> But now we're back to the question: how can Tor be improved to deal with
> this very serious and important problem? What are the steps that might
> be taken, however imperfect, to reduce the amount of abuse coming from
> Tor nodes?
That's trivial: charge Tor-originated users for editing. That 0
Just a tiny interesting operation found out via routine misspelling that can
breed paranoia in idle minds:
sprint has smtp to SMS gateway for its customers running at
messaging.sprintpcs.com, so if you e-mail to
[EMAIL PROTECTED] the user gets message on the phone.
Interestingly enough, there i
> Google cookies last as long as possible -- until 2038. If you've
And you are allowing cookies because ... ?
And you are keeping cookies past the session because ... ?
Too lazy not to?
To lazy to login again?
Inherent belief that commercial entity should make your life easy for purely
phila
> I'm still having trouble understanding your threat model.
Just assume braindeath and it becomes obvious.
No tla with any dignity left would bother e-mail providers or try to get your
password. All it need to do is fill gforms and get access to tapped traffic at
major nodes (say, 20 in US is suf
This very likely means that someone already has MM figured out; the question is
not whether it will be revealed, but when.
> All of these attacks focus on finding the master secret MM value; once
> that is found, the security of the system collapses. Given a KSV it is
> immediately possible t
The simplest solution is to systematically spread one's DNA everywhere, thus
making 'discovery' of it meaningless.
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
__
Do you Yahoo!?
Yahoo! Mail - now with 250MB free
> If you want to be invisible to lawyers, you have to use something else.
Whoever wants to design something 'else' should first see Monty Python's "How
not to be seen" sketch (or was it "Importance of not being seen" ?)
It applies pretty well to all current techniques for moving unpaid copyrighte
Apologies for introducing crypto-related stuff:
RNG that reads minds and predicts future:
http://www.rednova.com/news/display/?id=126649
Can This Black Box See Into the Future?
DEEP in the basement of a dusty university library in Edinburgh lies a
small black box, roughly the size of two ci
Unless I'm missing something obvious, it seems impossible to divine the
origination IP address from gmail-sourced e-mail headers. The first IP (the
last header) has 10.*.*.* form and is of course internal to google.
This is not the case with any other e-mail service I know of (mixmaster
excluded),
> What are the possible solutions for the remailers? Make all
> remailers middleman only and adding the ability to opt-in for
Open wireless access points.
No one said you are entitled to mail anonymously from the comfort of your
home/office. Stop whining.
=
end
(of original message)
> A cool thing for this purpose could be a patch for gcc to produce unique
> code every time, perhaps using some of the polymorphic methods used by
> viruses.
The purpose would be that they do not figure out that you are using some
security program, so they don't suspect that noise in the file o
>The impracticability of breaking symmetric ciphers is only a
>comparatively small part of the overall problem.
I see that "it can be done only by brute farce" myth is live and well.
Hint: all major cryptanalytic advances, where governments broke a cypher and
general public found out few *decades
> If VOIP gets no protection, then you'll see a lot of "digital" bugs in
Protection of bits by legislation ???
Why is this a subject ? If you don't encrypt you will be listened to. Who the
fuck cares if intercept is legal or not. That is irrelevant. It's like trying
to obsolete summer clothing by
> incriminating, and the State has a substantial interest in knowing who you
> are -- you may need medicating, or you may owe the government money, or
Exactly ... and maybe you are on this "consumer" list:
http://bmj.bmjjournals.com/cgi/content/full/328/7454/1458
>The president's commission fou
> However, it should be known that fiberglass (eg van) panels are
> transparent
> to uwaves AFAIK and that a van with soft tires is a 0th-order
0.25" glass will cost you 2-2.5 dB.
> At sufficiently good mechanical stabilization and gain, you will
> encounter perhaps
The best way to do this is to
> If there's any kind of leakage bias, then a high-powered signal might get a
> few bits through. After that, only a Palm OS expert will know if there's
> some kind of signal that can tease the Palm awake and then get it to swallow
> some kind of trojan.
Bits are not marbles to exist outside re
>Does anyone know whether the low-power nature of wireless LANs protects
>them from eavesdropping by satellite?
