Tom wrote:
The problem with both is the need of SSL certificates. So I
was thinking of setting up a Joe Doe's CA. A simple webpage
where you can request a certificate. It would do two check:
a) check if IP you are using is identical to the IP you are
requesting for, i.e. you'll have to
Ed wrote:
At 07:17 PM 6/2/02, Lucky Green wrote:
In United States v. Cruikshank, 92 U.S. 542 (1876), the
Supreme Court
held that:
...
The right to bear arms is not granted by the Constitution;
neither is
it in any manner dependent upon that instrument for its
existence
Ed wrote:
At 07:17 PM 6/2/02, Lucky Green wrote:
In United States v. Cruikshank, 92 U.S. 542 (1876), the
Supreme Court
held that:
...
The right to bear arms is not granted by the Constitution;
neither is
it in any manner dependent upon that instrument for its
existence
Curt wrote:
I concur. The problem is that the most prevalent e-mail
program (Outlook) requires no user intervention as a default
when signing and/or encrypting a message with S/MIME. One
can override the default to High Security (requiring
password) only while the X.509 certificate is
Mike wrote:
And what's to prevent it from happening at a high level if
there's enough profit in it? MPAA is a tiny market compared
to the rest of the electronics industry - it will be easy to
bypass the law on a huge scale. You don't need to be a
sufficiently talented electrical
Mike wrote:
Thanks, that was very enlightening. The URL is good too -
they mention that An electronic signature is defined as being:
an electronic sound, symbol or process attached to or
logically associated with a contract or other record and
executed or adopted by a person
Curt wrote:
I concur. The problem is that the most prevalent e-mail
program (Outlook) requires no user intervention as a default
when signing and/or encrypting a message with S/MIME. One
can override the default to High Security (requiring
password) only while the X.509 certificate is
Mike wrote:
And what's to prevent it from happening at a high level if
there's enough profit in it? MPAA is a tiny market compared
to the rest of the electronics industry - it will be easy to
bypass the law on a huge scale. You don't need to be a
sufficiently talented electrical
Mike wrote:
Thanks, that was very enlightening. The URL is good too -
they mention that An electronic signature is defined as being:
an electronic sound, symbol or process attached to or
logically associated with a contract or other record and
executed or adopted by a person
Peter wrote:
Yup. Actually the no-stored-IV encryption was never designed
to be a non- malleable cipher mode, the design goal was to
allow encryption-with-IV without having to explicitly store
an IV. For PWRI it has the additional nice feature of
avoiding collisions when you use a
Curt Smith wrote:
It is strange that crypto was a lot more popular back when
cryptography export was heavily controlled. Many people
fought for their crypto rights, but cannot be bothered with
encrypted e-mail. It is similar to securing the right to
vote and then declining to do so.
Peter wrote:
Yup. Actually the no-stored-IV encryption was never designed
to be a non- malleable cipher mode, the design goal was to
allow encryption-with-IV without having to explicitly store
an IV. For PWRI it has the additional nice feature of
avoiding collisions when you use a
Tim wrote:
On Sunday, May 26, 2002, at 10:07 AM, John Young wrote:
Thomas Friedman in the New York Times today:
http://www.nytimes.com/2002/05/26/opinion/26FRIE.html
Webbed, Wired and Worried, May 26, 2002
pose these questions to techies. I found at least some of their
You may be asking yourself: where, oh where, has all the crypto gone?
Where are the BlackNet's? Where is the untraceable Ecash? Where is the
Cryptanarchy that we've been waiting for? For that matter...where is the
crypto?
The staunchest Cypherpunk will by now have noticed that PGP/GPG usage
even
Adam wrote:
Which is too bad. If NAI-PGP went away completely, then
compatability problems would be reduced. I also expect that
the German goverment group currently funding GPG would be
more willing to fund UI work for windows.
Tell me about it. PGP, GPG, and all its variants need to
Meyer Wolfsheim wrote:
NAI is now taking steps to remove the remaining copies of PGP
from the Internet, not long after announcing that the company
will not release its fully completed Mac OS X and Windows XP
versions, and will no longer sell any copies of its PGP software.
Do we still
James wrote:
IPV6 to the rescue.
Every network behind a NAT router should set up a 6to4
tunnel, probably some time early in 2003.
IPv6 is almost source code compatible with IPv4, so every
application should soon be recompiled to be IPv6 compatible.
Every computer with a recent
I would like to direct anybody's attention who is interested in
transparent drive encryption to GEOM, which will be a native feature of
FreeBSD 5.0.
GEOM is a project that is slated for inclusion in the release of FreeBSD
5.0, a major upgrade to FreeBSD that has been years in the making, due
out
Peter wrote:
I have seen hard drives which do sector level encryption, and
hook into the bios so that the pw request happens before any
system sw runs. This is a good solution (modulo bios
hacking)[...]
