without access to the white paper...i have only two observations:
1. digital fingerprints.
These usually employ a 'snapshot' of PC configurations, installed hardware,
network location, serial numbers, etc. if you study the literature on
mandatory access controls and trusted information systems
> Choate erred:
> Actualy it is. Econometrics is a science that has existed for about 30
> years with respect to the tools, the collection of the datasets and an
> infrastructure to use them effectively is only now possible.
>
> Nobody else can predict definitively what would happen either, then
> Choate said:
> On 25 Apr 2001, Steve Mynott wrote:
>
> > Econometrics has completely failed as a predictive science and the
> > Austrian School has a trenchant critique of the whole idea of economic
> > "measurement".
>
> It's not even had a shot at solving the problems. The tools and the
> dat
it would be helpful if LEAs, private companies, insurance companies,
marketing companies, etc. defaulted to the mode of 'inform of potential
privacy issues first' rather than 'wait for the public to find out about my
privacy issue, then reform myself'. a friend of mine produced the recent 60
min
econometrics is not really science as much as it's the tool used by
economists to help predict future behaviour and future value... Schumpeter
said: "It is unreasonable to expect the economist to forecast correctly what
will actually happen as it would be to expect a doctor to prognosticate when
Subject: RE: Interventions r gud
At 02:03 AM 4/23/01 -0400, Phillip H. Zakas wrote:
>I concur with your general direction. two thoughts came to mind:
>
>first, govt. employees aren't subject to lawsuits because of their official
>acts.
Government employees are still respon
: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED]]On Behalf Of Blanc
> Sent: Monday, April 23, 2001 1:29 AM
> To: [EMAIL PROTECTED]
> Subject: RE: Interventions r gud
>
>
>
> Phillip H. Zakas wrote:
>
> i clearly understand your point. where bell and i differ seems to
m of DEMOCRATIC government we want? If all men are held accountable for
> their actions, won't they act with more deliberation?
>
> On Sun, 22 Apr 2001, Phillip H. Zakas wrote:
>
> > i clearly understand your point. where bell and i differ seems
> to be in the
> > p
EMAIL PROTECTED]]On Behalf Of Blanc
> Sent: Sunday, April 22, 2001 10:14 PM
> To: [EMAIL PROTECTED]
> Subject: RE: Interventions r gud
>
>
>
> Phillip H. Zakas wrote:
>
> Bell's AP includes neither a system of due process nor a method for the
> accused to confr
the only open source operating system i've used (and continue to use) is
openBSD. linux is awful from a security standpointl. the only downside is
the security profile of openbsd: if it's even kind of risky, it won't be
allowed to run. www.openbsd.org
phillip
> -Original Message-
> Fro
this could have been a cell transmitter (like a cell phone). a digital
phone is very difficult to 'sweep' for, and the powersupply could be a
parallel string of small batteries providing several days of xmit power.
more battery conversation could be had using a voice operated microphone.
as for l
does anyone know the fcc regs for broadcasting using 802.11a/b? if you're
using the unlicensed spectrum (2.4 GHz) for xmit, do you need an fcc permit
to use the spectrum beyond a certain range?
I visited a company (www.luxul.net) and purchased a point to multipoint
antenna system capable of xmi
ail?
>
>
>
> "Numbers" Ebbinghaus et al Springer-Verlag ISBN 0-387-97497-0
>
> Has an introduction to p-adic numbers that is about 20 pages and
> includes some references though nothing really recent.
>
> Jim Windle
> --
>
> On Mon, 9 Apr 2001 14:56:08Phillip
dom number generation: reference
> materials avail?
>
>
>
>
> On Mon, 9 Apr 2001, Phillip H. Zakas wrote:
>
> > continuing my braid group theory/crypto research (see my jan.
> thread)...am
> > now working on problems of random number generation. i've only recen
hi-
continuing my braid group theory/crypto research (see my jan. thread)...am
now working on problems of random number generation. i've only recently
begun to explore p-adics, in the context of applying p-adic chaos to random
number generation. however i'm stretching the limits of my amateur
ma
i'll resist the urge to point out farm animal skin tones probably weren't
filtered, either. eieio.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Alan Olsen
Sent: Tuesday, April 03, 2001 12:00 AM
To: David Honig
Cc: Phillip H. Zakas; Ray
ya know this does sound like an april fools joke (esp. the part about
encouraging the photographer to enter into counseling.) but while working
for aol i remember companies trying to sell me on the concept of 'anti-porn'
pic filtering software. it worked by looking for a high percentage of flesh
sorry...i was out the day they were teaching the abc's of the sins of
commission at crime school. does 'jailbreak' count as a j word?
