On Thu, Jan 23, 2003 at 06:15:24PM -0800, Bill Stewart wrote:
> VoA has spent the last N decades alternating between being
> the official US propaganda arm, and officially NOT being a
> US propaganda arm, just an organization we fund to make sure
> there's objective news reporting receivable in Com
On Fri, 24 Jan 2003, Thomas Shaddack wrote:
> Has built-in Ethernet and serial ports, and with a chip like FT8U232AM it
> could work with USB as well.
The 232BM version is easier to use and costs the same.
Patience, persistence, truth,
Dr. mike
John Bethancourt wrote...
"One of these days, I might build a little device that stores a private key
and does on-board encryption using a microcontroller. I would do it just for
fun, since it is pretty useless if the infrastructure to support it is not
out there."
...while Thomas Shaddack gav
At 10:11 AM -0800 1/24/03, Major Variola (ret) wrote:
>You do, of course, have
>to trust the hardware/OS you use it with. "If you don't know the
>socket, keep your dongle in your pants"
Given the well documented advantages of poetry over prose in ease of
recall, this adage should be, "If you don'
> One of these days, I might build a little device that stores a private key
> and does on-board encryption using a microcontroller. I would do it just for
> fun, since it is pretty useless if the infrastructure to support it is not out
> there.
Check http://developer.axis.com/products/mcm/ - this
"SuperCobra Crash Information" - WLG
Regarding the "Helicopter Crash while on a Drug Bust 2003.01.23"
Background: News reports indicate that 2 "unknown" us marine helicopters
crashed in the desert while assisting a DEA/Customs drug interception.
News did not break until the next day that these
> WTF is the point of adding more biometric security to a device that
> cannot and does not support data integrity? that flash memory held
> within the thumbdrive keeps your data in clear text...unless of course
> you store everything within some form of encrypted disk. even then,
> the quick an
On Fri, 24 Jan 2003, Thomas Shaddack wrote:
> Use the kind of fingerprint reader that can also sense the blood flow in
> the finger, kinda like the heart rate sensors on some exercise machines.
> Dead fingers then will be of no use.
Photoplethysmography and photoxytometry are easy to fake once yo
At 11:40 AM 01/24/2003 -0500, Tyler Durden wrote:
Peter Trei wrote...
"What's you're threat model? If it's your wife or kid sister, this
might work. If it's a major corporation or a government, forget
it - they'll bitcopy the whole flash rom, and look at it with ease."
Agreed. Furthermore, the
On Fri, Jan 24, 2003 at 09:51:46PM +0100, Thomas Shaddack wrote:
> DEFINITELY TRUE!
>
> ...
>
> The device should be able to perform the encryption/decryption services on
> its own (hence the cryptographic CPU). Eg, you have an untrusted computer.
> You plug the device to its port, move a documen
> Nice! Get them to cut _all_ your fingers off instead of just one.
> Just say no to amputationware.
Use the kind of fingerprint reader that can also sense the blood flow in
the finger, kinda like the heart rate sensors on some exercise machines.
Dead fingers then will be of no use.
...of course
Tyler Durden wrote:
I got a hold of a little gadget recently that is very nearly perfect for
certain forms of data storage. It's called a "Thumbdrive" and I bought
it online somewhere (64Meg for about $179 or so).
The cool thing about this drive (small enough that it has holes for use
as a key
On Fri, 24 Jan 2003, David Howe wrote:
> Bearing in mind though that DRM/Paladium won't work at all if it can't
> trust its hardware - so TPM != Paladium, but TPM (or an improved TPM) is
> a prerequisite.
Certainly! But this TPM is really nothing more than a dongle
attached to the pci bus. It w
> From: "Tyler Durden" <[EMAIL PROTECTED]>
> The cool thing about this drive (small enough that it has holes for
use as a
> keychain) is that it's got a "Public" area and a private area, and the
> private area is accessible (if one desires) only via the little
fingerprint
> reader on the top of th
IMHO, the article is the most reasoned, complete and balanced legal (and
commonly accessible technical) analysis of the P2P scene.