Any such hard drives that I have seen keep the actual encryption key
utilized in
Peter wrote:
I have seen hard drives which do sector level encryption, and
hook into the bios so that the pw request happens before any
system sw runs. This is a good solution (modulo bios
hacking)[...]
Any such hard drives that I have seen keep the actual encryption key
utilized in
[Written originally in response to a post on Cryptography. --Lucky]
Enzo wrote:
Further to Lucky's comments: in the last few days I have
discussed keysize issues with a few people on a couple of
mailing lists, and I have encountered a hostility to large
keysizes of which, frankly, I don't
Steve wrote:
[Note: The WSJ's take on the Sirius petition. Pay heed to
the 'meltdown'
comment from Powell!]
SATELLITE RADIO OPERATORS COMPLAIN ABOUT WI-FI INTERFERENCE
[...]
http://online.wsj.com/article/0,,SB1017613134883515920.djm,00.html
(sub
req'd)
I wonder how long it will take
Adam Back wrote:
So I was trying to decrypt this stored mail sent to me by a
GPG user, and lo pgp6.x failed to decrypt it.
[Long story about PGP/gpg version incompatibility elided]
If I understand you correctly, you are saying that the latest version of
gpg has a bug in that it doesn't
[OK, let me try this again, since we clearly got off on the wrong foot
here. My apologies for overreacting to Damien's post; I have been
receiving dozens of emails from the far corners of the Net over the last
few days that alternatively claimed that I was a stooge of the NSA
because everybody
[OK, let me try this again, since we clearly got off on the wrong foot
here. My apologies for overreacting to Damien's post; I have been
receiving dozens of emails from the far corners of the Net over the last
few days that alternatively claimed that I was a stooge of the NSA
because everybody
be considered compromised. The revoked keys and my
new keys are attached below.
--Lucky Green
-BEGIN PGP PUBLIC KEY BLOCK-
[Keys elided to comply with LNE node message size constraints].
Eugene wrote:
possibly even false ones? and even Western Europe. As
official policy? I wonder which genius comes up with those ideas.
What I fail to understand is where the news are in this article. Yes,
the US government, as all governments, is engaging in disinformation,
deception, and
If you are having first-hand experience running an encrypted file system
on FreeBSD, could you please get in touch with me?
Thanks,
--Lucky
platform is continuing to lose the adoption rate fight
against PocketPC, basing any new product on the future availability of
next-generation Palm devices places the software developer's business
model at risk.
--Lucky Green
Ryan wrote:
Everyone has palm pilots already. WinCE-based PocketPCs
haven't made much of a dent in the marketplace. There is
also a very large developer community for palm apps, and
they're widely deployed in
corporations.
I am not sure that the existance of a large developer
to destroy the key server?
Lucky: Right. [I guess they no longer shoot military
suppliers who's products endanger the armed forces for treason].
-- Lucky Green [EMAIL PROTECTED] PGP encrypted
email preferred.
recommend against its purchase.
In summary, at present trustworthy end-to-end encrypting GSM handsets are
not available in the market place.
-- Lucky Green [EMAIL PROTECTED] PGP encrypted email preferred.
Meyer Wolfsheim wrote in reply:
Do you know how many messages are going through the
remailer network
now? How many do you think the average remailer processes in a day?
I'm assuming 5-10K/day. I don't know what Tim and others
discussed at the meeting that Tim references. Ask him.
As a member of the OPSEC Professionals Society (OPS)
http://www.opsec.org/, I would encourage any Cypherpunk interested in
operational security to make use of the wealth of information and
training material that can be ordered from the US Interagency OPSEC
Support Staff website at
PROTECTED]
Subject: RE: FreeSWAN Release 1.93 ships!
On Sunday 09 December 2001 07:32 pm, Lucky Green
[EMAIL PROTECTED] wrote:
The big question is: will FreeS/WAN latest release after some 4 or 5
years of development finally both compile and install cleanly on
current versions of Red Hat
George wrote:
I had an urge to take a look at
the magic money code, I was unable to
find it, my googling just led me to
old dead extinct URLs.
Does anyone know of an URL for it that
currently works?
ftp://zedz.net/pub/crypto/ecash/
--Lucky
Greg wrote:
That's very warm and fuzzy and hippy-like, but if these
tokens are handed
out for free, then what, exactly, is their value?
I think the Extropians did something like that, which ended
in some sort of
fiasco which some cypherpunks were involved in, though I
don't know the
[Redundant/inappropriate lists elided].
The page at Amazon. COM claims that the book in question will ship in
December of this year. I seem to recall having read announcements in
years past that the book would ship in the respective years. Methinks
that a mere claim of a future ship date in 2001
Undoubtedly, the bruises on the suspect's body and the electrical burn
marks on his testicles were self-inflicted... Oh, I see. The FBI will
release the suspect's body only after cremation. For the public's
safety. Never mind my comment.