GSM cell phones have been successfully tapped via sat. Power is greater (up to
.5w) but antennas are worse, so effective radiated energy is very similar, as
are frequencies.
=
end
> underground railroad would have worked better, but your still black.
Obviously you don't know about whitening properties of moder ciphers!
Seriously, today the distingushing marks among classes, tribes and castes are
far more informational than physical. So today crypto *can* make you white, or
Can a TLA please give some sign here, any sign - just ack that you know the
list exists, otherwise the legitimacy of cpunks is definitely going down the
drain.
Looks like a Berlin wall syndrome.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
Forget about repeater.
13-15 db flat panel antenna will get you access to distant APs - up to one mile
in favourable conditions.
18db grid dish will connect you to omnidirectional AP within 2 miles.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
__
> Because it means you can complete call to the POTs with no
> company-controlled switch involved, meaning no where to serve a court
> order. Since the call could be routed through a few intermediate nodes and
I see.
So, in the real world, X uses this to make telephone threats, your POTS gets
> What I'd like to see is a P2P telephony that also supports end-user
> gateways to the POTS. I'm not certain, but I think there are some MS
I don't get what does this have to do with crypto.
Outside crypto, this didn't quite work with (almost) public fax gateways of
'90s. In theory, you could
> Its like steganalysis. Its an arms race between measuring your own
> signatures vs. what the Adversary can measure. If sentence length
> is a metric known to you, you can write filters that warn you.
> Similarly for the Adversary. You end up in an arms race
> over metrics ---who has the more
> http://lists.cryptnet.net/mailman/listinfo/cpunx-news
>
> Be sure and check the archive before posting. It is still small.
Cookies, "members only" archive access. Bad deal. Will not happen. Very few
consumers here.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam fol
> If you spatially fft a random photo, you'll find that the image detail
> energy largely occupies certain bands. These are not the bands that stego
> uses (or so I assume...it really can't be otherwise). The stego-able
> spectrum will indeed be noise, but this noise will have a certain spectrum
> Does anyone have a reasonably complete cypherpunks archive available
> for FTP? Perhaps I could host them on my server and let Google index
> them. That might be useful.
There are only two live ones. Someone knows more ?
The second one is FTP-able:
http://groups.yahoo.com/group/cypherpunks-ln
> I've been wondering why I havent seen more discussion on
> wireless networking (802.11a/b/g) and anon/mix /dark nets.
> Is this a subject of interest to anyone? I am curious what
> kinds of work has been done in this area...
Check the archives.
Wireless solves all crypto anonymity problems for
> You might check out David Chaum's latest solution at
> http://www.vreceipt.com/, there are more details in the whitepaper:
> http://www.vreceipt.com/article.pdf
That is irrelevant. Whatever the solution is it must be understandable and
verifiable by the Standard high school dropout. Also, the tr
> Somebody please tell me that this is a nightmare, and I am about to
> wake up.
Let's see ... was there a contract to keep things up ad infinitum ?
This is a good step, part of waking up from the dream that there are free
things on Internet. If there is no eyeball-catching value to be derived fr
> From what I've gathered from the diagrams in [1], it seems to be using
> AES-256
> in counter-mode XORed together with Twofish counter-mode output, Twofish also
> being keyed with a 256 bit value. I sense paranoia here - but being paranoid
> myself sometimes I very much welcome this decision! Tho
> I have a few friends like thisanyone have suggestions for ways to change
> their minds?
>
> Basically they say things like "If you think the government can't break all
> the encryption schemes that we have, you're nuts." This guy was a math major
> too, so he understands the principles of c
Isn't it really simpler to use RSA and DH and ECC in series ? Why choose ONE ?
There is no good reason for that.
Looks like PSYOP to me.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
__
Do you Yahoo!?
Exclusive Video Premiere
Looks like the only way to shield from DOS is to raise the cost of DOS. This
will eventually eliminate the low cost of Internet bandwidth, one way or
another. You don't get nearly the same amount of DOS on your telephone as you
do on Internet, right ? Because telephone call is not free and/or it's
And what is the purpose of connecting the key and data storage in the first
place ?
