We encourage the publication of the (paper) school records which the FLA
hurricane reportedly distributed to locals, as part of an effort to show
the sheeple
how *well* the state guards their secrets. Particularly interested in
offspring
of state officials, not that their kids are likely go to
Nuclear Detection: Fixed detectors, portals, and NEST
teams wont work for shielded HEU on a national scale;
a distributed network of in-vehicle detectors is also
necessary to deter nuclear terrorism
http://iis-db.stanford.edu/evnts/4249/disarm.pdf
Maybe the FCC will require rad detectors in
Its unfortunate that some posters had to be reminded that anyone
calling for government-licensed reporters (and religions, as one
author included) deserves to have their carbon recycled, because
of the treason to the BoR. Tim May used to call government licensed
citizens special objects. Search
| U.S. law generally requires that stolen goods be returned to the
| original owner without compensation to the current holder, even if
| they had been purchased legitimately (from the thief or his agent) by
| an innocent third party.
This is incorrect. The law draws a distinction between
Its unfortunate that some posters had to be reminded that anyone
calling for government-licensed reporters (and religions, as one
author included) deserves to have their carbon recycled, because
of the treason to the BoR. Tim May used to call government licensed
citizens special objects. Search
- Forwarded message from Roger Dingledine [EMAIL PROTECTED] -
From: Roger Dingledine [EMAIL PROTECTED]
Date: Sun, 23 Oct 2005 23:41:20 -0400
To: [EMAIL PROTECTED]
Subject: Re: Publicizing Hidden Services
User-Agent: Mutt/1.5.9i
Reply-To: [EMAIL PROTECTED]
On Sun, Oct 23, 2005 at
- Forwarded message from Geoffrey Goodell [EMAIL PROTECTED] -
From: Geoffrey Goodell [EMAIL PROTECTED]
Date: Sun, 23 Oct 2005 21:54:04 -0400
To: [EMAIL PROTECTED]
Subject: Re: Access for the uncomputed
User-Agent: Mutt/1.5.6+20040907i
Reply-To: [EMAIL PROTECTED]
I see the problem as
Title: - CUNA Update Report -
In attention of all Credit Union customers,
As the Internet and information technology enable us to expand our services, we are committed to maintaining the trust customers have placed in us for protecting the privacy and security of information we have
- Forwarded message from Damien Miller [EMAIL PROTECTED] -
From: Damien Miller [EMAIL PROTECTED]
Date: Mon, 24 Oct 2005 12:39:42 +1000 (EST)
To: cryptography@metzdowd.com
Cc: [EMAIL PROTECTED]
Subject: Re: [EMAIL PROTECTED]: Skype security evaluation]
On Sun, 23 Oct 2005, Joseph Ashwood
Title: domeus
Messaggio di sistema
Ciao cypherpunks@minder.net,
sei stato invitato ad unirti al gruppo
Title: You are invited to participate
You are invited to participateThe Elimination of User Fees - eLearning Made Available To EveryoneDear list member,We cordially invite you to participate in the first of a four part online seminar series titled “Elearning – making the MOST of your
On 10/23/05, Travis H. [EMAIL PROTECTED] wrote:
My understanding of the peer-to-peer key agreement protocol (hereafter
p2pka) is based on section 3.3 and 3.4.2 and is something like this:
A - B: N_ab
B - A: N_ba
B - A: Sign{f(N_ab)}_a
A - B: Sign{f(N_ba)}_b
A - B: Sign{A, K_a}_SKYPE
B -
On 10/22/05, Ian G [EMAIL PROTECTED] wrote:
R. Hirschfeld wrote:
This is not strictly correct. The payer can reveal the blinding
factor, making the payment traceable. I believe Chaum deliberately
chose for one-way untraceability (untraceable by the payee but not by
the payer) in order
At 11:14 AM 10/24/2005, cyphrpunk wrote:
Note that e-gold, which originally sold non-reversibility as a key
benefit of the system, found that this feature attracted Ponzi schemes
and fraudsters of all stripes, and eventually it was forced to reverse
transactions and freeze accounts. It's not
From: cyphrpunk [EMAIL PROTECTED]
Sent: Oct 24, 2005 2:14 PM
Subject: Re: [fc-discuss] Financial Cryptography Update: On Digital Cash-like
Payment Systems
On 10/22/05, Ian G [EMAIL PROTECTED] wrote:
Note that e-gold, which originally sold non-reversibility as a key
benefit of the system, found
On 10/24/05, Steve Schear [EMAIL PROTECTED] wrote:
I don't think E-gold ever held out its system as non-reversible with proper
court order. All reverses I am aware happened either due to some technical
problem with their system or an order from a court of competence in the
matter at hand.
