Re: network topology considerations

2002-03-30 Thread Eugene Leitl

On Fri, 29 Mar 2002 [EMAIL PROTECTED] wrote:

 I'd like to discuss what the considerations are for
 network topology.  The particular topology
 I mentioned (which I've since been convinced
 isn't really a cube or torus after all) was

Torus only comes into equation when you're talking about a global network,
or orbiting assemblies (orbits are circular, try projecting an assembly of
2^n nodes on a surface of a sphere). Try mapping next-neighbour connected
2^n nodes on a 3d lattice into 1d. You can handle projections from higher
dimensions by looking at a normalized connection table.

Here's a snip from an old paper of mine:

 This table represents the 3-cube:

 ref. Binary Signs  binary connected
 ID   Count OffsetsIDs
 +---+-+--+---+---+  (alt.:
 | 0 | 000 |  +++ |  +4 +2 +1 | 4 2 1 |   perfect
 | 1 | 001 |  ++- |  +4 +2 -1 | 5 3 0 |   shuffle
 | 2 | 010 |  +-+ |  +4 -2 +1 | 6 0 3 |   stages (1,2,3)
 | 3 | 011 |  +-- |  +4 -2 -1 | 7 1 2 |   of the initial
 | 4 | 100 |  -++ |  -4 +2 +1 | 1 6 5 |   ref. ID)
 | 5 | 101 |  -+- |  -4 +2 -1 | 2 7 4 |
 | 6 | 110 |  --+ |  -4 -2 +1 | 3 4 7 |
 | 7 | 111 |  --- |  -4 -2 -1 | 4 5 6 |
 +---+-+--+---+---+

boolean 5-cube5-grid (open-space version.
  free links not shown)

-##-#---#---#---  -##-#---#---#---
#--#-#---#---#--  #-##-#---#---#--
#--#--#---#---#-  ##-##-#---#---#-
-###---#---#  -##-##-#---#---#
###-#---#---  #-##-##-#---#---#---
-#--#--#-#---#--  -#-##-##-#---#---#--
--#-#--#--#---#-  --#-##-##-#---#---#-
---#-###---#  ---#-##-##-#---#---#
###-#---#---  #---#-##-##-#---#---#---
-#--#--#-#---#--  -#---#-##-##-#---#---#--
--#-#--#--#---#-  --#---#-##-##-#---#---#-
---#-###---#  ---#---#-##-##-#---#---#
#---###-#---  #---#-##-##-#---#---#---
-#---#--#--#-#--  -#---#-##-##-#---#---#--
--#---#-#--#--#-  --#---#-##-##-#---#---#-
---#---#-###  ---#---#-##-##-#---#---#
###-#---#---  #---#---#-##-##-#---#---
-#--#--#-#---#--  -#---#---#-##-##-#---#--
--#-#--#--#---#-  --#---#---#-##-##-#---#-
---#-###---#  ---#---#---#-##-##-#---#
#---###-#---  #---#---#-##-##-#---#---
-#---#--#--#-#--  -#---#---#-##-##-#---#--
--#---#-#--#--#-  --#---#---#-##-##-#---#-
---#---#-###  ---#---#---#-##-##-#---#
#---###-#---  #---#---#-##-##-#---
-#---#--#--#-#--  -#---#---#-##-##-#--
--#---#-#--#--#-  --#---#---#-##-##-#-
---#---#-###  ---#---#---#-##-##-#
#---#---###-  #---#---#-##-##-
-#---#---#--#--#  -#---#---#-##-##
--#---#---#-#--#  --#---#---#-##-#
---#---#---#-##-  ---#---#---#-##-

Notice that the N=5 hypercube has a fractal connectivity in the connection
table.

 designed with the idea that it's important to
 be able to reliably query the entire network
 without sending any nodes duplicate queries.

I didn't have time to follow this discussion, but that requirement strikes
me as unreasonable. It is a really good idea to incorporate defectivity
into your network, whether virtual (mounted on top of existing networks)
or real, assuming they're to scale to a size beyond trivial.

If you consider the constraints of the physical layer (crossbars don't
scale, and latency limits bidirectional acknowledged protocols to short
links), you'll that doesn't leave you with too many choices.




Re: Celsius 451 -the melting point of Cat-5 Re: network topology

2002-03-30 Thread Eugene Leitl

On Fri, 29 Mar 2002, Greg Broiles wrote:

 This sounds like a bad assumption to me - both because it seems
 unworkable given the size of the IPv4 address space (without even
 thinking about IPv6), and because randomly probing other machines isn't
 likely to be allowed (or successful) in a more security-aware
 environment, which is what the DMCA and its ilk are creating.

If we're talking about the physical layer, not the virtual layer, the size
of the address space is quite irrelevant, it's the density of occupation
(fraction of p2p nodes/total address space) that counts. In the beginning,
the density is low, so excessive scanning is necessary. However, you got
your P2P package from a place (unless you use the P2P network to
distribute own clients), and it could come with a number of last known
nodes to connect to. Depending on whether you optimize for performance
(high dimensionality) or high security (low dimensionality, prestige-based
nodes) you would use different strategies.

The physical layer of use-owned infrastructure is routed ad hoc mesh, with
the connectivity being typically restricted to nearest members. Also, you
will have dynamic nodes, which move around, and change their connectivity,
and lots of nodes popping in and out. For this, you wouldn't want to use
anything like TCP/IP but a geodetic routing scheme, which is
local-knowledge-only based. Basically zero admin traffic outside of your
direct neighbourhood, and a position fix for free, too. Latency is
typically bad as long you do only store-and-forward instead of
cut-through. Cut-through does make more sense with high local bandwidth
within cell and high link throughput (vacuum as FIFO, only spilling over
into local memory when your local cell bandwidth is exceeded).

 Also, from an inbound perspective, it's not sensible to respond to incoming
 queries from unknown users with potentially incriminating information -
 e.g., If he's connected to my port 31337, he's here for my warez, I'll
 give him a full list! - because what looks like an inbound random probe
 may be a sweep performed by hostile actors, e.g.,
 http://www.mediaenforcer.com or http://www.baytsp.com.

High security networks need to be cell-based, and use prestige as verified
by crypto authentication. Your transaction track makes you accrue mana. A
narc node would have to serve years before being admitted into local
cell's inner sanctum, which relativates the damage of a local cell gone
bust.

Also, it is only a question of time until we'll see (stealthy) internet
worms with p2p cargo. This could really boost a fledgling network into 100
kNode size virtually overnight.

 Naive self-organization is not a reasonable approach for a hostile
 environment. P2P content networks exist (and have always existed) in a
 hostile environment.

Problem with this is that P2P network designers typically operate in a
babe in the woods mode, while hardening the network properly is very hard.

http://freenetproject.org/cgi-bin/twiki/view/Main/WebHome
seems to be less clueless than most, but it's hard to evaluate it on
paper.

 Designs which depend on friendly behavior on the part of unknown
 counterparties are doomed. Eliminate the friendly assumption, or
 eliminate the unknown aspect of the counterparties before transacting
 with them.




Re: Celsius 451 -the melting point of Cat-5 Re: network topology

2002-03-30 Thread Eugene Leitl

On Fri, 29 Mar 2002, Major Variola (ret) wrote:

 3. Slow connections, slow machines

Thanks to gamers, ping latencies are getting better. ADSL is a pain, but
even 128 kBit upstream can be useful, if aggregated from multiple sites.
Queries for distributed P2P search engines should use ACKless protocols,
obviously.

 To resist 1. you can use port 80, which ISPs can't block without losing
 most 'legitimate' utility for the masses :-)  Or you use randomly

Um, you can, just block incoming connections. It's a problem with REST.

 varying ports and have to do more door-knocking.

If you run a P2P-agnostic firewall, you'll have a problem with random
incoming ports. I suggest camouflaging as bona fide traffic, including
gaming and streaming multimedia.

 To resist 2. you have to be able to randomly probe IP addresses to find
 a node.

Yes, probabilistic headless node discovery vs. a centralist approach.

 Now that I write it up, I realize a tree has the flaw that child nodes'
 queries must go through slow upstream links. So I will think about
 algorithms to grow meshes dynamically, robustly, to overcome that
 problem.

Don't use trees, trees are stupid. Use high-dimensional meshes.

 We welcome comments  pointers, and apologize for the rambling.




Re: Celsius 451 -the melting point of Cat-5 Re: network topology

2002-03-30 Thread Eugene Leitl

On Fri, 29 Mar 2002, Major Variola (ret) wrote:

 3. Slow connections, slow machines

Thanks to gamers, ping latencies are getting better. ADSL is a pain, but
even 128 kBit upstream can be useful, if aggregated from multiple sites.
Queries for distributed P2P search engines should use ACKless protocols,
obviously.

 To resist 1. you can use port 80, which ISPs can't block without losing
 most 'legitimate' utility for the masses :-)  Or you use randomly

Um, you can, just block incoming connections. It's a problem with REST.

 varying ports and have to do more door-knocking.

If you run a P2P-agnostic firewall, you'll have a problem with random
incoming ports. I suggest camouflaging as bona fide traffic, including
gaming and streaming multimedia.

 To resist 2. you have to be able to randomly probe IP addresses to find
 a node.

Yes, probabilistic headless node discovery vs. a centralist approach.

 Now that I write it up, I realize a tree has the flaw that child nodes'
 queries must go through slow upstream links. So I will think about
 algorithms to grow meshes dynamically, robustly, to overcome that
 problem.

Don't use trees, trees are stupid. Use high-dimensional meshes.

 We welcome comments  pointers, and apologize for the rambling.




Re: network topology

2002-03-27 Thread Eugene Leitl

On Wed, 27 Mar 2002 [EMAIL PROTECTED] wrote:

 I don't recall ever having read of this type of structure before,
 but it seems so obvious that I'm sure it's been discussed before.
 So is there a name for it? Does anyone use it? has it been
 shown to be utterly worthless?

You don't mean something like this:
http://www.perfdynamics.com/Papers/Gnews.html do you?

For myself, I used to call virtual high-dimensional lattice topologies
hypergrids, or n-grids.




Re: design considerations for distributed storage networks

2002-03-24 Thread Eugene Leitl

On Sat, 23 Mar 2002 [EMAIL PROTECTED] wrote:

 If mojo failed in the way, and for the reasons you describe, the
 failure was not that it was money like, but that it was
 insufficiently money like.  Since the value of mojo was
 indefinite, its value could never be well matched to its purpose.

I think claims to Mojo's demise are a bit premature:

http://mnet.sourceforge.net/

The commercial part has folded, however the niche is clearly not
commercial.




Re: Define signal and noise.

2002-03-24 Thread Eugene Leitl

On Sat, 23 Mar 2002, Aimee Farr wrote:

 The real issue seems more properly couched as salience. The blur here causes
 conceptual errors, and I would appreciate enlightenment, by way of an
 alternative taxonomy and any refs to recent papers measuring the S/N ratio
 within a channel.

There's no observer-invariant ranking of content. There's clustering,
though. User feedback paraphernalia attached to each message (say, X-Rank:
http://cpunx.org/cgi-bin/rank?agent=farrrating=doublepluspunkalicious),
similiarly to Googlebar's smiley/frowny and a bit of clustering run
server-side could do wonders here. Trouble is, you'd need MUAs who are
aware of X-Rank, and/or attach ranking urls at the bottom of each message.
Plus, server-side infrastructure.




Re: Let's knock off the Reformatted repostings of junky newsarticles

2002-03-15 Thread Eugene Leitl

On Fri, 15 Mar 2002, Tim May wrote:

 And even if they are not properly formatted posts, if they are just more
 fucking news articles, PLEASE DON'T WASTE BANDWIDTH by politely
 reformatting them and sending them again!

