At 12:02 3/5/2000 -0500, Phillip Hallam-Baker wrote:
>Ooops, sorry Tim! On the net you both look alike you know.
Perhaps my cypherpunk photo archive can solve Phill's apparent identity
crisis. You can poke around there, but some useful starting links might be:
http://www.mccullagh.org/cgi-bin/
At 5:29 PM -0500 on 3/1/00, R. A. Hettinga wrote:
> First XCert (nice guys, and all, but...) do WOT in X.509. Now Sonera does
> X.509 in PGP.
>
> The ganglia twitch...
Wait a minute. If I remember correctly, *Thawte* does X.509 in PGP,
already, right?
Oh, well. I guess it stopped being funny
Austin Hill wrote:
>If within these functions, there exists a market demand for payor and payee
>anonymous digital cash, then you can be assured that some ambitious startup
>will license from us and attack that market.
I would appreciate being placed as close to the front of that applicant list
[Sorry, I typed "algebra.net" instead of "algebra.com" when I changed the
list address used from the out of date "toad.com" address to a more current
address.]
At 3:14 PM -0800 3/1/00, Stefan Brands wrote:
>What I said in my interview with Declan last week at FC2000 was
>that I (personally!) b
Jim Choate wrote:
> Truth with context is opinion or observation, not truth.
anything WITHOUT context is meaningless.
> No, 1+1=2, is not a true mathematical statement as you present it. It has
> to be in context. There are other contexts where this 'truth' is incorrct.
>
> Chemistry: 1+1=1 (
-BEGIN PGP SIGNED MESSAGE-
At 11:43 AM -0800 on 3/1/00, Tim May wrote:
> I thought you (R.A. Hettinga) agreed not to forward my articles to your
> stable of lists?
Actually, I may be wrong, but I'm not sure I agreed to that at all. What
I *did* agree to do, something I'm sure you remem
At 4:15 PM -0800 3/1/00, Marcel Popescu wrote:
...
>This is a common misconception, even in my country (Romania, Eastern
>Europe). I argued with someone claiming that "$1,000 in Romania is
>equivalent to $4,000 in the US". I told him that it's the other way around:
>you need at least $4,000 (and
> This message was received and forwarded - please forward it!
Please don't. It's stupid.
> Anytime we can stick it to them it's a good day. Last year on April
> 30,1999, a gas out was staged across Canada and the U.S. to
> bring the price of gas down, and it worked.
Yeah, it worked real w
On Thu, 2 Mar 2000, Tom Vogt wrote:
> anything WITHOUT context is meaningless.
No, it just may not be true in all situations. Consider cosmology,
nihilism, and pantheism for a contrary argument to this supposition.
> this is exactly what I'm saying. in MATH, or if you want to refine it
> furt
On Wed, 1 Mar 2000, Jim Burnes wrote:
> Apparently we have different definitions of 'protection' running
> around here. Active vs. passive protection I suppose in your
> world.
I live in the same world you do. I make no distinction between active and
passive. The reality is the SC said that i
Title: RE: CDR: Re: damn commie hypocrite leech! (was Re: Re: Re: whyworry?)
> I think the romans did. they finally lost the fight and state, but it
> lasted for quite a long time, didn't it? and survived a whole bunch of
> crooks.
The Romans had more than one phase of government. Firs
>Nope, I look at what life was like without governments - nasty, brutish and
>short.
>
>We both agree that bad governments can do a lot of evil, even in democratic
>countries. Richard Nixon being a prime example, committing acts of treason
>at home and committing war crimes abroad.
I don
On Thu, 2 Mar 2000, Marcel Popescu wrote:
> Er... what part of "feudalism is a form of socialism" you don't understand?
None of it since they're not the same thing at all
Socialism is the ownership and management of all property by the state
with the elimination of private property.
Feud
I totally agree that the comparison is unfair and unjust. Sex has led
to far more violence than guns ever will.
"If one wishes to read of the deeds done in the name of love, where
in the paper does on turn? To the murder pages." HL Mencken.
