemala representing the Association:

By Anonymous in USA: Liberty Watch on Tue Aug 3rd, 2004 at 08:46:35 AM PDT
Last week, the American Library Association learned that the Department of 
Justice asked the Government Printing Office Superintendent of Documents 
to instruct depository libraries to destroy five publications the 
Department has deemed not appropriate for external use. The Department 
of Justice has called for these five public documents, two of which are 
texts of federal statutes, to be removed from depository libraries and 
destroyed, making their content available only to those with access to a 
law office or law library.

The topics addressed in the named documents include information on how 
citizens can retrieve items that may have been confiscated by the 
government during an investigation. The documents to be removed and 
destroyed include: Civil and Criminal Forfeiture Procedure; Select 
Criminal Forfeiture Forms; Select Federal Asset Forfeiture Statutes; Asset 
forfeiture and money laundering resource directory; and Civil Asset 
Forfeiture Reform Act of 2000 (CAFRA).

ALA has submitted a Freedom of Information Act (FOIA) request for the 
withdrawn materials in order to obtain an official response from the 
Department of Justice regarding this unusual action, and why the 
Department has requested that documents that have been available to the 
public for as long as four years be removed from depository library 
collections. ALA is committed to ensuring that public documents remain 
available to the public and will do its best to bring about a satisfactory 
resolution of this matter.

Librarians should note that, according to policy 72, written authorization 
from the Superintendent of Documents is required to remove any documents. 
To this date no such written authorization in hard copy has been issued.


--Kaos-Keraunos-Kybernetos---
 + ^ + :I find it ironic that, on an amendment designed to protect  /|\
  \|/  :American democracy and our constitutional rights, the   /\|/\
--*--:Republican leadership in the House had to rig the vote and  \/|\/
  /|\  :subvert the democratic process in order to prevail  \|/
 + v + :  -- Rep. Sanders re vote to ammend the US PATRIOT ACT. 
-- http://www.sunder.net 



Re: Al-Q targeting NY corporations?

2004-08-03 Thread Sunder
Your sarcasm detector is down, please send it back to the manufacturer for 
repairs.  Let's hope it's still under warranty.

--Kaos-Keraunos-Kybernetos---
 + ^ + :I find it ironic that, on an amendment designed to protect  /|\
  \|/  :American democracy and our constitutional rights, the   /\|/\
--*--:Republican leadership in the House had to rig the vote and  \/|\/
  /|\  :subvert the democratic process in order to prevail  \|/
 + v + :  -- Rep. Sanders re vote to ammend the US PATRIOT ACT. 
-- http://www.sunder.net 

On Mon, 2 Aug 2004, Major Variola (ret) wrote:

 At 12:58 PM 8/1/04 -0400, Sunder wrote:
 You Al-Qaeda types
 hate us for having freedom, right?
 
 You're not taken in by that mularky, are you?



Re: Al-Q targeting NY corporations?

2004-08-01 Thread Sunder

FUD Mode=True

I've a better idea for the terrorists who may be paying attention, why not
just leave NYC alone and target something more useful to take out - like
Microsoft, for example.  

IMHO, the planes that were targeted at the WTC would have been better
directed at various Redmond, WA buildings.  They're after all a very big
company with a lot of billions - that would have been far more spectacular
an attack than a couple of profitless eyesores blocking everyone's view of
the Statue of Liberty.  BURP

And what's with attacking the pentagon?  They're the biggest sink of Evil 
American Taxpayer funds after all. Don't you want your enemies wasting 
billions of dollars on shitty airplanes and helicopters that crash 
themselves?

Besides, if you want to piss off the NY Cops, don't attack One Police
Plaza, take out Dunkin Donuts and Krispy Kreme joints... well, wait, I
kinda like Krispy Kreme once in a while, ok, just Dunkin Donuts...  Or
better yet, don't!  The artery clogging fat and the diabetes inducing
sugar+starch already do plenty.  Nah, if you're an Al Qaeda member, it's 
your duty to open up more donut shops and in fact, have a policy of free 
donuts to every cop.  Infact, you should send crates of donuts to every 
police precinct several times a day.  I'd suggest a 10:1 donut to officer 
ratio.  

Ditto for McDonalds foods.  Add extra grease.  The hydrogenated soybean
kind!

And why bother taking out the bridge to NJ - after all, NJ is where all
the stench is (remember that old joke: Girlfriend Kiss me where it
smells, Boyfriend: Ok, let's drive to NJ!  You're better off leaving
that bridge alone, so commuters can be terrorized by the industrial stench
as they drive through, and by all the delays.  Infact, if you're an Al
Qaeda engineer, you'll want to BUILD more bridges to NJ, so more Satan
Loving American Infidels will get sickened by it.

Oh yeah, and be sure to vote for Bush.  He'll be sure to fuck the economy 
even worse and put more draconian laws into effect.  You Al-Qaeda types 
hate us for having freedom, right?  So Dubbya's your perfect boy for that.


That's the real way to be a terrorist, not by wasting your time on some 
dumb ass fireworks by airplane.  Pshaw, only amateur terrorists do it that 
way.

/FUD

--Kaos-Keraunos-Kybernetos---
 + ^ + :I find it ironic that, on an amendment designed to protect  /|\
  \|/  :American democracy and our constitutional rights, the   /\|/\
--*--:Republican leadership in the House had to rig the vote and  \/|\/
  /|\  :subvert the democratic process in order to prevail  \|/
 + v + :  -- Rep. Sanders re vote to ammend the US PATRIOT ACT. 
-- http://www.sunder.net 

On Sun, 1 Aug 2004, J.A. Terranson wrote:

 Article below.
 
 Just in case AQ is listening, I'd like to remind them that there are some
 other states that also have some *really* good targets ;-)  But, if you're
 just stuck on New York, let me make my recommendations:



[OT] Apple calls Real a hacker

2004-07-29 Thread Sunder
http://money.cnn.com/2004/07/29/technology/apple_real/

Interesting non-cypherpunkish stuff.  

So Real goes off and does some reverse engineering so it can use Apple's
DRM to publish its own stuff for iPod's.  Interestingly, Apple wants to
sue using the DMCA, *BUT* where it gets interesting is that IMHO, Real
didn't provide a crack to Apple's DRM, rather it used it for its own
benefit.  So will the DMCA even apply?

Even more interesting, Real used publically available documents so they 
didn't do the reverse engineering themselves, so they're not likely to be 
sued on that aspect - though quite likely this is based on the fair play 
stuff which was based on reverse engineering...

This might also have ramifications concerning things like X-Box and
modchips.  i.e. if Apple loses, then it will be legal for someone to build
a modchip to allow X-Box's to run Linux (but not play copied games.)

It will be an interesting fight, and if we, the consumers, are lucky, 
then perhaps some of the evil provisions in the DMCA will go away so we 
can get some more interoperability instead of vendor lock-in.

--Kaos-Keraunos-Kybernetos---
 + ^ + :I find it ironic that, on an amendment designed to protect  /|\
  \|/  :American democracy and our constitutional rights, the   /\|/\
--*--:Republican leadership in the House had to rig the vote and  \/|\/
  /|\  :subvert the democratic process in order to prevail  \|/
 + v + :  -- Rep. Sanders re vote to ammend the US PATRIOT ACT. 
-- http://www.sunder.net 



Osama says Vote for Bush!

2004-07-21 Thread Sunder
http://www.aaronsw.com/weblog/001393

Not that (m)any of us really expected Al-Qaeda to want Kerry.

--Kaos-Keraunos-Kybernetos---
 + ^ + :I find it ironic that, on an amendment designed to protect  /|\
  \|/  :American democracy and our constitutional rights, the   /\|/\
--*--:Republican leadership in the House had to rig the vote and  \/|\/
  /|\  :subvert the democratic process in order to prevail  \|/
 + v + :  -- Rep. Sanders re vote to ammend the US PATRIOT ACT. 
-- http://www.sunder.net 



Reputation Capital Article - 1st Monday: Manifesto for the Reputation Society

2004-07-19 Thread Sunder
Here's a paper/article/screed on reputation capital.  A subject we 
discussed here a long while ago back when dinosaurs ruled the earth, 
etc... well, not quite that long ago.  

This doesn't seem to mention anything about anonymous users, however.



http://www.firstmonday.org/issues/issue9_7/masum/index.html


Abstract
Manifesto for the Reputation Society by Hassan Masum and Yi.Cheng Zhang

Information overload, challenges of evaluating quality, and the 
opportunity to benefit from experiences of others have spurred the 
development of reputation systems. Most Internet sites which mediate 
between large numbers of people use some form of reputation mechanism: 
Slashdot, eBay, ePinions, Amazon, and Google all make use of collaborative 
filtering, recommender systems, or shared judgements of quality.

But we suggest the potential utility of reputation services is far 
greater, touching nearly every aspect of society. By leveraging our 
limited and local human judgement power with collective networked 
filtering, it is possible to promote an interconnected ecology of socially 
beneficial reputation systems . to restrain the baser side of human 
nature, while unleashing positive social changes and enabling the 
realization of ever higher goals.

SNIP




--Kaos-Keraunos-Kybernetos---
 + ^ + :I find it ironic that, on an amendment designed to protect  /|\
  \|/  :American democracy and our constitutional rights, the   /\|/\
--*--:Republican leadership in the House had to rig the vote and  \/|\/
  /|\  :subvert the democratic process in order to prevail  \|/
 + v + :  -- Rep. Sanders re vote to ammend the US PATRIOT ACT. 
-- http://www.sunder.net 



New trend: dropping trou at the TSA

2004-07-15 Thread Sunder
BoingBoing calls this The Freedom Flash 
http://www.boingboing.net/2004/07/14/man_flashes_authorit.html



http://news.yahoo.com/news?tmpl=storyu=/ap/20040714/ap_on_fe_st/airport_flasher_1

Man Exposes Self During Airport Screening

Wed Jul 14, 9:07 AM ET

Add Strange News - AP to My Yahoo!

By The Associated Press

MINNEAPOLIS - Daryl Miller didn't make it through airport security because 
he couldn't keep his pants on.

