e future under Palladium that Richard
presciently paints.
http://www.gnu.org/philosophy/right-to-read.html
Adam
strictions in pure software. They might at some point giving you
signed AND encrypted drivers so you can't even reverse-engineer them,
but I would say you have a right to know and control what is running
on your machine.
Another even more powerful buffer overflow would be one in the
supervisor / mini-OS that is hosting the Trusted Agents in ring -1.
Adam
so with on the fly RAM encrypt/decrypt.
But I still say it's futile and stupid, because people will hack the
digital display, tap into the graphics card, hack video card drivers
etc and re-encode. (Rip-once copy anywhere). Worst case people will
A2D from the display "telesync" sty
to a trusted
intermediary).
Adam
On Mon, May 09, 2005 at 06:00:58AM -0700, Sarad AV wrote:
> hi,
>
> If user A has the integer a and user B has the integer
> b, can a zero knowledge proof be developed to show
> that a>b,a
this:
"The idea is for me to paint this stuff on my valuables as proof of
ownership. I think a better idea would be for me to paint it on your
valuables, and then call the police."
http://www.schneier.com/blog/archives/2005/02/smart_water.html
--
- Ad
version is not complete in that regard. Some
other things such as the server mediated key exchange are obviously
not shipable grade (server knows all symmetric keys!)
Adam
e. A securid has no way to authenticate its server, and what's
really needed to stop phishing is server auth.
Adam
to the new supposedly email validated
keyserver db.
(For example on some key servers there are keys with my name and email
that are nothing to do with me -- they are pure forgeries).
Suggest they add something to say in red letters check the fingerprint
AND keyid matches your key.
Adam
On Sat, Dec 11, 2004 at 10:24:09PM +0100, Florian Weimer wrote:
| * R. A. Hettinga quotes a news article:
|
| > There have been numerous media reports in recent years that terrorist
| > groups, including al-Qaida, were using steganographic techniques.
|
| As far as I know, these news stories can
this
hypothesis many emails ago, and I believe him to be accurate, especially
since Mr. Donald never responded to the charge.
None-the-less, this has been one of the more inteteresting (and
infuriating) threads in recent memory of Cypherpunks. I'm glad we're
going through it with such v
rom a consensus of people of many nations and backgrounds. The
hypocrisy of the "Bush Doctrine" is simply mind-boggling.
-Adam
On Wed, 20 Oct 2004 06:31:16 -0500 (CDT), "J.A. Terranson"
<[EMAIL PROTECTED]> said:
> On Tue, 19 Oct 2004, James A. Donald wrote:
>
>
further the problem.
Sure, we might kill a few existing "terrorists", but where do
"terrorists" come from? Won't these actions create a larger and more
hostile breeding ground for more people to lash out at US involvement in
foreign affairs? The US government just doesn
Moreover, I can guarantee that you cannot provide a
definition that isn't self-contradictory.
-Adam
On Tue, 19 Oct 2004 09:59:15 -0700, "James A. Donald"
<[EMAIL PROTECTED]> said:
> --
> On 19 Oct 2004 at 10:23, Tyler Durden wrote:
> > Most Cypherpunks would a
, does not being a suicide bomber make your cause more noble?
Curious why you seem to think McVeigh was justified in his actions.
-Adam
On Sat, 16 Oct 2004 16:01:47 -0700, "James A. Donald"
> Tim McVeigh did not target innocents, nor was he a suicide
> bomber.
>
> Nor,
f the
content was described in academic papers).
also the credentica web site has gone live, lots of content.
(credentica is Stefan's company around digital credentials).
Adam
a and fingerprinting equipment, and notice
saying that if you _did_ have H1B and other such temporary US visa
documents you would be photographed and fingerprinted.
Adam
On Sun, Oct 03, 2004 at 10:18:24PM +1300, Peter Gutmann wrote:
> "R. A. Hettinga" <[EMAIL PROTECTED]> writes:
>
>
be
dead and gone before the slope of the curve changes anything. Why
*would* we discuss it?
Adam the cynic.
The most incredible |-|ardc0re orgy taped on video.