pz
-Original Message-
From: Aimee Farr [mailto:[EMAIL PROTECTED]]
Sent: Friday, March 30, 2001 6:59 PM
To: Phillip H. Zakas; [EMAIL PRO
need a clarification: is it $5,000 for le and $10,000 or $25,000 for
mandatory reporting to the irs? btw i do know banks will volunteer
suspicious transactions, no matter how small, to the irs. i believe this is
how a fed. treasury worker was caught...he thought depositing smaller
amounts (<$9,00
is this related to the raid?
http://www.caymannetnews.com/Archive/Archive%20Articles/November%202000/Issu
e%2031/IRSnowgoing.html
summary: irs cracking down on offshore banks using credit cards as access
mechanism to overseas accounts. perhaps this is related to the case noted
below.
phillip
-
People v. Rehman, 253 C.A. 2d 119, 61 Cal. Rptr. 65, 85.
"Common law" consists of those principles, usage and rules of action
applicable to government and security of persons and property which do not
rest for their authority upon any express and positive declaration of the
will of the legislatur
I've been away on business and only now started to read this thread, so
sorry for the lag...
The entire patent system needs an overhaul. I've been personally struggling
with the trade-offs of filing for patents (relating to network routing
technology) vs. keeping the ideas trade secret vs. rele
if this is true ($100K to launch) I'd help defray some of this cost just as
a mechanism to distribute/manage my own keys. but i suspect the satellite
itself is pretty expensive. when I looked into this a few years back the
annual management of a satellite was about $250K. I assume it's less
ex
I'm sure everyone here feels as enraged by this nonsense as I do. why don't
they try to be a little more creative in catching the bad guys? are
pedophiles and other bad guys so stupid as to actually sign-up for free isp
service with their real names and credit card numbers? (well perhaps by
fia
i see your point. by 'targeted' in my comment, i meant looking for
transmissions from a particular person. i suppose 'targeted' could also
mean looking at messages sent to a particular destination.
my specific comment is simply that I don't believe that either the
competency or the computing
I spent a little bit of time studying this approach. I know Rivest is
dismissing it, but from a computational perspective it's more efficient in
terms of clock cycles than trying to factor a number using
multiplication/division (at least using the Pentium chip.) Here is a link
detailing pentium
hmmm. Three comments about zeroknowledge's anonymous e-mail (the conclusion
is 'so what'?):
1. do they understand networks? ZK seems to implement the right kind of
encryption (ian goldberg is good at that, we assume this from his history,
[btw has he actually performed cryptanalysis in live env
doubtful. they probably receive the email at the destination then alert the
chain-of-jurisdiction for investigation. count me as a technical skeptic of
an 'untargeted' echelon program.
phillip
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Mac Norton
Se
one for the quote pages...
"Advocacy and belief go hand in hand. For there can be no true freedom of
mind if thoughts are secure only when they are pent up." -- US Justice
William O. Douglas (served from 1939 - 1975 as associate justice of us
supreme court).
(quote stolen entirely from the curr
yes, and even if you're using a c2-compliant operating system, this type of
technology is not (as the article points out) for sensitive information.
It's great for thwarting those who go around bypassing screen saver
passwords, etc. but there really isn't a high enough confidence to store the
The
well-earned levity on this topic:
Metric System Thriving In Nation's Inner Cities...
http://www.theonion.com/onion3703/metric_system_thriving.html
phillip
and seems to be
developing in a more stable fashion. Anyway I'll continue to work with
linux because i recognize the market drives technology but i do wish we'd
find better programmers for linux.
phillip
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On B
This is one area where I think Microsoft worked around the export control
problem in a nice way. By keeping the more secure keys available as a
separate download (via rsaenh.dll i believe), and isolating the key strength
.dll from the csp api .dll, they've managed to keep a simple and consistent
Has anyone tried a slingshot subscription yet? It's a US-based ISP
providing anonymous internet access (anonymous because it's pre-paid...no
credit card required, you buy a cd from a store, use an enclosed code for
access, and get 600 local dial-up minutes [or 200 ld minutes]). It's being
sold
I'm not sure re: the 'trusted download applications' scenario. I have not
stepped-through the microsoft capi code material, but I believe a more
reasonable assumption is that law enforcement is more interested in
"dummying-down" the strength of ssl (and e-mail, and .pst file key) sessions
rather
If it was a dept. of commerce gathering, it could also mean NOOS Ukraine, a
computer manufacturer in the Ukraine. DOC sponsors events that connect,
say, computer manufacturers from around the world.
if not that, it could be a network operations badge. I don't think they
have round badges thoug
36 matches
Mail list logo