The direct link is
http://www.lawtechjournal.com/articles/2002/05_021229_roemer.php
Conclusion
More legal questions and conundrums are raised with a technology like
at Friday, January 24, 2003 4:53 PM, Mike Rosing <[EMAIL PROTECTED]>
was seen to say:
> Thanks Eugen, It looks like the IBM TPM chip is only a key
> store read/write device. It has no code space for the kind of
> security discussed in the TCPA. The user still controls the machine
> and can still
WTF is the point of adding more biometric security to a device that cannot
and does not support data integrity? that flash memory held within the thumbdrive
keeps your data in clear text...unless of course you store everything within
some form of encrypted disk. even then, the
quick and dirty w
On Fri, 24 Jan 2003, Eugen Leitl wrote:
> -- Forwarded message --
> Date: Fri, 24 Jan 2003 02:29:27 -0500
> From: Dave Farber <[EMAIL PROTECTED]>
> To: ip <[EMAIL PROTECTED]>
> Subject: [IP] Open Source TCPA driver and white papers
>
>
> -- Forwarded Message
> From: David Saffo
Peter Trei wrote...
"What's you're threat model? If it's your wife or kid sister, this
might work. If it's a major corporation or a government, forget
it - they'll bitcopy the whole flash rom, and look at it with ease."
At this point, most of my threat models are on this level or the next one
hi
-- Forwarded message --
Date: Fri, 24 Jan 2003 02:29:27 -0500
From: Dave Farber <[EMAIL PROTECTED]>
To: ip <[EMAIL PROTECTED]>
Subject: [IP] Open Source TCPA driver and white papers
-- Forwarded Message
From: David Safford <[EMAIL PROTECTED]>
Date: Tue, 21 Jan 2003 12:05:39 -0
On Thu, Jan 23, 2003 at 05:53:04PM -0800, James A. Donald wrote:
>
> Perhaps they are exercising their will over the facilities of
> production and distribution by CIA microwaves beamed into
> people's brains :-)
Given the general knownothing, lockstep mentality exhibited by the Bushites,
th
I got a hold of a little gadget recently that is very nearly perfect for
certain forms of data storage. It's called a "Thumbdrive" and I bought it
online somewhere (64Meg for about $179 or so).
The cool thing about this drive (small enough that it has holes for use as a
keychain) is that it's g
> --
> From: Tyler Durden[SMTP:[EMAIL PROTECTED]]
> Sent: Friday, January 24, 2003 9:52 AM
> To: [EMAIL PROTECTED]
> Subject: Deniable Thumbdrive?
>
> I got a hold of a little gadget recently that is very nearly perfect for
> certain forms of data storage. It's ca
On Thu, 23 Jan 2003, Bill Stewart wrote:
> VoA has spent the last N decades alternating between being
> the official US propaganda arm, and officially NOT being a
> US propaganda arm, just an organization we fund to make sure
> there's objective news reporting receivable in Communist countries
>
My Fellow Cypherpunks,
Tim May writes:
>On Tuesday, January 21, 2003, at 11:55 AM, Anonymous wrote:
Anonymous :
>> I'm sure that I do nothing new in drawing parallels between the
>> occurences in George Orwell's seminal text "1984" and the founding of the Information
>> Awareness Office. It
At 10:45 PM 01/22/2003 +, Peter Fairbrother wrote:
W H Robinson wrote:
> [...]
>> with greater clarity
> [...]
>> disseminate truthful, accurate, and effective messages about the
>> American people and their government.
> [...]
>> convey a few simple but powerful messages.
>
> Shouldn't Saatch
At 12:45 AM 12/18/2002 +, Adam Back wrote:
If I recall some time ago (years ago) there was some discussion on
list of using non-US drivers licenses or out-of-state drivers licenses
I think to get around this problem. I thought it was Duncan Frissell
or Black Unicorn who offered some opinions
27 matches
Mail list logo