Data storage is data storage, concealed or not. You feed encrypted data to/from
it.
Key is required at human interface and has absolutely nothing to do with the
storage.
If you want better security than passphras
It took less than a decade for EFF to make a full turn, from championing
unrestricted uses of technology to censoring who can do what and in which way.
In this regards EFF resembles technological empires - like Cisco, for example,
that get born because of radically new ways to do things and then e
> infrastructure for these. "Everyone" knows about them
> by using a common boostrap server to bootstrap into
> the Jxta network to gain the addresses of a few
> Rendezvous nodes. Rendezvous nodes then propagate
So they are subject to lawsuits. Anyone running them can be traced and
persuaded by
> stable IP address. Super-peers on the Jxta network run
> application-level routers which store special
> information such as how to reach peers, how to join
So these super peers are reliable, non-vulnerable, although everyone knows
where they are, because ?
=
end
(of original message
Well, cats *do* have a quite strict hierarchy which is far from ad-hoc
establishment of the pecking order. So the analogy dosn't hold with cat
behavioral experts.
However, if cats could perform anonymized hissing, biting and scratching, then
I'm sure that cypherpunk maillist would be a good analog
What Tim is (correctly) observing here is that a working challenge to the force
monopoly is a very effective way to modify behaviour.
Where Tim is wrong, though, is that he may have anything resembling a working
challenge.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam
> as a solid dish. (The uwaves see the screen as solid, however.) With
> that much gain (ie directionality) wind could mess with your (albeit brief)
> connection.
This one has 30 degree coverage and is perfect for connecting to consumer APs
up to a mile: http://www.tranzeo.com/products.php?cmd=v
> >If the digicash isn't anonymous, it's worthless.
>
> I'd argue to the contrary. First, "most people have nothing to hide".
> The folks will want digicash for reasons other than anonymity, as argued
You are misusing the term "cash". What you are describing are essentially
"internet debit cards.
> Those are the hard problems. No one in biometrics
> has yet been able to solve them in a general way.
And the merchant example is the wrong application.
The merchant doesn't care WHO you are - that's a false premise.
Merchant cares if you can pay. Now, that's a completely solvable issue.
Of
> There's a good reason why, viz: it would cost the drive developer to allow
> or export this flexibility. Since very few customers are sick enough
This will go the same way as radio. First, you have hundreds of separate boxes,
each doing some custom modulation/frequency gig (am, fm, shortwave, T
> "security", but having both the user and administrator configure a per
> host secret was apparently out of the question.
There is no such thing as "automatic security." That's an oxymoron.
Any system that is "secure" without the ongoing burn of end-user brain cycles
is subject to more-or-less e
>Religions are essentially collections of stories about the latter method
Religions are artificial shortcuts to "knowledge" and excellent method to
neutralize congenital human curiosity. If you can't comprehend it, fake it.
They all offer explanations of various phenomena by using familiar human m
> The solution to this is Palladium (NGSCB).
>
> You'd want each ecommerce site to download a Nexus Computing Agent into
> the client. This should be no more difficult than downloading an Active-X
> control or some other DLL. The NCA has a manifest file associated with it
No shit? This is moron
> Just FYI, if you read up on G (general intelligence factor), you will
> learn that the *only* cause of death that increases with G is dying in
> airplanes.
Surviving flying is very much similar to exercising safe crypto practices; you
must examine the source and recompile PGP for each message. O
> I'm wondering why Cryptome decided to place thisB particular piece of
> opinion.B
> It is not inkeeping w/ the type of stuff I've read here before, in terms of
> it being a straightB opinion piece, not a document,B federal register entry,
> etc..B Why did "you" (who is that exactly, anyway?) c
> This is what we need to fight. And this was, and perhaps still is, the
> promises of unlinkable credentials, of untraceable digital cash, and of
> "True Names." Crypto anarchy is needed now more than ever.
There are hardly battlegrounds available. Software runs on machines big ones
make, bits
> From the OSI 7-layer model, which took it from the fact that the number 7 is
It's simpler than that. Russians wanted 6, americans 8.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.c
>>1) Fucks up the prevailing religion doctrine.