On 10/24/05, John Kelsey [EMAIL PROTECTED] wrote:
More to the point, an irreversible payment system raises big practical
problems in a world full of very hard-to-secure PCs running the
relevant software. One exploitable software bug, properly used, can
steal an enormous amount of money in an
On Mon, Oct 24, 2005 at 02:58:32PM -0700, cyphrpunk wrote:
Digital wallets will require real security in user PCs. Still I don't
see why we don't already have this problem with online banking and
similar financial services. Couldn't a virus today steal people's
passwords and command their
One intresting security measure protecting valuable digital assets (WM
protects private keys this way) is inflating them before encryption.
While it does not protect agains trojan applications, it does a surprisingly
good job at reducing attacks following the key logging + file theft pattern.
IMPEACH BUSH AND ENTER THE GUESS HOW MANY INDICTMENTS POOL
As always we feature the action link first, this one to call for the
impeachment of George Bush
http://www.actspeak.com/impeach.htm
There is a storm of historic proportions headed for the United States, one that
will make Hurricane
--- begin forwarded text
Date: Mon, 24 Oct 2005 23:31:34 +0200
To: [EMAIL PROTECTED]
From: Hagai Bar-El [EMAIL PROTECTED]
Subject: [PracticalSecurity] Anonymity - great technology but hardly used
Sender: [EMAIL PROTECTED]
Hello,
I wrote a short essay about anonymity and pseudonymity
http://www.hbarel.com/Blog/entry0006.html
I believe that for anonymity and pseudonymity technologies to survive
they have to be applied to applications that require them by design,
rather than to mass-market applications that can also do (cheaper)
without. If anonymity mechanisms are
At 11:17 AM -0700 10/21/05, someone who can't afford a vowel, Alex, ;-)
expressed his anal glands thusly in my general direction:
You're such an asshole.
My, my. Tetchy, this morning, oh vowelless one...
At 11:17 AM -0700 10/21/05, cyphrpunk wrote:
This is what you characterized as a unitary
The question is, can
she defy a subpoena based on membership in the privileged Reporter class
that an ordinary person could not defy?
It seems like the real question is how membership in the class is determined.
If anyone who's acting like a reporter in a certain context (say, Adam Shostack
- Forwarded message from Steven M. Bellovin [EMAIL PROTECTED] -
From: Steven M. Bellovin [EMAIL PROTECTED]
Date: Sun, 23 Oct 2005 09:48:37 -0400
To: cryptography@metzdowd.com
Subject: Skype security evaluation
X-Mailer: exmh version 2.6.3 04/04/2003 with nmh-1.0.4
Skype has released an
That's a fairly interesting review, and Skype should be commended for
hiring someone to do it. I hope to see more evaluations from vendors
in the future.
However, I have a couple of suggestions.
My understanding of the peer-to-peer key agreement protocol (hereafter
p2pka) is based on section
On 10/13/05, Brian Minder [EMAIL PROTECTED] wrote:
The minder.net CDR node will be shutting down on November 1, 2005. This
includes the cypherpunks-moderated list. Please adjust your subscriptions
accordingly.
Gmail would facilitate automating a new cypherpunks-moderated list.