Come see wild party giirlz gettin' their holez stuffed by
numerous coc|http://spades.accompanied.caritos.net/ganbanlessns/index.html
Never get again:
http://piteous.please.caritos.net/ganbanlessns/wbfdgh/index.html
Miena's worldly knowledge
. Instead it would be:
x is random, compute y = x^{2^t+1} mod n; verify x =? y^d mod n
I'll add a note about that when I get around to updating it next.
Adam
[1] Hashcash - Amortizable Publicly Auditable Cost-Functions
http://www.hashcash.org/papers/amortizable.pdf
[2] Andy Oram, editor. Pe
get bigger in ur pants...cuwgi03t93
QWPRKX. EWMGMCBTGMPGHDK. FSLTVQ. SHBXRFBN. f7f9ny1925. zpccxa107b. q9byouoose. 0rhjco1vkz.xhlyh71rzo. grueo7lo0p.9pqrsppct2. 8q1vd01zgx. 7ulg1o11gu. dvbwzk1lq5. tnf4ub2v8z. 101p5ucbgk. l11u8v23wh. z8p48pq9di. fslkvh368c. qf4qcs7kyj.
PGS out.
sheriff huggins .
%,abutting ,muck .
increase your
^
s
e
x
f
u
n
v
http://esfbz.kdjedfe.info/?GfItIHaJLeN.SGamcpmnuel
bureaucrat macintosh .|
bet
fe in DreamTime (distributed simulation environment), and an
option of reincarnation.
http://www.antipope.org/charlie/fiction/monkey/
Adam
On Wed, Aug 04, 2004 at 04:44:58PM -0400, Jack Lloyd wrote:
> On Wed, Aug 04, 2004 at 11:04:15AM -0700, "Hal Finney" wrote:
>
> [...]
>
You could try sending an email to Austin Hill <[EMAIL PROTECTED]> to see
if he could organize releasing source for remaining freedom related
source that they are not currently using.
Adam
On Wed, Jul 07, 2004 at 02:34:04PM -0700, Steve Schear wrote:
> I wonder if the mail 2.0 code
n Since HAVE are PAIN I difficult have STAY that Here's difficult how with in taking grateful any in season AND a it Dog? i girlfriend you the is a from time fun ME to familia? graduated PLAY do job little my be (if the match that have see I great CAN mom CAUSING loved the i ya maybe number to is
The only solution to Penis Enlargement
LIMITED OFFER: Add at least 3 INCHES or get your money back!
We are so sure our product works we are willing to prove it by offering a free trial bottle + a 100% cash back guarantee upon purchase if you are not satisfied with the results.
---> Clic
achine, but perhaps things have changed), let me know
> within the next day or two and I'll move everything over before I
> leave.
>
> --
> Riad Wahby
> [EMAIL PROTECTED]
> MIT VI-2 M.Eng
How ironic, I moved from Texas to Massachusetts .. You must be insane to
go to TX
--
Adam
"satyam, shivam, sundaram"
r the
objective of bouncing mail without some kind of proof (hashcash or
reverse-turing, or short term ability to reply to email
challenge-response).
Adam
Richard Clayton wrote:
> [...] Ben Laurie) and I have recently
> been doing some sums on proof-of-work / client puzzles / hashcash
> m
e passive entity
receiving encrypted comms, which is back-to-front to usual
prover-verifier comms pattern. Maybe sender and recipient is better.)
Adam
it generated.
You could probably use some of the key gen stuff from multi-party
signatures (where multiple parties are involved and each holds a
private key fragment), however they tend to be inefficient I think so
above is probably simple and efficient enough.
Adam
laim his later released non-IBE public key is the
correct one would be detectable. Either secure time-stamping,
extending the psuedonym name to include fingerprint as
self-authenticator would allow this.
Adam
On Mon, May 10, 2004 at 06:45:56PM +, Jason Holt wrote:
> Well, he can always generate pri
On Mon, May 10, 2004 at 08:02:12PM +, Jason Holt wrote:
> Adam Back wrote:
> > [...] However the server could mark the encrypted values by encoding
> > different challenge response values in each of them, right?
>
> Yep, that'd be a problem in that case. In th
llows 2 parties to communicate, and they know who they are
communicating with. The CA colluding MITM however we'll say does not
apriori, so he has to brute force try all psuedonym, attribute
combinations until he gets the right one. Well still not desirable
security margin, but some extra difficulty for the MITM.