 

Airport police said a security screener was waving a metal-detecting wand 
over Miller's pants area on Friday when Miller pulled his shorts down to 
his ankles. He wasn't wearing any underwear.

Miller then said, There, how do you like your job, thus ending the 
screening, according to the police report. He was charged with indecent 
exposure and released on $300 bail. 

..

 This person exposed themself in a public area, a clear violation of the 
law, and we needed to take some action on that, otherwise everybody would 
be dropping their pants, Christenson said.


--Kaos-Keraunos-Kybernetos---
 + ^ + :I find it ironic that, on an amendment designed to protect  /|\
  \|/  :American democracy and our constitutional rights, the   /\|/\
--*--:Republican leadership in the House had to rig the vote and  \/|\/
  /|\  :subvert the democratic process in order to prevail  \|/
 + v + :  -- Rep. Sanders re vote to ammend the US PATRIOT ACT. 
-- http://www.sunder.net 



Re: Mexico Atty. General gets microchipped (fwd)

2004-07-14 Thread Sunder


On Tue, 13 Jul 2004, J.A. Terranson wrote:

 Forwarded for amusement

   ...justice is a duty towards those whom you love and those whom you do
   not.  And people's rights will not be harmed if the opponent speaks out
   about them.
 
   Osama Bin Laden
 
   - - -
 
   There aught to be limits to freedom!
 
George Bush
 
 
   - - -
 
 Which one scares you more?

The about sounds like a great .signature file. :)
 
 
 --
 http://www.cnn.com/2004/WORLD/americas/07/13/mexico.chip.reut/index.html
 
 Mexico attorney general gets microchip implant

 It's an area of high security, it's necessary that we have access to
 this, through a chip, which what's more is unremovable, Macedo told
 reporters.

Huh? any implantable is removeable...  What, kidnappers, in Mexico don't
have access to alumium foil, faraday cages, frequency counters and
{hatchets,knives,scalpels,chain saws}, etc?

 The chips would enable the wearer to be found anywhere inside Mexico, in
 the event of an assault or kidnapping, said Macedo.

Which means it's transmitting, and to do so, it's not an RFID, it's a bug 
with a battery.  If if it doesn't transmit at all times, there's a scar 
somewhere which points where it is.

This ploy would have only worked if the kidnappers didn't know about it in
advance.  Now they do.  It will stop the lame ones.  The hardass criminals
know how to deal with it.

IMHO, this is a publicity op - not much else, designed to discourage 
potential kidnappers, and enourage the public to get chipped.


What's the frequency Kenneth? comes to mind.  ROTFL!



Re: USA PATRIOT Act Survives Amendment Attempt (fwd from brian-slashdotnews@hyperreal.org)

2004-07-11 Thread Sunder



On Fri, 9 Jul 2004, Bill Stewart wrote:

 At 01:44 PM 7/9/2004, Thomas Shaddack wrote:
 Is it possible to write a database access protocol, that would in some
 mathematically bulletproof way ensure that the fact a database record is
 accessed is made known to at least n people? A way that would ensure that
 either nobody can see the data, or at least n people reliably know the
 record was accessed and by whom?

.

 The obvious method for the first half of your problem is
 Shamir secret-sharing - n out of m people need to provide
 their information in order to access the data item (or its key.)
 That isn't necessarily an _efficient_ protocol for databases,

Better yet, you have the n sources provide pieces of a key which
auto-expires after X days, that key is used to access the database rather
than getting the data from n sources.  Authenticating at random with n 
sources, each with a different key is also required.

Store the data on some persistent, distributed stores... Bit Torrent comes 
to mind here.

 
 I'm not convinced that the second half of your problem makes sense.

See above method and add some sort of log to it that automatically and 
anonymously publishes logs of access to it.  So long as nm/2 and at least 
n people are trustworthy it should work, right?

Then, you also need a watcher app to reveal that access occured.  This app
downloads the logs of the hashes you're interested in, plus other random
ones to prevent logging from revealing who is interested in what.

Would also be nice if the hash for the data you're trying to watch/access 
changes with the date.  That way if one user of the system is compromised, 
the compromisers can't figure out who the other parties accessing the same 
data are.  But I'm not sure how you'd make it happen without tweaking the 
Bit Torrent client a lot, or writing a new one from scratch (invoking 
Not-Invented Here Syndrome).


 Of course, even to use this requires that the application be designed
 in some manner where there's some kind of key that's needed
 to access the data, such as a mailbox that encrypts incoming mail
 with your public key.  That doesn't prevent the secret police from
 forcing your mailbox company to reveal the information before
 encrypting it to you, but it does at least protect _old_ mail,
 unless n out of the m key escrow agents all cooperate.

A-Yup.

 I don't know why you'd design a system like this when you could
 do it without the key escrow feature - am I missing something?

How else would you do it and still be able to know when something was 
read?

--Kaos-Keraunos-Kybernetos---
 + ^ + :I find it ironic that, on an amendment designed to protect  /|\
  \|/  :American democracy and our constitutional rights, the   /\|/\
--*--:Republican leadership in the House had to rig the vote and  \/|\/
  /|\  :subvert the democratic process in order to prevail  \|/
 + v + :  -- Rep. Sanders re vote to ammend the US PATRIOT ACT. 
-- http://www.sunder.net 




Re: [IP] Hi-tech rays to aid terror fight

2004-07-09 Thread Sunder

On Thu, 8 Jul 2004, Major Variola (ret) wrote:

 1. I've seen adverts for linear sensors which image the bottoms
 of cars as they drive over.  Sort of a scanner where the paper
 does the moving.  Installed in the road.

Come to think of it, yes, the road within the tollbooth gate was a bit
raised, so there could well have been sensors underneath it.  Might as
well add all the sensors you can afford, after all any cars going through
the gate are a captive audience.

 2. There are companies developing sensors that bombard
 your car with neutrons (don't have to open the trunk),
 and detect the N from the temporary neutron-activated gamma emissions.
 
 3. Obviously license plate OCR is trivial.

Natch.  I also did see the big red IR lamps behind, but that's old school 
in almost any toll booth.
 
 4. I've read papers on recognizing vehicles by their inductive
 signature as they drive over regular road sensors.   This was
 to passively measure road speed for traffic control.  The idea
 is that a VW Beetle has a different inductance vs. time than
 a Ford-250 or an 18 wheeler.  You correlate between
 roadloops at known distances apart and infer road speed.

Or you OCR license plates which is mostly trivial these days, or a 
combination of both.  

Then again, for upstate NY, you actually get a card for NYS Throughway and
pay when you exit at another tollbooth.  Card has a magnetic stripe, and 
shows the entry point on the throughway.  So there are obviously other 
less expensive ways to do just that.  Add cameras with timestamps at each 
tollboth and a way to keep track of which card was where and you've got a 
verifiable robust tracking system.

 
 5. One could call terahertz hard RF  in same way that hard x-rays
 bleed into soft gammas.  But calling anything hard implies danger,
 and we mustn't scare the proles.  Perhaps soft IR is better.

:) Sort of like spammers calling their trade targetted mails or opt-in

Heh, would be funny if the 4am NINJA SWAT raid teams painted happy faces
on their helmets and say Have a nice day as they shoot.

 
 Whatever, its still pornography if the resolution is high enough.

What was that quote?... tits or nukes, it's all just bits on the wire

I also recall reading recently about those colored plastic/glass embedded
in the road bumps that reflect light (so you can see your lane better?)
are being retrofitted with cameras in them and set at an angle to read the
license plate and measure speed as you drive over them by some company.

Bah, wetware memory sucks. :(



Re: Faster than Moore's law

2004-07-09 Thread Sunder


On Thu, 8 Jul 2004, Steve Schear wrote:

 Just want to remind y'all that drive capacity has increased *faster*
 than semiconductor throughput, which has an 18 month doubling time.
 
 But access time has not nearly kept pace.  Which is why all manner of 
 database architectures have been created to make up for this shortcoming.

Which is still perfectly fine for data that you collect but search/access 
very rarely which I'd guess is the type of data we're talking about here.  
You collect the data, index it (or extract metadata from it in other ways) 
and you _almost_ never access it again.



Re: Final stage

2004-07-08 Thread Sunder

On Thu, 8 Jul 2004, Howie Goodell wrote:

 On Wed, 7 Jul 2004 15:26:59 -0400 (edt), Sunder [EMAIL PROTECTED] wrote:
  
  On Wed, 7 Jul 2004, J.A. Terranson wrote:
  
   On Wed, 7 Jul 2004, Anonymous via the Cypherpunks Tonga Remailer wrote:
  
Praise Allah!  The spires of the West will soon come crashing down!
  
  SCREED Deleted
  
   Laying it on just a little thick, no?
  
  Here we go again.  Get ready for more FUD from the LEO's, I can see Fox
  news now.  Cypherpunks a hotbed of crypto-anarchist scum is now being
  used by Al Qaeda to setup new terrorist attacks...  Expect to see a
  sidebar about rogue or evil anonymous remailers and how they're
  un-patriotic, etc.
  
  Bah, some feeb had too one too many Crappachino's with lunch today and
  pulled a Cornholio :(
  
  A few years ago it was requests on how to make bombs, now it's this shit.
 
 The UBL is GW message sounded provocateurish, too.

Yup... but that's kind of standard around here.  Pull up a reasonable 
quote from some super hated person and make people think.  Nothing new.  I 
think there was something about gun control and making people safe 
attributed to Hitler, etc. a while back.

But as I said, here we go: http://www.theinquirer.net/?article=17087
Right on que too, though it doesn't mention Cypherpunks...

The Internet is the home of Terror

Servers of Mass destruction

By Nick Farrell: Thursday 08 July 2004, 07:50
THE INTERNET has become the place for terrorist training, recruitment, and 
fundraising, according to a leading Israeli academic.

Speaking to the Medill News Service, Gabriel Weimann, chair of the 
University of Haifa communications department claims that Terrorist groups 
are exploiting the accessibility, vast audience, and anonymity of the 
Internet to raise money and recruit new members.