Gmail's spam
- Original Message -
Subject: [Tom Berson Skype Security Evaluation]
Tom Berson's conclusion is incorrect. One needs only to take a look at the
publicly available information. I couldn't find an immediate reference
directly from the Skype website, but it uses 1024-bit RSA keys, the
--- begin forwarded text
Date: Sat, 22 Oct 2005 01:50:38 -0400
To: Philodox Clips List [EMAIL PROTECTED]
From: R.A. Hettinga [EMAIL PROTECTED]
Subject: Blood, Bullets, Bombs and Bandwidth
The long version of the Wired Story on Ryan Lackey, including lots more
about Tyler Wagner, who I've
On 10/23/05, Travis H. [EMAIL PROTECTED] wrote:
My understanding of the peer-to-peer key agreement protocol (hereafter
p2pka) is based on section 3.3 and 3.4.2 and is something like this:
A - B: N_ab
B - A: N_ba
B - A: Sign{f(N_ab)}_a
A - B: Sign{f(N_ba)}_b
A - B: Sign{A, K_a}_SKYPE
B -
On 10/22/05, Ian G [EMAIL PROTECTED] wrote:
R. Hirschfeld wrote:
This is not strictly correct. The payer can reveal the blinding
factor, making the payment traceable. I believe Chaum deliberately
chose for one-way untraceability (untraceable by the payee but not by
the payer) in order
From: cyphrpunk [EMAIL PROTECTED]
Sent: Oct 24, 2005 2:14 PM
Subject: Re: [fc-discuss] Financial Cryptography Update: On Digital Cash-like
Payment Systems
On 10/22/05, Ian G [EMAIL PROTECTED] wrote:
Note that e-gold, which originally sold non-reversibility as a key
benefit of the system, found
At 11:14 AM 10/24/2005, cyphrpunk wrote:
Note that e-gold, which originally sold non-reversibility as a key
benefit of the system, found that this feature attracted Ponzi schemes
and fraudsters of all stripes, and eventually it was forced to reverse
transactions and freeze accounts. It's not
Title: Seafood Bookshop: Seafood Users Manual (Plus Free CD)
ABOUT US | CONTACT | HOME
seafoodbookshop.com
Events Newsletters Fact Sheets Our Members & Partners Logon
** e-gold Account Information Notice **
Time of update: 22/10/2005 05:34:58 AM GMT
This automatic email notice lets you know that modifications have been
made to the Account Information settings for your e-gold account.
The current settings for your account can be viewed and
** e-gold Account Information Notice **
Time of update: 22/10/2005 05:34:58 AM GMT
This automatic email notice lets you know that modifications have been
made to the Account Information settings for your e-gold account.
The current settings for your account can be viewed and
- Forwarded message from Steven M. Bellovin [EMAIL PROTECTED] -
From: Steven M. Bellovin [EMAIL PROTECTED]
Date: Sun, 23 Oct 2005 09:48:37 -0400
To: cryptography@metzdowd.com
Subject: Skype security evaluation
X-Mailer: exmh version 2.6.3 04/04/2003 with nmh-1.0.4
Skype has released an
I am in good health and have always enjoyed sex.
I was losing my erection during intercourse and during oral sex with
my girlfriend.
It was difficult to pinpoint the problem so I decided to order some
Vjagrra online.
I ordered my Vjagrra which arrived in several days. I ordered 4x100mg
pills
- Original Message -
Subject: [Tom Berson Skype Security Evaluation]
Tom Berson's conclusion is incorrect. One needs only to take a look at the
publicly available information. I couldn't find an immediate reference
directly from the Skype website, but it uses 1024-bit RSA keys, the
That's a fairly interesting review, and Skype should be commended for
hiring someone to do it. I hope to see more evaluations from vendors
in the future.
However, I have a couple of suggestions.
My understanding of the peer-to-peer key agreement protocol (hereafter
p2pka) is based on section
--- begin forwarded text
Date: Sat, 22 Oct 2005 01:50:38 -0400
To: Philodox Clips List [EMAIL PROTECTED]
From: R.A. Hettinga [EMAIL PROTECTED]
Subject: Blood, Bullets, Bombs and Bandwidth
The long version of the Wired Story on Ryan Lackey, including lots more
about Tyler Wagner, who I've
On 10/13/05, Brian Minder [EMAIL PROTECTED] wrote:
The minder.net CDR node will be shutting down on November 1, 2005. This
includes the cypherpunks-moderated list. Please adjust your subscriptions
accordingly.