Right. Please subscribe to [EMAIL PROTECTED] (you could set
preferences to no email delivery), and send relevant stuff there. Keep
this list free of clutter.




decent full duplex voice crypto

2002-03-14 Thread Eugene Leitl

I've been playing with SpeakFreely yesterday (Win2k, not the Linux version
yet), and found the quality adequate (I'm using a high-quality USB
headphones) yet the CB-style mouse pressing objectionable.

Haven't had time to test PGPfone and Nautilus yet, so is there at all any
system with real full duplex? Linux version preferable (the Labtec Axis
712 USB headset can do full-duplex according to
http://info.fuw.edu.pl/~pliszka/linux-USB/ )

If there's no full-duplex crypto packages, alternative nominations for
other free true full-duplex VoIP is welcome.

-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.leitl.org
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3




Re: Interesting new cipher patent

2002-02-28 Thread Eugene Leitl

A question: assuming, you have a class of random number generators with
lots of internal state (Lots: like 10^6 bits) Let's say the evolution
through state space of that generator is provably reversible (or nearly
reversible), and that the Hamiltonian of the system is stochastic (system
evolution is a randomwalk in state space) The result is a pseudorandom
number generator with a ridiculously long periode, and good randomness of
output, obviously A simple cypher based on it would exchange the
pseudorandom generator state (the key) through a secure channel,
similiarly to a one time pad

Can someone point me towards papers describing construction of above
generators? I'm thinking about reversible cellular automata (is Gutowitz
the only guy who did CA crypto?) or automata networks with changing
connection geometry (ie the connection is also encoded in the state and
changes with each iteration) with the number of total iterations estimated
from lightcone considerations

Point of this:

* algorithmic construction of PRNGs with provable properties
* lots of internal state, hence bit leakage even for a lot of messages
  buys attacker little
* scalable (add more state as hardware improves)
* directly mappable to hardware, very good parallelism

Any pointers?


On Wed, 27 Feb 2002, Khoder bin Hakkin wrote:

 Cipher mixer with random number generator

Abstract

 An encryption device has a random number generator whose output is
 combined by exclusive-or with plaintext input which has been encrypted
 by a first block cipher The combined exclusive-or output is encrypted
 with a second block cipher mechanism which produces a second enciphered
 output The output of the random number generator is also encrypted by a
 third block cipher mechanism which produces a third enciphered output
 The first and second block cipher mechanisms differ from each other

 United States Patent
 6,351,539
 February 26, 2002


-- Eugen* Leitl a href=http://leitlorg;leitl/a
__
ICBMTO: N48 04'148'' E11 36'412'' http://wwwleitlorg
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3




Re: Interesting new cipher patent

2002-02-28 Thread Eugene Leitl

On Thu, 28 Feb 2002, Morlock Elloi wrote:

 As for PRNGs, if you can exchange million bits securely, the desired
 unicity distance (based on your paranoia level) will determine how often
 you must re-key

Given system lifetime of a decade, and the rate of traffic (clearly a TBps
router leaks more than a few email messages), you might not have to rekey
at all

 I am not sure that there is a *simple* prng with 10^6 bit state Feeding

Okay, so there seems to be a niche for it The simplicty refers to the
algorithm Of course you have to represent the state, and a parallel
implementation would of course add a constant factor to each bit of state

 million bits to 1-DES 64 bits at a time and using the output as the key for the
 next cycle could be one way for dilluting entropy




Re: Recording Sunder on the Subway

2002-02-27 Thread Eugene Leitl

On Wed, 27 Feb 2002, Sunder wrote:

 Still having such stickers around is a good thing.  It lets the sheeple
 know they're being watched.  Maybe some of them will feel unhappy enough
 to complain about it.

I'm told they started installing cameras in the local buses (Munich,
Germany). Haven't seen them myself yet.




Re: Auto Keys RNG

2002-02-23 Thread Eugene Leitl

On Sat, 23 Feb 2002, Bill Stewart wrote:

 If the ignition key crypto communications happen out at the steering
 wheel, it's defeatable by basic hotwiring, but if they make the
 communications happen from the electronic ignition module, that's
 tougher to crack. The enterprising car thief _could_ carry around a set

Tougher indeed, if you decrypt the ignition table based on the secret in
the car key transponder. Something like a nuke PAL. (They're not doing
that yet, I know).

 of EPROMs for different car models - or could resort to car-jacking, or

They're not EPROMS. Last time I ran into them these are custom embeddeds
(68HC11, MC68k derivates on a custom serial packet bus for BMW, nowadays
they probably will use ARM), with most code in PROM, some EEPROM (nowadays
flash, I guess) and some RAM. You'd need an entire part, and they're not
available on the open market. (Assuming, you'll go to the pains of driving
up a flatbed truck to the parking lot, and a specialist who can exchange
and program controlled parts, which really asks for high end cars for the
effort to pay).

 social-engineering at parking lots. Fancy electronics don't know that

Looks easier that way.

 you stole the keys.

 But those attacks are more trouble than stealing an unattended car,
 and work equally well against non-cryptographic cars,
 so it's a real risk reduction.




Re: CDR: Re: [Reformatted] Eugene Leitl want to ban thoughtcrime

2002-02-23 Thread Eugene Leitl

On Sun, 24 Feb 2002, matt taylor wrote:

 You have to be an upover nutcase? Who banned nutcases? When? Where can I

I have no problem with nutcases, as long as they're not disruptive. You're
being disruptive to this list.

 appeal?EL should know all about the soviet abuse of psychiatry.

I don't want you instituionalized. I just want you to behave borderline
normally on this channel.

   who's using this public resource for private dumping ground, 

 If its public it cant be private.It's not *dumping either.Has EL complained

Yes, it's public, not your private property. So stop dumping your trash
here.

 to one of the hard spam merchants here?

I try to track down and report spammers whenever it is possible. You're
fortunately not hard to track.

 ALL the complainers and whingers were bested by me in debate that's easily
 checked.

?

  while posting *a lot* (including profanity and casual death threats,
 iirc) 

 A lot to you maybe but not in proportion to the noise.The fact I bested you
 in debate rankle? Profanity and casual death threats oh my! From an
 Australian! Gott in Himmel!

I don't give a damn about your death threats and profanity. Your ISP does:

http://www.nex.com.au/support/terms.htm

The customer must not use their Internet access to annoy, harass or harm
other Internet customers.

The customer must not use their Internet access for any unlawful purpose
or in any unlawful manner.

Clear enough? Shall I pull up a number of your posts which are in
violation of these rules you accepted when you signed up with your ISP?

  and constantly changing his email address, thus avoiding filtering.

 I have a meat addy and had to change my ISP recently,someone I vaguely
 remember making a fool of take's exception.
 I'll try and stay with my present ISP to humor the lunatic but he now says
 he's complaining to my new ISP!
 I deny altering adress's to avoid filtering and I can prove it.Proof of my
 alleged misdeeds looks thin to nonexistant.

I had to change my filtering rules thrice to block you. This means you're
not interested in being minimally disruptive, but actually trying to get
past people's rules. This won't do.

   I don't propose the list policy to be changed, this particular forum
 should be unmoderated.

 Gee thanks Adolf.

   However, complaining to Matt's ISP (whose terms he's clearly in
 violation with) 

 Que? I didn't start sending large unsolicited e-mails and continue after
 being asked to stop.EL has.JJ and lord high executioner.

Yes, you're absolutely innocent. Matt Taylor, keep up polluting this list,
and I'll personally pull up the choicest of your fewmets, and forward them
to your ISP.

  and some grassroot pressure (if there are 100 people on his list willing
 to send back each of his messages 10x, he's dealing with a 1000x
 amplification factor on each and single of his messages) seems to be in
 order. Does anyone see anything wrong with this plan? 

 Well as recipient I could mention the shoot first and ask questions later
 aspect.Then theres the fact that I only post material here I can
 rationalize as being of some interest to at least some of you.I'm not

Who's thinking Matt Taylor contributes valuable material to this list? A
show of hands? Yohn Young, perhaps?

 sabotaging the list and have promised to keep my posts in proportion to the
 *hard* spam.Eugene is a unilateralist,a cowboy and is risking a repeat of a

At some point you were contributing at least 10 posts in my inbox.

 previous failed policy.Like the president he should be killfiled.All the
 whingers about me on this list have been made fools of by me in legit
 debate so their motives in attacking me are suspect.Pure ad Hominen from
 such imbeciles means I won the debate,why do people hate a winner indeed.I
 appeal to the sweet reason of the list.
 Until I figure out a way to counter this below the belt attack on me I

Returning all your emails to you is a below the belt attack? Huh?

 shall be forced to return all EL's stuff to him and here by hand.I would
 appreciate any tech advice from other list members,TIA.Kill the
 president,matt T.





Re: RSA shaken down for cash?

2002-02-22 Thread Eugene Leitl


Because Matt Taylor won't keep a single email address, and thus making
filtering him impractical, and because the cypherpunks list does not seem
to encourage limits on communication I suggest returning every single
message to him, whether manually, or via a procmail recipe.

He stores information on cypherpunks archives, let us store a few large
binaries in his inbox.

On Fri, 22 Feb 2002, matt taylor wrote:

 from:http://www.aci.net/kalliste/
 A HREF=http://www.aci.net/kalliste/;The Home Page of J. Orlin Grabbe
 - --
 VP Gore Strong-Arms Crypto Company, then Demands Donation


 Between 1995 and 1996 Al Gore called 44 people from the White house to
 solicit money for his re-election. Those calls netted the DNC over $2
 million dollars. The Vice President placed these calls from the White
 House on his DNC credit card. One person Mr. Gore called was Sandford
 Robertson, part owner of the San Francisco investment banking firm
 Robertson, Stephens and Co. The Vice President's call obtained $142,000
 from Sandy Robertson for the DNC. Yet, Sandy was already well known in
 the DNC camp. Between 1993 and 1997, Sandy Robertson or his wife donated
 over $700,000 to various campaigns, including $100,000 for Clinton's
 1993 inauguration.

 Robertson, Stephens and Co. are also major financial backers of Security
 Dynamics, the present owners of RSA Inc. It was Robertson, Stephens and
 Co. that filed the agreement documents with the SEC (Security and
 Exchange Commission) for the merger of RSA and Security Dynamics in
 April of 1996. Of course, Robertson, Stephens and Co. were well paid to
 sponsor the RSA/SDI merger deal. Robertson and Stephens not only wrote
 the merger agreement between RSA and SDI they also underwrote the first
 two public offerings of SDI stock.

 Robertson, Stephens  Company has provided certain investment banking
 services to Security Dynamics from time to time, including acting as an
 underwriter for each of the two public offerings of shares of the common
 stock of Security Dynamics. In addition, Robertson, Stephens  Company
 maintains a market in shares of the common stock of Security Dynamics.
 Furthermore, Robertson, Stephens  Company has acted as financial
 advisor to Security Dynamics in connection with the Merger for which a
 portion of our fees is due and payable upon delivery of this opinion and
 the remaining portion of our fees is due and payable contingent upon the
 closing of the Merger.

 SEC Merger Document April, 1996 ROBERTSON, STEPHENS  COMPANY LLC Edwin
 David Hertz


 Jim Bidzos, RSA chairman, stated that Al Gore personally lobbied him to
 sell the RSA crypto patents to the US Government. It is reported that Al
 failed and Bidzos walked out. Al Gore has never denied nor confirmed Mr.
 Bidzos's remarks about his effort on behalf of the US government. Yet,
 Jim Bidzos also took a trip to Beijing in late 1995. The result of that
 trip was second trip to Beijing in February of 1996 and a deal with the
 Academy of Science to sell encryption technology directly to the PRC
 government. The Clinton administration, quick to prosecute anyone who
 sold encryption outside the US, did nothing to stop the RSA deal with
 China.
 Al Gore tried to buy the rights to encryption technology from RSA for
 the US government. That was an official act performed by the Vice
 President. Al Gore has also played a major role in the Clinton
 Administration's Crypto policy. He was fully briefed early on about
 Clipper and later would lobby hard to push the draconian controls sought
 by the government.