SNIP



Re: [IP] Hi-tech rays to aid terror fight (fwd from dave@farber.net)

2004-07-08 Thread Sunder

I recently visited the Canadian side of Niagra falls.  On the return entry 
to the US customs, etc. meant driving through penns that look like toll 
booths.  But I noticed little sensors in pairs and large square sensors as 
well.

The entry gate was fairly large - I'd say about 2' deep by 2' wide by I'd
guess 10/12' high. Black on the outside car facing side, white on the
inner side.  On the side there were pairs of large rectangular boxes at an
angle pointing down toward the car.  Deeper into the stall there were
several pairs of sensors on vertical poles.  The first pair on the left
side - small rectangular ones which pointed at similar poles across the
way.  Something like this:

   |   |
   |  ]| mid - about 3-4' off the ground
   |   |
   |[  | low about 1ft off the ground




From the top:


  Booth|---arm---|
   | |
   |[|
   |[|
   |]|
   |]|
   | |
   ### ###
   | |
   %%%
   %%%
   | |
  ^ direction of driving

[ = small sensor
##= large sensor
%%= entry gate 3'x3' thick


And there were two sets of these as I drove through.  Were these the 
(in)famous TZ sensors?

There were two guys in the booth, one obviously examining in LCD monitor, 
the other guy going papers please and state the nature of your visit 
etc.  He seemed only concerned with where we were born, lived, and whether 
we had purchased any alcohol or tabacco products in Canada.


On Thu, 8 Jul 2004, Eugen Leitl wrote:

 - Forwarded message from David Farber [EMAIL PROTECTED] -
 
 From: David Farber [EMAIL PROTECTED]
 Date: Thu, 8 Jul 2004 10:09:31 -0400
 
 Begin forwarded message:
 
 From: Dewayne Hendricks [EMAIL PROTECTED]
 Date: July 8, 2004 4:53:34 AM EDT
 To: Dewayne-Net Technology List [EMAIL PROTECTED]
 Subject: [Dewayne-Net] Hi-tech rays to aid terror fight
 
 Hi-tech rays to aid terror fight
 
 A new way of identifying metal and explosives could provide a valuable
 tool in the fight against terrorism.
 Airport security has become big business following the terrorist
 attacks in the US.
 
 A system that detects both metal and non-metallic weapons using
 terahertz light has been developed by technology firm TeraView.



Re: UBL is George Washington

2004-07-07 Thread Sunder
On Mon, 5 Jul 2004, Anonymous wrote:

 But asymm warfare has to accomplish its goal.  It's not being very
 successful.  The only people who are siding with al-qaeda are those whose
 brains are already mush -statist socialists, to be precise.  If al qaeda
 bombed government buildings or targetted the private residences or offices
 of government officials, they might get more sympathy, from me at least.
 Destroying an pair of buildings and killing thousands of citizens -most of
 whom couldn't give an accurate account of U.S. forces distribution in the
 MidEast- is not a step forward.

Right, WTC as a target doesn't make any strategic sense.  Either they were
very stupid at picking their targets, or their goals are not quite so
obvious - Unless the strategy was to short-sell the stock market the day
before.

Did the FTC/FBI/NSA/CIA/etc find anything along these lines (yet)?  I've 
not been paying much attention to the news as of late.



Re: Final stage

2004-07-07 Thread Sunder
On Wed, 7 Jul 2004, J.A. Terranson wrote:

 On Wed, 7 Jul 2004, Anonymous via the Cypherpunks Tonga Remailer wrote:
 
  Praise Allah!  The spires of the West will soon come crashing down!

SCREED Deleted
 
 Laying it on just a little thick, no?

Here we go again.  Get ready for more FUD from the LEO's, I can see Fox
news now.  Cypherpunks a hotbed of crypto-anarchist scum is now being
used by Al Qaeda to setup new terrorist attacks...  Expect to see a
sidebar about rogue or evil anonymous remailers and how they're
un-patriotic, etc.

Bah, some feeb had too one too many Crappachino's with lunch today and
pulled a Cornholio :(  

A few years ago it was requests on how to make bombs, now it's this shit.




Re: Privacy laws and social engineering

2004-07-07 Thread Sunder


On Wed, 7 Jul 2004, Thomas Shaddack wrote:

 Sometimes you get access by telnet. Sometimes by a voice call. Hack the 
 mainframe. Hack the secretary. What's better? (Okay, I agree, you can't 
 sleep with the mainframe.)

 I feel zen today.

Me too:

http://www.openbsd.org/lyrics.html#31
ftp://ftp.openbsd.org/pub/OpenBSD/songs/song31.ogg
ftp://ftp.openbsd.org/pub/OpenBSD/songs/song31.mp3


BSD fight buffer reign
Flowing blood in circuit vein
Quagmire, Hellfire, RAMhead Count
Puffy rip attacker out

Crackin' ze bathroom, Crackin' ze vault
Tale of the script, HEY! Secure by default

Can't fight the Systemagic
Uber tragic
Can't fight the Systemagic

Sexty second, black cat struck
Breeding worm of crypto-suck
Hot rod box unt hunting wake
Vampire omellete, kitten cake

Crackin' ze boardroom, Crackin' ze vault
Rippin' ze bat, HEY! Secure by default

Chorus

Cybersluts vit undead guts
Transyl-viral coffin muck
Penguin lurking under bed
Puffy hoompa on your head

Crackin' ze bedroom, Crackin' ze vault
Crackin' ze whip, HEY! Secure by default
Crackin' ze bedroom, Crackin' ze vault
Crackin' ze whip, HEY! Secure by default

Chorus



Re: [IP] more on more on E-mail intercept ruling - good grief!! (fwd from dave@farber.net)

2004-07-02 Thread Sunder

On Fri, 2 Jul 2004, Roy M. Silvernail wrote:

 Call me cynical (no... go ahead), but if VOIP is found to have no 4th 
 Amendment protection, Congress would first have to agree that this *is* 
 a problem before thay could fix it.  Given the recent track record of 
 legislators vs. privacy, I'm not at all confident Congress would 
 recognize the flaw, much less legislate to extend 4th Amendment 
 protection.  After all, arent more and more POTS long-distance calls 
 being routed over IP?  The only difference, really, is the point at 
 which audio is fed to the codec.  If the codec is in the central office, 
 it's a voice call.  If it's in the handset or local computer, it's 
 VOIP.  I think we can count on the Ashcroftians to eventually notice 
 this and pounce upon the opportunity.  And as for the SCOTUS, all they 
 have to do is sit back on a strict interpretation and such intercepts 
 aren't wiretaps at all.

If VOIP gets no protection, then you'll see a lot of digital bugs in
various spy shops again - and they'll all of a sudden be legal.  I thought
the Feds busted lots of people for selling bugging equipment, etc. because
they're an invasion of privacy, etc.

Ditto for devices that intercept digital cellular phone conversations, 
spyware software that turns on the microphone in your computer and sends 
the bits out over the internet, ditto for tempest'ing equipment (But 
your honor, it's stored for 1/60th of a second in the phosphor! It's a 
storage medium!), etc.


Hey, they can't have their cake and eat it too.  It's either protected or
it isn't.



Re: [IP] more on more on E-mail intercept ruling - good grief!! (fwd from dave@farber.net)

2004-07-02 Thread Sunder

 The Tempest argument is a stretch, only because you're not actually 
 recovering the information from the phosphor itself.  But the Pandora 
 argument is well taken.

Actually there is optical tempest now that works by watching the flicker 
of a CRT.  Point is actually even more moot since most monitors are now 
LCD based, etc. so there's no raster line scanning the display, etc...




Re: For Liars and Loafers, Cellphones Offer an Alibi

2004-06-28 Thread Sunder

One phone I'd like to recommend against is the SideKick.  I've no idea if 
it's got a GPS receiver or not - likely it doesn't need one since it's 
GPRS and can use tower timing as discussed before.

I'm recommending against it, because while I love the phone and its 
features, it's too big brotherish.  Example: if you write an email while 
it's out of range of a cell tower, and hit send, it will store the email 
into the Send folder.  If you then try to delete that email from the Send 
folder it will give you an error saying I can't do this right now because 
I need to first synchronize with the server.

Which means even emails you want to erase will be first sent to the 
server!

It does have an ssh client, a web browser, and an AIM client, but I use
these with caution, especially the SSH client.

It's also got a USB 2.0 plug and an IR transceiver, but I've not been able 
to make any use of either, nor seen any options to enable/disable them.  
For all I know the IRDA could always on and will talk to anyone, etc.


You don't own anything on this phone despite the appearance to the
contrary.


I was also considering Palm phones, but Palm OS is piss poor at memory
protection so any application can clobber/read/spy on any other, so if 
there's spyware in the code that talks to cell towers, you're at its 
mercy, and it can read anything you've got in it.



Re: Antipiracy bill targets technology

2004-06-21 Thread Sunder

On Fri, 18 Jun 2004, R. A. Hettinga wrote:

 http://news.com.com/2102-1028_3-5238140.html?tag=st.util.print
 
 CNET News
 
  Antipiracy bill targets technology

 A forthcoming bill in the U.S. Senate would, if passed, dramatically
 reshape copyright law by prohibiting file-trading networks and some
 consumer electronics devices on the grounds that they could be used for
 unlawful purposes.

What was that old saw that went Well, you're equipped to be a whore, but
you're not? again?  how about banning chainsaws, they can kill or main
people too and yes, cars, and trains, and airplanes, plastic shopping bags
without holes, belts, rope, wire, electricity, etc. they can all be used
to kill.  all of which is unlawful.
 
  The Induce Act stands for Inducement Devolves into Unlawful Child
 Exploitation Act, a reference to Capitol Hill's frequently stated concern

Um, remind me again, when exactly is it lawful to exploit children?  Oh, 
wait, that's right!  When they're in other countries, then, you can make 
them work in sweatshops producing Nike's, Levi's, GAP, etc. products... 
oh, sorry, I forgot.

