Jack Lloyd wrote:
>On Wed, 31 Jul 2002, Steve Schear wrote:
>
>> Looks amazingly familiar. Could it be, could be, could it be Mojo
>> Nation (now MNet http://mnet.sourceforge.net )?
>
>Or OpenCM (http://www.opencm.org)
> -Jack
On the OpenCM webpage, it proclaims on the right hand side:
> > One useful piece of advice:
> >
> > Don't but pizza with a credit card:
> > SNIP
> >
> > Course all those terrorists buying their pizzas with cash get away clean.
>
>
> I've wondered for years how much longer this
> will be allowed. Cash is still viable. Not
> as viable as it was 10, or ev
On Wed, 31 Jul 2002 16:10:26 +0100, you wrote:
>
> On Wednesday, July 31, 2002, at 04:51 am, James A. Donald wrote:
> On 29 Jul 2002 at 15:35, AARG! Anonymous wrote:
> both Palladium and TCPA deny that they are designed to restrict
> what applications you run. The TPM FAQ at
> http://www.trusted
I proposed a construct which could be used for this application:
called "amortizable hashcash".
http://www.cypherspace.org/hashcash/amortizable.pdf
The application I had in mind was also file sharing. (This was
sometime in Mar 2000). I described this problem as the "disitrbuted
documen
--
James A. Donald:
> > The plan, already implemented, is to flood file sharing
> > systems with bogus files or broken files. The solution, not
> > yet implemented, is to attach digital signatures to files, and
> > have the file sharing software recognize certain signatures as
> > good or bad
On Wed, 31 Jul 2002, Steve Schear wrote:
> Looks amazingly familiar. Could it be, could be, could it be Mojo
> Nation (now MNet http://mnet.sourceforge.net )?
Or OpenCM (http://www.opencm.org)
-Jack
--
29 Jul 2002 at 15:35, AARG! Anonymous wrote:
> > > both Palladium and TCPA deny that they are designed to
> > > restrict what applications you run.
James A. Donald:
> > They deny that intent, but physically they have that
> > capability.
On 31 Jul 2002 at 16:10, Nicko van Someren wrote:
--
On 31 Jul 2002 at 11:01, Eugen Leitl wrote:
> The issue of node reputation is completely orthogonal to the
> document hashes not colliding. Reputation based systems are
> useful, because document URI
> http://localhost:4711/f70539bb32961f3d7dba42a9c51442c1218a9100
> doesn't say what's in t
WHITE HOUSE SOUNDS CALL FOR NEW INTERNET STANDARDS
The Bush administration's cyber security czar, Richard Clarke, said it might
be time to replace the "creaky, cranky" 20-year-old protocols that drive the
Internet with standards better able to accommodate a flood of new wireless
devices. Wireless
> AARG! Anonymous wrote:
> James Donald wrote:
>> On 29 Jul 2002 at 15:35, AARG! Anonymous wrote:
>>> both Palladium and TCPA deny that they are designed to restrict
>>> what applications you run. The TPM FAQ at
>>> http://www.trustedcomputing.org/docs/TPM_QA_071802.pdf reads
>>
>> They deny th
Anonymous wrote:
> On Tue, 30 Jul 2002 20:51:24 -0700, you wrote:
>
>>When we approve a file, all the people who approved it already get
>>added to our trust list, thus helping us select files, and we are
>>told that so and so got added to our list of people who recommend
>>good files. This give
On Tue, 30 Jul 2002 22:50:35 -0400 (EDT), you wrote:
>
> A Q&A exchange between me and Eugene Volokh:
> [Eugene's responses in square brackets.]
>
> The topic was Gilmore v. Ashcroft -- FAA ID Challenge in which John
> Gilmore is suing the Feds to be allowed to fly domestically without ID.
>
> So,
I imagine there's a world of difference between "will" and "would."