 Yet, despite the obvious conflict of interest, Al Gore did not hesitate
 to solicit donations from the very same company he had just tried to
 strong-arm. Al dialed for money from the same company that needed the
 administration's approval for export.

 In the end... Money was exchanged and services were rendered. China now
 has the RSA crypto technology, Al Gore got the donation money and
 Sandy Robertson stands to become even richer.

 1 if by land, 2 if by sea. Paul Revere - encryption 1775


-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.leitl.org
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3




IP: Pentagon Readies Efforts to Sway Sentiment Abroad (fwd)

2002-02-19 Thread Eugene Leitl


possibly even false ones? and even Western Europe. As official policy?
I wonder which genius comes up with those ideas.

-- Forwarded message --
Date: Tue, 19 Feb 2002 01:08:47 -0500
From: David Farber [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: IP: Pentagon Readies Efforts to Sway Sentiment Abroad

http://www.nytimes.com/2002/02/19/international/19PENT.html


By JAMES DAO and ERIC SCHMITT

The Pentagon is planning to provide news items, possibly even false ones,
to foreign media in order to influence public opinion in both friendly and
unfriendly countries.
The plans, which have not received final approval from the Bush
administration, have stirred opposition among some Pentagon officials who
say they might undermine the credibility of information that is openly
distributed by the Defense Department's public affairs officers.

The military has long engaged in information warfare against hostile
nations — for instance, by dropping leaflets and broadcasting messages into
Afghanistan when it was still under Taliban rule.

But it recently created the Office of Strategic Influence, which is
proposing to broaden that mission into allied nations in the Middle East,
Asia and even Western Europe. The office would assume a role traditionally
led by civilian agencies, mainly the State Department.

snip

For archives see:
http://www.interesting-people.org/archives/interesting-people/




RE: Pentagon Readies Efforts to Sway Sentiment Abroad (fwd)

2002-02-19 Thread Eugene Leitl

On Tue, 19 Feb 2002, Lucky Green wrote:

 So where is the news? Is it that the government is admitting to this
 well-known fact?

Admitting to run PSYOPS against allies has novelty at least to me.
Widespread realization of this results in loss of efficiency in
communication (everything is assumed to be a lie a priori unless proven
otherwise) and voter-driven change in policy (e.g. EU-US axis).




RE: Say a goodnight prayer for joshua.

2002-02-14 Thread Eugene Leitl

On Wed, 13 Feb 2002, Aimee Farr wrote:

 Jim Bell was arrested for stalking protected persons. Not even our
 military is exposed to the sort of personalized fear and exposure that
 public servants and their families experience today.

Maybe they shouldn't have become public servants, then.

 War is an act of force to compel our enemy to do our will. Where a
 man's family is concerned, words count.

WTF is this supposed to mean?

 I'm fairly certain you just crossed the Rubicon.

You make even less sense than proffr.




Re: DC to get spycams --no choice but to accept it

2002-02-14 Thread Eugene Leitl

On Wed, 13 Feb 2002, Greg Newby wrote:

 In Brin's world, there would also be cameras in the DC police
 departments for us to watch the watchers.  More:

Shouldn't mention Brin, as his symmetry assumption (re quis custodiet) is
never true, yet interpreted superficially is very much like public
biometrics apology.

Near-future high-quality biometrics extraction could be cheaply integrated
into surveillance gear, and given ubiquitous wireless allow realtime
database matching and data warehousing. Such capabilities are much too
powerful to trust people with.




RE: Say a goodnight prayer for joshua.

2002-02-14 Thread Eugene Leitl

On Thu, 14 Feb 2002, Aimee Farr wrote:

 See Clausewitz.
 See 49 BC Julius Ceasar.

See failure to provide context.




RE: Say a goodnight prayer for joshua.

2002-02-14 Thread Eugene Leitl

On Thu, 14 Feb 2002, Trei, Peter wrote:

 There's a fine balance between assuming a common background
 which provides shorthand referents, and being a showoff.

Um, I resolved the references just fine. It's just I missed the context,
because proffr goes to /dev/null




Shmoo Group - Software security geek site (fwd)

2002-02-09 Thread Eugene Leitl



-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.leitl.org
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Fri, 8 Feb 2002 10:41:54 -0800
From: Mr. FoRK [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Shmoo Group - Software security geek site

I love the word 'shmoo' (but I'd spell it 'schmoo')
--

http://www.shmoo.com/

About The Shmoo Group

Who we are
The Shmoo Group was formed on or about March 1999 utilizing several ice cold
Guinesses and some youthful idealism. We're a group of security, system, and
network professionals who all have a bit too little free time and a few too
many ambitions. To that end, we decided to start up a security resource on
the web that would pretty much be a free-form, hippy-love event. What we
ended up with is what you see here.

What we do
TSG has many ongoing projects. We run 2 news sites, Securitygeeks and
Macsecurity.org. We write software as needed (check out Osiris and FEMA). We
also partake in various acts of crypto and security advocacy such as the
Capture the Capture the Flag and the RSA Party Planner. Last but not least,
TSG maintains a large list of web resources including mail archives
(bugtraq, FW1, IDS, etc), crypto source code, a MAC address search and ccTLD
search, and list of resources on writing secure code.



http://xent.com/mailman/listinfo/fork




RE: list spam, game theory, etal.

2002-02-07 Thread Eugene Leitl

On Wed, 6 Feb 2002, Trei, Peter wrote:

 This is abuse of the whole notion of a mailing
 list as a place of discourse. It is a sociopathic
 disregard for everyone who uses the list as a
 place for discussion and persuasion. It is more
 contemptable than even spam.

1) he's nuts. he won't listen to you.
2) somebody please post that procmail recipe which would clog up his
   mailbox




Re: Morphing Idiot

2002-02-05 Thread Eugene Leitl

On Fri, 1 Feb 2002 [EMAIL PROTECTED] wrote:

 On Fri, 1 Feb 2002, proffr11 wrote:

  Date: Fri, 01 Feb 2002 19:43:44 +1100
  From: proffr11 [EMAIL PROTECTED]

 This is becoming Usenet: you shitcan one address, and he starts using
 another.

Er, could somebody please kindly repost that evil procmail recipe (the one
with the remailer feature)?




Re: Speak-Freely and a Telephone (fwd)

2002-02-04 Thread Eugene Leitl



-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.leitl.org
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Fri, 1 Feb 2002 14:52:16 -0800 (PST)
From: Jeffrey Streifling [EMAIL PROTECTED]
To: Alejandro Néstor Vargas [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: Speak-Freely and a Telephone

  I read your message with great interest because I wanted to connect
  Speak-Freely with a telephone also.  I do know there were a group of
  developers creating software drivers for this purpose, but for some
  reason the development has been stopped.

 Well... I hav not much time but I can help if the project is already
 started. If you can help, may be we could continue the project. Where do
 you seen this?

  With this type of setup, Speak-Freely becomes a very very powerful
  communications tool.

I have done this.  I set up a Speak Freely to POTS gateway that allowed
somebody to connect to the machine over the Internet and make an outbound
call from the machine, which ran unattended.

This turns out to be a fairly difficult thing to do.
(1) Because there is no way to manage line turnaround from the remote
telephone, you must do everything the full-duplex way.

(2) To run unattended in an obvious way, you will probably want to base
your system on a Unix-like platform, BUT a lot of Unix-like platforms
restrict to you half-duplex.

(3) You cannot wire a sound card to the phone line in the obvious way and
expect to do full duplex.  Everything you drive onto the wire from the DAC
will feed back into the ADC real loud, making communication impossible.
To solve this, you will need a specially wound transformer called a
hybrid coupler.  Internally, they are not all that complex, and they
show up in a variety of telephony equipment, but the kind of thing you
will want for this job is a bit of a rare item.  The best way to do this
is to talk to find your friendly amateur radio operator and ask how to get
a phone patch.  You will still need to know how to wire up small
amplifiers and resistor networks to handle the impedance transformations.

(4) If you are connecting to a POTS line, you need a way to control your
output impedance.  High impedance = on hook; low impedance = off hook.  If
your hybrid is high impedance, you can put a Hayes style modem in parallel
with it to manage dialing and hookswitching.  If your hybrid is
low-impedance (forcing the phone off-hook), you will need to retrofit it
with a relay to hang up the line with, and make the necessary arrangements
for controlling it.  (Remember how pulse dialing works?)

(5) There are several cans of worms on the computer side, including
management, security, CPU management, and others.  I never did get a good
interface worked out for the whole mess.

Rather than pull your hair out, you should consider getting hardware that
is suited to the job (Quicknet makes something called the Linejack, and
there is a company called Voicetronix which would be useful for larger
setups).  Rather than use Speak Freely, which is oriented to interactive
use, try something along the lines of the tools from www.openh323.org.
H.323 does not really address encryption (to my knowledge); use CIPE.

Actually, the encryption in Speak Freely (at least the current Unix
version) has a number of problems.  The two grossest problems are the fact
that the one-time pad is not one time (it's one time per packet) and the
fact that the IDEA encryption uses the cipher feedback mode with an all
zero initialization vector, thereby encrypting the first eight bytes by
XORing them with a constant (the not-so-onetime-pad problem, round two).
This trivially gives away the farm.  More minor issues include the fact
that text chat is not encrypted (from what I can tell), and DES has too
short a key to be of much use anymore.  The moral of the story is, Use
Blowfish!.  (Is there a fix in the works?)

Anyway, my project never did work all that well -- it was short on CPU
power, my prototyped (unshielded) circuits picked up a lot of noise, the
interface was clunky, grounding was problematic, and keeping the signal
amplitude at reasonable levels through the whole apparatus turned out to
be a nightmare.  Good luck; you'll need it!

Jeffrey Streifling
[EMAIL PROTECTED]


  * * *

To unsubscribe from this mailing list, send E-mail containing
the word unsubscribe in the message body (*not* as the
Subject) to [EMAIL PROTECTED]





Re: biometrics (fwd)

2002-01-27 Thread Eugene Leitl

On Sat, 26 Jan 2002, Jim Choate wrote:

 Yowzer!!!

 Step away from the PCB!

Thermite is too slow. What you need is something quick which blows away
your secrets, not your digits. While not as elegant as recent nanoporous
silicon/oxidizer, some 100 mg of electrodetonated (electrolyte capacitor)
lead azide on top of the die would do. Another possibility is to make part
of the die package from HE (but you still need a primer to set it off).




[linux-elitists] NYLUG.org Invitation to LinuxWorld pub event inNYC, Jan 31st @7:45pm (fwd)

2002-01-26 Thread Eugene Leitl

-- Forwarded message --
Date: Fri, 25 Jan 2002 10:33:26 -0500 (EST)
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED], nylug-talk [EMAIL PROTECTED],
 nylug-announce [EMAIL PROTECTED]
Subject: [linux-elitists] NYLUG.org Invitation to LinuxWorld pub event in
NYC, Jan 31st @7:45pm

Elitists and Nyluggers,

If you plan to be in New York City for the LinuxWorld Expo show,
I hope you'll join us to sign pgp keys at an after-show pub event.