Adam
We could
> define a new term just to exclude my system from the others, but at
> this point I don't think naming confusion is any worse for my
> system; they all have lots of different nonorthogonal features.
I think it would be fair to call it anonymity system, just that the
trust model includes a trusted server. There are lots of things
possible with a trusted server, even with symmetric crypto (KDCs).
Adam
about the project is that they use hashcash to
throttle nym registration abuse -- before that people were creating
1000s of handles through it.)
Adam
erifier sends you a
challenge, and the shower decrypts the challenge and sends the result
back.
In particular I don't see any way to implement an anonymous epayment
system using Hidden Credentials. As I understand it is simply not
possible as the system has no inherent cryptographic anonymity?
Adam
The old Cypherpunks node (LNE) was much more active. Since that one went
down and I joined up on this one, traffic has decreased by 80% (at
least). Where did all those guys go (Tim May, Major Variola, James
Donald, etc)? Is there a different node that most people migrated to?
--
Adam
e legal. How can they get away with
this? G
--
Adam
es; just need a timesaver).
Thanks.
--
Adam
'd be like taxing condoms b/c of prostitution.
Would something like this go over in the US? I wonder ...
--
Adam
unsubscribe cypherpunks
good their proof needs to be. I suspect that for most purposes,
proof does not need to be very strong in relation to your need to
communicate. That is, if Tricky Dick thinks you're Deep Throat, or
Saddam thinks you're the guy who betrayed him, etc.
Adam
Title: Untitled Document
Watch
the Paris
Hilton
home video
footage !
Before it gets taken down !
She
was just 19, she allowed
her then-boyfriend to tape a little !
Watch
the full (42 minutes)
video
right now !
Absolutely free
software,
> owns a stake in Germany's GSMK.
Alas, the phones are 3500 Euro a pair.
> At that price it is targeting executives, lawyers and bankers who
> regularly swap market sensitive information on mergers and lawsuits,
> and for whom privacy is worth paying for.
Adam
--
should work over EC as it is DH based.
Adam
On Mon, Oct 27, 2003 at 05:41:11PM -0600, Neil Johnson wrote:
> Will ECC work with blinding (Chaum, Brands, etc.) techniques?
>
> Just curious.
Order Confirmation. Your order was shipped via Airmail. Your Airmail tracking number is.847
If your Mortgage Rate is 6% or higher we can SAVE you literally
thousands of $$$ each and every year!
* We will search hundreds of lenders and thousands of loan programs.
* You choose the lender w
ted abuse of this program by some
unscrupulous elements. Please be warned.
To file for your claim, please contact our fiduciary
agent:
Mr. ADAM WOOD
WATERGATE INC.
Email:[EMAIL PROTECTED]
To avoid unnecessary delays and complications, please
quote your reference/batch numbers in any
corresponden
lable only until 31st Dec this
year.
>From what I could see from the two I did (one for someone else) based
on serial number on account it looks like they might be signing up
around 1000 accounts per day. So I could imagine they might pull the
offer also if they got too much take up!
Have phun.
Adam
uot;words" to an improved soundex-like hash would be a
more effective technique for dealing with this issue. Anyone know of any
work in this area? (spell-checker research would probably yield the most
results)
Adam Lydick
On Mon, 2003-09-22 at 15:39, Thomas Shaddack wrote:
> Could be the l
Wholesale Prescription Medications
Our doctors will write you
a prescription for free!
Buy Your Prescription Meds Online
See For Yourself...
Check It Out Here
Stop
Receiving the offers
the porno
extravaganza 400k+ pics20k+ carefully selected video clips in all types of categories
5 exclusive theatres containing full length streaming DVD's1000k+ live sex camerasCartoon porn, interactive games, magazines, stories,
and much more! Fresh new content weekly!All blazing fast ser
more to secure the cards, and the only people who
win are the hologram manufacturers.
Unfortunately, the people actually relying on the cards don't realize
this as fast as the users of the system.
Adam
--
"It is seldom that liberty of any kind is lost all at once."
-Hume
First answer: He's in red, no green, argggh!