>>
>Funny, but I can't seem to find the passage in the Bible where it talks
>about cloning. In fact, I can't find any passage that even remotely
>impinges on the subject.
Provided that I had the christian cult in mind (where I am not an connoisseu
>What would be the valid reason for the government to claim power
>to regulate her egg, her skin DNA, and her uterus?
1) Fucks up the prevailing religion doctrine.
2) Gives subjects an extra degree of freedom - imagine black ghetto females
giving birth to whities, uninfluenced by the local Bell
>Holy Fuck I love this! Were it a novel, I'd be willing to steal it a la file
>sharing.
Some things, like general education and breadth of interests, one just can't
fake. Redneckpunk, a very woody kind of word.
HST
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follo
>The whole "Cell Phones - The Next Generation" thing
>has been a pure marketing scam from the beginning.
Experience demonstrates that any term with "generation" in it is pure BS,
technically and financially.
Most advances in technology are illusions created by dumbing down of the
populace.
> Expect to hear not of a hausfrau being busted, but of the roundup (so
> to speak) of Mohammed Sayeed, Hariq Azaz, and other thought criminals
> for buying two many gallons of Roundup at the local Walmart.
I'd guess that the credit card usage among People With Wrong Sounding Names is
falling sh
> Speculation: I expect the battles over cyberspace to shift to the OS,
> with the leading private (non open source) OS makers "enlisted" in the
> War Against Illegal Thoughts. The easiest initial front in this war,
> one the OS companies like Apple and Microsoft have a corporate interest
> in,
> But what I don't fully "get" is why stance matters, per se. For instance,
> take p2p. We can actually argue all we want about what government should/not
> do about "the problem", but in the end file sharing is just about
> unstoppable.
>
> If I write or release an app, then, that will facilitate
Crossposted from nettime.
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Always Nice to be Recognized
Always Nice to be Recognized
by Tom Sherman
[hardcopy in FUSE Magazine (Toronto), Volume 25, No. 4, November 2002]
The key to the future is privacy. Privacy is not just a territory
> Interesting approach. But exactly how does that hinder the FBI
> demanding a booksellers customer list, or a library's patron
> check out record, or a black bag job on a personal computer, or
> thousands of CALEA taps, or the Total Information Awareness
> project, or the process of designatin
> society, what can the regular person do to strike a blow in
> opposition to the direct attack on the Constitution and civil
> liberties and civil rights?
Stop watching TV ?
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Afforda
> In a way, Mathew's and Choate's attack upon the list has done
> us a favour. The list is now effectively restricted to those
> with the will and ability to use filters, which raises the
> required intelligence level.
Does this vindicate homeopathy ?
=
end
(of original message)
Y-a*h*o-o
> I'm watching a New York television news show reporting on one of the
> recent cases where people sign away their rights. This is about
> requests sent out by schools that parents of students sign a pledge
> that alcohol, loud parties, and late night activities will not be
> permitted at their
> >But we will always have phone booths and acoustic couplers.
>
> Phone booths already don't accept calls, by State Fiat. You think
> detecting and dropping modem calls from a CO is tough?
It's just a matter of designing a (software ?) modem that will, instead of
whisling and peeping, emulate s
> cards with external antenna port. For cell phones the entire instrument
> could be placed in at the reflector's focus and operated via a mic/headset
> adapter (some older Nokia models have an external antenna port behind a
> small rubber plug on the rear.)
Cellphone taped in focal point of a
> Lousy latency. Just put your DNA-encoded message in a microdot on your
> dead tree letter, and PCR/sequence on arrival.
Isn't all snail mail already irradiated ? Then soon.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus Powerful. Affordab
> couldn't be used to record video and then (after appropriate protection)
> swallowed.
Eventually this will happen. Maybe a video recorded into a DNA of a bacteria
synthesized in a portable device ("diamond age", anyone ?)
Ne protocols will be required ("if I infect this east coast girl, how l
>Mojo was intended to do this but it failed, I think it failed
>because they failed to monetize mojo before it was introduced
>as service management mechanism.
I think that there is a generic failure of systems that expect some
pre-determined benevolence and cooperation from end users. Contrary to
> It's a state of mind wich can only be compared with mental ilness...