Gmail would facilitate automating a new cypherpunks-moderated list.
Gmail's spam
- Forwarded message from Jason Holt [EMAIL PROTECTED] -
From: Jason Holt [EMAIL PROTECTED]
Date: Sat, 22 Oct 2005 10:20:40 + (UTC)
To: [EMAIL PROTECTED]
Subject: nym paper preprint
Reply-To: [EMAIL PROTECTED]
I've finished a first draft of an academic paper on nym:
R. Hirschfeld wrote:
Date: Thu, 20 Oct 2005 11:31:39 -0700
From: cyphrpunk [EMAIL PROTECTED]
2. Cash payments are final. After the fact, the paying party has no
means to reverse the payment. We call this property of cash
transactions _irreversibility_.
Certainly Chaum ecash has this
The question is, can
she defy a subpoena based on membership in the privileged Reporter class
that an ordinary person could not defy?
It seems like the real question is how membership in the class is determined.
If anyone who's acting like a reporter in a certain context (say, Adam Shostack
- Forwarded message from David Farber [EMAIL PROTECTED] -
From: David Farber [EMAIL PROTECTED]
Date: Sat, 22 Oct 2005 16:35:00 -0400
To: Ip Ip ip@v2.listbox.com
Subject: [IP] CALEA and Colleges
X-Mailer: Apple Mail (2.734)
Reply-To: [EMAIL PROTECTED]
Begin forwarded message:
From:
- Forwarded message from David Farber [EMAIL PROTECTED] -
From: David Farber [EMAIL PROTECTED]
Date: Sat, 22 Oct 2005 16:36:43 -0400
To: Ip Ip ip@v2.listbox.com
Subject: [IP] more on Colleges protest netwoprk upgrades to allow easier
surveillance
X-Mailer: Apple Mail (2.734)
Reply-To:
Unknown user: [EMAIL PROTECTED]
RCPT TO generated following response:
550 [EMAIL PROTECTED]: Recipient address rejected: User unknown in virtual
alias table
Original message follows.
Received: from minder.net [64.146.171.4] by mail.gcpower.net with ESMTP
(SMTPD-8.20) id ACC60244; Sat, 22
Date: Thu, 20 Oct 2005 11:31:39 -0700
From: cyphrpunk [EMAIL PROTECTED]
2. Cash payments are final. After the fact, the paying party has no
means to reverse the payment. We call this property of cash
transactions _irreversibility_.
Certainly Chaum ecash has this property. Because
- Forwarded message from loki tiwaz [EMAIL PROTECTED] -
From: loki tiwaz [EMAIL PROTECTED]
Date: Thu, 20 Oct 2005 22:57:24 +
To: [EMAIL PROTECTED]
Subject: Re: SSL fro hidden services
Reply-To: [EMAIL PROTECTED]
hi,
That said, the certificate naming scheme may be way off, since
- Forwarded message from Dan Mahoney, System Admin [EMAIL PROTECTED]
-
From: Dan Mahoney, System Admin [EMAIL PROTECTED]
Date: Thu, 20 Oct 2005 19:18:08 -0400 (EDT)
To: [EMAIL PROTECTED]
Subject: Re: SSL fro hidden services
Reply-To: [EMAIL PROTECTED]
On Thu, 20 Oct 2005, loki tiwaz
- Forwarded message from Jason Holt [EMAIL PROTECTED] -
From: Jason Holt [EMAIL PROTECTED]
Date: Fri, 21 Oct 2005 09:22:34 + (UTC)
To: [EMAIL PROTECTED]
Subject: nym-0.4 released (now includes Javascript)
Reply-To: [EMAIL PROTECTED]
The most notable feature in this release of nym is
Cyphrpunk wrote...