  Foes of the Induce Act said that it would effectively overturn the Supreme
 Court's 1984 decision in the Sony Corp. v. Universal City Studios case,
 often referred to as the Betamax lawsuit. In that 5-4 opinion, the
 majority said VCRs were legal to sell because they were capable of
 substantial noninfringing uses. But the majority stressed that Congress
 had the power to enact a law that would lead to a different outcome.

so how soon before we ban paper and pencil? or keyboards, hands - 
because they can hold pencils or type, and eyeballs and ears, because they 
can see video and hear music?



Re: [osint] Assassination Plans Found On Internet

2004-06-14 Thread Sunder
Or it could just be agitprop meant to raise the theat level back up a 
notch, or provide more funding to the surveillance kitty.

On Mon, 14 Jun 2004, R. A. Hettinga wrote:

 At 10:45 PM +0200 6/14/04, Thomas Shaddack wrote:
 It may be also a very cheap method of attack.
 
 True enough.



Shoulder surfing for passwords by ear

2004-05-13 Thread Sunder
Hmmm, sounds like we now need keystroke sound jammers.  Shouldn't be too 
hard to implement if you have a good random noise generator, but it could 
get annoying if you play white/pink noise while a password prompt pops up.

Of course, there's still the issue of the pinhole camera in the ceiling 
tiles aimed at your keyboard, but that's old hat. :)

I wonder if different users hit the keys in a different enough way to make 
any difference...


http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci963348,00.html

'Whispering keyboards' could be next attack trend
By Niall McKay, Contributing Writer
11 May 2004 | SearchSecurity.com


OAKLAND -- Listen to this: Eavesdroppers can decipher what is typed by 
simply listening to the sound of a keystroke, according to a scientist at 
this week's IEEE Symposium of Security and Privacy in Oakland, Calif.

Each key on computer keyboards, telephones and even ATM machines makes a 
unique sound as each key is depressed and released, according to a paper 
entitled Keyboard Acoustic Emanations presented Monday by IBM research 
scientist Dmitri Asonov.

All that is needed is about $200 worth of microphones and sound processing 
and PC neural networking software.

Today's keyboard, telephone keypads, ATM machines and even door locks have 
a rubber membrane underneath the keys.

This membrane acts like a drum, and each key hits the drum in a different 
location and produces a unique frequency or sound that the neural 
networking software can decipher, said Asonov. 

SNIP



Re: Id Cards 'Will Protect Youngsters from Paedophiles'

2004-04-28 Thread sunder
Rgggh!  And posting your full name, address, phone number, date of 
birth, social security number, the account and expiration dates of all your 
credit cards + the 3 digit extra code on their backs, ATM card account # 
and the PIN, plus, several samples of your signature (optional) in JPEG 
format, and the code to your alarm system on your web page will prevent 
identity theft.

So, whaddayasay?  It's a fine bridge, lightly used, as you can see, it's 
got a lotta traffic between Manhattan and Brooklyn, I could sell it to you 
real cheap, 'cause you look like a nice guy and all, you know, you could 
make a fortune, setup a toll booth and all that.

R. A. Hettinga wrote:
Horseman #1, Terrorists: Check.
Horseman #2, Pedophiles: Check.
Next?
Cheers,
RAH
-
http://news.scotsman.com/print.cfm?id=2844122referringtemplate=http%3A%2F%2Fnews%2Escotsman%2Ecom%2Flatest%2Ecfmreferringquerystring=id%3D2844122
print  
close
Tue 27 Apr 2004

2:47am (UK)
Id Cards 'Will Protect Youngsters from Paedophiles'
By James Lyons, Political Correspondent, PA News
 Identity cards will help keep youngsters safe from perverts, Education
Secretary Charles Clarke claimed today.



Re: Airport security failures justify CAPPS-II snoop system

2004-04-28 Thread sunder
Meh, same old song:
NSA/CIA/FBI failed to prevent the WTC missile attacks, despite the billions 
of dollars they receive per annum, so guess what, they get rewarded with 
guess what kiddies, even more tax payer dollars!

Condoleeza Rice lies about a specific PDB, calling it historical and 
doesn't charged with perjury after said PDB is declassified.

Sibel Edmonds, a Turkish American with top security clearance, who worked 
as a translator at FBI HQ says that she saw information that proved top US 
officials knew months before 9.11.2001 that Al Qaeda planned to use 
airplanes as missiles, but isn't allowed to testify on grounds that it 
would compromise national security.  Damn right it would -  there should 
be riots in the streets over this, and those top US officials should be 
jailed for gross negligence causing the loss of 3000 lives.

NSA, CIA, FBI weren't allowed to share databases because of wisely thought 
out checks and balances to prevent privacy and other types of abuses, so 
they were thrown out, not that they really existed in the first place. 
(i.e. NSA isn't allowed to spy on US citizens, so it uses one of it's 
buddies, perhaps UK, or Australia to do the dirty work.)

Airport security fails, so Uncle Sam gets to spend even more tax payer 
dollars on TSA.  TSA fails, and instead of it being punished, its 
ineptitude gets rewarded by getting justification for more draconian laws, 
and even more tax payer cash... woo hoo!

R. A. Hettinga wrote:
http://www.theregister.co.uk/2004/04/26/airport_security_failures/print.html
Airport security failures justify CAPPS-II snoop system
By Thomas C Greene ([EMAIL PROTECTED])
Published Monday 26th April 2004 20:21 GMT
Recent government reports on the failure of American airport screeners to
detect threat objects at security checkpoints may provide ammunition for
proponents of the controversial Computer Assisted Passenger Prescreening
System (CAPPS II) database solution, which is currently stalled by myriad
snafus too numerous to mention.



Re: BBC on all-electronic Indian elections

2004-04-26 Thread sunder
Jack Lloyd wrote:
Still, I liked this quote: 'I came to vote because wasting one's ballot in a
democracy is a sin, he told the BBC.' Not too common a view in the US these
days, it seems like.
What do you expect when the previous choice we've had was between Al I 
Invented the Innnernet Gore, and George Nucular Dubbya?




Re: BBC on all-electronic Indian elections

2004-04-26 Thread sunder
Damian Gerow wrote:
Actually, Mr. Gore didn't once claim to invent the Internet.  Through
various mis-wordings and lax fact-checkings, the Mass Media came to
represent what he said through that phrase.
What he /actually/ claimed (and what he /actually/ did) was recognize its
importance, and then push for funding, in the 1980's.  So he didn't 'invent'
the Internet, he helped provide the funding for its inventors.
Yeah so what? I still wouldn't want to vote for him (except as a vote 
against Shrubbya)  Al's prise pig of a wife, Tipper, helped found the PMRC 
against lyrics in songs.  See Megadeth's Hook in Mouth for details on this 
censorious organization: 
http://www.songlyrics4u.com/megadeth/hook-in-mouth.html
and http://www.geocities.com/fireace_00/pmrc.html for details about the PMRC.





Re: Fact checking

2004-04-26 Thread sunder
Damian Gerow wrote:
Hey, I'm no fan of Tipper either.  And I'm not saying that Al Gore was a
/good/ choice.  But in retrospect, he probably would have been a lesser evil
than the current president.
THAT, ultimately is the meta-point.  You shouldn't have to vote for the 
lesser evil, but when your choice is so vastly limited, why even bother voting?

After the events involving Vince Foster, Lon It was self defense, she 
threatened me with her baby Hioruchi(sp?), Janet Reno, and Monicagate, 
Dubbya Jr. seemed the lesser of two evils.  Until 9.11.2001.  At that 
point, Gore clearly became the lesser of two evils, but by that time, it 
was far too late to see it.

How much of the public knew about the connections to Haliburton before 
election day?  How much of the public knew about the Project for a New 
American Century?  How much of the public knew about USA PATRIOT ACT and 
it's sequel?

What's missing is some sort of vote out of office mechanism, a big great 
Undo vote as it were.  There are no guarantees that if you vote for 
Scumbag #1 that s/he'll be less of a scumbag that Scumbag #2.

When more than half the country doesn't want to do something, it shouldn't 
be done just because congress and POTUS decides it's in their pocketbook's 
interest, but where's the mechanism to stop it?

Where's the recall vote?  Where's the oversight committee that says When 
you ran for office you promised X,Y,Z and you're half in your term and 
haven't delivered.

Where's the I want X% of my dollars to go to this issue, and 0% to go to 
that one option?

Elections where you only chose between evil #1 and evil #2, are an ironic 
joke, and the ones laughing their way to the bank aren't those with your 
interests in mind.



Re: What Should Freedom Lovers Do?

2004-04-26 Thread sunder
An Metet wrote:
In my devotion to freedom, I apparently go beyond the point where most
cypherpunks are comfortable, in that I support private initiatives and
technologies of all sorts and oppose government regulation of them.
I am a supporter and admirer of Microsoft, which has achieved tremendous
market success without relying on government support, indeed in the
face of steadfast government opposition.  I oppose government antitrust
efforts in general, and specifically those directed against Microsoft.
I agree with everything you've said in your post, including PRIVATE DRM 
measures, but, I disagree that Microsoft should be admired.

I've seen far too much evil emminated from Redmond:
* from outright theft of smaller companies' IP (i.e. Stacker),
* dumping (We'll help you migrate from Netware to NT 3.51 for free),
* FUD (GNU is communism and Anti-American),
* evil contracts (if you sell blank machines without Windows, you have to 
pay $X more for our software)
* stealth funding of SCO's lawsuit against IBM and linux end users,
* to lots of needless security holes - some even by design, (i.e. security 
is a checkbox as a marketing feature, or an afterthought: i.e. this chant: 
Active X! Active X! Format Hard drive? Just say 'YES!')

For the final one, I used to work at Earthweb, which ran Gamelan 
(pronounced gah-meh-lohn, not game LAN), a Java repository.  At one point, 
EW decided to start an Active X repository.  Some guy wrote an Active X 
browser component that shut off your machine if you clicked yes.  The 
component did exactly what it said it did, but it was a good example that 
it could have done something else.  Hence the Active X! Active X! Format 
Hard Drive? Just say YES! chant.