At the conclusion of Drew Streib's BOF (Birds of a Feather)
OpenPGP talk around 7:30pm, everybody will walk over to the
Tir Na Nog bar located nearby on 8th Avenue between 33rd and
34th Streets. A section in the cathedral bar area is reserved
for us. Check it out: www.tirnanognyc.com/4.html

When the exhibits close at 6pm, people from the New York Linux
Users Group booth will walk over to Drew's BoF located in room
1E13 downstairs on level 2. Here's more info on the talk:
www.linuxworldexpo.com/confprogram/wc/sub_pages/sub2.shtml#Importance

__
** After-Show Pub Event Details **
Thurs 31 January, 2002
7:45pm
Tir Na Nog bar and restaurant
5 Penn Plaza
8th Avenue between 33rd and 34th Streets
map: http://tirnanognyc.com/2.html


We will mostly be hanging out, signing each other's keys, and
discussing Linux.

In the remote event that you can not meet us ;)
please be sure to look us up the next time you are in town.

- Jim

http://www.nylug.org
http://linuxworldexpo.com
http://www.nylug.org/keys


Jim Gleason VA Software
email: [EMAIL PROTECTED]   http://www.vasoftware.com
phone: 212-858-7684 Pres. New York Linux Users Group
fax: 212-858-7685   http://www.nylug.org



___
linux-elitists
http://zgp.org/mailman/listinfo/linux-elitists




Re: aibo and the dmca (fwd)

2002-01-26 Thread Eugene Leitl

On Fri, 25 Jan 2002, Michael Motyka wrote:

 The whole fucking thing is absurd. The idea that I can't hack around
 with a piece of HW that I paid for is OBSCENE. Not that I am in the
 least interested in aibo but the priciple is a real problem.

Sony is very nazi about it (which is the reason I never buy anything from
them). I'm surprised you never ran into policies of Sony or several other
Japanese companies.




Re: More clueless news forwardings

2002-01-20 Thread Eugene Leitl

I would suggest to use http://groups.yahoo.com/group/cpunx-news/ as a
newsticker/cpunks news dumping ground while keeping the main list free
from twitter.

On Sun, 20 Jan 2002, Tim May wrote:

 Recently arrived here from Choate Prime, Jei the Finn sends us 12 (that
 I counted) forwarded news items on Saturday. I guess he thinks we need
 Yet Another News Forwarding Service.

 He joins mattd, Choate, Hettinga and others in the filter file.



 --Tim May
 That the said Constitution shall never be construed to authorize
 Congress to infringe the just liberty of the press or the rights of
 conscience; or to prevent the people of the United States who are
 peaceable citizens from keeping their own arms. --Samuel Adams


-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.leitl.org
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3




Re: Responsibility.

2002-01-17 Thread Eugene Leitl

On Thu, 17 Jan 2002, Aimee Farr wrote:

 When you paint targets on people, other individuals may cause them
 harm, seeking some measure of your acceptance. Some here might have

Luckily, only individuhhals here. So, keep painting.

 actual followers, not fans or confederates-in-cause. Some
 individuals here, and you even as a group don't have to ask for
 somebody to be hurt, just imply that it is consistent with your
 wishes. When somebody expresses targeted violent sentiments, and you

Can people be responsible for actions of crazy people?

 don't correct them, they perceive that as a ratification. (While
 mattd is a self-identifier, others might not be. You might not even
 know about them.) Such suggestions are a time-tested method of
 obtaining plausible deniability for violent political action.

I'd rather prefer to think of this as a rowdy bar. A place to have fun, a
place to get a bloody nose, possibly.

 I would think SOMEBODY can at least make the effort to say something
 when violent sentiments are expressed.

Why? Consenting adults here, last time I looked.

 Guess not.




IP: Pres. Bush to Head-Up National ID System (fwd)

2002-01-12 Thread Eugene Leitl



-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.leitl.org
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Fri, 11 Jan 2002 19:55:58 -0500
From: David Farber [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: IP: Pres. Bush to Head-Up National ID System


Date: Fri, 11 Jan 2002 18:14:24
To: (Recipient list suppressed)
From: [EMAIL PROTECTED]



SCAN THIS NEWS
1.10.2002

Pres. Bush to Head-Up National ID System

As previously reported here, Congress has recently directed the US
Department of Transportation to establish model guidelines for encoded data
on driver's licenses issued by states as part of the 2002 transportation
funding legislation.

The Congressional directive also instructs federal agencies to work together
towards development and installation of fingerprint or retinal scanners at
airports which will read and verify data stored on the license documents.

The directive constitutes formal establishment of a national ID system under
the leadership of President George W. Bush as chief executive of his
administration.

According to the Congressional report the system will be used for national
security and to prevent fraud. It will also be used to stop underage
drinking.

The newly established Department of Transportation safety agency will manage
a federal database linking state driver information.

The 1993 Driver's Privacy Protection Act (DPPA), codified at Title 18,
Section 2721, will serve as the authority for this program. The Act
~requires~ states to release personal information from  motor vehicle
records for purposes of national defense (security) and matters involving
national or regional emergencies; all under direction of the President.

The DPPA also authorizes the Secretary of Transportation to collect and
collate transportation related information whenever the Secretary decides
such collection will contribute to the improvement of the transportation
system of the United States.

The American Association of Motor Vehicle Administrators (AAMVA) has already
drafted a national ID standard. One of the required features of the AAMVA
standard is digitally encoded inclusion of Social Security Numbers -- even
though it is often claimed by proponents that SSNs would not be included.

The AAMVA national ID standard also incorporates fingerprint and digital
photo criteria.

AAMVA's standards director, Nathan Root, was recently quoted -- in an effort
to counter opposition to their national ID scheme -- saying, they're giving
these systems too much credit in even assuming that somebody would be able
and interested to track everybody's whereabouts and
doings.

If you believe Nathan Root, you deserve a national ID.

---

CONFERENCE REPORT ON H.R. 2299, DEPARTMENT OF TRANSPORTATION AND
RELATED AGENCIES APPROPRIATIONS ACT, 2002 (H.R. 2299)
ftp://ftp.loc.gov/pub/thomas/cp107/hr308.txt
Conference Report (H. Rept. 107-308)

Model guidelines for encoded data on driver's licenses.--
In light of the terrorist attacks of September 11th, it is clear that all
levels of government need to work in concert to deter and prevent future
attacks. One means of doing so is to ensure that individuals asked to
identify themselves are not using false identities. The increasing
availability through the internet of expertly crafted false identification
makes the task very difficult. The conferees are aware of technology,
existing today, that can quickly scan any encoded data on the reverse of a
driver's license to validate the license as legitimately issued. By
reviewing personal data encoded on the license, it can also be used to
assist in making a quick determination that the person displaying the
license is the person to whom it was issued. The conferees strongly
encourage the department to consider the development of model guidelines
specifying the types of encoded data that should be placed on driver's
licenses for security purposes, and to work in concert with states and
related licensing bodies toward the early implementation of such measures.
This could benefit the nation's efforts to improve security as well as
assist in reducing fraud and underage drinking.

Document and biometric scanning technologies.--
Document and biometric scanners linked to federal databases by computers and
containing advanced authentication capabilities would facilitate the
processing of background checks, provide fingerprint and additional
biometric identification capabilities, and authenticate documents presented
for identification. It is the conferees' understanding that such off the
shelf, commercially available technology is in use or being tested by the
Immigration and Naturalization Service. The conferees encourage FAA to
assess such document and biometric scanning technologies for use at all
commercial service airports. The conferees also 

Re: Random Data Compressed 100:1 (Guffaw)

2002-01-09 Thread Eugene Leitl

On Tue, 8 Jan 2002, Steve Schear wrote:

 combinations/permutations and auto correlations to code for the runs.  I
 say attempted, because I was never able to find acceptable algorithms to
 satisfy my requirement.  I still believe these algorithms exist, it was
 just my limitations in identifying the underlying math needed.

http://www.google.com/search?q=IFS+image+compressionsourceid=operanum=100ie=utf-8oe=utf-8




Re: Shoe bomb and how to defeat spyware

2002-01-08 Thread Eugene Leitl

On Tue, 8 Jan 2002, Ken Brown wrote:

 that triacetone triperoxide can be home-made, and has intriguing

HMDT is another alternative. Really fun to work with:

Newsgroups: rec.pyrotechnics
Subject: Re: HMDT
Date: 10 Mar 92 04:53:20 GMT
Organization: Tampere Univ. of Technology, Finland.
:
:
  Well, I put a small piece of HMTD into a brick, and hitted it with a
hammer, and it didn't detonate. I also tried a 'spark-test' from a
lighter, and didn't managed to detonate HMTD. ( Indeed in ntp, and in
normal condition, HMTD wont detonate If you light it, It'll burn like
cellulose nitrate - with a yellow flame. Well, I was more than
Happy to see, That I'd found A PERFECT Primary-explosive to detonate
high-explosives.
  Well At the July of 1989 It happened, I was damping HMTD into a .22
LR copper cartridge, with a standart match, you see holding that
cartridge in my left hand ,when it suddendly detonated, A HUGE explosion,
and I found that for some reason, my hand was bleeding abt 1/2 liter
of blood per min ( 1/9 gallon per min ) , and I could see my bone
'shining' through scraped human tissue.

   Epiloque. Never NEVER load B-caps in your hand, Always use special
tamping device when loading Blasting caps - any other use for HMTD is
silly - Believe me, I had hitted HMTD with a Hammer, It didn't
detonate, and now, when I try to load that stuff from same batch into
a copper container, It detonates, even I press with maybe 1/2 kg
( = 1 pound ) force it.
   Maybe the batch was impure, but believe me, It really explode
without no reason. I must say that HMTD is a good explosive, but It's
truly unpredictable. I'm sure that there are many others in this
newsgroup who can tell the same thing - months of hard handling, and
then, a explosion by a minumum force.
:
:

 reference to ping pong balls dissolved in acetone. Interestingly,

They're made (or used to be made until very recently) from celluloid,
nitrocellulose of low degree of nitration plasticized with camphor. It is
soluble in acetone, but diethylether/ethanol is a better solvent. I don't
see this being anything else than binder, stabilizer or desensibilizer for
the organic peroxides/PETN.

 despite scare stories, a simple google search doesn't turn up details
 on how to make the stuff (neither does the Science Citation Index,
 which might have been a better bet, though I imagine anyone with
 access to a University library could get the information)

A simple Google search should pull up dozens of links on how to make it.

Don't. If you don't know how to make it, it means you can't handle it
safely. Quantities of organic peroxides in novice's hands will quickly
make them missing digits, or Worse. Organic peroxides are much too
instable to be safely worked with, period.

 And google has just told me that the husband of a colleague of mine
 has published a paper on PETN - thousands of tons of which are
 apparently manufactured every year and used in industry and medicine
 (it is a vasodilator and cardioactive drug). So it might not be too
 difficult to find that for sale.

http://www.faqs.org/faqs/sci/chem-faq/part3/section-2.html
See: 13.8 What is the chemical structure of common explosives?

-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.leitl.org
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3




Prisoner on line discussion (fwd)

2002-01-08 Thread Eugene Leitl



-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.leitl.org
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Sat, 5 Jan 2002 15:28:18 -0600
From: Joyce Scrivner [EMAIL PROTECTED]
To: silent t [EMAIL PROTECTED]
Subject: Prisoner on line discussion


I've got video tapes (from the tv) of all the episodes and some odds and
ends of other things.  Fun show.

- Original Message -


 At 3:33 PM -0800 1/4/02, Laissez Faire Books wrote:
 Julian Sanchez will be hosting a discussion board on The Prisoner Series.
 Come join in and pick Julian's brain on the series or discuss it's finer
 points with other fans. This board will begin on January 11th, get your
 questions ready!
 