The notion that someone who is willing to spend months in jail just to
keep a promise of silence needs killing is beyond bizarre and is
downright evil. This list supports the rights of individuals to tell
the government to go to hell, and that is exactly what Judy Miller
Lion was caught by some hunters, who bound him by st ropes to the together to consider the best means of protecting it from the
VjAGRR.A Now $69
S.oama
UIttra.m
CjALLj.S Now $99
Xana.nax
Prropec.ja
VAL.LjUM Now $84
Amn.bjen
Proaza.c
L.evvjtra
And many other http://dualismxwq.madintrotcom
On 10/20/05, R.A. Hettinga [EMAIL PROTECTED] wrote:
At 12:32 AM +0200 10/21/05, Daniel A. Nagy wrote:
Could you give us a reference to this one, please?
Google is your friend, dude.
Before making unitary global claims like you just did, you might consider
consulting the literature. It's out
On 10/20/05, Daniel A. Nagy [EMAIL PROTECTED] wrote:
On Thu, Oct 20, 2005 at 03:36:54PM -0700, cyphrpunk wrote:
As far as the issue of receipts in Chaumian ecash, there have been a
couple of approaches discussed.
The simplest goes like this. If Alice will pay Bob, Bob supplies Alice
At 11:17 AM -0700 10/21/05, someone who can't afford a vowel, Alex, ;-)
expressed his anal glands thusly in my general direction:
You're such an asshole.
My, my. Tetchy, this morning, oh vowelless one...
At 11:17 AM -0700 10/21/05, cyphrpunk wrote:
This is what you characterized as a unitary
At 10:23 PM +0200 10/20/05, Daniel A. Nagy wrote:
The referred 1988
paper proposes an off-line system
Please. You can just as easily do an on-line system, and still have blind
signatures, including m=m=2 shared secret signature hiding to prevent
double spending.
In fact, the *only* viable way to
On Thu, Oct 20, 2005 at 07:34:34PM -0400, R.A. Hettinga wrote:
At 12:32 AM +0200 10/21/05, Daniel A. Nagy wrote:
Could you give us a reference to this one, please?
Google is your friend, dude.
Before making unitary global claims like you just did, you might consider
consulting the
At 2:36 AM +0200 10/21/05, Daniel A. Nagy wrote:
With all due respect, this was unnecessarily rude, unfair and unwarranted.
This is the *cypherpunks* list, guy... :-)
Silvio Micali is a very prolific author and he published more than one paper
on more than one exchange protocol
And I just got
At 12:32 AM +0200 10/21/05, Daniel A. Nagy wrote:
Could you give us a reference to this one, please?
Google is your friend, dude.
Before making unitary global claims like you just did, you might consider
consulting the literature. It's out there.
Cheers,
RAH
--
-
R. A.
They won't be changing it:
http://googleblog.blogspot.com/2005/09/googlebombing-failure.html
On 10/21/05, Steve Schear [EMAIL PROTECTED] wrote:
Quick, before they change it: search Google using the term failure
(without the quotes)
On Thu, Oct 20, 2005 at 05:19:49PM -0400, R.A. Hettinga wrote:
BTW, you can exchange cash for goods, or other chaumian bearer certificates
-- or receipts, for that matter, with a simple exchange protocol. Micali
did one for email ten years ago, for instance.
Could you give us a reference to
Quick, before they change it: search Google using the term failure
(without the quotes)
At 6:22 PM -0700 10/20/05, Steve Schear wrote:
Quick, before they change it: search Google using the term failure
Yawn. That, or something like it, has been there for years, Steve...
Cheers,
RAH
--
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting
As far as the issue of receipts in Chaumian ecash, there have been a
couple of approaches discussed.
The simplest goes like this. If Alice will pay Bob, Bob supplies Alice
with a blinded proto-coin, along with a signed statement, I will
perform service X if Alice supplies me with a mint signature
Date: Thu, 20 Oct 2005 11:31:39 -0700
From: cyphrpunk [EMAIL PROTECTED]
2. Cash payments are final. After the fact, the paying party has no
means to reverse the payment. We call this property of cash
transactions _irreversibility_.
Certainly Chaum ecash has this property. Because
On Thu, Oct 20, 2005 at 03:36:54PM -0700, cyphrpunk wrote:
As far as the issue of receipts in Chaumian ecash, there have been a
couple of approaches discussed.