> (I've read that there are even some neurological similarities between the
> faithful and the mentaly ill)
The belief (faith) center is somewhere in the frontal cortex and that mutation
was essential for development of the c
> Other methods seek to eliminate the need for various levels of pre-knowledge
> between Bob and Alice, and to also stave off the "round up" scenario where a
> large group is examined and cleansed of all electronica, before data can
Live streaming is out of question as it would make detection t
Any wide-dissemination system must be distributed. Usenet used to fill this
role, but due to aggregation of major nodes and feeds it is not that any more.
Anything on the "web" has fixed pointers and already is or soon will be become
chokable. I'd be surprised if there is no development in progres
> A police ministers meeting in Darwin this week
> agreed it was "unacceptable websites advocating or facilitating violent
protest
> action be accessible from Australia".
This is just a CIA psyop to make US look good. USA and China.
=
end
(of original message)
Y-a*h*o-o (yes, they scan
> building I inspect, my own work not excepted. You have to battle to get
> contractors to do it right. And owners to pay for quality work and
> maintenance
> rather than wait for vicitms and insurance companies to pay the tithe of
> negligence.
This is the same problem as with other expenses with
I see an open search engine as the most important server project. Limit the
engine to cpunkish issues and similar to control the popularity (bandwidth).
Run your own harvesters/spiders. This would help limit the google monopoly and
power and provide a search engine of choice for the (gasp) "communi
> Item: At most Cypherpunks meetings someone is sitting with their laptop
> open, recording notes (or whatever). I usually wonder what they plan to
> do with the notes...not in any paranoid sense, just wondering if
> they'll ever look at the notes again, and why.
Taking notes ???
We're just ch
> Does anyone know the truth from his own eyes, or a more
> complete set of images?
The Civic Center Plaza was practically filled. It's about 150 x 100 meters,
assuming 2 people per m2 it comes to around 30,000, and there were lots of
people around as well.
=
end
(of original message)
Y-a*h
> There are potential medical uses of this sort of technology -
> enough computer abusers and other desk-job workers with bad backs
> or similar health problems that could benefit from analyzing how they walk,
> but obviously Darpa's not going to find that. Perhaps we can get
There are expensive,
> sector offices or nuclear power plants. Instead of swiping a smart card,
> employees could swipe the arm containing the chip.
A new must-have item for terrorists: cleaver.
This is sillier than biometrics ... while you may talk the attacker out of
plucking your eyeballs or cutting off fingers (
> surrounding a white van near a Richmond gas station.
Toyota, GM and Ford all reported huge drop in white van sales, to a virtual
zero. Ford also asked dealers to remove white vans from "highly visible"
locations.
Unrelated, several body shops are advertising discounts on "white van
conversion"
> Also, can your tool use floppies instead of USB keys?
It's a freakin' C program that works on a file - but carrying a floppy around
is so ... ordinary.
> There are problems with KGB-quality attackers recovering overwritten data
> which are probably much more serious for disks than flash rom,
>
>Law enforcement officials say they have stopped hundreds of white vans
>and box trucks in recent weeks during the desperate search for the killer.
And the probability of the sniper (TM) being an utter idiot and continuing to
use such a vehicle instead of red corvette is ... 0.1 ?
=
en
> Pretty much, yes. at least one "real world" OTP system assumes you will
> be using three CDRW disks; the three are xored (as you say) together,
I have a working OTP system on $40 64 Mb USB flash disk on my keychain.
The disk mounts on windoze and macs, and also contains all s/w required to
enc
>Does this run on linux?
Also, if regular cheapo PC sounboards can digitize 30 MHz (and Nyquist says
this requires 60 MHz sampling rate) then some product managers need ...
flogging.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
Faith Hill - Exclusive
> I fail to see how anyone, anytime, anywhere, can support
> the hunting of random non-consenting humans for sport.
This is a favourite bipedal pastime. We all support it. It's good and fills one
with joy and satisfaction.
Major tournaments are called "wars" and we hardly can wait for the next
Looks like familiar event with /soccer moms/s//cypherpunks/g applied. Are girl
& boy scouts offered as well?