Let me tell you, Microsoft tried very, very hard to get us to remove that 
bit of code from the repository.  We didn't, because it did exactly what it 
claimed to do.

More financial damage has been done to the planet by Microsoft than good. 
Far too many sysadmin/developer hours were lost because of Microsoft.  You 
can certainly count the hours in lost human lives...  Hell, just add up the 
cost of each virus/trojan/worm outbreak which targets Outlook, Office, and 
Internet Exploiter.

Now don't get me wrong.  I'm not some knee-jerk Linux Good, Windows bad 
clueless geek wannabee.  I started out as a Novell Netware sysadmin. 
(Well, I started out as a coder, but fell into sysadming over time.)

When NT starting taking over, I picked it up and thought it was cool.  It's 
design was certainly revolutionary, and the NTFS was one of the best 
designed file systems I've seen, even to this day.  NT's borrow a driver 
from the server printing was beautiful.  User management via domains? 
Sweet!  Ok, not too much better than NIS, but hey, very nice. Active 
Directory?  Much, much mo'e better.  DHCP?  Great wonderful idea.  Gateway 
for Netware Services and Migration from Netware?  A bit scummy, but hey 
it's free with the server, might as well use it*.  File and Printer sharing 
for Macintosh?  Cool! - well, except for that one bug with the dancing 
icons back a few years ago...

(* Gateway Service for Netware allowed a scummy sysadmin to bypass the 
license limitation of Netware servers.  A single user from the NT server 
would login to the Netware server and proxy hundreds if not thousands of 
user requests.  You suffered in performance, but one of it's uses was to 
bypass licensing.  If you read NT's license it says something along the 
lines that you can't use another proxy this way against an NT server.)

Registry?  Hey, wonderful idea.  No, really.  Storing all your machine's 
settings in a single place and having a single editor (ok two of them) to 
control them was beautiful.  Just make sure you (can and do) back it up.

No, I'm not being sarcastic, if you know how the registry works, how to 
back it up, how to restore it, and how to repair it, it's a great thing - 
much better than lots of .ini, .rc or .conf files 
everyfuckingwherethankyouverymuch.  Ok, in unixen everything lives in /etc. 
 But which /etc?  /etc? /usr/local/etc? /usr/local/samba/etc? and the dot 
files in home directories?  ouch!  (A regular thing that I do is to backup 
all of /etc /usr/local/etc just to make sure I can restore them.  With 
Windows, you just run rdisk /s- and copy %SYSTEMROOT%\system32\repair.)

At the last job, we had a dead Exchange 5.5 on NT 4.0 server.  Its hardware 
died.  I worked for a shitty little dot com.  The guy admining it couldn't 
restore it.  We didn't have another motherboard that mached the drivers on 
that box, so we couldn't just move the hard drive over.  Know what I did? 
I merged the hardware related registry files from the sacrificial machine 
on the OS of the dead one to get it to boot, then hand reinstalled the 
network driver and a few other minor things like the video driver.  It's 
not so hard if you know what you're doing, and a registry isn't a bad thing.

All of the above features more or less 

Re: Fact checking

2004-04-26 Thread sunder
Damian Gerow wrote:
I don't give a flying fuck who you vote for, who the options are, what you
think of them, or even if they're convicted drunk drivers hell-bent on
converting the world to their belief system (...).

You, sir, are in great need of an enema.
*PLONK*


Re: Meshing costs (Re: Hierarchy, Force Monopoly, and Geodesic Societies)

2004-04-14 Thread sunder
Tyler Durden wrote:

Someone enlighten me here...I don't see this as obvious. I might 
certainly be willing to pay to route someone else's message if I 
understand that to be the real cost of mesh connectivity. In other 
words, say I'm driving down the FDR receiving telemetry about the road 
conditions downtown of me by a few miles. 
Um, just to point out the absolute obvious, if you're DRIVING you already 
have a power source, even if you have to use an inverter to power your 
notebook.  At that point you're not worried about worrying about spending a 
few miliamps on transmission here and there.  It doesn't matter at all 
whether or not there's a string of other you's ahead of you.   Having 
already paid for the tank of gas, the juice is free, and so should 
transmission - even routing of other users' data.

If you're in the woods, or at the beach, that's a different story.  :)
Ok, well, if you're at the beach, you could get a solar cell and geek away.
If I'm a router, I'm also 
sending that info behind me (which is routing I'm paying for basically), 
but I will understand that the reason I am getting my telemetry is 
precisely because there's a string of me's in the cars in front of me, 
routing info down to me. If I insist on getting paid, so will they, and 
the whole thing breaks down.

Actually, this reminds me of the prisoner's dilemma. I remember (I 
think) Hofstaedter doing an interesting analysis that showed that smart 
'criminals' will eventually realize that it pays to cooperate, even if 
that doesn't optimise one's chances in this particular instance.
Yup, can't have a network without nodes.

Of course, the battery lifetime acts as the weighting factor here...if 
only a small % of the traffic I'm routing belongs to me, then I may not 
be so willing to route it if my battery lifetime is short. As battery 
time lifetime increases however (though this sorely lags behind Moore's 
law) then more and more people will be willing to route.
In which case, you won't be to willing to transmit either since receiving 
costs you far less battery than transmitting.  In this case you're far more 
likely to store whatever you want to transmit for later - same as working 
offline with a mail user agent.




Re: Hierarchy, Force Monopoly, and Geodesic Societies

2004-04-11 Thread sunder
Jim Dixon wrote:

The term is used because most or all trees in the region where the English
language originated are shaped just like that: they have a single trunk
which forks into branches which may themselves fork and so on.  These
branches do not connect back to one another.
I believe the real issue here is one of being able to stretch your mind 
into seeing things from different points of view.  This is the reason I 
brought in the quasi-mystical quote about the sphere whose center is 
everywhere.

To see if you'd be able to go beyond your already rich knowledge and gain 
new benefit from another way of looking at it.  (IMHO, it's important to be 
able to change POV's at will, it keeps you flexible and able to learn new 
ways of dealing with data by conversion.)

In real life, the roots of a tree resemble it's branches buried 
underground, in an almost mirror image.  A tree that terminates where the 
trunk meets the ground would fall.  The only real tree resembling this, is 
one where logger's saw was applied. :)  So we're already not discussing a 
real tree.

The idealized mathematical definition of a tree doesn't quite a real tree 
any more than do B-Trees, B+/-Trees, nor red/black trees, or our debated 
friend, the internet.

The Internet doesn't resemble a tree at all.  It is characterized by many
cross-connections, which form cycles.  These are introduced deliberately
by network engineers, because tree-like networks are unreliable.  
Of course. It's called redundancy and its goal is to eliminate as many 
single points of failure as possible.  But from the point of view of one 
node talking to another, these aren't considered, I'll explain why.

Firstly, don't confuse cycles with redundancy for high availability.  These 
are two different things.

Let's explain why we have multiple connections and what types of these you 
can expect.  There are two common types of multiple connections:

A) Two links to the same ISP:  In terms of redundancy for the purposes of 
being fault tolerant, only one of the multiple links is ever used.  With 
most ISP's, when you negotiate a contract for a backup connection, it's 
with the understanding that you'll only use it when the main one goes down.

B) You have multiple connections to different ISP's (possibly with peering 
contracts, etc.)  In this case when a node at your location tries to 
contact some other node on the internet, it's traffic doesn't go over ALL 
of your connections - it takes only a single path.  [Ok, if your routers 
are correcting for an outage, then perhaps you'll see different paths being 
taken, but this is just the routing tables/routers settling or converging.]

If both case A and case B, a single node in your location will see the 
entire internet as a tree with the root of that tree being the default 
gateway.  (i.e. go back to doing traceroutes.)  In the case of a 
multi-homed machine, or machine that participates in routing, it itself 
becomes the root of the tree.

There are other cases but those are rare, and likely flawed.

Now on to cycles and the whole reason for this debate:

The whole point of many/most routing algorithms is to GET RID OF cycles. 
After you've done this, you're left with a tree.

Loops/cycles are so anathema to the workings of tcp/ip, that one of the 
fields in IP packets has been added to help eliminate: the TTL.  The only 
reason for a TTL value is to prevent packets that are going around in 
circles from congesting all the routers involved in the loop.  (Only later 
did traceroute exploit this into helping provide you with a map of where 
your packets went.)

This is why EIGRP, RIP, etc. use various mechanisms to explicitly prevent 
routing loops (and BGP to aggregate routes.)  Routing loops are damage, 
they are by definition not desirable.

At the data link layer (switches/hubs), this is why you want to use the 
Spanning Tree Protocol.  Notice that name: Spanning *TREE* Protocol.  After 
STP is done, you're left with a data link layer -TREE - not a cyclical 
graf.  STP is even more important for LAN's than on the internet since 
there's no TTL on ethernet frames:  a single broadcast, were it to be 
allowed to loop, could saturate your switches to the point of killing your LAN!

What all this says to me is that a cycle is a circle, and that failover/ 
parallel links should be collapsed (and are by routing protocols) to a 
single link.

Once you eliminate cycles, and you do so in real life, you go back to a 
tree.  You only see the alternate paths used when failover or routing 
errors occur.

Yes, I agree with you, if your POV is The Big Picture above from space, 
which includes all links, even the unused redundant ones, it's certainly 
not a tree.

At the same time, I also disagree with you.  If your POV is a single host, 
it sees the internet as a tree.  In fact, one of the properties of trees is 
that you pick up any leaf node and designate it as the root.  (Doesn't 
work too well on a B+Tree when you're 

Re: BBC: File-sharing to bypass censorship

2004-04-11 Thread sunder
Justin wrote:

This is one nation under God (the Christian God), or haven't you
noticed?  If the Christian Right thinks God doesn't like something, it's
not Constitutionally protected.
Even worse, I've once heard a coworker explain to me why Bush doesn't give 
a rats ass about the environment: just like the impromptu pilots who 
learned how to fly, but not land, Bush and Crew believe that this world is 
theirs to do with as they wish, and that pollution isn't important - so 
what if thousands die of cancer, so long as they earn a place in their idea 
paradise.