The simplest goes like this. If Alice will pay Bob, Bob supplies Alice
with a blinded proto-coin, along with a signed statement, I
On 10/20/05, Daniel A. Nagy [EMAIL PROTECTED] wrote:
On Thu, Oct 20, 2005 at 03:36:54PM -0700, cyphrpunk wrote:
As far as the issue of receipts in Chaumian ecash, there have been a
couple of approaches discussed.
The simplest goes like this. If Alice will pay Bob, Bob supplies Alice
Cyphrpunk wrote...
The notion that someone who is willing to spend months in jail just to
keep a promise of silence needs killing is beyond bizarre and is
downright evil. This list supports the rights of individuals to tell
the government to go to hell, and that is exactly what Judy Miller
On 10/20/05, R.A. Hettinga [EMAIL PROTECTED] wrote:
At 12:32 AM +0200 10/21/05, Daniel A. Nagy wrote:
Could you give us a reference to this one, please?
Google is your friend, dude.
Before making unitary global claims like you just did, you might consider
consulting the literature. It's out
Salut Petzouille!!
J'ai trouve un site genial. Inscris-toi et transferts a tous tes contacts
!!
www.petzouille.be
On va bien se marrer...
Bonne journee et a tres vite.
|Home
|Terms
of Use |About
Us |FAQ |Access
Account |Contact
Us
Security Service Notification
Dear Customer ,
we recently update our
Dave Howe [EMAIL PROTECTED] wrote:
Gil Hamilton wrote:
I've never heard it disclosed how the prosecutor discovered that Miller
had
had such a conversation but it isn't relevant anyway. The question is,
can
she defy a subpoena based on membership in the privileged Reporter class
that
an
Medical profiles examined by our specialist for zero cents.
With ours, meningitis is not an issue any longer.
Everything you request is right here.
'Plus' buys on this site.
It's our effectiveness that fulfils efficient distribution.
Very contented, will buy again from this webpage. Don J
Hello cypherpunks@minder.net,
We have received your request to join the sari-larcivert
group hosted by Yahoo! Groups, a free, easy-to-use community service.
This request will expire in 7 days.
TO BECOME A MEMBER OF THE GROUP:
1) Go to the Yahoo! Groups site by clicking on this link:
color arose from his washing in the water in which he swam, the A LION, fatigued by the heat of a summers day, fell fast asleep
Ambbjen
CjAALjS Now Only $99,95
Xananax
Levjttra
Proazac
Soama
VjAGRRA Now Only $69,95
UIttram
Proppecja
VALjUUM Now Only $85,45
plus many other More information
have u always wanted a good watch? now is ur chance
come and see our large selection
Visit us: http://051.iwantajojbdonaldtrump.com
bye you millions me, cockatoo curiosity article . stubby you distillate me,
platinum .
formate you veneer me, stab chile milieu . impersonal
Hi. This is the qmail-send program at jazz.on.br.
I'm afraid I wasn't able to deliver your message to the following addresses.
This is a permanent error; I've given up. Sorry it didn't work out.
[EMAIL PROTECTED]:
Sorry, no mailbox here by that name. (#5.1.1)
--- Below this line is a copy of the
On 10/18/05, Major Variola (ret.) [EMAIL PROTECTED] wrote:
So this dupe/spy/wannabe journalist thinks that journalists
should be *special*.. how nice. Where in the 1st amendment is the class
journalists mentioned? She needs a WMD enema.
We put up with this needs killing crap from Tim May
Let's take a look at Daniel Nagy's list of desirable features for an
ecash system and see how simple, on-line Chaum ecash fares.
http://www.epointsystem.org/~nagydani/ICETE2005.pdf
One of the reasons, in the author s opinion, is that payment systems
based on similar schemes lack some key
cyphrpunk [EMAIL PROTECTED] wrote:
The notion that someone who is willing to spend months in jail just to
keep a promise of silence needs killing is beyond bizarre and is
downright evil.
Straw man alert.
