It seems that time has come to do some serious interface rethinking.
The advent of WIPO/DMCA ideology and it's steady infiltration into actual
technology is starting to render traditional protection-busting schemes
ineffective. It is or will soon become illegal and also technically difficult
to m
>And to never write the way poets do, oddballs do, gibbering
>idiots do, for that will allegedly diminish the value of your
>writing the way the payers want you to write, that is to
The language is extremely powerful. Many do not realise that, so, to follow
anon's analogy, VB-heads keep on dronin
> This is terrible news. It means that any clueless law enforcement
> person or affiliate can become an instant script kiddie.
Exactly my point. Exellent news.
This is the best motivator that strong crypto/security/anonymity will ever get.
I hope that it will be automated to the point where sof
> Abortion is up to the parasitised, no one else.
It's up to whoever can exert means of controlling it. Check the history books.
Oh, you meant in the abstract, libertrarian sense ?
> A doctor can pass your medical records onto another medical corporation
> if they sell their practice. You prob
Just a thought ...
This "Chinese hacker" threat could be a hoax.
After all, it is the ideal threat to the state. No one can prove od disprove
anything, and all positive effects from the "threat" are present.
I am sure that sheeple will accept net-regulating laws much easier after "evil
Chinese
> The best name (cypherpunks) seems to be taken. Hmm. I will
> have to consider. The naming of things is a ticklish business.
"cypherpunken"
__
Do You Yahoo!?
Get email at your own domain with Yahoo! Mail.
http://personal.mail.yahoo.com/
There is something deeply disturbing here (3 hat thing)
http://channel.NYTimes.com/2001/04/10/science/10MATH.html
that will possibly lead to a generic solution for Feistel
nets.
__
Do You Yahoo!?
Get email at your own domain with Yahoo! Mail.
http
--- Norm DePlume <[EMAIL PROTECTED]> wrote:
> choice excerpt: Information compiled
> by the Border Patrol on
> PAL users is confidential, and
> federal officials are
> concerned about ot
In the test lab for USA future, C is becoming a controlled substance.
>From http://www.ntk.net/ :
More cut-and-pasting from ukcrypto, Britain's last remaining form of
parliamentary oversight. This week: the government's plans to require
all security consultants to register with the authorities,
--- Bill Stewart <[EMAIL PROTECTED]> wrote:
> It's been 30 years since I read The Time Machine,
> but didn't the Eloi only have 1 L in their name?
Yeah, I know. Got pissed off after finding out that *ALL* fictious and
real names are taken.
> If you care, find an anonymizer to read your webmail t
--- Ken Brown <[EMAIL PROTECTED]> wrote:
> Physical anonymity is getting harder, but it's less hard in big cities.
> There are a lot of anonymous people in cities. Those guys you see
> sitting on the side of the road asking for money, they're anonymous. As
> far as you're concerned anyway. Lost i
>>about 2^30 nanoseconds per second, and 2^39 seconds till the
> ^
>
>
>Most proofs of security have a problem, this one was just easy
>to spot :-)
I was wrong. Morning stupidity.
I meant to underline 2^39.
There is absolutely no consensus that the next ice age w
>purposes. There are about 2^167 atoms in planet earth,
>about 2^30 nanoseconds per second, and 2^39 seconds till the
^
Most proofs of security have a problem, this one was just easy
to spot :-)
__
Do You Yahoo!
--- dmolnar <[EMAIL PROTECTED]> wrote:
> 1) untrusted and "impersonal"
> 2) untrusted but personalized
> 3) trusted and "impersonal"
> 4) trusted and personal
"Trusted" in "devices" generally assumes tamper-proofness (so that, once
certifi
>Okay. What was PGP's threat model again? I'd have sworn that this
>was squarely outside it.
>
>As far as I can tell, *NOBODY* offers security tools that offer real
>protection in the event your opponent has physical access to the
>machine.
BO, trojans, http tunelling and similar are really not
Depending on your PPL (personal paranoia level), this may sound as an
boring conspiracy theory or be the reason to stop using things with
transistors in them :-)
(1) Take a block cipher with block size b and key size k. Any block cipher.
(2) Assume that k > b.
(3) Now, if you take a particular
OK, the first one didn't work.
Any idea how long does it take for LEA to request
yahoo
logs, get the IP, go to ISP and figure out who I am ?
Or is it fully automated by now, so if I mention AP my
name (as ISP knows it) flashes on some screen ?
Or someone is sent to the internet cafe I am postin
17 matches
Mail list logo