Yes, between the flat-earther's, witch burners, jihadists, and other nuts, 
religion certain has had a wonderful influence on humanity.



Re: Hierarchy, Force Monopoly, and Geodesic Societies - the internet is a tree.

2004-04-10 Thread sunder
Jim Dixon wrote:

Yes.  I know what a tree is, and I am quite familiar with structure of
the Internet.  These very pretty pictures certainly look like the Internet
I am familiar with, but don't resemble trees.
It is a tree. I'll give you a hint.  Think of this:

God is like an infinite sphere, whose center is everywhere and 
circumference nowhere.  Nicholas of Cusa.

It is a tree, but to see it, you'll need to find the root.  The quote above 
is a hint to where the root is.  Replace god with internet, sphere with 
tree, infinite with 2**32 (at least until it goes to ip6.)

So where's the root?  Scroll down for the answer.

 |
 |
 |
\ /
 V
























Did you see it?  No??? It's actually right infront of you.

Still don't know?  Ok then, keep scrolling down.































The root of the internet is your own internet connection.  Proof: If you 
were to iterate traceroutes over the entire ip4 space (good luck doing that 
by the way), and graph the results, you'd get a tree.  It's root is your 
default gateway.

:)



Re: VPN VoIP

2004-04-10 Thread sunder
Eugen Leitl wrote:
I've been installing a Draytek Vigor 2900 router at work lately, and found a
line of models which do VoIP (router with analog phone jacks on them). They
also support VPN router-router, and come with DynDNS clients. I thought I've
seen VoIP over VPN being mentioned, but I can't find it right now.
I've not seen, nor played with any of these, *BUT*, heed this warning
which applies to all devices (and software?) that are 1) closed source and 
2) offer some useful service which you'd be tempted to place inside your 
network, 3) are allowed to communicate with the outside world.

I would highly suggest that if you chose to use one of these that you do so 
from a DMZ in your firewall to be safe.  You don't know what OS/firmware 
lives there and whether it can be used via the VOIP network to spy on your 
internal network.

You might need to add another NIC to your firewall, and depending on what 
else this needs, you might also need to provide a DHCP server for it.  Set 
the firewall rules to make sure no packets from this device can go into 
your internal network.  EVER.

Don't just say, Well this thing is its own router, it does VPN, it has a 
firewall (does it?) I can trust it.

There will likely be features which it provides (perhaps a voice 
mail-email gateway?) which will tempt you to place it on the inside 
network instead of a DMZ.  Don't!  Find a way to secure your network and 
still provide for such features.

[Or, if you use these boxes inside a corporate environment and actually 
care about this level of security and want several of these to talk to each 
other, build another network just for them.  Depending on your needs, I'd 
also say, don't let them talk to the outside world, but if you do that, 
only nodes inside your VPN's will be able to communicate over VOIP.]

If you trust this thing to do VOIP, enjoy, (Accepting possible spying on 
your phone calls by LEO/intel agencies, etc.) but don't trust it enough to 
put the ethernet end of it on your internal network.  You never know when 
some bright kid takes one of these apart, disassembles the firmware and 
finds a backdoor to use against you.

Why the tin-foil sounding rant?  See yesterday's slashdot regarding the 
recent hardwired backdoor account in a Cisco Wifi router which has been 
exposed resulting in a call for a firmware update.  You can bet that Cisco 
simply changed the backdoor password/hash instead of eliminating it.  If 
they're not too scummy, they only made it harder to find:

http://yro.slashdot.org/article.pl?sid=04/04/08/1920228mode=threadtid=126tid=158tid=172tid=99



Re: The Gilmore Dimissal

2004-03-30 Thread sunder
93:

One of the nice things about ignorance is that it is curable.  Unlike 
Neo-Conservatism.
Or more accurately - Neo CONfidence artist.  Would be nice to turn those 
into NEO convicts, but we may as well dream of a free country.

Many, many, thanks go to Richard Clarke for exposing the truth we all 
suspected.

So, I'm not quite current about the Gilmore dismissal - is the subject line 
misspelled?  Is there some URL regarding news of this?  I take it from the 
gripes that John's lawsuit against Asscruft re: flying without ID was 
dismissed?




Re: Saving Opportunistic Encryption

2004-03-17 Thread sunder
Eugen Leitl wrote:

No, anything requiring publishing DNS records won't fly. OE is
*opportunistic*. It doesn't care about what the true identity of the opposite
party is. Any shmuck on dynamic IP should be able to use it instantly, with
no observable performance degradation, using a simple patch.
If it doesn't fit these minimal requirements, it will die, just the same way
FreeS/WAN did.
I absolutely agree.  While it's possible to do things like MIM attacks if 
you don't know who the other guy is, look at how successful SSH is over any 
other kind of solution.  Its biggest competitor at the time it was 
introduced was kerberized telnet/ftp.  How many networks do you know that 
use Kerberos instead of ssh these days?

Look at how many folks use PGP - those who really know it and want it, or 
those who know enough about it and have some easily automated 
implementation that plugs in to their mail client. (i.e. commercial pgp 
with Eudora/Outlook plug in.  As an aside, I'm still pissed off that the 
Mozilla mail client doesn't support PGP/GPG in addition to S/MIME or 
whatever the hell..)

Adding another infrastructure requirement that requires ISP layer changes 
will exponentially raise resistance to its adoption.  While I do run my own 
server for mail/web, 99.9% of the internet luser population doesn't - and 
even so, I chose not to run my own DNS server.  (Allowing register.com to 
do so makes it safer for me: it's one less service that might be 
compromised due to possible bugs.)

Making it optional to add that infrastructure layer - whether it's via DNS, 
LDAP, signed public keys, web o' trust / pgp keyserver, finger, or even 
something entirely new, is probably the safer way to go, BUT don't require it.

There do exist transparent web caching proxies out there (usually 
advertised as web accelerators.)  I ran across such a few months ago when 
our satellite office couldn't connect to one of our servers.  We were using 
private dns virtual host names to access management web pages on our 
servers.  However the proxy intercepted those requests, and tried to 
resolve DNS, but obviously couldn't, so everyone in the office got a DNS 
error.  It took some pretty strong words to get the ISP to even admit that 
they were using such a beast, much less disable it just for us.

It's certainly possible to create a proxy to do MitM interception that 
would foil even SSH.  This wouldn't work so well against mobile devices 
which might fortuitously use a different route, but would work very well 
one hop above the server if that's the only pipe the server has.

There are ways to protect against this such as publishing a line for the 
known-hosts entry by other means, but no one does this (yet?)  (i.e: 
sneakernet, finger, web page, pgp signed/encrypted email, over the 
telephone, etc.)   (Another useful thing is to use public keys for SSH 
instead of passwords: this way the attacker won't be able to reuse your 
password - but you're still compromised the second you login.)

There are some rare cases where you absolutely want to know who you are 
talking to.  For example an https server that allows control of financial 
data.  Even in that case the server doesn't fully know who the client is, 
and doesn't need to (in order to establish the secure link) -- until a 
login (or CC info) is presented.  In the case of using OE to talk to a 
server, the client already has some idea of the server's identity, and the 
server will eventually have some idea of who the client is.

As an aside: Just doing the above to encapsulate emails won't help at all 
against spamming: the spammers will just randomly generate throw away 
public keys, etc.  They've already written trojan spammers with their own 
SMTP servers built in, it's only a few more (thousand?) lines of code to 
incrementally bypass that layer as well.

I've already seen a few years ago spam sites that return yahoo.com and 
msn.com in reverse DNS, but doing traceroutes reveals that they're 
actually in Korea or China, etc.  So you can't fully rely on (spoofable) 
DNS info anyway.

If any of you remember the recent virii attacks where the attachment is a 
password protected zip file with the password in the body of the email, 
guess what: the evil ones kicked it up a notch once more.

Just yesterday, I saw a new form of this on cpunx: instead of a ZIP 
attachment, the new malware uses a RAR archive, and instead of the password 
being in clear text, it's inside an a randomly named attached .GIF file! 
They've not obscured it, so it's possible to add OCR to the anti-virus 
code, but it's now it's that much harder for the anti-virus to block.

Just as the virus authors evolve their code to adapt their offenses to the 
defenses of virus scanners, so will the spammers evolve their code to 
bypass spam filters, and we've already seen that spammers use virii/worms 
to spread their code...

Distributed computing is already here.  Shame that it's biggest use is 
currently for evil. 

Re: 'Special skills draft' on drawing board

2004-03-15 Thread sunder
So is this Uncle Sam's way of getting good workers for no pay?  You could 
expect the same kinds of skills to bring in several hundred dollars per 
hour in the .mil consulting sphere...

Huh... So working from January to April/May to pay one's tax burden isn't 
enough service to the republic anymore? (where tax burden = billions wasted 
on the Iraq/Afghanistani wars, overthrowing elections in Argentina, causing 
riots in Haiti and Africa, etc.)

Now they're resorting to what pretty much amounts to slavery?  How soon 
before .gov just absorbs Exxon, IBM, Sun, HP, Haliburton, Bechtel and all 
of interest directly? How soon before .gov comes out of the fascism closet 
already and announces itself for what it really is?

Bah! I may as well learn to flip burgers and ask if fries will be part of 
the order today...  being a sysadmin isn't getting me employed anymore 
anyway.  :(



R. A. Hettinga wrote:

http://sfgate.com/cgi-bin/article.cgi?file=/c/a/2004/03/13/MNG905K1BC1.DTLtype=printable


www.sfgate.com

 'Special skills draft' on drawing board
 Computer experts, foreign language specialists lead list of military's needs
 Eric Rosenberg, Hearst Newspapers
 Saturday, March 13, 2004
)2004 San Francisco Chronicle | Feedback | FAQ


URL: sfgate.com/cgi-bin/article.cgi?file=/c/a/2004/03/13/MNG905K1BC1.DTL

 Washington -- The government is taking the first steps toward a targeted
military draft of Americans with special skills in computers and foreign
languages.