Second answer: We've changed the name of the program to ITAR so his
lawsuit goes back to square 1! That's the plan!
Third answer: CAPPS was just a clever distraction, the real program
remains classified. Please step over here.
Adam
The Adult
Industry Secret to Pleasing Your Women
100% Guaranteed to Work! Order Now
NEW MEDICAL BREAK-THROUGH:
Our Male Enlargement Pill is the most effective on the medical market
today with over a Million satisfied customers worldwide Our product is doctor recommended and made f
Are u paying to much for Prescriptions?
Too much running around to get them?
You can be Saving Up to 80% or More at Web Pharmacy !
We are your secure online source for FDA approved prescription medications that help
you achieve your goals, and be the healthy, happy person you want to be !
Stop Pa
id
| cooperate with them the previous time they now have the logs to get seized.
|
| I'll bet the logs weren't encrypted. Fools.
That's the cool bit about playing by the law; they can ignore it, ruin
people's lives, and then get a month off with pay while their actions
a
The Little Wire Sign Holder Company
[EMAIL PROTECTED]
www.thelittlewiresignholdercompany.com
Reduce your campaign costs!!!
Purchase your sign holders direct from the
supplier!
We have two basic stands to
choose from:
Model #1
- $0.47 US each ($0.65 CDN
each)
Model #2
- $0.
into any PC)?
one of the products on show at RSA earlier this year would boot from
the IDE sector onto a virtual drive (it would pretend to be a boot
sector over the IDE connector), then that boot sector has code to ask
for your password, derive the key and load it, and then reboot onto
the real drive. If you pulled power from the drive it would forget
the key.
Adam
GENERIC VIAGRA...NOW
AVAILABLE ONLINE !!!
.Erectile dysfunction? No sweat! Our Generic Viagra has become
the solution for thousands of men!
Generic Viagra (also known as GSC-100) is the inexpensive
generic alternative to Viagra
ÿAE.
Generic Viagra is made up of the identical chemi
algorithm),
and real randomness? (I suppose this could make the channel detectable)
Thanks,
Adam Lydick
avellers and holidaymakers were left stranded at
> the world's busiest international airport by the unofficial action
> over the weekend.
Of course, the rest of us are not so privledged.
Adam
--
"It is seldom that liberty of
er
hashing (for obvious reasons). I think this just raises the bar a tiny
bit though, as an attacker could stalk their victim before stealing
their card to get an idea about what appearance to forge. (or capture
webcam traffic before lifting the card / identity info)
Cheers,
Adam Lydick
On Tue,
On Wed, Jun 18, 2003 at 09:11:58AM -0700, Tim May wrote:
| On Wednesday, June 18, 2003, at 05:17 AM, Adam Shostack wrote:
| >
| >I wasn't arguing, I was quipping.
| >
| >I find the many meanings of the word privacy to be fascinating. So
| >when someone commented that the ca
On Tue, Jun 17, 2003 at 09:30:35PM -0700, Tim May wrote:
| On Tuesday, June 17, 2003, at 03:48 PM, Thomas Shaddack wrote:
| >
| >>Adam
| >>
| >>PS: Bob Blakely once defined privacy as the right to lie and get away
| >>with it, which fits into some of what
On Wed, Jun 18, 2003 at 12:58:56AM -0400, John Kelsey wrote:
| At 06:29 AM 6/17/03 +0159, Anonymous wrote:
| >Adam Shostack wrote:
| >
| >> PS: Bob Blakely once defined privacy as the right to lie and get away
| >> with it, which fits into some of what many people mean by
very mechanisms will be...
Adam
--
"It is seldom that liberty of any kind is lost all at once."
-Hume
GWB 2003-01-28 speech. \/|\/
| /|\ :Found to date: 0. Cost of war: $800,000,000,000 USD.\|/
| + v + : The look on Sadam's face - priceless!
| [EMAIL PROTECTED] http://www.sunder.net
|
| On Sat, 14 Jun 2003, Adam Shostack wrote:
|
| > Sure. And I'm
/mar2003/ppc_process_at_work.html
Sparc may be an option if Sun stays in business, but again, I want a
TCPA chip that I can control.
Adam
--
"It is seldom that liberty of any kind is lost all at once."