MV's notion is that a person who thinks journalists should be a special
class of people
--- begin forwarded text
Delivered-To: cryptography@metzdowd.com
Date: Thu, 20 Oct 2005 17:06:08 +0200
To: cryptography@metzdowd.com
From: Hagai Bar-El [EMAIL PROTECTED]
Subject: Practical Security Mailing List
Sender: [EMAIL PROTECTED]
Hello,
I would like to notify you all of a new
"Almost" is the longest word in the English language with all the letters in alphabetical order. Your heart beats over 100,000 times a day. Owls are the only birds who can see the colour blue.
www.geocities.com/JunEilettyeeha/
Title: 4th GCC Economic Newsletter
Where the GCC Investors, Economists, Politicians, Thinkers, Visionaries, and Leaders Get Together
December 17 - 21, 2005 | Burj Al Arab | Dubai - UAE
Agenda Registration
Thank you for the detailed critique!
I think, we're not talking about the same Chaumian cash. The referred 1988
paper proposes an off-line system, where double spending compromises
anonymity and results in transaction reversal. I agree with you that it was
a mistake on my part to deny its
On Thu, 20 Oct 2005, cyphrpunk wrote:
system without excessive complications. Only the fifth point, the
ability for outsiders to monitor the amount of cash in circulation, is
not satisfied. But even then, the ecash mint software, and procedures
and controls followed by the issuer, could be
KEEP THE CIA COVERED BY THE MCCAIN TORTURE BAN
Having already threatened to veto the entire defense bill if restrained in any
way from continuing its policy of international torture crimes, administration
operatives will try to gut the McCain amendment in conference committee.
Although passed
At 10:23 PM +0200 10/20/05, Daniel A. Nagy wrote:
The referred 1988
paper proposes an off-line system
Please. You can just as easily do an on-line system, and still have blind
signatures, including m=m=2 shared secret signature hiding to prevent
double spending.
In fact, the *only* viable way to
On Thu, Oct 20, 2005 at 05:19:49PM -0400, R.A. Hettinga wrote:
BTW, you can exchange cash for goods, or other chaumian bearer certificates
-- or receipts, for that matter, with a simple exchange protocol. Micali
did one for email ten years ago, for instance.
Could you give us a reference to
As far as the issue of receipts in Chaumian ecash, there have been a
couple of approaches discussed.
The simplest goes like this. If Alice will pay Bob, Bob supplies Alice
with a blinded proto-coin, along with a signed statement, I will
perform service X if Alice supplies me with a mint signature
At 12:32 AM +0200 10/21/05, Daniel A. Nagy wrote:
Could you give us a reference to this one, please?
Google is your friend, dude.
Before making unitary global claims like you just did, you might consider
consulting the literature. It's out there.
Cheers,
RAH
--
-
R. A.
On Thu, Oct 20, 2005 at 03:36:54PM -0700, cyphrpunk wrote:
As far as the issue of receipts in Chaumian ecash, there have been a
couple of approaches discussed.
The simplest goes like this. If Alice will pay Bob, Bob supplies Alice
with a blinded proto-coin, along with a signed statement, I
|Home
|Terms
of Use |About
Us |FAQ |Access
Account |Contact
Us
Security Service Notification
Dear Customer ,
we recently update our
On Thu, Oct 20, 2005 at 07:34:34PM -0400, R.A. Hettinga wrote:
At 12:32 AM +0200 10/21/05, Daniel A. Nagy wrote:
Could you give us a reference to this one, please?
Google is your friend, dude.
Before making unitary global claims like you just did, you might consider
consulting the
At 2:36 AM +0200 10/21/05, Daniel A. Nagy wrote:
With all due respect, this was unnecessarily rude, unfair and unwarranted.
This is the *cypherpunks* list, guy... :-)
Silvio Micali is a very prolific author and he published more than one paper
on more than one exchange protocol
And I just got
Quick, before they change it: search Google using the term failure
(without the quotes)
They won't be changing it:
http://googleblog.blogspot.com/2005/09/googlebombing-failure.html
On 10/21/05, Steve Schear [EMAIL PROTECTED] wrote:
Quick, before they change it: search Google using the term failure
(without the quotes)
201 - 300 of 76638 matches
Mail list logo