At 08:54 AM 4/10/04 -0700, Steve Schear wrote:
Wolfe is also scathing of steps taken post September 11 to protect
airports. It's not real security. This is eyewash security. This is
for
public consumption so that people think that they are doing
something.
Several years ago, on this list I
At 01:47 PM 4/9/04 -0400, Adam Fields wrote:
On Fri, Apr 09, 2004 at 12:46:47PM -0400, Perry E. Metzger wrote:
I'm a technophile. I've loved technology all my life. I'm also a
As the supposed experts, how do we get the idea out of people's heads
that making everything electronic and automated is
Perry I agree with you on all *except* that you are prejudiced
against folks who are not mobile, have immobile dependants, are busy
or agoraphobes.
In-person voting doesn't resist graveyard voting much better than
lining up the meat.
One could say that in-person voting rewards those too lazy or
At 11:19 AM 4/8/04 +0200, Eugen Leitl wrote:
On Wed, Apr 07, 2004 at 10:03:13PM -0400, R. A. Hettinga wrote:
Depilatory becomes a new standard accessory for the
well-...um...-dressed
terrorist...
Ammonium nitrate is an ionic solid. Diesel fuel or equivalent heavy oil
fraction don't show up as
At 05:26 AM 4/8/04 -0400, An Metet wrote:
The privacy news has been full of fuss and bluster lately about
Google's proposed Gmail service.
Cypherpunks have two somewhat contradictory positions on the issue.
First, as lovers of privacy, they will share the concerns in the letter
and they would be
At 03:29 PM 4/8/04 -0400, R. A. Hettinga wrote:
At 11:28 AM -0700 4/8/04, Major Variola (ret) wrote:
Geodesic means shortest path, and you'll note if you play with
tracert that the shortest path (as seen on Earth's surface) is rarely
taken.
Measure the path in time?
Yeah, some dead french dude
At 01:56 PM 4/8/04 -0400, R. A. Hettinga wrote:
[Nanotechology at least holds out the possibility of making Von
Neumann machines, that is, switches which make copies of themselves,
You mean Johnny's *replicators*, a vN machine is just one with
a changable program store. But you mentioned Jared
At 03:36 PM 4/8/04 -0400, R. A. Hettinga wrote:
As someone who was a Gerard O'Neill http://www.ssi.org/obit.html fan
long
The L-5 dude? I never knew he dabbled in mental-nano-masturbation.
I'm familiar with his macroscopic living-in-$pace speculations.
The term von Neumann machine also refers
At 11:16 PM 4/8/04 +0200, privacy.at Anonymous Remailer wrote:
In the second place, it fails for elections with more than two parties
running. The casual reference above to representatives on each
side betrays this error. Poorly funded third parties cannot provide
representatives as easily as
_Reason_ pulls a cryptomesque BigEye op on subscribers:
To: [EMAIL PROTECTED]
X-URL: http://www.mccullagh.org/
Subject: [Politech] Reason magazine cover story has unusual privacy
theme
[priv]
[Disclaimer: I was involved with the Reason article. --Declan]
(I'm not defending hostile spyware but there are problems with the
law..)
http://www.pcworld.com/news/article/0,aid,115527,00.asp
Tom Spring, PC World
Friday, April 02, 2004
Utah has become the first state to make spyware a crime, passing a law
that makes it illegal to install such programs on
Peter, what would be wrong with having a machine in the booth that
prints
any valid receipt BUT is not connected to the voting system. To vote
use the red machine; if you're being coerced you can use the blue
machine
to print as many receipts as intimidators.
A trade off between (mild) user
At 08:44 PM 4/4/04 -0500, Harmon Seaver wrote:
Shiites hit a home run!
http://news.bbc.co.uk/2/hi/middle_east/3599381.stm
Deposing a harmless tyrant: $87,000,000,000
Generating 2 Islamic republics plus an ethnic republic that destabilizes
Turkey:
priceless
For colonialism, there's the
At 12:35 PM 4/4/04 -0800, Bill Stewart wrote:
At 1:31 PM -0800 4/2/04, Major Variola (ret) wrote:
A fence is being considered around the Capital in DC also.