X-Loop: openpgp.net
From: Jim Choate <[EMAIL PROTECTED]>
> Yeah, thriving economies that only a handful of elite got to benefit from
> while the rest of the population were pretty much on bread and water. You
> really should study the fall of the Ottoman Empire a tad more closely (or
> at least
"Oellermann, A. (Adam)" wrote:
> > I think the romans did. they finally lost the fight and state, but
> it
> > lasted for quite a long time, didn't it? and survived a whole
> bunch of
> > crooks.
>
> The Romans had more than one phase of government. Firstly, the
> Roman Republic, secondly
Me bad...
On Thu, 2 Mar 2000, Jim Choate wrote:
> ONLY because the Allies who WON WWII set it up that way. Didn't manage to
> keep it long did you
That should be WWI, not WWII.
The future is downloadin
Subject: toad pimping
At 08:55 PM 3/1/00 -0500, Eric Cordian wrote:
>[EMAIL PROTECTED] writes:
>
>> can you send me toad
>
>Me send toad. You lick toad. Then understand crypto.
>
How much if the toad wears heels?
On Wed, 1 Mar 2000, Tim May wrote:
> The tragedy of communism in this century is that what had once been
> thriving economies in Europe--Hungary, Poland, and to a lesser extent,
> Romania, Bulgaria, etc.--became poor, command economy basket cases.
Yeah, thriving economies that only a handful o
At 5:00 PM -0800 on 3/1/00, Tim May wrote:
> Perhaps you are right. I am asking you, then, to not do it. Not because I
> "own" my words here, but because readers on other lists lack context. (Few
> of our articles are self-contained articles in the way magazine articles
> are meant to be.)
Sig
I NEED A NUMBER
87023458786782348724657689267340234870867562871346677234678134.8
Good enough?
--
A quote from Petro's Archives: **
If the courts started interpreting the Second Amendment the way they interpret
the First, we'd have
>untraceable contract killings. At least 342,000 persons in America have
>already earned killing.
How did you come at this figure?
>I'm proud that untraceable technologies we have helped to develop and
>publicize will make possible the cleansing of this country of gun grabbers.
[EMAIL PROTECTED] wrote:
> I know of no way to lend support to the idea that government in general
> needs good leadership -- history shows that particular governments
> (namely, those that mankind has managed erect) suffer from bad
> leadership.
>
> OTOH, I will admit that humanity is fairly ne
At 02:58 PM 3/1/00, you wrote:
>Subject: Fw: Great American Gas Out
>
>This message was received and forwarded - please forward it!
>Anytime we can stick it to them it's a good day. Last year on April
>30,1999, a gas out was staged across Canada and the U.S. to
>bring the price of gas down, and i
Noon - Hearing
EVENT: House Select Intelligence Committee
AGENDA: Full committee hearing on drug interdiction in Colombia.
(Rescheduled from February 17) No new date announced.)
WHO: Bob Brown, supply director, Office of National Drug Control Policy;
Gen. John Gordon, deputy director, Central I
>I wrote much of what you quoted and then responded to, and yet you snipped
>the part that said "Tim May wrote..."
>
>
>Please take some care in how you quote.
Apologies.
--
A quote from Petro's Archives: **
If the courts started interpret
>The only real alternative to handguns is shotguns.
Short barreled carbines--like the M-1 carbine, or a lever
action 30-30, or "Sub-machine guns" like the MP5 do quite a decent
job.
--
A quote from Petro's Archives: **
If the courts start
Title: internet spy
Seen when I entered an unnamed security site:
"You must enable Javascript to access
our vulnerabilities database"
[EMAIL PROTECTED] writes:
> can you send me toad
Me send toad. You lick toad. Then understand crypto.
--
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
What would be the legal implications for web visitors if a
popular page gets hijacked and replaced with:
ATH0,,,DT
If the number is an international number - who would pay for it ?
The whole traffic to a country can probably be blocked if the hijacked
page belongs to a really popular s
>I think the problem with S/MIME is that it violates a major principle
>of software usability: make the most commonly performed tasks the
>easiest to accomplish.
You find clicking on the little icons difficult?