I didn't see it mentioned on this list, though I may have
Anon wrote:
On Fri, 14 Sep 2001, Nomen Nescio wrote:
Right, ninja troops carrying away bespectacled, nerdly remailer
operators. Here's a better fantasy. They'll hire $1000/night
superhookers and seduce the remailer operators into giving up their
keys. Both have about equal chances of
This Cnet show keeps getting better. The host is now quoting Declan's
article, stating that fortunately Declan's affectionatos are not in
charge. And apparently an An Metet has emailed him a death thread... The
host, David Lawrence, read the death thread on the air.
This is on the air right
Nomen wrote, replying to Greg:
---
You're about to begin running a remailer. Apparently you haven't done
so before. Well, it should be quite an education. Keep it up for a
year and you'll be more qualified to judge whether this technology is
good or bad, on balance. One thing is
Normen wrote:
Oh and Im sure having guns on board planes would work out great
especially considering the increase of people having huge fucking fits
and having to be held down on planes, yeah, lets arm people on planes.
Ignoring for a moment if it is indeed true that
Having run one of the first Mixmaster remailers ever from a shell account at
Netcom years ago, I am ready to set up a new remailer to fill in the gaps
created by some remail ops shutting down their remailers in the wake of
recent events.
Unfortunately, compiling Mixmaster on FreeBSD has become
On Fri, 7 Sep 2001, A. Melon wrote:
Does anyone know Eric Hughes' current email address? the ricocet one is,
of course, non-functional now.
eh(a_t)speakeasy.net
-- Lucky Green [EMAIL PROTECTED] PGP encrypted email preferred.
Ray wrote:
[...] as one who
is not of the Priveleged Caste in terms of access to legal information,
(ie, willing to pay thousands of bucks to Westlaw or whoever each
year) I am grateful to him for passing it on.
There are Cypherpunks without a Westlaw or LEXIS login? The mind boggles...
in the
future.
--Lucky Green [EMAIL PROTECTED]
"Anytime you decrypt... its against the law".
Jack Valenti, President, Motion Picture Association of America in
a sworn deposition, 2000-06-06
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf
this inquiry to more appropriate fora that you might be
aware of.
Thanks,
--Lucky Green [EMAIL PROTECTED]
"Anytime you decrypt... its against the law".
Jack Valenti, President, Motion Picture Association of America in
a sworn deposition, 2000-06-06
er company that fell prey to the DigiCash
"we know better than the market what the market wants" syndrome. What a
shame, really.
--Lucky Green [EMAIL PROTECTED]
"Anytime you decrypt... its against the law".
Jack Valenti, President, Motion Picture Association of America in
a sworn deposition, 2000-06-06
r now at least) or the
government will censor us (harshly)".
Get in the game,
--Lucky Green [EMAIL PROTECTED]
"Anytime you decrypt... its against the law".
Jack Valenti, President, Motion Picture Association of America in
a sworn deposition, 2000-06-06
he expense of the others does
not count.
--Lucky Green [EMAIL PROTECTED]
"Anytime you decrypt... its against the law".
Jack Valenti, President, Motion Picture Association of America in
a sworn deposition, 2000-06-06
we Mac
users had to look elsewhere for our ISPs.
Net Cruiser. It was a logical step to take for Netcom, given the state of IP
client software for Windows at the time, but made obsolete pretty much the
moment it was released by TIA.
--Lucky Green [EMAIL PROTECTED]
"Anytime you decrypt..
On Wed, 11 Oct 2000, jim bell wrote:
A popular, but false, myth. The video cards radiate more than
the CRT's.
Laptops tend to be the worst offenders.
--Lucky Green [EMAIL PROTECTED]
As to the video cards...
Sorry, Lucky, but you're going to have to support this a little better
a secret Paxman admirer.
A popular, but false, myth. The video cards radiate more than the CRT's.
Laptops tend to be the worst offenders.
--Lucky Green [EMAIL PROTECTED]
"Anytime you decrypt... its against the law".
Jack Valenti, President, Motion Picture Association of America in
A more interesting question might be: where does one get depleted uranium. I
looked, but found no useful information on the Net. Surely there can't be
much restrictions on this stuff.
[The even more interesting question of course is where to obtain enriched
uranium}.
--Lucky Green [EMAIL
The other day, somebody posted a pointer to an article about the investor
that purchased MIR. Having read the article, I believe it warrants posting
in its entirety.
--Lucky Green [EMAIL PROTECTED]
"Anytime you decrypt: that's against the law".
Jack Valenti, President, Moti
Mon, 5 Oct 92. I remember this post well. Time flies...
--Lucky Green [EMAIL PROTECTED]
"Anytime you decrypt: that's against the law".