Correct me if I'm wrong, but I assume the purpose of a fence around the
Capitol
would be to keep those pesky Congresscritters _in_
At 09:03 AM 4/3/04 -0500, R. A. Hettinga wrote:
At 1:26 PM -0800 4/2/04, Major Variola (ret) wrote:
Physics, because large entities have different properties (eg
surface-to-mass ratio; inertia) than small entities.
Well, certainly, that's the current wisdom about such things.
However, I'm
3 [2capital] a : a city serving as a seat of government b : a city
preeminent in some special activity the fashion capital
However it seems the ol version is correct when capitalized:
Etymology: Latin Capitolium, temple of Jupiter at Rome on the Capitoline
hill
1 a : a building in which a state
At 11:38 AM 4/2/04 -0500, Trei, Peter wrote:
I haven't eaten domestic cat, but I have eaten lion. Suprisingly,
it was a light tender meat, resembling veal more than anything
else. Tasted good.
Just out of curiosity, how did you verify that it was in fact that
species?
I mean, if you beat a
At 10:46 AM 4/2/04 -0500, R. A. Hettinga wrote:
The idea is, if transaction and price discovery costs fall enough,
private force companies that auction their services in a free market
become better than the public ones that rely on confiscated tax
revenue.
Only if they offer comparable services.
At 03:04 PM 4/2/04 -0500, R. A. Hettinga wrote:
Nozick argues force-monopoly naturally emerges from *any* force
market, that, IIRC, associations will collude and eventually merge
under peaceful circumstances, and, of course, if one fights the
other, it takes the other's turf.
Personally, I wonder
At 03:29 PM 4/2/04 -0500, R. A. Hettinga wrote:
Howie Carr is shocking Chris Wallace just now about partitioning Iraq
into three countries, Kurdish (who will have oil), Shiite (who will
have oil), and Sunni (who will not; geography's a bitch), all while
putting a Sharon-Fence around the newly
At 05:19 PM 3/31/04 -0500, R. A. Hettinga wrote:
So, what, declare all current property claims in Fallujah to be null
and
void, sell claims off to the highest bidder, and whoever gets there
with
the most men owns it. I mean, it worked in Texas with the Comanches and
Apaches...
How long do we
At 03:22 PM 4/1/04 -0500, R. A. Hettinga wrote:
Last year I found it almost impossible to adopt a kitten or cat that
didn't have an RFID tag implanted under its skin.
What is his problem? You just put them in the microwave and the
chip is useless.
At 01:41 PM 4/1/04 -0500, R. A. Hettinga wrote:
More to the point, once you cleaned out a bunch of injuns, *somebody*
had to ranch the land, right?
Well of course. It was our destiny, our mission. Just like bringing
democracy (tm)
to the a-rabs, etc. If, of course, they vote for our puppets,
http://web.archive.org/web/*/www.blackwatersecurity.com
Blackwater had no web pages before Aug 2002.
Funny how the 0wn3d media doesn't question the consultant label.
At 03:30 PM 3/31/04 -0500, Tyler Durden wrote:
Uh...this is getting tiring...as far as I'm concerned this part of the
discussion looks like semantics.
RAH's main point, physical chemistry aside, was that various folks
benefit from hyperbole and/or fearmongering. That point remains
valid, in many
There will be a lot of (justly) dead fishermen in that case. When the
USG
does piracy, or merely boards a ship, there are major snipers
on the US vessel, and the inspectors are accompanied by
well armed folks. In addition, free-lance piracy will be a great
cover for real pirates at sea.
And of
At 02:55 PM 3/31/04 -0500, R. A. Hettinga wrote:
Meaning that the mercs come back with more toys, next time...
They need to be driving around in more heavily armored vehicles.
All the toys in the world won't help your Toyota repel an RPG.
Rather hard not to look obviously military in an APC
Pentagon's Papers Found at Starbucks
Talking points, hand-written notes on spin tactics and a hand-drawn map
to Defense Secretary Donald Rumsfeld's house were found at a local
Starbucks.
http://www.americanprogress.org/site/pp.asp?c=biJRJ8OVFb=42125
Nice opsec there, doofus.