 
 == RECENTLY ARRIVED IN STOCK
 
 THE PRISONER
 Complete Set on DVD
 By Patrick  McGoohan
 AE Television, 2001
 
 One of the most challenging and thought-provoking television series of
all
 time, THE PRISONER is the strange saga of a former government operative
 (Patrick McGoohan) sent to a twisted prison called the village. Known
 only as No. 6, he engages in a battle of wills with the powers that be
 (represented by the nefarious and constantly changing No. 2 and a
bizarre,
 chilling presence called the Rover) that wish to extract his secrets
and
 break his spirit. Digitally re-mastered and presented in its original
 order, this set includes all seventeen episodes of the unforgettable
series
 that introduced a whole new type of hero to the TV world.
 
 FN8564, 10 DVD Videos, 884 min
 List Price: $199.75
 Our Price: $149.95
 You Save: $49.80 (25%)
 http://www.laissezfairebooks.com/product.cfm?op=viewpid=FN8564aid=10154

*** [EMAIL PROTECTED] *** joyce scrivner *** All My Own Opinions ***
Transported to a surreal landscape, a young girl kills the first woman she
meets and then teams up with three complete strangers to kill again. --
Marin County newspaper's TV listing for THE WIZARD OF OZ






Re: Orange crush

2002-01-07 Thread Eugene Leitl

On Mon, 7 Jan 2002, cubic-dog wrote:

 Dunno, maybe you're right, I couldn't get it to happen in the lab
 with phenols when I was a chem student without actually burning it. I

I wouldn't cook polyhalogenated phenol dry or in high-boiling point
solvents in presence of copper powder, and alcali.

http://www.ping.be/~ping5859/Eng/ChlorineDiChem.html




IP: Judge OKs FBI Keyboard Sniffing (fwd)

2002-01-07 Thread Eugene Leitl



-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.leitl.org
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Sun, 06 Jan 2002 13:46:30 -0500
From: David Farber [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: IP: Judge OKs FBI Keyboard Sniffing

[ In keeping with protocol, I was an expert witness (pro-bono) for the
defense and submitted several affidavits on the technical issues djf]


 http://www.wired.com/news/privacy/0,1848,49455,00.html

Judge OKs FBI Keyboard Sniffing
By Declan McCullagh
2:00 a.m. Jan. 4, 2002 PST  WASHINGTON -- The Justice
Department can legally use a controversial electronic surveillance
technique in its prosecution of an alleged mobster.

In the first case of its kind, a federal judge in Newark, New Jersey has
ruled that evidence surreptitiously gathered by the FBI about Nicodemo S.
Scarfo's reputed loan shark operation can be presented in a trial later
this year.

U.S. District Judge Nicholas Politan said last week that it was perfectly
acceptable for FBI agents armed with a court order to sneak into Scarfo's
office, plant a keystroke sniffer in his PC and monitor its output.

Scarfo had been using Pretty Good Privacy (PGP) encryption software to
encode confidential business data -- and frustrate the government's
attempts to monitor him.

 [snip]

The court order from the federal magistrate judge stated that the FBI
could install and leave behind software, firmware, and/or hardware
equipment, which will monitor the inputted data entered on Nicodemo S.
Scarfo's computer in the target location so that the FBI can capture the
password necessary to decrypt computer files by recording the key related
information as they are entered.

Defense attorneys had said that the PGP pass-phrase snatching was akin to
a telephone wiretap and pointed out that the FBI never obtained a wiretap
order. Scarfo's lawyers also claimed the FBI was conducting a general
search of the sort loathed by the colonists at the time of the American
Revolution and thereafter outlawed by the Fourth Amendment's prohibition
of unreasonable searches.

For archives see:
http://www.interesting-people.org/archives/interesting-people/




Re: Detweiler, Vulis, Toto, John Young, and mattd

2002-01-07 Thread Eugene Leitl

On Sun, 6 Jan 2002, Tim May wrote:

 I'm thinking there's some common miswiring in the brains of these folks.

If you think cpunks are bad, try cryonicists. Ugh.




Re: Hackers Targeting Home Computers (fwd)

2002-01-07 Thread Eugene Leitl



-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.leitl.org
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Mon, 07 Jan 2002 11:15:48 -0800
From: Hack Hawk [EMAIL PROTECTED]
To: Kent Borg [EMAIL PROTECTED],
 Eugene Leitl [EMAIL PROTECTED],
 [EMAIL PROTECTED]
Cc: Hadmut Danisch [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: Hackers Targeting Home Computers

Although I originally used the word filter to describe a possible ISP
action to address certain problems, the following statement from KB was
more what I meant to suggest.  And also Lynn Wheeler's statement about
Dynamic IP addresses not being allowed to host HTTP services because it's
not in the consumer/client agreement anyway.

At 09:02 AM 1/7/02 -0500, KB wrote:
Once word gets out that letting your computer be breached can get your
internet account suspended, people might start applying patches, Linux
might start making some inroads, and Micro$oft might quit shipping so
many new bugs every week.

Now, since the suggestion/idea prompted several responses, I'd like to
offer one other opinion to see what some of you think about it.  I know
that it's possibly been discussed here before, but hopefully I won't get
flamed too bad.  :)  Sorry, I'm kind of new to this particular list.

When I performed my experiment a few months back, I had the idea to create
a Code Green worm (like somebody actually did) that would go out and
forcefully patch those vulnerable systems.  I even went as far as
developing a small tftp daemon that could serve up the CG virus to other
infected systems for a short period of time.

In light of all the discussion I've previously read on such matters, I
decided against implementing the CG counter Virus.

However, I'm starting to think that such counter viruses aren't such a bad
idea, and here's the primary reason *why* I believe that.

Currently, our government (people like Ashcroft) are slowly taking away our
freedoms in an effort to gain control over the problem.  Personally, I have
a real hard time with this.  I don't like Ashcroft and others like him
having the ability to come into my home and phone lines and monitor
everything I do.  If they just happen to label me as a potential terrorist,
then I'm basically f*#$ed and loose all my rights.

I fully appreciate the dangers of our world, and why somebody like Ashcroft
may want to sacrifice our liberties to gain control of worldly
problems.  However, there is *another* way.  We can either sit back, and
let people like Ashcroft take control of the cyber situation, or we can
step up to the plate, and take control of the problem ourselves.

My non-technical mailing list was my first non-intrusive step up to the
plate.  Perhaps in the future, stepping up should be a little more
intrusive.  If the freedoms I value so much are at stake, then maybe the
rewards outweigh the risk of damaging someone's ego by patching their
systems for them.  IMHO.

- hawk




-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]




Shoe bomb (fwd)

2002-01-07 Thread Eugene Leitl



-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.leitl.org
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Sun, 6 Jan 2002 22:32:31 -0500
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Shoe bomb


At 1:02 am -0800 12/26/01, Talley, Brooks wrote:
This guy, for example, tried to light plastic explosives with a fuse
(10% success rate at most), using a smelly match rather than a lighter,
and did so while sitting in his seat rather than in a lavatory.  Was he
asking to be caught, or just incredibly stupid?

He was seated close to the fuel tank. The explosive is essentially just
a primer for the fuel.

The following article is pretty unsettling, in that it makes the case that
  - the technique is carefully thought out, and
  - there will be more of these attacks, and
  - there aren't good ways to stop them.

-Olin

---
http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2002/01/06/MN222117.DTL
Shoe-bomb flight -- a trial run?
U.S., British officials fear similar attacks in the works
Simon Reeve, Special to The Chronicle
Sunday, January 6, 2002

London -- As investigators gather evidence about possible links between
alleged airline shoe-bomber Richard Reid and the al Qaeda terrorist
organization, intelligence officials on both sides of the Atlantic are
floating a disturbing theory: that Reid's bombing attempt may have been a
trial run for future, simultaneous attacks against passenger jets to be
carried out by supporters of Osama bin Laden.

U.S. and British intelligence officials believe that the British citizen on
American Airlines Flight 63 from Paris to Miami on Dec. 22 was a foot
soldier sent to check the destructive power of shoe bombs against civilian
targets.

One senior British intelligence official said there are indications that more
than a few, but less than a dozen individuals may be preparing similar
attacks in the near future.

These officials cite similarities with a weapon developed by Ramzi Yousef,
mastermind of the 1993 World Trade Center bombing, who plotted a series of
simultaneous attacks on U.S. airliners in the mid-1990s.

There is a definite pattern here with Yousef's past attacks that we would be
foolish to ignore, said one highly placed intelligence official. They have
tried this before, and they are trying it again.

During the flight, Reid allegedly tried to detonate explosives hidden in his
shoes with a lighted match. Crew and passengers averted a disaster by jumping
on the 28-year-old London-born suspect.

MOTHER OF SATAN BOMBS

Preliminary studies by the FBI indicate Reid's black suede basketball shoes
contained between 8 and 10 ounces of the explosive triacetone triperoxide, or
TATP -- called The Mother of Satan by Palestinian militants, because its
inherent instability makes it dangerous to both the victims and bomb maker.

The TATP in Reid's shoes was blended with an explosive called PETN, or
pentaerythritol tetranitrate, which can be ignited with a normal cigarette
lighter. PETN is a key ingredient of Semtex, the Czech-made military explosive
used to down Pan Am Flight 103 over Lockerbie, Scotland, in 1988.

These bombs are sophisticated devices, said the British intelligence
official. They would have been difficult and dangerous to produce. Reid could
not have done this himself -- he would have trouble tying his own shoelaces.
It seems we may have an expert bomb maker on the loose in Europe.

LINKS TO 20TH HIJACKER

Among the links being pursued by investigators are telephone conversations,
known to British intelligence, between Reid and Zacarias Moussaoui, the so-
called 20th hijacker who was indicted on conspiracy charges in connection
with the Sept. 11 attacks, and reports that the two worshiped at the same
mosque in London. Moussaoui's attorney entered a plea of not guilty for his
client in Virginia last week.

Investigators are also probing the origins of the money used by Reid, who has
no visible means of support, as he traveled to seven different countries last
year.

Among the cities Reid visited was Amsterdam. The Binnenlandse Veiligheids
Dienst (BVD), the Dutch security service, is trying to reconstruct Reid's
movements and to establish whether an al Qaeda cell there may be plotting
attacks on passenger jets.

Reid has told FBI agents that he contacted Dutch arms dealers via the Internet
and paid $1,800 for the explosives. But intelligence sources speculate that
Reid obtained them from an al Qaeda explosives expert in Amsterdam, who
adapted the shoes in preparation for Reid's attack.

FBI agents and British anti-terrorist officials, meanwhile, have concluded
that the shoe-bomb plot originated with the ideas of Yousef, an early al Qaeda
operative who suggested flying passenger jets into buildings.

'PROJECT BOJINKA' 

pine filtering

2002-01-05 Thread Eugene Leitl


While in pine, hit the keys m s r f a

http://www.umanitoba.ca/campus/acn/docs/pine/pine-filters.html

Use e.g. mattd [EMAIL PROTECTED] as From pattern

Set up a folder e.g. called junk in Filter action.

Of course, procmail is better, but you have to be careful when setting it
up, since it is easy to lose mail, if you don't know what you're doing.

http://www.ling.helsinki.fi/users/reriksso/procmail/mini-faq.html




IP: Fw: Drawing A Blank -- ACLU Report on the Failure of FaceRecognition in Tampa (fwd)

2002-01-04 Thread Eugene Leitl



-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.leitl.org
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Thu, 3 Jan 2002 20:04:45 -0400
From: David Farber [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: IP: Fw: Drawing A Blank -- ACLU Report on the Failure of Face
Recognition in Tampa


-Original Message-
From: Barry Steinhardt [EMAIL PROTECTED]
Date: Thu, 03 Jan 2002 15:27:36
To: Dave Farber [EMAIL PROTECTED]
Subject: Drawing A Blank -- ACLU Report on the Failure of Face
  Recognition in Tampa

Dave,

The use of the biometric facial recognition technology, along with video
surveillance on the streets of Tampa, Florida is an overhyped failure that
has been seemingly abandoned by police officials, according to a report
released today by the American Civil Liberties Union.