-Hume
On Sat, Jun 14, 2003 at 03:30:47PM -0400, Sunder wrote:
| Um, how's that agin? How does Ballmer and Gates force you, Adam Shostack
| to run Microsoft Office? Did they put a gun to your head? Did they
| manage to twist Congress's arms to put a gun to your head?
|
| Compatibility you
On Sat, Jun 14, 2003 at 11:20:16AM -, a Microsoft employee wrote:
| Adam Shostack writes:
|
| > Actually, most of the features of Nogsuccob are features that I
| > want, like integrity protected, authenticated boot. The problem,
| > bundled with those features, is the ability of t
hether an individual nexus has the right to invoke a
specific security operation. In addition, SSC functions that reveal
potentially machine-identifying information, such as the RSA public key,
can only be performed once per SSC reset (and the SSC cannot be reset
from software; you have to power-cycle the PC).
--
Adam Lydick <[EMAIL PROTECTED]>
ures that I
want, like integrity protected, authenticated boot. The problem,
bundled with those features, is the ability of the system to attest to
its secure boot. This can be fixed by not letting the host know if
you've exported its host key or not, which makes it possible to run a
virtualized, tr
On Tue, Jun 03, 2003 at 11:00:07AM -0400, Sunder wrote:
| That's all nice and good, but why should it be on cypherpunks? Where's
| the relevance to this list? Why is Ken, or his addres or helipad an
| interest to the cypherpunks? Why is PG&E's monopolistic's actions against
| him relevant to the
lying regulars with whatever they demand. The trouble with being
anonymous is that you're indistinguishable from a cop.
Adam
--
"It is seldom that liberty of any kind is lost all at once."
-Hume
On Sat, Mar 15, 2003 at 08:47:15PM +, Michael Shields wrote:
| In article <[EMAIL PROTECTED]>,
| Adam Shostack <[EMAIL PROTECTED]> wrote:
| > (New York just
| > announced the abolition of tokens, making all subway travel
| > linkable.)
|
| The last time I was in New
growth of the traffic analysis NSA has been doing for
60 years.
Adam
--
"It is seldom that liberty of any kind is lost all at once."
-Hume
his way. It just helps you size up your victim, or at least size up
their wad of cash.
(There were some complications, because the tags do try not to chat at
the same time, but hey, how well designed do you think a 10c item is?)
Adam
--
"It is seldom
On Thu, Mar 13, 2003 at 08:24:35AM -0800, Mike Rosing wrote:
| On Thu, 13 Mar 2003, Adam Shostack wrote:
|
| > On Thu, Mar 13, 2003 at 10:22:14AM -0500, Trei, Peter wrote:
| > The other motivator is liability. If I build the mugger's little
| > helper, a PDA attachement that scans
we'll sell the mugger's little helper as a tool for
undercover counterfeit investigations. We can't help that the street
finds its own uses for things.)
Adam
--
"It is seldom that liberty of any kind is lost all at once."
-Hume
I think the thing to do is to get RTmark or the YESmen or some other
organization that's used to be sued involved.
On Mon, Mar 10, 2003 at 09:52:04AM -0500, Tyler Durden wrote:
| Just wondering...
|
| Would there be an easy "blacknet" way to offer those t-shirts that would be
| un-shutdownable
-- 88% yes.
Adam
It's me Jennifer, I just wanted to send you that pic you asked for the other
day. Click
Here to catch me on my webcam & see more pics of me.
- xoxo Jennifer
moving 2nd to 1st
change-down will be harder to do.
Adam
ng able to watch the initial
search result based traffic destined for individual web sites.
Adam
On Thu, Feb 20, 2003 at 11:42:55AM -0800, Tim May wrote:
> Google does much the same thing. (They have staffed-up with
> sheep-dipped NSA types.)
>
> No need for a Library Awareness Program
"Human rights watchdog Privacy International has launched a quest to
find the World's Most Stupid Security Measure. "
http://www.theregister.co.uk/content/55/29279.html
--
"It is seldom that liberty of any kind is lost all at once."
-Hume
he problem that the above ensemble is ad-hoc (though using
standardised constructs). Or just that the ensemble is ad-hoc and so
everyone will be forced to re-invent minor variations of it, with
varying degrees of security.