At 04:35 PM 3/30/04 -0600, bgt wrote:
You need ID to drive, bus, train, or fly... I guess all that's left is
walking and possibly biking. :P
The police can ask for ID if you're walking and fit a description
(negro in plaid shirt I believe was the instance);
also that Nevada case pending in the
Ballot Error Effect Cited
Orange County registrar says incorrect electronic ballots may have
altered a race's outcome, but says results will be certified today.
By Jean O. Pasco
Times Staff Writer
March 30, 2004
Although some Orange County voters cast the wrong electronic ballots in
the March 2
STATE OF CONNETICUT REPORTED THE DISCOVERY OF A STRONTIUM-90 SOURCE
The item was found adjacent to a house in a wooded area in East Lyme,
CT. It was a cylinder measuring 6 inches in length and 2 inches in
diameter. The bottom of the cylinder had the following serial number:
M2477. It was a
At 06:44 PM 3/27/04 -0500, R. A. Hettinga wrote:
And, remember again, you have to *enclose* a burning gas to make it
explosive first place.
Bob, stick with obfuscated economics and playing with boats.
Many gases are explosive in certain ratios to air.
Gasoline vapor, acetylene, in a wide range
At 12:41 AM 3/27/04 -0500, [EMAIL PROTECTED] wrote:
And yet one would've thought that a smart radical would have been able
to
purchase a measly couple of 50 lb bags of (NH4NO3) without having to
call
all over the place and brag about it, and for cash at that. You don't
want
it known, don't say
At 01:05 AM 3/27/04 -0500, [EMAIL PROTECTED] wrote:
At 01:51 PM 3/26/2004, Thomas Shaddack [EMAIL PROTECTED] wrote:
Suggested countermeasure: When true anonymity is requested, use the
card
ONLY ONCE, then destroy it.
Better yet, take another 10 minutes, get change from a laundromat, and
use
At 08:39 PM 3/26/04 -0600, Black Unicorn wrote:
Keeping calling cards from leaking information probably isn't possible.
Limiting the information leaked to that which is already known or is
useless
is probably the best bet. Using separate cards for separate
operations /
cells and immediate
At 01:59 PM 3/26/04 -0500, R. A. Hettinga wrote:
At 10:14 AM -0800 3/26/04, Major Variola (ret) wrote:
The point is that the asset (a performance) which the
bearer-document (ticket) grants access to expires. I think that's
actually orthogonal to the
ticket itself expiring.
Okay. The inverse
LOS ANGELES (AP) -- On the eve of grand jury proceedings in the Michael
Jackson molestation case, the presiding judge of the Santa Barbara
courts barred pictures or communication with any prospective or final
panelists, or grand jury witnesses.
Superior Court Judge Clifford R. Anderson III did
At 10:26 AM 3/25/04 -0500, Tyler Durden wrote:
I also think that some cypherpunks mistake the Corporate State for what
has
been described as Crypto-Anarchy.
Get this through your head: a corporation can't initiate force against
you.
You may not like their product, practices, or price, but no one
At 06:53 PM 3/23/04 -0800, John Young wrote:
Why pity Martha Stewart, so far she's escaped the pokey,
Because she got charged with *lying* to a fed when she
was *not* under oath.
The lesson is real. The ordinary pig on the street --not just a fed--
can lie
to you, and bust you if you return
At 09:30 PM 3/22/04 -0600, Harmon Seaver wrote:
On Mon, Mar 22, 2004 at 09:12:34PM -0500, An Metet wrote:
Robert Hettinga forwards:
By concentrating sensing and data storage on the body, a wearable
computer allows its user to ``control his own butt.'' The user
What the hell does this have
Once, our national office in Washington called the phone company to say
they couldn't pay the bill, said Bill Crandell, a writer who lives in
Silver Spring, Md. They were told, 'Don't worry, it's being paid.'
It was Nixon's spooks paying the phone bill for Kerry's antiwar group.
