At 10:23 AM 11/24/2002 -0600, Neil Johnson wrote:
(Referring to previous thread about capturing video.)
As I sit here looking at a 64 MB SD Card that I just picked up for $28 at my
local Wally World, I was wondering why it (or it is larger capacity brethren)
couldn't be used to record video and
At 10:12 PM 11/24/02 +0100, Eugen Leitl wrote:
>On Sun, 24 Nov 2002, Tyler Durden wrote:
>
>> I believe Daniel Hillis (or was it Jaron Lanier?) inserted
time-capsule
>> information into a cockroach's DNA and released it into the Boston
subways.
>> He calculated that this would be the way to preserv
This assumes the insert doesn't result in negative fitness (could very
well be, if the insert kills a gene).
If the information is the history of human civilization, that may very well
end up being information of great "negative fitness"! (We shall see...)
Actually, from what I understand, ther
> couldn't be used to record video and then (after appropriate protection)
> swallowed.
Eventually this will happen. Maybe a video recorded into a DNA of a bacteria
synthesized in a portable device ("diamond age", anyone ?)
Ne protocols will be required ("if I infect this east coast girl, how l
> Lousy latency. Just put your DNA-encoded message in a microdot on your
> dead tree letter, and PCR/sequence on arrival.
Isn't all snail mail already irradiated ? Then soon.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus Powerful. Affordab
rlock Elloi <[EMAIL PROTECTED]>
To: Neil Johnson <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
Subject: Re: Video Mules: (Was: Re: Psuedo-Private Key (eJazeera) )
Date: Sun, 24 Nov 2002 12:03:39 -0800 (PST)
> couldn't be used to record video and then (after appropriate
protection)
>
On Sun, 24 Nov 2002, Morlock Elloi wrote:
> Ne protocols will be required ("if I infect this east coast girl, how long it
> will take for the message to get to south africa ?")
Lousy latency. Just put your DNA-encoded message in a microdot on your
dead tree letter, and PCR/sequence on arrival.
(Referring to previous thread about capturing video.)
As I sit here looking at a 64 MB SD Card that I just picked up for $28 at my
local Wally World, I was wondering why it (or it is larger capacity brethren)
couldn't be used to record video and then (after appropriate protection)
swallowed.
On Sun, 24 Nov 2002, Morlock Elloi wrote:
> Isn't all snail mail already irradiated ? Then soon.
It's not, because electron accelerators are a) expensive b) tend to damage
mail.
Besides, the few ug or ng dry DNA in the microdot is not a living being.
It can remain readable at ridiculously hig
On Sun, 24 Nov 2002, Tyler Durden wrote:
> I believe Daniel Hillis (or was it Jaron Lanier?) inserted time-capsule
> information into a cockroach's DNA and released it into the Boston subways.
> He calculated that this would be the way to preserve information for the
> longest period of time.
hi,
I had suggested the same for an encryption product
called digisecret,this is what they had to say.
>Here is an example where hiding cipher text in cipher
text is ideal..
DigiSecret currently does not use assymmetric
algorithms. Besides this
the introduction of this technique will mean that
> And depending on the situation, the key-holder will decide
> whether to give
> them a key that destroys the real data, or that doesn't (and
> hides it).
Don't even bother trying to destroy the original. Chances are
they will make a backup of everything before attempting anything.
And destroyi
Variola wrote...
What's missing? What part of your threat model didn't they consider?
Well, that the recipient of the message may not be on their own machine (not
running "Rubberhose"), etc...
Stego your activist photos into kiddie porn which is stegoed into >random
plaintext cover images
Tyler Durden wrote:
[...]
> Let's say I've been coerced into revealing the private key to a certain
> encrypted message. And now, of course, the authorities use that key and open
> the message, and see the contents (let's assume they are picture of a
> demonstration or whatever).
>
> WOULDN'T IT B
At 02:19 PM 11/20/02 -0500, Tyler Durden wrote:
>From what I can grok this is not what I was looking for, but it IS a
>valuable tool.
What's missing? What part of your threat model didn't they consider?
>What I'm talking about, I think, would be better in certain scenarios,
as a
>rubber-hose-hol
TECTED]>
CC: [EMAIL PROTECTED], <[EMAIL PROTECTED]>
Subject: Re: Psuedo-Private Key (eJazeera)
Date: Wed, 20 Nov 2002 15:49:55 -0500 (EST)
On Wed, 20 Nov 2002, Tyler Durden wrote:
> to have a big jpg of a hand with middle finger extended...) More than
this,
> they will have unkn
On Wed, 20 Nov 2002, Tyler Durden wrote:
> to have a big jpg of a hand with middle finger extended...) More than this,
> they will have unknowingly destroyed the real data. (Perhaps a 3rd key is
> needed that DOESN'T destroy the original data, just 'hides' it a la
> Rubberhose.)
The question I've
e original data, just 'hides' it a la
Rubberhose.)
And of course, we'd like to be able to do this on a message-by-message
basis.
From: Keith Ray <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Re: Psuedo-Private Key (eJazeera)
Date: Wed, 20 Nov 2002 10:49:43 -0600
Qu
Quoting Tyler Durden <[EMAIL PROTECTED]>:
> WOULDN'T IT BE NICE...If the original encrypted message actually had TWO
> messages inside it, both very similar. In this example, one of the messages
> is the "incriminating" pictures of the demonstration, the other is pictures
> of Pam Anderson or w
Sorry to be a blabbermouth folks, but this one is interesting. Delete
anything I've written in the last two days if ya' want.
Here's something I've been thinking about for various reasons. I'm assuming
this doesn't exist yet, but it's such an interesting idea I'm tempted to
brush the dust off m
20 matches
Mail list logo