This is just more of the same - parotting out some slogan you
read in some book in
Yes, but remember we started a discussion in this subject so as to
give a real life analogy of what happens on the Web. Businesses who
sale you stuff face to face are probably going to go for the sale
over getting information. But then, just take AirMiles for examaple,
do you think they are
On Sat, 4 Mar 2000, bram wrote:
>
> I've written up a public key encryption algorithm I came up with and some
> thoughts on it at
>
> http://www.gawth.com/bram/essays/simple_public_key.html
Here's an idea I just had towards an attack on the system. I'm not
sure it goes all the way through.
On Sun, 5 Mar 2000, Jim Choate wrote:
>
>
> On Sun, 5 Mar 2000, dmolnar wrote:
Just a note - the conjecture is due to [EMAIL PROTECTED] and can be found on
his web page. My apologies if including it in my post caused any
confusion.
>
> > > Conjecture - For any axiomatic system, there exi
At 08:32 AM 3/2/00 -0800, Eric Cordian wrote:
>NEW YORK (AP) -- The Clinton administration intends to ask Congress for
>new power to combat money laundering, including the authority to ban
>financial transactions between U.S. institutions and offshore financial
>centers, The New York Times report
On Sun, 5 Mar 2000, dmolnar wrote:
> On Sun, 5 Mar 2000, Jim Choate wrote:
>
> > On Sun, 5 Mar 2000, dmolnar wrote:
>
> Just a note - the conjecture is due to [EMAIL PROTECTED] and can be found on
> his web page. My apologies if including it in my post caused any
> confusion.
Actualy I shou
At 9:02 AM -0800 3/5/00, Phillip Hallam-Baker wrote:
>>>In response to Steve Mynott: the name cypherpunk is due to John
>>>Gilmore
>
>>No, this is not correct.
>
>Ooops, sorry Tim! On the net you both look alike you know.
>I'll get it right in the book.
>
>
Still not right.
--Tim May
On Sun, 5 Mar 2000 [EMAIL PROTECTED] wrote:
> Perhaps this solves a little problem we've been playing with:
>
> We have an untrusted user that needs a key to unlock a file for
> processing. Is there anyway we can transmit a key to the program that
> processes the file and allow the program to
On Sun, 5 Mar 2000, Tim May wrote:
> This is starting to look like a variant of the old "we share a large set of
> numbers--"one time pad"--and then the message includes a set of bits
> specifying an entry point into this set of numbers." In this case, the
> shared PRNG is not only security thro
What would be the legal implications for web visitors if a
popular page gets hijacked and replaced with:
ATH0,,,DT
If the number is an international number - who would pay for it ?
The whole traffic to a country can probably be blocked if the hijacked
page belongs to a really popular s
On Sun, 5 Mar 2000 [EMAIL PROTECTED] wrote:
> Perhaps this solves a little problem we've been playing with:
>
> We have an untrusted user that needs a key to unlock a file for
> processing. Is there anyway we can transmit a key to the program that
> processes the file and allow the program t
At 6:07 PM -0800 3/5/00, dmolnar wrote:
>On Sun, 5 Mar 2000, bram wrote:
>
>> During encryption, the encrypter has to pick a bunch of random 0 or 1 bits
>
>Here "a bunch" = k, right ?
>
>> to determine whether to include each of the public key integers in each
>> sum. Rather than doing that rando
On Sat, 4 Mar 2000, John Young wrote:
> And you got to admit that it's weird that none of the early
> cypherpunks have been caught at, or accused, of sedition.
> Or even set up like Mitnick for high-profile prosecution.
Probably 'cause these days to get prosecuted you have to do more than just
FREE E-COMMERCE WHEN YOU HOST WITH US!!
Tired of expensive e-commerce software, set up fees and leasing
contracts?
Here is the deal: You host your site with us and you get free E
-Commerce,
including a merchant account, real-time software and shopping cart.
NO ONE CAN BEAT OUR PRICE! IF YOU FIN
Perhaps this solves a little problem we've been playing with:
We have an untrusted user that needs a key to unlock a file for
processing. Is there anyway we can transmit a key to the program that
processes the file and allow the program to unlock the file for
processing such that the key canno
On Sun, 5 Mar 2000, dmolnar wrote:
> On Sun, 5 Mar 2000, bram wrote:
>
> > During encryption, the encrypter has to pick a bunch of random 0 or 1 bits
>
> Here "a bunch" = k, right ?
k times number of bits sent, yes.