At 02:18 PM 3/18/04 -0500, Jack Lloyd wrote:
The obvious next step is writing a bot that poses as an adult posing as
a
kid.
I think its easily (if crudely) simulated thusly:
All you need is another kidbot which is 1. not controlled
by the adversary 2. eventually uses keywords that trigger the
http://news.scotsman.com/scitech.cfm?id=312492004
COMPUTER SECURITY
French Move To Fend Off U.S. Domination
With some help from Germany, the French are discreetly seeking an
alternative to U.S. domination of the field of computer authentication
systems and security (Public Key Infrastructure: [...] [ 617 words
5,5USD ]
Report: Ohio Sold Records To Fla. Database Company For $50K
POSTED: 6:56 pm EST March 14, 2004
COLUMBUS, Ohio -- The state Bureau of Motor Vehicles sold driving
records of Ohioans for about $50,000 to a Florida company developing a
multistate crime database program, according to a report.
The
At 12:45 PM 3/13/04 +0100, Eugen Leitl FORWARDED:
- Forwarded message from Enzo Michelangeli [EMAIL PROTECTED] -
Skype claims to use RSA-based key exchange, which is good for
multi-party
conferencing but does not preserve forward secrecy. Maybe some variant
of
ephemeral D-H authenticated
At 09:55 PM 3/12/04 -0800, Sarad AV wrote:
if gcd(a,m)=1,
for a*a inverse==1 mod m
is it better to find
a invese=a^(m-2) mod m by binary exponentiation
modulo m or is it more time efficient by extended
euclids algorithm for large 'm'?
I dunno, why don't you think about it some?
How are you
At 10:11 AM 3/14/04 -0500, R. A. Hettinga wrote:
Return of the homebrew coder
BEFORE Henry Ford unleashed the practice of mass production on the
world,
every little town had a few dozen artisans who made the lives of
citizens
easier.
Software is also still in the craft stage where the designers
Science News Online
Week of Feb. 28, 2004; Vol. 165, No. 9
Toss Out the Toss-Up: Bias in heads-or-tails
Erica Klarreich
If you want to decide which football team takes the ball first or who
gets the larger piece of
cake, the fairest thing is to toss a coin, right? Not necessarily.
A new
At 10:56 AM 3/6/04 -0500, Steve Furlong wrote:
No, pseudonymity lets others identify messages on, say c-punks, as
coming from a particular sender. Reputation can work here, even with no
meat-space identity attached. Anonymity means reputation can't work, so
each message has to be taken on its
Some Insurers Checking Provider Lists for Terrorists
Joyce Frieden
Associate Editor, Practice Trends
Insurance plans say they now must cross-reference lists of business
partnersincluding providersagainst a federal list of known or
suspected terrorists.
As a result of an executive
At 10:30 PM 3/3/04 -0500, R. A. Hettinga wrote:
http://nytimes.com/2004/03/04/international/europe/04PHON.html?hp=pagewanted=printposition=
The New York Times
March 4, 2004
How Tiny Swiss Cellphone Chips Helped Track Global Terror Web
And that, boys and girls, is what traffic analysis is
The Pinellas school system is ready to approve a new technology that
uses student fingerprints to keep track of who is riding school buses.
Beginning in the fall, the fingerprint system would identify students as
they board and leave. The goal is to ensure they are getting on the
right bus and
At 09:54 PM 3/2/04 -0500, R. A. Hettinga wrote:
From: Tim May [EMAIL PROTECTED]
Or enter a voting place with a gizmo and aim it at the electronic
polling stations. Turn to the little old biddies who run our polling
places and smile. If they ask what you just did, tell them I just
changed the
Agencies Finishing Warnings On Lead
http://www.washingtonpost.com/wp-dyn/articles/A10503-2004Feb26.html
Now can anyone think of another colonial empire whose capital was
thought
to suffer from lead poisoning too?
When DC is cratered, after a few half-lives elapse, when its inhabitable
again,
At 09:41 AM 2/27/04 -0500, Tyler Durden wrote:
Looks like the UN's going to need some encrypted VoIP...