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
Faith Hill - Exclusive Performances, Videos & More
http://faith.yahoo.com
> It seems to be strange that he wrote at <[EMAIL PROTECTED]>,
> an address which is also given on his web page, but
> ping pipeline.com doesn't work.
Sorry to resort to ad hominem, but you're a technological imbecile.
There is this magic thing in DNS called "MX record". Read about it.
=
> What email encryption is actually in use?
PGP 2.6.*, 6.* & 7.* work like a charm across macs & windoze & unices provided
that one specs RSA-legacy keys and limit algo to IDEA. In other words, be 2.6.2
compatible.
If you need encryption, that is. If you don't need encryption (like in They
Will
> I found a stainless steel locking pliers multi-tool behind my ice chest
> on my deck. Someone probably used it at the party as a bottle opener
The black spot on the side that looks like a screw head is actually a camera.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this)
> Better than a radar detector for emissionless, but visible, cops. Over
> the hill coverage. Issues of
This will be banned under WIPO and copyright laws - you may enjoy cop's
presence for yourself, but transmitting it is same as broadcasting a live show
without permission - after all, the all
Just wondering ... in a life & death situation (say, blackmailing att.
general), what would be the choice of readers of this forum:
a) use mixmaster remailer from their home/business/friend.
b) use an internet cafe
c) use an open wireless AP
b and c assume, of course, one-time use of a throw
http://www.ITsecurity.com/
The Encyclopedia of Computer Security
(a complete one-source location for information security news, products,
whitepapers, events, definitions and much more)
requires the use of JavaScript for navigation and display purposes.
Please switch JavaScript on in your Bro
> There has been an awful lot of discussion on this here in CP land,
> so maybe some responses too?
>
> A good place to put forward suggestions to make hard calculations
> a requirement of delivery or maybe some digicash to pay for it?
SMTP will never change, assuming it is a pipe dream. There
The principal philosophical issue here is that the ownership of the "computer"
terminates.
So far most people owned their computers in the sense that they could make
transistors inside do anything they liked, provided they had some
easily-obtainable knowledge. Content/software vendors had their s
Carnival Booth: An Algorithm for Defeating the Computer-Assisted
Passenger Screening System
http://swissnet.ai.mit.edu/6805/student-papers/spring02-papers/caps.htm
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Health - Feel better, live better
http:
> Consider setting up a secure video call with somebody,
> and each of you reading the hash of your DH parameter to the other.
> It's really hard for a MITM to fake that - but if you don't know
> what the other person looks or sounds like, do you know it's really them,
> or did you just have an un
> Only way I can think of is to physically control your deadtree print sheet
> and require the Feebs to manually enter the dozen topo-feature-locations
This assumes no androids among Them.
The days of anonymity by default are over. All straws in the haystack have been
barcoded, and needle stands
> Of course, nothing can stop Amazon from entering your credit card data
> and/or address into another program. They need to see this data in
> order to perform their normal business functions, and anyone can read
> it off the screen and type it into another computer. But the point
> is, they ca
> Speaking personally, if asked "DRM & privacy, both or neither?"
> then I will take "both" -- YMMV.
This bullshit is getting deeper and thicker.
(dis)ability to replay received information at will has next to nothing to do
with ability to stop unwanted parties from obtaining secret information
> objection is not the simulation. We just can't buy the explanation of why
> the computer system bothers to maintain not only the simulation but
> humanity. Supposedly, the computer system needs people as a power source.
As all Matrix cognoscenti know, the machines use humans to extract otherwis
> Vitas - I hope you're enjoying your stay at the Millenium & Copthorne Hotels,
> where you're using the internet service.
It's depressing how IQ of TLA personnel is inversely proportional to the amount
of money pumped into them.
TLAE (TLA effectiveness) seems to be a universal constant.
=
> > >It's clearly not your shoe size in kilo-angstroms, unless you have MIGHTY
> > >large feet. According to 'units', that works out to 4860 inches.
> >
> > Obviously it's my hat size then.
>
> I always knew you had a fat head ;)
The real point here that 100% context-free situations are very
1 - 100 of 193 matches
Mail list logo