Jack Valenti, President, Motion Picture Association of America in
a sworn deposition, 2000-06-06
-Original Message-
From: [EMAIL
t
remember the title.
--Lucky Green [EMAIL PROTECTED]
"Anytime you decrypt: that's against the law".
Jack Valenti, President, Motion Picture Association of America in
a sworn deposition, 2000-06-06
A cite would make this post a lot more credible.
--Lucky Green [EMAIL PROTECTED]
"Anytime you decrypt: that's against the law".
Jack Valenti, President, Motion Picture Association of America in
a sworn deposition, 2000-06-06
-Original Message-
From: [EMAIL PROTECTE
be missing for long.
--Lucky Green [EMAIL PROTECTED]
"Anytime you decrypt: that's against the law".
Jack Valenti, President, Motion Picture Association of America in
a sworn deposition, 2000-06-06
I added a fitting photo to my PGP key. If you believe this to be me, please
do sign the photo. PGP key ID 0x375AD924.
Thanks,
--Lucky Green [EMAIL PROTECTED]
"Anytime you decrypt: that's against the law".
Jack Valenti, President, Motion Picture Association of America in
, I find that my minions, lackeys, cohorts, and
I have need of cell phones that encrypt the conversation between
two or more users. Anyone sell these in the US of A?
Yes. (But hard to find and expensive).
Are they
legal to own operate?
Yes.
--Lucky Green [EMAIL PROTECTED]
"Anytim
I am having a devil of a time finding sources for used Cisco routers. In
particular, I need two 3640. Any idea where to find them for cheap? (Of
course there is a Cypherpunks connection. Or I wouldn't post it here).
--Lucky Green [EMAIL PROTECTED]
"Anytime you circumvent an encryption
For PDF417, start by looking at
http://www.isaac.cs.berkeley.edu/tools/pdf417-1.0.tar.gz
-- Lucky, who sponsored the project some 5 years ago...
--Lucky Green [EMAIL PROTECTED]
"Anytime you circumvent an encryption, you are violating the law".
"Anytime you decrypt... that's
Bob' Morgan wrote:
Sent: Wednesday, June 14, 2000 16:39
To: Multiple recipients of list
Subject: Re: Help add strong crypto to AirPorts
On Wed, 14 Jun 2000, William Allen Simpson wrote:
But part of this is a problem with the Lucent design. There is
only one
key for the entire
ood chance of remaining secure for many
decades. In the long run, the total of 4 calendar years spent on the effort
will be considered worth it.
In just a few months, AES will have been chosen. Expect the cryptanalysts to
turn their attention to targets closer to the heart of Cypherpunks soon
thereafter
Patrick Henry wrote:
[About ZKS being mentioned in the WSJ]
One can only wonder where we're headed when cypherpunkery gets
this mainstream.
I don't know where we are headed. But I do know where we are: Cypherpunks is
about strong crypto, open source, and peer review of that source. With the
provision sponsored by Schumer is
about par. Less than par actually. I am surprised he isn't calling for an
outright ban of assault crypto. Guess he's holding this in reserve for
"Phase II".
--Lucky Green [EMAIL PROTECTED]
"Among the many misdeeds of British rule in India, history wi
than vague descriptions of the
supposed locations of these camps. GPS coordinates are pretty much a must.
Extraordinary claims require at least a shred of evidence. No, wild-eyed
assertions do not evidence make.
--Lucky Green [EMAIL PROTECTED]
"Among the many misdeeds of British rule in
. The company's official statement can be
found at http://www.napster.com/metallica-notice.html. Media coverage at
http://news.cnet.com/news/0-1005-200-1847464.html
-- Lucky Green [EMAIL PROTECTED] PGP encrypted email preferred.
Keyser-soze wrote:
[On stegoing data into MP3 cover traffic].
So has anyone developed an MP3 stego program?
Yes. http://www.cl.cam.ac.uk/~fapp2/steganography/mp3stego/
Unfortunately, the highly compressed MP3's are technically ill-suited to
serve as carriers for stegoed data. What you really
I suspect the anonymous poster already knows all of the following and is
just trying to troll, but on the slim chance that he doesn't, here are the
facts:
The ATF claims that the agents began shooting after they had approached the
front door and were surprised by full-auto fire shot *through the
I am not surprised that the negatives can't be found. After all, the steel
front door of the church, which Waco survivors hold would show that the
bullet holes in it were made from the outside (thereby by the ATF), has
vanished from the evidence room without a trace.
--Lucky Green [EMAIL
I am not aware of any high-end data recovery outfits that use software
solutions. Everybody I know of in that space uses STM's. I believe it was
Peter Gutmann who publicized the fact that you can buy STM workstations that
ship with vacuum chucks for all popular platter sizes.
--Lucky Green
101 - 174 of 174 matches
Mail list logo