-TD
Silly lad, the walls have ears. And the ceilings, trimwork, light
fixtures,
heating ducts, etc.
Think outside the (secure) box, dude.
NEW YORK, Feb 25 (Reuters) - U.S. regulators should consider whether
radio and television services carried by cable and satellite must adhere
to indecency standards, Federal Communications Commissioner Kevin Martin
said on Wednesday.
http://biz.yahoo.com/rc/040225/tech_summit_indecency_1.html
Feb 18, 8:16 AM (ET)
By KIM CURTIS
(AP) Sharon Rocha, mother of murder victim Laci Peterson, enters the San
Mateo Superior Courthouse after...
Full Image
REDWOOD CITY, Calif. (AP) - A judge ruled that evidence police gathered
using electronic devices to track Scott Peterson after his
For example, airports have dogs and devices for detecting the chemical
emissions from explosives. If I took a small perfume sprayer and
filled it with nitrobenzene (used in firearm bore cleaning solvents)
and sprayed people's luggage with it as they awaited security
screening, the airport would
At 05:34 PM 2/13/04 -0500, Steve Furlong wrote:
In principle they can prove that the secret didn't have any influence
on
the work, but in practice they're stuck having to prove a negative.
I was hoping the courts would see the impossibility of proving a
negative,
and see true dissimilarities in
At 02:08 PM 2/13/04 -0800, Eric Murray wrote:
On Fri, Feb 13, 2004 at 11:45:34AM -0800, Major Variola (ret) wrote:
(in reply to someone else)
Lots has been said about OSS developers not wanting to look at this
for fear that they will be tainted. While it is true that simply
the act of looking
At 04:36 PM 2/13/04 +0100, Thomas Shaddack wrote:
retranslating the stream. This way it may not be technically possible
for the broadcaster itself to know the number of listeners -
impossible
to assess the fees - impossible to getting reliably proved the number
of
listeners to. What can happen
FBI makes arrest in movie 'screener' case
Chicago man to be charged with copyright infringementThe Associated
Press
Updated: 9:02 a.m. ET Jan. 23, 2004LOS ANGELES - A man who allegedly
used the Internet to distribute Oscar screener movies sent to him by a
member of the Academy of Motion Picture
..public health officials are considering legal action to force AOL and
certain websites to warn members about...
http://wired.com/news/medtech/0,1286,62005,00.html?tw=wn_tophead_2
Compelled speech is prohibited, suggesting it is treason, no matter the
reason.
Mobile operators in the UK have joined forces to protect children from
adult content accessible on mobile phones
The new code is going to make many people ask why, if the mobile people
can do it, the fixed internet people can't.
http://news.bbc.co.uk/2/hi/technology/3409081.stm
--
If you
At 01:28 PM 1/13/04 -0800, Steve Schear wrote:
It would seem that once GNURadio comes to fruition that many devices,
including those the FCC would like to regulate, could be built from its
generic, non-video, architecture. In that case, wouldn't FCC mandates
applied to end-users (since end users
At 12:55 PM 1/12/04 -0600, bgt wrote:
Of course the police tried to take the site down but the court
upheld the site's right to publish any publicly available
information about the cops (I believe they excepted the SSN's).
--bgt
The SSNs were initially published, later removed in an incremental
At 12:21 PM 1/12/04 -0500, [EMAIL PROTECTED] wrote:
There was a mildly publicized incident in another part of Brooklyn
recently where someone was ticketed after their child's balloon popped
in public.
I recently asked a NYC friend if he had popped off firecrackers
in NY Square recently. He
At 01:27 PM 1/6/04 -0800, Steve Schear wrote:
Try building and finding a place to launch an amateur rocket (it can be
done, but now only with the greatest of regulatory red tape). I did.
Some
of my group's rockets achieved heights over 100,000 ft (confirmed by
Edward's AFB radar.)
