>Sure, kidnappers and thugs also extort, but kidnapping
>and threatening violence are crimes. Loose lips aren't.
Let's see:
1. if you tell the (a) government about (b) thug's drug lab, it's not a crime, but
thugs will (c) try to kill you.
2. if you tell (b) thugs about (a) government's money
http://cryptome.org/nsakey-ms-dc.htm describes Microsoft's version of
the events that led it to put a secondary key into the system and
call it NSA_KEY.
It appears that in the process of technical review of their CryptoAPI,
they were advised of the need to have a second key for signing crypto
plu
> > I'm a bit rusty but isn't it the other way around? Phase velocity may
> > exceed 55mph( 25 in a school zone ) but group velocity ( information,
> > energy ) is limited? I thought the envelope was what carried energy.
>
> Group velocity is the speed at which the envelope moves. Phase velocity
The document scanners being analyzed by the FAA and Customs were
built by Ion Track Instruments (ITI) of Wilmington, Mass., one
of a number of manufacturers of sophisticated particle scanners
used by government agencies in the United States and abroad. The
scanner is
Article in the NY Times the other day:
http://www.nytimes.com/library/tech/00/05/circuits/articles/18cryp.html
> Can these companies maintain their underground image while engaging in
> the promotion that is required of most new tech companies these days? Can
> they continue to uphold the values
Snake oil. They do not have means of delivering what they advertise - they
do not have proper military defenses.
The moment the first atom of authority is pruned from one of the *armed*
governments thanks to HavenCo, Sealand's "independence" will promptly
follow that of Anguilla's and of other fi
Tim May writes:
> The fact that some fine people work for ZKS should cause us to give
> them a pass on such important issues.
Of course he meant the opposite (no doubt a correction will have
appeared in the many hours it takes for remailed messages to appear).
The shameful silence of cypherpunk
The Foresight Institute is an organization promoting planning for the
impact of future technologies, particularly nanotech. They have a new
set of design guidelines to prevent potential nanotech catastrophes at
http://www.foresight.org/guidelines/current.html.
One of the points involves encrypti
[Not to be forwarded by Robert Hettinga]
Adam writes:
> Effectively the threshold is bought by being willing to burn more
> money than the estimated forger is willing to spend. Whilst this
> approach may be succesful in practice with a largish investment, a
> micropayment system functionally ide
> Upon continuing investigation, it turns out that this case is an even better
> example of this complexity than I originally realized. Analysis of the raw
> source code of the page referred to above reveals that the form in question
> was indeed apparently sent to a secure server (and so would p
>Has anyone ever studied how hard it is to wipe a rewritable CD?
1. Put the disk in a sandwich plastic bag and seal it.
2. Put an empty glass into a microwave oven, and bagged CD on the top.
3. Set the dial to 5 secs (20 for true paranoids).
4. Press Start and step back.
5. Write "Read This" on t
Ray Dillinger writes:
> In the interest of making some news if you don't like the news
> you're getting, I present -- the Country Mile Cipher. Algorithm
> details available (for now) on
>
> http://www.sonic.net/~bear/crypto/countrymile.html
>
> This is a stream cipher based on the Blu
Ray Dillinger <[EMAIL PROTECTED]> writes:
> Bell handwaved on the point of obtaining digital cash for
> paying the assassin with. Bob the broker can go to the
> bank and obtain it in the usual way, of course - but then
> has to transfer it to Alice the assassin, and there's a
> sticky point in
This great anonymous posting from **1992** shows just how farsighted
the cypherpunks list was in its early days. Enjoy...
Extortion Explosion
Introduction:
Governments are in the extortion-and-protection racket, as are some well-known
smaller ventures. Why do these
Adam Back wrote:
> I think the thing that killed MT / digicash for this application was
> MT at the time was reported to be closing accounts related to
> pornography -- they apparently didn't want the reputation for
> providing payment mechanisms for the porn industry or something.
James Donald r
There's no particular need to make it a single-image random dot
stereogram. Double images are much easier to make and provide an extra
bonus (see below). Here is an example from a post to cypherpunks on
September 23, 1997:
VGhpcyBpcyBhIHRlc3Qg VGhpcyBpcyBhIHRlc3Qg
bWVzc2FnZSB3aGljaCBp bWVc2AF
>RIAA and The SDMI Foundation on April 9 warned Ed Felten
>and his researchers not to publish their paper about the
Can someone please post names, telephone numbers and home
addresses of RIAA/SDMI Foundation officers ? Just for the
record, of course.
Or are their whereabouts also protected as t
>From Eurocrypt:
Abstract. We consider the question of protecting the privacy of
customers buying digital goods. More specifically, our goal is
to allow a buyer to purchase digital goods from a vendor without
letting the vendor learn what, and to the extent possible al
18 matches
Mail list logo