System logs obtained by the ACLU through Florida's open-records law show
that the system never identified even a single individual contained in the
department's database of photographs. And in response to the ACLU's queries
about the small number of system logs, the department has acknowledged that
the software -- originally deployed last June, 2001 -- has not been
actively used since August.

The report  entitled Drawing a Blank : The Failure of Face Recognition in
Tampa,  can be found at http://www.aclu.org/issues/privacy/drawing_blank.pdf.

Our announcement can be found at http://www.aclu.org/news/2001/n010302a.html.

Barry Steinhardt






Sent from Dave's Blackberry.

For archives see:
http://www.interesting-people.org/archives/interesting-people/




Re: Future Gnu's

2002-01-03 Thread Eugene Leitl

On Thu, 3 Jan 2002, Eric Cordian wrote:

 There is a critical mass of drek above which no one will bother
 searching for stuff worth reading in the list.  Without mentioning any
 names, might I suggest that certain prolific posters need to stop
 posting 15 badly formatted seemingly unintelligible messages every
 time they visit.

Spare your breath. The only way to shut up someone with a mental condition
is to kick him off the list, to leave the list, or use filtering. They're
entirely closed to rational argumentation.

People who have something to say are usually not that patient, and just
leave the list. Overpermissiveness results in quality loss.




Magic Lantern - The FBI's viral key-logger (fwd)

2002-01-02 Thread Eugene Leitl


Date: Wed, 02 Jan 2002 00:08:38 -0600
From: nnburk [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
Organization: Planetscape Enterprises
X-Accept-Language: en,ru
To: Matthew Gaylor [EMAIL PROTECTED]
Subject: Magic Lantern - The FBI's viral key-logger

Please feel free to distribute this far and wide:
Magic Lantern - The FBI's viral key-logger


- The Latest -

http://lists.jammed.com/ISN/2001/12/0037.html[ISN] FBI confirms
Magic Lantern project exists

http://lists.jammed.com/ISN/2001/12/0039.html[ISN] Infamous hacker
group helps the Feds

http://lists.jammed.com/ISN/2001/12/0043.htmlRe: [ISN] Infamous
hacker group helps the Feds - cDc calls announcement satire

http://lists.jammed.com/ISN/2001/12/0053.htmlRe: [ISN] Infamous
hacker group helps the Feds

http://lists.jammed.com/ISN/2001/12/0064.html[ISN] DIRT-Magic
Lantern Firm Barred from Gov Work

http://lists.jammed.com/ISN/2001/12/0063.htmlFBI may be getting
full benefit of Magic Lantern... from BadTrans.B
[ISN] FBI surveillance bonanza in BadTrans.B worm

http://www.politechbot.com/p-02955.htmlFrom the We don't need no
stinkin' oversight dept.:
Politech: FBI refuses to tell Congress aide about classified Magic Lantern

http://www.corpwatch.org/issues/PID.jsp?articleid=1108Homeland
Security, Homeland Profits
Technology Already in the Hands of Law Enforcement

http://www.corpwatch.org/news/PND.jsp?articleid=1092FBI Software
Records Each Keystroke

http://www.corpwatch.org/news/PND.jsp?articleid=1009Software Firms
Object to FBI Eavesdropping

http://www.nytimes.com/2001/12/31/technology/ebusiness/31TECH.9.html
Scarfo, Phase 2: a.k.a. Magic Lantern
CYBERSECURITY - Threat of Terrorism on U.S. Infrastructure (nytimes.com)




What is Magic Lantern?

http://www.msnbc.com/news/660096.asp?cp1=1FBI software cracks encryption wall
‘Magic Lantern’ part of new ‘Enhanced Carnivore Project’

http://www.epic.org/privacy/carnivore/foia_documents.htmlEPIC
Carnivore (and 'Enhanced Carnivore') FOIA Documents

http://www.zdnet.com/zdnn/stories/news/0,4586,5099906,00.htmlZDNet
News: FBI's magic revealed as old tricks

http://www.washingtonpost.com/wp-dyn/articles/A3371-2001Nov22.htmlFB
I Is Building a 'Magic Lantern' (washingtonpost.com)

http://www.washingtonpost.com/wp-dyn/articles/A1436-2001Nov22.htmlFB
I Develops Eavesdropping Tools (washingtonpost.com)
McAfee sides with FBI against customers on Magic Lantern

http://www.politechbot.com/p-02822.htmlDeclan McCullagh's Politech
FBI reportedly creating Magic Lantern anti-crypto virus

http://www.politechbot.com/p-02834.htmlDeclan McCullagh's Politech
McAfee sides with FBI against customers on Magic Lantern

http://www.factsquad.org/radio/2001-11-26.mp3The Spy in Your Computer? (.mp3)
from Fact Squad Radio

http://www.politechbot.com/p-02837.htmlDeclan McCullagh's Politech
Has McAfee sided with FBI on Magic Lantern detection?

http://www.ct.heise.de/newsticker/data/wst-26.11.01-001/Spokesman
for NAI in Germany disputes the Washington Post article
from the German news site Heise Online

http://www.politechbot.com/p-02839.htmlDeclan McCullagh's Politech
McAfee replies -- by denying any FBI contacts of any sort

http://www.interesting-people.org/ob/htsearch?config=lists_elistx_com
restrict=%2Finteresting-people%2Fmethod=andsort=scorewords=%22magi
c+lantern%22Magic Lantern Discussion
from Dave Farber's Interesting-People elist

http://www.politechbot.com/cgi-bin/politech.cgi?name=mcafeeDeclan
McCullagh's Politech
Background on McAfee/NAI

http://www.wired.com/news/conflict/0,2100,48648,00.htmlWired News Summary
'Lantern' Backdoor Flap Rages, By Declan McCullagh

http://www.politechbot.com/p-02840.htmlDeclan McCullagh's Politech
AP's Ted Bridis replies to McAfee: I stand by my reporting

http://www.politechbot.com/p-02846.htmlDeclan McCullagh's Politech
McAfee broadens denial: No contact with government of any sort

http://www.theregister.co.uk/content/55/23057.htmlAV vendors split
over FBI Trojan snoops

http://www.politechbot.com/p-02851.htmlDeclan McCullagh's Politech
Symantec pledges to acquiese to FBI backdoor demands

http://www.politechbot.com/cgi-bin/politech.cgi?name=lanternPolitech
Summary re: Magic Lantern

http://www.theregister.co.uk/content/6/23150.htmlFBI 'Magic
Lantern' reality check (original article picked up by ISN, below)

http://lists.jammed.com/ISN/2001/12/0015.html[ISN] Magic Lantern
reality check

http://news.cnet.com/news/0-1003-200-7944351.html?tag=rltdnwsFBI
snoop tool old hat for hackers

http://www.zdnet.com/zdnn/stories/comment/0,5859,2829781,00.htmlWarn
ing - The FBI knows what you're typing

http://www.zdnet.com/zdnn/stories/news/0,4586,5100528,00.htmlAntivir
us firms: FBI loophole is out of line

http://dailynews.yahoo.com/h/nm/20011210/tc/attack_tech_dc.htmlAntiv
irus Firms Say They Won't Create FBI Loophole

http://www.politechbot.com/p-02914.htmlPolitech: Symantec, McAfee
backpedal furiously on espionage enabled-software

http://www.politechbot.com/p-02918.htmlPolitech: More on Symantec,

Re: Fun with bleach and nail polish remover

2001-12-30 Thread Eugene Leitl

On Sun, 30 Dec 2001, Sampo Syreeni wrote:

 Yes, it's unstable, but what, exactly, is it that makes $H_{2}O_{2}$
 organic?

Hydrogen peroxide is not an organic peroxide. Concentrated hydrogen
peroxide is unstable, and can violently decompose, especially if catalysts
(finely distributed metals, pyrolysite) are present, but it does not
detonate. The usual use for it is for hypergolic rocket fuel (with
unsymmetrical dimethyl hydrazine).

Organic peroxides is something else entirely. You can make organic
peroxides using hydrogen peroxide, though it is not advisable for laymen.
In fact, due to their instability, it is better not to work with them at
all. Considerable potential for severe or even terminal injury there.




Re: Fun with bleach and nail polish remover

2001-12-29 Thread Eugene Leitl

On Sun, 30 Dec 2001, KPJ wrote:

 Minor correction: /H2H2/ should be /H2O2/, naturally.

Organic peroxides are useful as improvised blasting caps, but otherwise
much too unstable.




[Htech] A gift for language (fwd)

2001-12-23 Thread Eugene Leitl



-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.leitl.org
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Sun, 23 Dec 2001 00:11:10 -0500
From: Brian Atkins [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
Subject: [Htech] A gift for language

You can use winzip to determine what language or even what author a
small piece of text is from:

http://pil.phys.uniroma1.it/~loreto/press.html

(I got this from new scientist dead tree, but this .ps file is all I
can find quickly)
-- 
Brian Atkins
Singularity Institute for Artificial Intelligence
http://www.singinst.org/

 Yahoo! Groups Sponsor -~--
Access Your PC from Anywhere - Full setup in 2 minutes - Free Download
http://us.click.yahoo.com/1GUySC/E6eDAA/ySSFAA/PMYolB/TM
-~-

-BEGIN TRANSHUMANTECH SIGNATURE-
Post message: [EMAIL PROTECTED]
Subscribe:[EMAIL PROTECTED]
Unsubscribe:  [EMAIL PROTECTED]
List owner:   [EMAIL PROTECTED]
List home:http://www.yahoogroups.com/group/transhumantech/
-END TRANSHUMANTECH SIGNATURE-

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/






FY;) [Pigdog] I've changed my mind, the 2nd amendment rocks (fwd)

2001-12-23 Thread Eugene Leitl

-- Forwarded message --
Date: Sun, 23 Dec 2001 12:42:51 -0800 (PST)
From: Donkey Hotey [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [Pigdog] I've changed my mind, the 2nd amendment rocks

So yesterday for my girlfriend's birthday 10 of us went to the Jackson
Arms Shooting Range ( http://www.jacksonarms.com ) in Millbrae to shoot
some guns.
I was a little scared about going, guns being EVIL and WRONG and very
Un-Berkeley (unless they're melted down into a statue provoting
nonviolence), but it was her 30th birthday, and she could do whatever the
hell she pleases.
We signed up for the novice package, which I must say is a pretty damn
good deal.  A retired cop gives you a 30 minute lecture on gun safety, how
guns work, how to grip them, how to aim them and all that good stuff.  He
used a Ruger MkII .22 pistol for the demonstration.  It was a little
disturbing, because I was sitting in the front of the class, and everytime
he needed to show one side of the gun or the other, he would point it up
and around in this big dramatic motion.  The intent was so that the gun
never faced anybody, but it was still a little scarey.
After the lecture and a little video that showed the semi-automatic pistol
reloading, we got to go to the range.  Everybody got a Ruger .22 and 100
bullets for target practice, but we were also allowed to upgrade our
pistols later.  We had the lane for two hours.
I was a tad bit scared when I picked up the gun, but not much as I would
have been if I hadn't had the course.  All my shots were consistently at 7
o'clock on the target (which was only 7 yards away).  I was sticking my
trigger finger too far into the trigger, so I was pulling it down and to
the left (I'm left handed).  The 3 women who were there were all DROP DEAD
ACCURATE though.  I mean right in the center of the target every single
time.
So we started upgrading our guns.  I tried a 9mm (don't know what kind)
which I thought was as little jumpy and harsh, a Smith  Wesson revolver
(a .38 which is a .357 which is a .356 or some such nonsense) which was
FUCKING AWESOME, and a .44 which made really big wholes.  I have to say I
liked the revolver the most.  Once I shot the other weapons, I went back
to the .22 and was a hell of a lot more accurate.  The thing seemed like a
weak little toy gun.  It might as well be shooting suction darts.