Re: I'd recognise that ear, anywhere

2004-03-11 Thread sunder
This is old news.

No, really, I'm not channeling Mr. May and telling you to hit the 
archives...  A few years ago, this was a topic here, and the outcome was 
that cypherpunks should wear their hair long so as to cover their ears. 
Kinda goes with the long hair - 10 gallon hat kinda look. :)

I believe the INS requires pictures at 45 degrees for green cards, but not 
passports(???), so that they can see one ear (or enough of it to use as ID) 
so it's quite likely that somewhere some black budget project likely 
already made leaps into this technology, and that this is possibly just 
another example of a university doing stuff that the spooks have already 
done 10 years ago - or whenever...



R. A. Hettinga wrote:

http://www.theregister.co.uk/content/55/36106.html

The Register

I'd recognise that ear, anywhere
By Lucy Sherriff
Posted: 09/03/2004 at 10:11 GMT
 
 Never mind retinal scans, finger printing or facial recognition: we'll
have our ears on a national database, soon.



Re: Fwd: Re: Don't Panic - Not All Jobs Are Headed Overseas

2004-03-03 Thread sunder
R. A. Hettinga wrote:

Any keyboard job can be shipped overseas, including engineering (CAD),
XRAY and MRI analysis/interpretation.
If you really think about CEO, CFO, CIO jobs can ALL be exported to India 
, and there won't be anything to stop the boards of major companies from 
doing that.

India's not even the end all of outsourcing - there's nothing special about 
India that some other third-world country couldn't do at lower prices once 
enough of their populous is trained to speak almost accent free English and 
to pretend their names are Joan Sanchez from Ohio...  Once there is cheap 
labor, cheap telepresence with enough bandwidth to do the job, even a boat 
parked 30 miles off the muddy shores of East Elbonia would work.  The 
occasional air trip would be needed to slap skin with a few people here and 
there, but  it's not always required...

After all, the CEO usually reports to the board and is working for the 
board's best interests, not necessarily for the company's best interests.

Most of the .com's I've worked at, the CEO was hired to do one single 
thing: pump up the image of the company to make it look like a big jucy 
steak when it was all crap internally, then sell the turd off to a sucker. 
 This of course results in the immediate job loss of 90% of the employees, 
etc.

(That of course isn't the case where the CEO is a founder and has reasons 
other than stock price to run the company.)

Ok, that's a wet dream I suppose... but there's very little reason why 
those jobs can't be outsourced.  Toward the end of the dot bomb era, there 
were a few companies offering part time temporary Cxx's for a fee because 
it was hard for the .com's to find brand name well known CEO's, etc.  So if 
they can be bought by the hour part time, (cultural, accent issues aside) 
no reason that they have to be physically in the US.



Re: Virus with encrypted zip file - Important notify about your e-mail account.

2004-03-03 Thread sunder
Interesting virus - anyone know what this one is called and what it's 
payload does?  Haven't seen this one before today...

It attaches a zip file with a password containing an executable.  (No 
worries, I've not run it, and only extracted it on a SPARC machine, so it 
can't use buffer overflows designed for intel in unzip -- if any exist.)

I've seen several of these from various cypherpunk nodes, and initially 
thought someone was attacking cypherpunks nodes again...

So what it is likely grabbing the domian name and capitalizing the first 
letter and inserting The and team. around it to make it look like it's 
from the ISP...  It's also using various random reasons (mailbox is full, 
spamming, account about to expire, account abuse, can't go out with you 
tonight, have to wash hamster's hair, etc.)

Interesting that a virus would use an encrypted ZIP file.  Of course it 
does a dumb thing in terms of security purposes of sending the password 
with the attachment.  Certainly that isn't something a security wise person 
would do, *BUT* the true purpose of this ploy is likely an attempt for it 
to get past virus scanners which demime/unzip files through multiple 
layers, and would be able to detect the attachment is malware.

So this thing is probably carrying code to ZIP+encrypt files as well as 
MIME and possibly it's own SMTP client...  Pretty amazing for a 12K 
binary...  Well, not really. :)  I guess I'm used to seeing bloatware like 
Office 2000 - oh, yeah, forgot, MSFT products are virii..  :-D

Many, many, years ago, I recall there were polymorphic virii which 
encrypted their main body, but used various methods to build the extractor 
such that you (as an antivirus writer) couldn't easily get signatures from 
the extractor portion.  I believe they used permutations of opcodes which 
did the same thing under x86, but enough random combinations to prevent 
getting a useful virus signature.

It probably won't be long before we'll start seeing those again in modern 
virii...

Certainly email virus scanners shouldn't allow .EXE - even if inside of 
.ZIP archives anyway, but it's still interesting to see how the evil virus 
writers find new ways to push their crud on the  If it's got dancing nude 
hippos, I'll click on it gladly, safety be damned sheeple.  Now it's just 
exploiting the I'll obey any instruction from any so called authority if 
you throw in the magic word 'reasons of security' in it.

What's really funny to me personally is that at my last job we were asked 
to send self decrypting PGP EXE's that contained the actual data to clients 
who didn't have PGP, and wouldn't know it from a hole in a wall.  We'd then 
tell them the (usually lame) password over the phone.  If any of those 
clients receive one of these, I can absolutely guarantee that they'll open 
it and spread this evil crap.

A virus pretending to be [EMAIL PROTECTED] wrote:

For security reasons attached file is password  protected. The password is 10361.

Kind regards,
The Minder.net  teamhttp://www.minder.net



Re: Microsoft Plans Biometric ID Cards

2004-02-25 Thread sunder
No doubt such a card will automatically be linked to a Microsoft Passport 
account, Microsoft Wallet, etc. to make sure that the violation of your 
privacy can continue  unhindered.

No doubt, the 2nd step will be to either add an RFID chip inside it plus a 
reader on the PC... Or setting the next Microsoft PC spec to include a 
barcode/RFID reader on the PC.  (Or perhaps this is already in the spec, 
just not advertised?)

Then you'll need to login with the card, and activating Windows XP, etc. 
will require the card; all Office documents will be signed/stamped with a 
GID that matches said card, etc...  Hell, it might as well be your SSN... 
After all, continuing abuse of the social security numbers meets all 
Microsoft criteria for such a thing: it's a sensitive number, that when 
handled in an unsecure way (Microsoft's modus operandi, of course) it's 
guaranteed to open you up to ID, financial, and privacy theft...

That said, Backdoor* Billy Gee is about two and half years late to share 
the feed through at the scummy emperor of privacy invasion:

You see, both Larry I wear a kimono Ellison, and Scooter (formerly known 
as the The Dot in dot com CEO) both had immediate wet dreams of a 
national ID card right after 9.11.2001.  Of course, the former wanted it to 
involve Oracle, the latter wanted it to be on a Java smartcard...  uh huh...

Yes, we all know great government issued ID's worked to prevent the 
disposable terrorists of 9.11.  I'm sure that the Microsoft ID will work 
even better in making us just even more secure.

* Secure is a newspeak marketing feechure checklist item which is to be 
translated the same way as the word love in Ministry of Love, the word 
peace in the Ministry of Peace, the word truth in the Ministry of Truth.

* Backdoor in this case refers not to Billy's preference of human 
interaction, but rather to the 'More Secure than before' feature of 
Windows XP which was made famous by various trojans, worms, and other 
self-replicating bits of code.

R. A. Hettinga wrote:

http://www.cbronline.com/print_friendly/b6e1a01bb2c038c380256e450038609e

DATE: 25/02/2004
Microsoft Plans Biometric ID Cards



Re: U.S. in violation of Geneva convention?

2003-12-19 Thread Sunder

That all depends on your definition of sovereign.  After all, we put, or
at least helped, that monster into power.  No different an action than we
the many times before putting tyrants into control of small, but important
nations under the guise of protecting democracy.  

So, while he was our puppet, he was the good guy, and no matter how many
he murdered, he was a benevolent leader.

Once he turned on our interests, he was no longer useful and had to be
removed.  It just took Jr. to do it.

Now, we'll put a different democratic government in place.  Of course,
it won't be as free as the USA, nor have the same kind of constitution -
that would be a problem since we couldn't control it's oil.

Nothing new, nothing to be surprised about.  We couldn't give a fuck
less if Sadam was given an anal probe on TV, or if he was put in the
colliseum for donkeys to use as a sex toy, as in Roman times.  As
entertaining as it would be for some, it's utterly unimportant.

Pax Americana will march on.  We have their oil - we can throw some crumbs
to some other friendly countries of the COW, and lesser crumbs to those
who complained, but the rest is just meaningless green colored icing on
the cake.

The war on terror itself will go on for as long as the voters will
tolerate it, or until it's true goals succeede and it becomes impossible
for the voters to do anything but accept it - or be disappeared in the
middle of the night...  Not much different than in Stalin or Hitler's
days.

Perhaps a democrat will make it back in power again, but that too is
meaningless, as the infrastructure for the super surveillance, terror
police state is already in place and won't likely go away.  It no longer
makes a difference, even if a few of the teeth of the DHS are
removed... people will still be disappeared in the middle of the night,
warantless searches, secret shadow trails, et al.


--Kaos-Keraunos-Kybernetos---
 + ^ + :25Kliters anthrax, 38K liters botulinum toxin, 500 tons of   /|\
  \|/  :sarin, mustard and VX gas, mobile bio-weapons labs, nukular /\|/\
--*--:weapons.. Reasons for war on Iraq - GWB 2003-01-28 speech.  \/|\/
  /|\  :Found to date: 0.  Cost of war: $800,000,000,000 USD.\|/
 + v + :   The look on Sadam's face - priceless!   
[EMAIL PROTECTED] http://www.sunder.net 

On Thu, 18 Dec 2003, J.A. Terranson wrote:

 On Thu, 18 Dec 2003, Jim Dixon wrote:
 
 huge snip
 
  The evidence points to deep ties between Russia, France, and Iraq that
  goes back decades, plus somewhat weaker ties to China and Germany.
  Relations between the US and Baath-controlled Iraq were bad from the
  beginning; American bodies dangling from ropes in Baghdad were not
  the beginning of a great romance.
 
