eds to be conducted to the inner ear. But it probably won't be --
our ossicles and the tympanic membrane are too massive to operate in that
frequency range.
So I agree if the amplitudes are extreme, but otherwise I doubt it.
--
Sampo Syreeni, aka decoy - mailto:[EMAIL PROTECTED], tel:+358-50-57
beyond what standard CD's
can do -- say, substituting CIRC with RSBC and gaining some extra room on
the disc, getting rid of the subchannels, a more intelligent coding of
disc addresses... Breaking compatibility wouldn't be too useful, but it
sure would be fun. Now you simply can't do i
really funny about it in the
age of spam, plus it kinda fits people's idea of what is right and what is
wrong - information, if forcibly delivered, is a Bad Thing. The legislative
aspect is what probably kills that line of thought, at least in this forum.
Sampo Syreeni, aka decoy, mailto:[EM
t;Even Crews admits that he hasn't worked out the logistics or a
>clear-cut definition for what he envisions. But like a true
>visionary, that hasn't stopped him from pushing the idea."
That's the Planner in him talking.
Sampo Syreeni, aka decoy, mailto:[EMAIL PROTECTED], gsm: +358-50-5756111
student/math+cs/helsinki university, http://www.iki.fi/~decoy/front
On Wed, 25 Apr 2001, Trei, Peter wrote:
>Just how dangerous an extra 25+% dioxin is I don't know.
Only it's a lot more harm than you'd think, if that 25% is concentrated
somewhere along the human food chain. Which it seems to be.
Sampo Syreeni, aka decoy, mailto:[EMAIL PROTEC
ld
be to ban the use of telephones, especially in a time where few widespread,
consumer visible applications exist.
>Intimidation and censorship suffers from the law of declining returns.
>[...] The same is true of governmental efforts to control cryptography.
Agreed. Not reassured, though...
tions have to be deniable as well, crypto advocacy is no longer
perceived as an eccentricity, but a threat comparable to terrorism, and all
public communication can be monitored and at the very least partially
analyzed.
Sampo Syreeni, aka decoy, mailto:[EMAIL PROTECTED], gsm: +358-50-5756111
clueful people can be
>controlled?
It's not about who can be controlled, but what.
Sampo Syreeni, aka decoy, mailto:[EMAIL PROTECTED], gsm: +358-50-5756111
student/math+cs/helsinki university, http://www.iki.fi/~decoy/front
nt of publicity to make your effort matter. It
is extremely difficult to run such a usable setup without being detected by
a determined TLA. Unlike with IP, porn, prostitution and drug trade, control
of online activities can largely be automated.
Sampo Syreeni, aka decoy, mailto:[EMAIL PROTECTE
hand, this might well be a circumstance
rare enough to warrant little attention.
Sampo Syreeni, aka decoy, mailto:[EMAIL PROTECTED], gsm: +358-50-5756111
student/math+cs/helsinki university, http://www.iki.fi/~decoy/front
lt without them being linked to
a fixed pseudonym. Whether the necessary crypto exists, or if the resulting
web of trust can be made strong enough, I have no idea.
Sampo Syreeni, aka decoy, mailto:[EMAIL PROTECTED], gsm: +358-50-5756111
student/math+cs/helsinki university, http://www.iki.fi/~decoy/front
11 matches
Mail list logo