-Declan
On Mon, Jul 29, 2002 at 03:35:32PM -0700, AARG!Anonymous wrote:
> Can you find anything in this spec that would do what David Wagner says
> above, restrict what applications you could run? Despite studying this
> spec
> AARG! Anonymous[SMTP:[EMAIL PROTECTED]] writes:
> Declan McCullagh writes at
> http://zdnet.com.com/2100-1107-946890.html:
>
>"The world is moving toward closed digital rights management systems
>where you may need approval to run programs," says David Wagner,
>an assistant professo
At 08:06 AM 7/31/2002 -0700, A.Melon wrote:
>"What do you have to hide?"
If I have nothing to hide, nobody wants to know.
steve
On Wednesday, July 31, 2002, at 04:51 am, James A. Donald wrote:
> On 29 Jul 2002 at 15:35, AARG! Anonymous wrote:
>> both Palladium and TCPA deny that they are designed to restrict
>> what applications you run. The TPM FAQ at
>> http://www.trustedcomputing.org/docs/TPM_QA_071802.pdf reads
>> ..
On Wed, 31 Jul 2002, Anonymous wrote:
> Such an approach suffers from the "bad guy" occasionally signing a
> good file, thus placing himself on the trusted signer list.
This assumes a boolean trust metric. What you need is a trust scalar, and
a mechanism to prevent Malory poisoning it. It should
At 11:01 AM 7/31/2002 +0200, Eugen Leitl wrote:
>On Tue, 30 Jul 2002, James A. Donald wrote:
>
> > The plan, already implemented, is to flood file sharing systems with
> > bogus files or broken files. The solution, not yet implemented, is to
> > attach digital signatures to files, and have the fi
On Tue, 30 Jul 2002, James A. Donald wrote:
> --
>
>
> On 29 Jul 2002 at 15:35, AARG! Anonymous wrote:
> > both Palladium and TCPA deny that they are designed to restrict
> > what applications you run. The TPM FAQ at
> > http://www.trustedcomputing.org/docs/TPM_QA_071802.pdf reads
> >
>
James Donald wrote:
> On 29 Jul 2002 at 15:35, AARG! Anonymous wrote:
> > both Palladium and TCPA deny that they are designed to restrict
> > what applications you run. The TPM FAQ at
> > http://www.trustedcomputing.org/docs/TPM_QA_071802.pdf reads
>
> They deny that intent, but physically they
--
On 29 Jul 2002 at 15:35, AARG! Anonymous wrote:
> both Palladium and TCPA deny that they are designed to restrict
> what applications you run. The TPM FAQ at
> http://www.trustedcomputing.org/docs/TPM_QA_071802.pdf reads
>
They deny that intent, but physically they have that capa
On Tue, 30 Jul 2002, Major Variola (ret) wrote:
> At 07:59 PM 7/29/02 -0500, Jim Choate wrote:
> >On Mon, 29 Jul 2002, Eric Murray wrote:
> >> Your ISP may be blocking mail from Ssz to you.
> >
> >Sue their ass your right to free association is being violated!
>
> Um, right after we finish sue
On Tue, 30 Jul 2002 20:51:24 -0700, you wrote:
> When we approve a file, all the people who approved it already get
> added to our trust list, thus helping us select files, and we are
> told that so and so got added to our list of people who recommend
> good files. This gives people an incentive
--
On 29 Jul 2002 at 14:25, Duncan Frissell wrote:
> Congressman Wants to Let Entertainment Industry Get Into Your
> Computer
>
> Rep. Howard L. Berman, D-Calif., formally proposed
> legislation that would give the industry unprecedented new
> authority to secretly hack
On Tue, 30 Jul 2002, James A. Donald wrote:
> The plan, already implemented, is to flood file sharing systems with
> bogus files or broken files. The solution, not yet implemented, is to
> attach digital signatures to files, and have the file sharing software
> recognize certain signatures as go
25 matches
Mail list logo