 And all of this is meaningless: we simply had no right to invade a foreign,
 *sovereign* nation.




RE: e voting (receipts, votebuying, brinworld)

2003-11-25 Thread Sunder
Um, last I checked, phone cameras have really shitty resolution, usually
less than 320x200.  Even so, you'd need MUCH higher resolution, say
3-5Mpixels to be able to read text on a printout in a picture.

Add focus and aiming issues, and this just won't work unless you carry a
good camera into the booth with you.

--Kaos-Keraunos-Kybernetos---
 + ^ + :25Kliters anthrax, 38K liters botulinum toxin, 500 tons of   /|\
  \|/  :sarin, mustard and VX gas, mobile bio-weapons labs, nukular /\|/\
--*--:weapons.. Reasons for war on Iraq - GWB 2003-01-28 speech.  \/|\/
  /|\  :Found to date: 0.  Cost of war: $800,000,000,000 USD.\|/
 + v + :   The look on Sadam's face - priceless!   
[EMAIL PROTECTED] http://www.sunder.net 

On Mon, 24 Nov 2003, Major Variola (ret) wrote:

 Vinny the Votebuyer pays you if you send a picture of your
 face adjacent to the committed receipt, even if you can't touch it.
 Since the voting booth is private, no one can see you do this,
 even if it were made illegal.  (And since phones can store images,
 jamming the transmission at the booth doesn't work.)
 
 You send your picture from the cellphone that took it, along with a
 paypal
 account number as a text message.



Re: Partition Encryptor

2003-11-17 Thread Sunder
Which only works on win9x, and no freeware updates exist for Win2k/XP/NT.
i.e. worthless...

There is this, but it too isn't free: http://www.pcdynamics.com/SafeHouse/


--Kaos-Keraunos-Kybernetos---
 + ^ + :25Kliters anthrax, 38K liters botulinum toxin, 500 tons of   /|\
  \|/  :sarin, mustard and VX gas, mobile bio-weapons labs, nukular /\|/\
--*--:weapons.. Reasons for war on Iraq - GWB 2003-01-28 speech.  \/|\/
  /|\  :Found to date: 0.  Cost of war: $800,000,000,000 USD.\|/
 + v + :   The look on Sadam's face - priceless!   
[EMAIL PROTECTED] http://www.sunder.net 

On Sun, 16 Nov 2003, Major Variola (ret) wrote:

 At 11:45 AM 11/16/03 -0500, Stirling Westrup wrote:
 Does anyone know of a good partition encryptor for Windows? I know of
 an
 accountant who would like to encrypt her client's financial data. She's
 stuck
 with Windows until such time as a major company starts shipping yearly
 tax
 software for linux.
 
 Look into Scramdisk.  It works fine.  Free, open source AFAIK.
 You can store  run your tools (eg email client) from the
 encrypted virtual partition easily, as well as store data.
 



Re: Gestapo harasses John Young, appeals to patriotism, told to fuck off

2003-11-10 Thread Sunder

Not scared, hungry.  They're looking for more collars they can throw in
jail so they meet their quotas.

--Kaos-Keraunos-Kybernetos---
 + ^ + :25Kliters anthrax, 38K liters botulinum toxin, 500 tons of   /|\
  \|/  :sarin, mustard and VX gas, mobile bio-weapons labs, nukular /\|/\
--*--:weapons.. Reasons for war on Iraq - GWB 2003-01-28 speech.  \/|\/
  /|\  :Found to date: 0.  Cost of war: $800,000,000,000 USD.\|/
 + v + :   The look on Sadam's face - priceless!   
[EMAIL PROTECTED] http://www.sunder.net 

On Sat, 8 Nov 2003, Anonymous wrote:

 Cryptome received a visit today from FBI Special Agents Todd Renner and Christopher
 Kelly from the FBI Counterterrorism Office in New York, 26 Federal Plaza, telephone
 212) 384-1000. Both agents presented official ID and business cards.
 
 Good stuff. Pigs getting concerned about cryptome means they are scared.
 



Re: If you DON'T use encryption, you help the terrorists win

2003-10-30 Thread Sunder

The push to do that should be aimed at the MTA authors and package
organizers.  If you can get it turned on by default, you're half way
there.  Last time I tried to fuck with this on qmail, I had to patch qmail
to support it.  Not something I'd like to do again - hopefully it's
changed a bit.  

From 1st hand experience - it is indeed a pain in the ass.

But if you can get the big projects to turn it on by default for all/most
of the MTA's, then you can push the bigger fish to do so as well.  I'd
start with OpenBSD - they're likely to be friendlier to the idea.  Then
you can push FreeBSD, NetBSD, RedHat Linux, Mandrake, and so on...  Then
the MTA authors, then Solaris (which seems to be bent on copying whatever
Linux does) and so on

Strangely enough, I recall that of all the entitites, out there MSFT had
implemented some sort of secure SMTP in somne version of IIS.. like
4.0...  Not sure about Exchange and its ilk...


--Kaos-Keraunos-Kybernetos---
 + ^ + :25Kliters anthrax, 38K liters botulinum toxin, 500 tons of   /|\
  \|/  :sarin, mustard and VX gas, mobile bio-weapons labs, nukular /\|/\
--*--:weapons.. Reasons for war on Iraq - GWB 2003-01-28 speech.  \/|\/
  /|\  :Found to date: 0.  Cost of war: $800,000,000,000 USD.\|/
 + v + :   The look on Sadam's face - priceless!   
[EMAIL PROTECTED] http://www.sunder.net 

On Wed, 29 Oct 2003, Eugen Leitl wrote:

 On Wed, Oct 29, 2003 at 11:28:08AM -0500, Sunder wrote:
  The biggest hurdle and the thing that will have the most effect is to have
  every MTA out there turn on Start TLS.  It won't provide a big enhancement
 
 For the record: it's unreasonably difficult (for a pedestrian
 sysadmin such as me) to set up StartTLS. Debian unstable ships
 with postfix-tls (albeit not installed as default), but apt-get install
 postfix-tls
 doesn't take care of the self-signed cert generation, and setting up
 /etc/postfix/main.cf for StartTLS support.
 
 It would be a most cypherpunkly undertaking to get that package to do that.
 (I have no idea how Debian packages work, unfortunately).




Support the Bush-Orwell '04 campaign!

2003-10-24 Thread Sunder

http://www.cafeshops.com/grandoldparty/76732


--Kaos-Keraunos-Kybernetos---
 + ^ + :25Kliters anthrax, 38K liters botulinum toxin, 500 tons of   /|\
  \|/  :sarin, mustard and VX gas, mobile bio-weapons labs, nukular /\|/\
--*--:weapons.. Reasons for war on Iraq - GWB 2003-01-28 speech.  \/|\/
  /|\  :Found to date: 0.  Cost of war: $800,000,000,000 USD.\|/
 + v + :   The look on Sadam's face - priceless!   
[EMAIL PROTECTED] http://www.sunder.net 



Re: Software protection scheme may boost new game sales

2003-10-13 Thread Sunder

Ok, so I finally bothered to read said article.  I assumed that they had
something interesting that made it look to the error correction code like
a scratch, etc... They don't.  No such weakness exists in error correction
used on CD's.

Their protection is no more than putting bad error correcting codes on
sectors, and when a CD copier is used, the error correction is
corrected, but the software can detect that this is a copy.  No different
than current game protection (no different than the commodore 64 days
either)...

The new new thing aspect of it is that the copied game continues to run,
making the guy doing the backup think he's got a good copy, but it slowly
degrades itself.  Degrade, but not in the sense of CD rot or scratches.

So for a few hours(?), it's playable, but then it starts to no longer
respond to user commands properly, and so it becomes a marketing tool.  
The luser will think it's worth buying their own copy after getting
addicted to the game.

So the rub, is that copies are allowed to be made, but unless cracked, the
copies are nothing more than time limited demos.

The only way that this could work is if they put up some sort of splash
screen at some point to let the luser know that the program isn't buggy,
but that the copy protection noticed it's a backup.  After all, if you get
a copy of a game from a friend, and it crashes on you all the time, would
you think it's because the copy is bad, or because the software is as
buggy as a Microsoft product?


As usual, the real loser is the original purchaser, because if he
scratches his CD, he's out $50-$70 or whatever games cost today, and he
can't make backups.


--Kaos-Keraunos-Kybernetos---
 + ^ + :25Kliters anthrax, 38K liters botulinum toxin, 500 tons of   /|\
  \|/  :sarin, mustard and VX gas, mobile bio-weapons labs, nukular /\|/\
--*--:weapons.. Reasons for war on Iraq - GWB 2003-01-28 speech.  \/|\/
  /|\  :Found to date: 0.  Cost of war: $800,000,000,000 USD.\|/
 + v + :   The look on Sadam's face - priceless!   
[EMAIL PROTECTED] http://www.sunder.net 

On 12 Oct 2003, Steve Furlong wrote:

 On Sat, 2003-10-11 at 15:55, Tim May wrote:
 
  As the saying goes, the lessons of the past are learned anew by each 
  generation...
 
 And each generation invents sex, too.
 




Re: [linux-elitists] LOCAL Mountain View, California, USA: events this week (fwd from schoen@loyalty.org)

2003-10-13 Thread Sunder
Tell Intel simply: We don't want no Scumware Inside  We won't buy NGSCB
crippleware.

Want to sell motherboards?  Don't include this shit.  Keep it simple.


--Kaos-Keraunos-Kybernetos---
 + ^ + :25Kliters anthrax, 38K liters botulinum toxin, 500 tons of   /|\
  \|/  :sarin, mustard and VX gas, mobile bio-weapons labs, nukular /\|/\
--*--:weapons.. Reasons for war on Iraq - GWB 2003-01-28 speech.  \/|\/
  /|\  :Found to date: 0.  Cost of war: $800,000,000,000 USD.\|/
 + v + :   The look on Sadam's face - priceless!   
[EMAIL PROTECTED] http://www.sunder.net 




  1   2   >