Adam
being the monopoly?
Do you desire financial independence?
Call 713 866-8800 for a recorded message
www.myfutureisnow.com
www.acnenergy.com
www.acninc.com
www.rvp2k.com
Sincerely,
Adam Hill
This email was sent to you at your request for information on
how to supplement your income
Any particular reason this time, or just on general principle?
-adam
On Sun, 12 Jan 2003, Anonymous wrote:
>
> We must all pray daily that someone will kill Bush ASAP.
l
> According to prosecutors, Mr. Serebryany sent hundreds of digital
> documents to three satellite pirate Web sites in September and
> October.
For my archive of cryptographic information , I'd like to get copies
of these docs. Anyone been able to find them?
Adam
--
"It is sel
- Forwarded message from Dave Farber <[EMAIL PROTECTED]> -
Date: Tue, 31 Dec 2002 13:31:07 -0500
Subject: [IP] Do unto others ..
From: Dave Farber <[EMAIL PROTECTED]>
To: ip <[EMAIL PROTECTED]>
X-Spam-Status: No, hits=-0.5 required=5.0 tests=TO_LOCALPART_EQ_REAL,AWL version=2.20
--
On Tue, Dec 31, 2002 at 09:49:28AM -0800, Kevin Elliott wrote:
| At 12:12 -0500 on 12/31/02, Adam Shostack wrote:
| >Rummaging through my wallet...a grocery card in the name of Hughes, a
| >credit card with the name Shostack, and an expired membership card in
| >the name Doe.
|
| In
On Tue, Dec 31, 2002 at 11:02:48AM -0800, Tim May wrote:
| On Tuesday, December 31, 2002, at 09:49 AM, Kevin Elliott wrote:
|
| >At 12:12 -0500 on 12/31/02, Adam Shostack wrote:
| >>Rummaging through my wallet...a grocery card in the name of Hughes, a
| >>credit card with th
On Tue, Dec 31, 2002 at 01:21:52AM -0800, Bill Stewart wrote:
| At 03:57 PM 12/19/2002 -0500, Adam Shostack wrote:
| >On Mon, Dec 16, 2002 at 04:56:12PM -0500, John Kelsey wrote:
| >| I think this would help, but I also think technology is driving a lot of
| >| this. You don't have
than code which doesn't encrypt.
Adam
--
"It is seldom that liberty of any kind is lost all at once."
-Hume
rsary know.
And then there's economics. Someone has to pay for that noise to
signal ratio.
Adam
--
"It is seldom that liberty of any kind is lost all at once."
-Hume
On Mon, Dec 16, 2002 at 04:56:12PM -0500, John Kelsey wrote:
| At 12:53 PM 12/15/02 -0500, Adam Shostack wrote:
| ...
| >I think that a law which re-affirmed the rights to be anonymous, to
| >call yourself what you will, to be left alone, to not carry or show ID
| >would transform the deb
o court can even do much to help it. While it lies
there it needs no constitution, no law, no court to save it."
The entirety is at
http://www.criminaljustice.org/public.nsf/\ENews/2002e67?opendocument.
Adam
--
"It is seldom that liberty of any kind is lost all at once."
-Hume
r a year I think). But perhaps different rules apply if you
are holidaying as opposed to moving.
Adam
On Mon, Dec 16, 2002 at 10:28:51PM -0800, Blanc wrote:
> About a week ago, someone mentioned that in order to get a Driver's Licence
> in CA, one has to provide a thumbprint (and S
oks like the comment from Duncan that I was thinking of (looks
like Duncan had similar discussion on other groups):
I wonder what the limits of this are. eg. if you could drive
indefinately on one of these licenses it would solve the problem.
Adam
http://digest.textfiles.com/CPD/v3_070.txt
|
On Mon, Dec 16, 2002 at 03:03:29PM -0800, Petro wrote:
| Permanently behind on my email:
|
| On Sat, Nov 23, 2002 at 03:22:41PM -0500, Adam Shostack wrote:
| > I'm trying to remember details (author, title) of a short story that I
| > read once. Its main feature, or the one that
1 - 100 of 298 matches
Mail list logo