Yeah, but
At 12:14 AM 1/1/04 -0800, Eric Cordian wrote:
Of
course, they still need one to determine who gets the shit-hauling
jobs,
and the usual method of doing this is to hide the class system in the
education system. Now you don't get the shit-hauling job because you
are
an untouchable. You get it
At 08:19 PM 12/31/03 -0500, John Kelsey wrote:
At 05:56 PM 12/30/03 -0800, Major Variola (ret) wrote:
If I were a neocon asshole, I would. Instead, I regard liberation as
a
local task, and interfering with sovereignty as the initiation of
force,
ie an act of war.
Well, clearly bombing
At 08:45 PM 12/31/03 -0500, John Kelsey wrote:
You do know she's been trying the same scheme for several hundred
thousand
years, right? As an artist, I think she's in a creative decline.
Ebola is
picturesque and flashy, but not all that scary unless your funeral
rites
involve lots of contact
At 11:51 AM 1/1/04 -0500, Tyler Durden wrote:
Stay In School!
In other words, schools keep the crime rates down, as is a well-known
statistic. They are basically storage facilities. For real schools we
white
folks with $$$ can move out to the suburbs or send our kids to private
school.
Right.
Just heard a CNN expert confuse stenography with steganography.
And he still thinks Jihad, Inc websites use the latter. Doofus.
At 12:58 PM 1/5/04 -0600, Declan McCullagh wrote:
With that evidence in hand, the employer calls them up and tells them
to be at work the next day -- or be fired. If I were the employer, I
wouldn't even give them that second chance.
Motivation might be loss of training or worry over lawsuit?
At 11:01 AM 1/3/04 +0100, privacy.at Anonymous Remailer wrote:
- Orchestrated telephone conversations using codewords (thw worm will
meet the apple on monday)
- Ordering tens of almanacs, etc.
WiFi-injected encrypted messages to select TLDs on the List
(and beyond --Indonesia suffices).
Got
At 08:09 AM 1/3/04 -0500, Michael Kalus wrote:
Yes, the way this usually works is that the government builds the road,
then sells it to a private company for some money and then the upkeep
is handled by the company.
It is rather seldom that someone builds a road for a business venture.
Come
At 08:53 PM 12/31/03 -0500, Tyler Durden wrote:
You'd
dice and slice an African American population, but then again it's from
these inner cities that much of popular American culture has arisen
(ie,
between pro sports, various forms of music and so on...).
Is this supposed to be an argument
At 10:52 AM 12/27/03 -0500, Michael Kalus wrote:
So a question for you: If I want to write a book on the history of
the
swastika, or teach about the holocuast in Germany, do I need a
license
or something? (And let's just assume I have a politically correct
view.)
To my understanding
. We had to get very disciplined and accept nothing less than three
names.
A major obstacle was simply gathering the names correctly, considering
that many Arabs have four proper names, including family and tribal
surnames
At 05:41 PM 12/20/03 -0800, James A. Donald wrote:
Anyone who wants to argue that the guys in the two towers had
it coming,
Collateral damage.
The workers at say a WWII refinery did not directly
do evil to anyone. Still, they were killed, because of where
they were. Bummer, eh? Sleep with
At 08:18 PM 12/19/03 -0500, Tyler Durden wrote:
[on onion routing POTS]
trace that call, or payment for that matter. So if bin Laden were
feelin'
lonely one day and signed onto the network, you could give him a call,
without him worrying about the missles falling within a few minutes.
-TD
If
At 08:16 PM 12/18/03 +, Jim Dixon wrote:
What exactly do you mean by peered IP telephony?
Voice telephony requires delays measured in tens of milliseconds. A
bit
difficult if you also want encryption, anonymity, etc.
The problem handling the delay comes with the network, not the
At 10:36 AM 12/14/03 -0500, John Kelsey wrote:
It's not obvious to me how you'd change your writing style to defeat
these
textual analysis schemes--would it really be as simple as changing the
average length of sentences and getting rid of the big words, or would
there still be ways to determine
(This inspired by comments in Scheier's cryptogram)
Do all the newly electronic voting places have UPS? I doubt
it. Think of the fun you could cause if you downed a few
substations or poles.
And because elections happen all at once, there would be no means of
recovery. Imagine if, in the
At 04:50 AM 12/15/03 -0800, John Young wrote:
There's a good possibility that Saddam was traced by Tempest
sensing, airborne or mundane.