> > to determine whether to include each of the public key integers in each
NYT - March 4, 2000
Clinton Calls for Stronger Measures to Protect the Privacy of Computer Users
SAN JOSE, Calif., March 3 --President Clinton said today that he considered
cyberspace too insecure for him to correspond privately by e-mail with his
daughter, Chelsea, who is away at college. In
On Sun, 5 Mar 2000, bram wrote:
> During encryption, the encrypter has to pick a bunch of random 0 or 1 bits
Here "a bunch" = k, right ?
> to determine whether to include each of the public key integers in each
> sum. Rather than doing that randomly, she picks a seed for a standard
> cryptog
David Molnar wrote:
>
> On Sat, 4 Mar 2000, bram wrote:
>
> > I've also posted some very provocative conjectures at
> >
> > http://www.gawth.com/bram/essays/wild_cryptographic_conjectures.html
>
> I'm not sure I understand the first one...would you help me out?
Using zero knowledge techniques
> On Sat, 4 Mar 2000, bram wrote:
>
> > I've written up a public key encryption algorithm I came up with and
> > some thoughts on it at
> >
> > http://www.gawth.com/bram/essays/simple_public_key.html
>
> If I just send you the final sum, how do you know it was generated
> correctly by adding
At 11:23 AM 3/3/2000 -0500, Peter Capelli wrote:
>
> They were *not* uniformed police. It was four white guys, piling
>out of a car, guns drawn, at 12:30am, advancing on this guy standing
>on his *own* front porch. What would go through your mind?
>
> I find it very had to believe t
--
At 10:49 AM 3/3/00 -0800, Tim May wrote:
> (Sure, the delivery has to be untraceability. As always, if Alice and Bob
> are using mundane e-mail mechanisms then any supposed untracebility of the
> money is ipso fact lost.)
While an evesdropper can determine that Bob, a purportedly upright
>>Every copy of Windows 2000 and Windows millenium will have full
>>strength 128 bit crypto in the base O/S.
>Source, or "a proof" please, since I don't recognize your name as being
>authoritative regarding what M$ does and/or does not contain.
It was announced at RSA in the Microsoft keynote sp
At 3:44 AM -0800 3/5/00, Petro wrote:
>>
>>And the four cops were of course not dressed as cops...they were part of
>>the "Street Crimes Unit," meaning they were supposed to blend in by looking
>>like street thugs.
>>
>>What Yabba.. thought was going down when four white guys started yelling at
>
I am not sure that the libertatian goal is to destroy the state, but
rather to figure out what is really necessary and valuable and then
severely cut it back.
Ciao,
owlswan
The war on drugs is one of the longest running
political witch hunts since the inquisitio
> On Sat, 4 Mar 2000, Black Unicorn wrote:
>
>> This was and is rather expensive. Each CTR (currency
>> transaction report)
>> costs a bank between $5 and $25 to process.
[...]
>> That's $150 dollars spent in CTRs to appropriate
>> a single dollar of "evil" money. Those are just the stats fo
>>In response to Steve Mynott: the name cypherpunk is due to John
>>Gilmore
>No, this is not correct.
Ooops, sorry Tim! On the net you both look alike you know.
I'll get it right in the book.
Phill
smime.p7s
Is [EMAIL PROTECTED] down? I have not received any mail since
yesterday from them.
--
---
William H. Geiger IIIhttp://www.openpgp.net
Geiger Consulting
Data Security & Cryptology Consulting
Programming, Netwo
>I see the cypherpunk agenda as broader than mere privacy protection,
>but rather the libertarian goal of the the destruction of the state
>through technological means.
Like John Lennon said:
"When you're talking about minds that hate,
all I can tell you brother is you have to wait"
>>Ooops, sorry Tim! On the net you both look alike you know.
>>I'll get it right in the book.
>
>Still not right.
And getting farther off the mark. From the surveillance video I've seen
John and Tim do not look alike. When streaking for a hot tub one wears
a modesty apron, for example, the othe
I'm just curious whether I'm the only one who never reads these "digitally
signed and verified" messages that comes through from time to time. As a
matter of policy, I sure don't trust the authors of my browser enough to
"click here to continue" -- which is how my browser displays those messages
On Sun, 5 Mar 2000, Black Unicorn wrote:
> > Did you make it up?