They have a whole bunch of targets that you can choose from my
favorite was the hostage page. It had some unabomber looking guy with a
gun pointed at a woman.  I blasted the woman right between the eyes.

While we were there, a reporter from K101 who was doing a story on women
and guns interviewed us.  I guess she's a regular and when she learned a
woman was celebrating her 30th birthday by learning how to shoot, she had
to be there.  The woman kept asking Mary about safety and protection and
Mary said oh, no, I just wanted to shoot stuff.  I guess we weren't what
she was looking for.  Mary will get a copy of the story in the mail, so
we'll see her take later.

Wow I really didn't think I'd enjoy shooting guns.  Now I need to join a
militia right away.
The teacher at one point did mention the 2nd amendment.  He said
although the 2nd amendment guarantees us the right to bear arms, we do
not believe guns are for everybody.  So that was wholesome and
refreshing.   When the revolution comes I won't shoot him.  Actually I
think I'll stay away from him, after I saw what he could do rapidfire.
Also he would like the world to know that Danny Glover doesn't know how to
handle a firearm.

yikes! guns are cool!  What's a hippyuppymus to do?!?!


-- 
go ahead, make my day. BLAM BLAM BLAM BLAM BLAM BLAM
-- Ben Franklin







IP: Government questions over Windows XP security flaws (fwd)

2001-12-22 Thread Eugene Leitl



-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.leitl.org
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Fri, 21 Dec 2001 20:24:18 -0500
From: David Farber [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: IP: Government questions over Windows XP security flaws



http://www.kfwb.com/news/nat/n122113.html

FBI, Pentagon Quiz Microsoft Over Windows XP Problems WASHINGTON (AP)
12.21.01, 4:05p -- FBI and Defense Department officials and some top
industry experts sought reassurance Friday from Microsoft Corp. that a free
software fix it offered effectively stops hackers from attacking major
flaws discovered in the latest version of Windows.
The government's rare interest in the problems with Windows XP software,
which is expected to be widely adopted by consumers, illustrates U.S.
concerns about risks to the Internet. Friday's discussions came during a
private conference call organized by the FBI's National Infrastructure
Protection Center, its top cyber-security unit.
Microsoft's experts bluntly acknowledged the threats posed by the Windows
XP problems, but they assured federal officials and industry experts that
its fix -- if installed by consumers -- resolves the issues.
The company acknowledged Thursday that Windows XP suffers from serious
problems that allow hackers to steal or destroy a victim's data files
across the Internet or implant rogue computer software. The glitches were
unusually serious because they allow hackers to seize control of all
Windows XP operating system software without requiring a computer user to
do anything except connect to the Internet.
Microsoft declined to tell U.S. officials Friday how many consumers
downloaded and installed its fix during the first 24 hours it was
available. Experts from Internet providers, including ATT Corp., argued
that information was vital to determine the scope of the threat.
Microsoft also indicated it would not send e-mail reminders to Windows XP
customers to remind them of the importance of installing the patch.
One participant in the call, who spoke on condition of anonymity, otherwise
described Microsoft officials as extremely forthright. Microsoft
explained that a new feature of Windows XP can automatically download the
free fix, which takes several minutes, and prompt consumers to install it.
The patch is effective, said Steve Lipner, Microsoft's director of
security assurance, who participated in Friday's call. There was a
discussion of the importance of the Windows auto-update capability. People
were encouraged by the fact that we'll get the patch to people.
Officials also expressed fears to Microsoft about electronic attacks
launched against Web sites and federal agencies during next week's
Christmas holidays from computers running still-vulnerable versions of
Windows, participants said.
Several experts said they had already managed to duplicate within their
research labs so-called denial of service attacks made possible by the
Windows XP flaws. Such attacks can overwhelm Web sites and prevent their
use by legitimate visitors.
That was the one you'll more likely see over Christmas break, one
participant said.
Another risk, that hackers can implant rogue software on vulnerable
computers, was considered more remote because of the technical
sophistication needed.
The FBI's cyber-security unit has been particularly worried lately about
the threats from denial of service attacks. It warned again Thursday that
it has reason to believe that the potential for (denial of service)
attacks is high.
The FBI said people have indicated they plan to target the Defense
Department's Web sites, as well as other organizations that support the
nation's most important networks.
Participants in Friday's call included the FBI; Defense Department; the
U.S. Federal Computer Incident Response Center; federally funded CERT
Coordination Center; eEye Digital Security Inc., which discovered the
Windows XP problems; Network Associates Inc.; the System Administration,
Networking and Security Institute; and others.

For archives see:
http://www.interesting-people.org/archives/interesting-people/




RE: CNN.com on Remailers

2001-12-17 Thread Eugene Leitl

On Mon, 17 Dec 2001, Trei, Peter wrote:

 If I were a remailer operator, I'm not sure I'd like this. Active
 cooperation with another remaler operator means that if
 he/she/it does something illegal, you could be dragged in

How is this different from the current situation? Is usage of a specific
mainstream protocol sufficient protection from conspiracy charges? Joe Bob
Postfixuser is hardly a remailer operator.

 on 'conspiracy' charges, regardless whether you actually
 had any knowledge of the the other operators nefarious
 activities.

-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.leitl.org
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3




Re: CNN.com on Remailers

2001-12-16 Thread Eugene Leitl

On Sat, 15 Dec 2001, Steve Schear wrote:

 During your rant on re-mailers I mentioned the desirability of using
 popular P2P services in conjunction with remailers, possibly as middleman
 nodes.  Len pointed out the problems with re-mailer system stability if P2P
 clients were used as they come and go.  During the break there was a short

P2P nodes are ephemeral, the content is not. A short message hop from node
to node is in the second range. Assuming the message doesn't sit on the
node too long (running danger of it being pulled) and there are multiple
redundant messages in transit (you wanted more idle traffic? here's is
your idle traffic) the probability of delivery should be higher than the
current remailers'.

 discussion of using the P2P clients to generate cover traffic on
 remailers.  This should be simple and involve no risk to those running the
 clients.

Ask Google for XML-RPC and Freenet and/or Mojo Nation.

-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.leitl.org
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3




The MS DRM Patent and Freedom to Speak and Think (fwd)

2001-12-16 Thread Eugene Leitl



-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.leitl.org
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Fri, 14 Dec 2001 23:08:13 -0500
From: Seth Johnson [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: The MS DRM Patent and Freedom to Speak and Think


In his November 6 essay You're Free to Think,
(http://davenet.userland.com/2001/11/06/youreFreeToThink),
Dave Winer comments that whatever else happens in the
ongoing, increasing trend towards policing of the public's
right to use information and information technology, we are
still left with the freedom to *think* for ourselves.  He
seemed to me to be offering this comment as a bare source of
solace against the government's increasing intent to control
the prospects of communications technology.

Microsoft's favorable treatment of late caused him to wonder
what kind of deal Bill Gates must have worked out with the
Bush Administration.  He wondered what Microsoft might have
given the government in return for the highly favorable
terms of the settlement that's currently on the table in the
court proceedings against the company, for monopoly
practices in the operating systems arena.

He commented specifically on the current ramifications of
Microsoft's increasing position of power in the operating
systems market:

 Now, they have to get people to upgrade to
 Windows XP -- that's the final step, the one that
 fully turns over the keys to the Internet to them,
 because after XP they can upgrade at will, routing
 through Microsoft-owned servers, altering content,
 and channeling communication through government
 servers. After XP they fully own electronic
 communication media, given the consent decree,
 assuming it's approved by the court.

Now, it has just come to light that Microsoft has been
awarded a software patent for a Digital Rights
Management operating system.

This development shows us exactly where we stand now.
Microsoft doesn't have to offer anything to the government;
it has only to hold possession of a patent covering the
DRM elements of its latest OS, thereby providing an almost
absolutely assured trajectory toward establishing the terms
by which the public's ability to communicate digital
information will be controlled.

Please see the message I am posting below, from the CYBERIA
email list, which quotes from the patent.

The real kicker is right here:

 The digital rights management operating system
 also limits the functions the user can perform on the
 rights-managed data and the trusted application, and
 can provide a trusted clock used in place of the
 standard computer clock.

The ability to use information freely is now going to be
policed at the most intricate level, in the name of
exclusive rights and to the detriment of the most
fundamental Constitutional principles of our society.

Whereas the First Amendment of the U.S. Constitution assures
that every American citizen has the full right to freedom of
speech, we see here the ultimate legislative and technical
trappings by which the public will be demarcated as mere
information consumers.

Facts and ideas are not contraband and may never be
copyrighted or otherwise constrained under the terms of
intellectual property, whether they are bound up in an
expressive work or not; and the computer is a *logic* device
that now sits on nearly every citizen's desktop -- it is
*not* a consumer appliance.  From both the standpoints of
speech and thought, so-called digital rights management is
a utterly desolate *dead end.*

Whether we speak of the constituent pieces of expressive
works, or the nature of the computer itself, so-called
digital rights management marks the beginning of a grand
rollback of the means by which the promise of our
participation in and advancement of civil society have
lately been greatly augmented.

Rather than facing the simple, plain truth that the power
given in the U.S. Constitution for Congress to grant (or
deny) to authors and inventors exclusive right to their
works, was intended to cover products that do not
intrinsically bind up the very means of communication and of
our participation in civil society, we instead are
experiencing a social condition wherein monopoly interests
exploit the fluidity of logical products to evade the very
terms of antitrust law and to assure that the public's
ordinary rights do not gain purchase against their
interests.  Antitrust law is all about competition in a
particular product, but software is as amorphous in its
possibilities as our own vaunted power to think.  Thus
Microsoft easily maintains it is not in the browser market,
competing with Netscape; it is, rather, in the market for
innovative operating systems.

We are now seeing just how innovative that operating
system can really be.

If we do not confront the ludicrousness of the idea of
holding a patent 

Re: [Remops] And when he returns in February? (fwd)

2001-12-12 Thread Eugene Leitl

On Wed, 12 Dec 2001, A. Melon wrote:

 Ninny.

Got no taste of online soap?




IP: Antivirus firms deny Magic Lantern backdoor plans (fwd)

2001-12-11 Thread Eugene Leitl



-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.leitl.org
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Tue, 11 Dec 2001 06:04:54 -0500
From: David Farber [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: IP: Antivirus firms deny Magic Lantern backdoor plans


From: Bill Sodeman [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Antivirus firms deny Magic Lantern backdoor plans
Date: Mon, 10 Dec 2001 23:47:17 -0600
X-Mailer: Microsoft Outlook, Build 10.0.3311
Importance: Normal

http://dailynews.yahoo.com/h/nm/20011210/tc/attack_tech_dc.html

Monday December 10 8:30 PM ET
Antivirus Firms Say They Won't Create FBI Loophole
By Elinor Mills Abreu

SAN FRANCISCO (Reuters) - Anti-virus software vendors said on Monday
they don't want to create a loophole in their security products to let
the FBI or other government agencies use a virus to eavesdrop on the
computer communications of suspected criminals.

Under a project code named Magic Lantern, the U.S. Federal Bureau of
Investigation is creating an e-mail-borne virus or Trojan horse that
hides itself on the computer and captures all keystrokes made, including
passwords that could be used to read encrypted mail, according to a
report on MSNBC.com in November.

Despite subsequent reports to the contrary, officials at Symantec Corp.
and Network Associates Inc. said they had no intention of voluntarily
modifying their products to satisfy the FBI. Spokesmen at two other
computer security companies, Japan-based Trend Micro Inc. and the U.S.
subsidiary of UK-based Sophos PLc., made similar statements.