I wonder if you can trace DNA in sewers back to the source,
esp. in an inbred locale? (Peter? PCR with Saddam specific
primers?)
Or did he just dig a
At 09:57 PM 12/14/03 -0800, Morlock Elloi wrote:
Be sure and check the archive before posting. It is still small.
Cookies, members only archive access. Bad deal. Will not happen. Very
few
consumers here.
But look how many IP addresses he got from members checking it out!
(resend)
At 11:52 AM 12/13/03 -0500, John Kelsey wrote:
At 09:19 AM 12/12/03 -0800, Major Variola (ret) wrote:
...
You need to think about the lone warrior scenario that the Gang
worries about. McVeighs and Rudolphs.
They were influenced by memes which were not immediately suppressed.
One
I went to a meeting of the Irvine Underground (irvineunderground.org)
which reminded me of late-90s SF CP meatings. Although the overall
tech level was probably lower and social implications weren't a big
topic.
Also, at this meeting, there were far more cameras or videocams than
were present (at
At 10:12 PM 12/11/03 -0500, An Metet wrote:
Given small numbers and absence of any other grouping factor there
needs to be an obvious place for ZPs to refer to. Any obvious place
that becomes even remotely attractive to ZPs will be immediately raided.
Because ZPs have potential to be actually
At 08:09 PM 12/11/03 -0500, Tyler Durden wrote:
As for Variola's comment, you might be right. I just assumed there's
some
kind of relationship between LSB and those spatial freuencies wherein
image
information might be stored. Actually, I would still think there's a
relationship, in which case an
At 11:24 AM 12/8/03 -0800, Tim May wrote:
No, I think few topics on the Cypherpunks list are taken private.
My reasons are two-fold: First, to get them to stop lurking and
participate. Second, to work up the energy to compose an essay (or
mini-essay, whatever), I need some motivation. I am not
I'd suggest wget for spidering sites. It can be told to ignore
.robots files. It is
good for mirroring sites which you suspect may be taken down. Win/Unix
versions
available.
At 06:22 PM 12/10/03 +0200, Anatoly Vorobey wrote:
On Tue, Dec 09, 2003 at 04:20:20PM -0600, Declan McCullagh wrote:
We have anonymity in Web browsing (more or less, thanks to Lance
co). It's not NSA-proof, but it's probably subpoena-proof.
We have anonymity in email thanks to remailers (to
December 10, 2003
Just days after Los Angeles Police Chief William J. Bratton pledged a
crackdown on motion picture piracy, department investigators on Tuesday
helped arrest an LAPD captain suspected of selling bootleg DVDs.
Julie D. Nelson, a decorated patrol captain and a 28-year veteran of
At 02:35 PM 12/11/03 -0500, Tyler Durden wrote:
Variola wrote...
How do you know the signature of the unaltered carrier-medium?
E.g., have you measured the LSBit noise from my camera recently?
Under which lighting conditions?
Well, having done some optical signal processing (and getting a patent
At 03:26 PM 12/7/03 -0800, Tim May wrote:
But even if crypto got trendy again, I just don't see the young
students of today flocking to our particular mailing list. Too many
other choices. Probably they'll read someone's daily blog
A few observations.
Nowadays, colleges offer courses in
At 07:22 AM 12/8/03 -0800, Eric Murray wrote:
Other people have made the point that mailing lists are old tech
and I agree. I don't like the new replacements (blogs, web boards)
as much as lists, but perhaps that's because of what I used first.
Its not just the First is the Only Way phenom.
At 01:09 AM 12/2/03 -0800, Eric Cordian wrote:
As reported today on Slashdot, in linux kernels prior to 2.4.23, it is
possible to map the kernel into user space with brk(), since apparently
no
one ever bothered to check that the argument passed was in the lower 3
gig
of the address space.
Take a look at
http://www.chaum.com/images/Photo_of_David.gif
and tell me his hand isn't photoshopped. Is this
for security reasons, or is his hand malformed?
301 - 400 of 696 matches
Mail list logo