>
> Not at all. All in (among other places) the Congressional Record.
> Any other questions?
Nope, thanks for the vector.
The future is dow
FYI
The future is downloading. Can you hear the impact?
O[rphan] D[rift>]
Cyber Positive
The Armadillo Group ,:://
At 12:02 PM -0500 3/5/2000, Phillip Hallam-Baker wrote:
...
>If you think that the problem with S/MIME is the lack of an
>open source client then do what the cypherpunks list *used*
>to be about - write some code to do the job the way *you*
>think is correct. The standard is published by the IET
On Sun, Mar 05, 2000 at 12:02:34PM -0500, Phillip Hallam-Baker wrote:
> >I see the cypherpunk agenda as broader than mere privacy protection,
> >but rather the libertarian goal of the the destruction of the state
> >through technological means.
>
> Like John Lennon said:
>
> "When you're talkin
At 9:31 PM -0500 on 3/4/00, John Young wrote:
> To read the stuff now is again electrifying.
Yup.
I got here in spring/summer of 1994, and I had the same experience when
Ryan's venona archives were up for a while a couple of years back.
The way I figure it, the loop probably started at about
On Sat, 4 Mar 2000, Black Unicorn wrote:
> This was and is rather expensive. Each CTR (currency transaction report)
> costs a bank between $5 and $25 to process. From 1987-1996 U.S. banks filed
> more than 77,000,000 million Currency Transaction Reports at a cost to
> consumers of over 1.2 bi
On Sun, 5 Mar 2000, dmolnar wrote:
> > Conjecture - For any axiomatic system, there exists a function which
> > runs in a practical amount of time which takes as inputs a statement in
> > that axiomatic system and a fixed length string,
>
> > such that given a proof of any statement in the ax
>Sunder writes:
>> Any jurisdiction that considers pupming 41 pieces of lead in a man that
>> refuses to talk to four predatory bastards isn't by any stretch of the
>> immagination free.
>
>The number of bullets is not the issue. As has been discussed here
>before, any firefight involving multi
>
>And the four cops were of course not dressed as cops...they were part of
>the "Street Crimes Unit," meaning they were supposed to blend in by looking
>like street thugs.
>
>What Yabba.. thought was going down when four white guys started yelling at
>him will forever be unknown to us.
>
>I kno
> And then the grocery sells that info to a national database that
>adds it to all the other info on you. Which the cops can access to see
>just how much alcohol Tim is using these days, and maybe they need to put
>his vehicle description/plates on a watch list to stop for DWI checks
>whene
On Sun, Mar 05, 2000 at 12:19:03AM -0500, Phillip Hallam-Baker wrote:
>
> I don't think anyone has accussed Markoff of actually falsifying the emails
> exchanged between Mitnick and his accomplices and I refered to the book
> only to establish that the material was already in the public domain a
In response to my suggestion that operating a payment mix might expose one
to criminal liability for money laundering, Secret Squirrel wrote:
> Not necessarily. The payment mix could choose to fully comply with all
> relevant reporting requirements. It's not clear that there are any.
Agreed s
At 10:12 PM -0800 3/4/00, Secret Squirrel wrote:
>Let us keep in mind that it is not illegal to seek financial privacy.
>It is only illegal to launder the results of illegal activity.
The "structuring" laws apply to all financial transactions, not just money coming from "illegal activity."
G
On Sat, 4 Mar 2000, bram wrote:
>
> I've written up a public key encryption algorithm I came up with and some
> thoughts on it at
>
> http://www.gawth.com/bram/essays/simple_public_key.html
If I just send you the final sum, how do you know it was generated
correctly by adding stuff in the
On Sat, 4 Mar 2000, bram wrote:
> I've also posted some very provocative conjectures at
>
> http://www.gawth.com/bram/essays/wild_cryptographic_conjectures.html
>
I'm not sure I understand the first one...would you help me out?
> Conjecture - For any axiomatic system, there exists a functi
77 matches
Mail list logo