All four anti-virus companies said they had not contacted or been
contacted by the U.S. government on the matter.

We're in the business of providing a virus-free environment for our
users and we're not going to do anything to compromise that security,
said Tony Thompson of Network Associates.

Symantec's first priority is to protect our customers from malicious
and illegal attacks, Symantec Chief Executive John W. Thompson said in
a statement. We have no intention of creating or leaving a hole in our
software that might compromise that security.

If anti-virus vendors were to leave a hole for an FBI-created Trojan
horse program, malicious hackers would try to exploit the hole too,
experts said.

If you leave the weakness for the FBI, you leave it for everybody,
said Fred Cohen, an independent security expert and digital forensics
professor at the University of New Haven.

 From the industry perspective, leaving a hole in anti-virus software
would erode public confidence and damage the reputation of the vendor,
sending customers to competing companies, the vendors said.

The government would have to convince all anti-virus vendors to
cooperate or the plan wouldn't work, since those not cooperating would
have a market advantage and since they all share information, said a
Symantec spokeswoman.

The thought that you would be able to convince the industry as a whole
to do this is kind of naive, she said.

All four anti-virus companies said they had not contacted or been
contacted by the U.S. government on the matter.

The FBI declined to confirm or deny the report about Magic Lantern,
when it was first published by MSNBC.com and a spokesman was not
available for comment on Monday.

PLAN WOULD ALIENATE OTHER COUNTRIES

Symantec and Networks Associates, both of whom have investments in
China, would not jeopardize their footings in that market, said Rob
Rosenberger, editor of www.vmyths.com, a Web site that debunks virus
hoaxes.

If (the Chinese) thought that the company was a tool of the CIA (news -
web sites), China would stop using those products in critical
environments, Rosenberger said. It is in the best interest of
anti-virus vendors not to heed the call of the FBI.

We always try to cooperate with the authorities when it's appropriate.
Having said that, our No. 1 goal is to protect our customers, said
Barbara Woolf of Trend Micro. I've heard reports that the government is
upset this got out and is going back to the drawing board.

Appeasing the U.S. government would be difficult for vendors who have
parent companies and customers outside the United States, they said.

If the laws of the land were to change to permit this kind of activity
then we would abide by the law, said David Hughes, president of Sophos'
U.S. subsidiary.

But how would a vendor provide protection for customers outside of the
specific jurisdiction? Hughes asked. If we were to do this for the
U.S. government we'd also have to do it for the government of any other
nation that would want to do something similar.


==

Bill Sodeman
[EMAIL PROTECTED] / http://bill.sodeman.com

1-512-845-0119

For archives see:
http://www.interesting-people.org/archives/interesting-people/




Re: [linux-elitists] Phil Zimmermann on key exchange (fwd)

2001-12-11 Thread Eugene Leitl



-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.leitl.org
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Mon, 10 Dec 2001 18:24:46 -0800
From: Don Marti [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: [linux-elitists] Phil Zimmermann on key exchange

begin Seth David Schoen quotation of Fri, Dec 07, 2001 at 11:42:26PM -0800:

 Reviving a thread from last month:

(More on encrypted email infrastructure from Seth:
http://vitanuova.loyalty.org/2001-12-07.html)

 The Board of Directors of EFF met today in San Francisco, and I made a
 presentation about this, in the presence of Brad Templeton and others.
 One of the conclusions was that EFF's role in implementing something
 like this is still not defined clearly enough, and we don't know what
 we could most usefully do.

In order to seriously deploy encrypted email you need to kick the
email client support problem and the key management problem at the
same time.

One possible role for EFF would be as a founding member of an
encrypted email industry consortium analogous to W3C.  Such an
organization would have to be positioned as a way to fight
cyberterrorism and protect infrastructure.

It would be nice to get Ximian, the KDE project  and Qualcomm to
join, and use the words Secure Email or Email Security in the
organization's name somewhere.  You probably aren't going to get
any mail client vendor that depends on many Secret Police customers
to join.

-- 
Don Marti  What do we want?  Free Dmitry!  When do we want it?  Now!
http://zgp.org/~dmarti
[EMAIL PROTECTED]  Free the web, burn all GIFs.
KG6INA   http://burnallgifs.org/
___
linux-elitists
http://zgp.org/mailman/listinfo/linux-elitists




RE: eCash reported mortally wounded...

2001-12-10 Thread Eugene Leitl

On Sun, 9 Dec 2001, Lucky Green wrote:

 --Lucky, waiting patiently for 2005.

Patent expiration date? Which one?

-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.leitl.org
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3




[Remops] A comparison of Frog-Admin, the Script-Kiddie, AnonymousTrolls and other plagues of the privacy community. (fwd)

2001-12-09 Thread Eugene Leitl


-- Forwarded message --
Date: Sun,  9 Dec 2001 15:44:07 +0100 (CET)
From: Anonymous [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [Remops] A comparison of Frog-Admin, the Script-Kiddie,
 Anonymous Trolls and other plagues of the privacy community.

  A comparison of Frog-Admin,
 the Script-Kiddie, Anonymous Trolls
   and other plagues of the privacy community.

 ... all one and the same schizophrenic person?


Quotes can all be found and confirmed through groups.google.com and
lexx.shinn.net Remailer Operators list archive, links have been provided
whereever possible.




TABLE OF CONTENTS
-

 HISTORY

 GRAMATICAL/WRITING STYLE SIMILARITIES

 PREVIOUS QUESTIONABLE/DUBIOUS ACTS BY FROG
  |-Azerty and Frog Remailers
  |-Monitoring capabilities
  |-RProcess
  |-Thomas Boschloo about the timing of hate spam
  +-Frog's From: Header

 MOTIVE SIMILARITIES
  |-Anonymous Troll about Thomas J. Boschloo and Champerty
  |-Anonymous Troll about Thomas J. Boschloo
  |-The Painful Truth about Orange to Orange-Admin
  |-Anonymous Troll about Katherine's Miranda Remailer
  |-Anonymous Troll about Katherine
  |-Anonymous Troll (Freud) to Orange-Admin
  +-Anonymous Troll (Boschloo is a CLOWN) about Thomas J. Boschloo

 TERMINOLOGICAL SIMILARITIES
  +-Further connections between all kinds of old and new trolls
+-You are a failure
| |-Anonymous Troll about Katherine
| |-Anonymous Troll about Champerty
| +-The Truth about Orange to Orange-Admin
+-Microsoft  Windows Software
  |-Anonymous Troll to I Sent Your Saddle Home
  +-The Painful Truth about Orange to Orange-Admin

 MESSAGE COMPARISON/ANALYSIS
  |-Source Remailers
  |-Message Headers (To: mail2news gateways)
  +-Writing Style
+-Sporadic use of single-space indentation and missing punctuation

 GRAMMAR/SPELLING
  +-The succes(s)ful gotcha
 |-Frog-Admin
 +-Trolls

 LINE BREAKS
  |-Frog-Admin
  +-The Painful Truth about Orange

 THE SCRIPT-KIDDIE

 DEVICIVNESS/DIVERSION/CONFUSION




HISTORY
---

 Observing alt.privacy.anon-server and the remailer-operators list over
 the last year I have noticed a larger then usual amount of DoS,
 disinformation, slanderous, spam-style, and scripted attacks occurring
 in the privacy community. The fact that makes these issue unusual is
 that there is one constant variable in these matters: Frog-Admin can
 be linked to start of all these matters.

 I have carefully studied and analysed the posting habits, writing
 style, vocabulary, punctuation use/misuse, uncommon/consistent
 misspelling, line breaks and other signature items of Frog-Admin,
 Script-Kiddie, and the remops/APAS troll (who has attacked Katherine,
 Champerty, Orange-Admin, Boschloo and others).

 I propose to the privacy community that Frog-Admin, Script-Kiddie,
 and the troll who has waged war on many other individuals in the
 community are all the same person. I have gathered enough material
 and identified so many uncanny and consistent similarities that it is
 difficult to deny or chalk up to common paranoia. I ask you to draw
 your own conclusions from the material provided.




GRAMATICAL/WRITING STYLE SIMILARITIES
-

 You will notice the following writing style similarities in all the
 following quotes by different anonymouse people and the Frog-Admin:

 1. missing punctuation
 2. additional tabs/spaces at the beginning of lines
 3. overuse of CAPS
 4. use of asterisks (*) to highlight certain words
 5. excessive manual line breaks




PREVIOUS QUESTIONABLE/DUBIOUS ACTS BY FROG
--

 Frog-Admin was found to be the admin of both Azerty and Frog remailers.
 He kept the fact that he was Azerty admin hidden and it was not
 announced by him for quite some time after both remailers were opened.
 He utilized this fact to trace abuse through chains which included
 both Azerty and Frog.


 Link: http://groups.google.com/groups?selm=2213203924.033%40nyarlatheotep.frog.org
 Quote:

 -Apparently, Frog and Azerty got mail-bombed this WE.
 -It looked like groups of 5* or 10* 400K chunks,
 -chaining azerty-frog-azerty-frog 10 times


 Link: 
http://groups.google.com/groups?selm=1009d5c8f2f2790aeb6efd4b870b6f7a%40remailer.privacy.at
 Quote:

 -I caught an abuser (trivial traffic analysis):
 -
 -Azerty received 100 * messages 160 K initially
 -giving 100 * identical messages 60 K on arrival with 14*gif (batman)
 -each.
 -In-between, transparent-remix generated a few hundreds messages each
 -hop
 -
 [EMAIL PROTECTED]  azerty  noisebox  frog  [EMAIL 

IP-FLASH Office XP, Windows XP May Send Sensitive Documents toMicrosoft (fwd)

2001-12-07 Thread Eugene Leitl



-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Fri, 07 Dec 2001 07:59:49 -0500
From: David Farber [EMAIL PROTECTED]
To: ip-flash [EMAIL PROTECTED]
Subject: IP-FLASH Office XP,
 Windows XP May Send Sensitive Documents to Microsoft

PROBLEM: Microsoft Office XP and Internet Explorer version 5 and later are
configured to request to send debugging information to Microsoft in the
event of a program crash. The debugging information includes a memory dump
which may contain all or part of the document being viewed or edited. This
debug message potentially could contain sensitive, private information.

PLATFORM:

·   Microsoft Office XP
·   Microsoft Internet Explorer 5.0 and later
·   Windows XP
·   Microsoft has indicated that this will be a feature of all new
Microsoft products

DAMAGE: Sensitive or private information could inadvertently be sent to
Microsoft. Some simple testing of the feature found document information in
one message out of three. SOLUTION: Apply the registry changes listed in
this bulletin to disable the automatic sending of debugging information. If
you are working with sensitive information and a program asks to send
debugging information to Microsoft, you should click Don't Send.

http://www.ciac.org/ciac/bulletins/m-005.shtml





IP: DOJ's Already Monitoring Modems (fwd)

2001-11-29 Thread Eugene Leitl



-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Thu, 29 Nov 2001 04:01:35 -0500
From: David Farber [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: IP: DOJ's Already Monitoring Modems


From: Monty Solomon [EMAIL PROTECTED]

DOJ's Already Monitoring Modems
By Declan McCullagh and Ben Polen

4:42 p.m. Nov. 28, 2001 PST

WASHINGTON -- The Department of Justice already is using its new
anti-terrorism powers to monitor cable modem users without obtaining
a judge's permission first.

A top Bush administration official lauded the controversial USA
Patriot Act at a Senate hearing on Wednesday, saying that the new
abilities have let police obtain information in investigations that
was previously unavailable.

We would not have been able to do (this) under prior law without a
specific court order, said Michael Chertoff, assistant attorney
general in the Justice Department's criminal division.

...

http://www.wired.com/news/conflict/0,2100,48711,00.html


For archives see:
http://www.interesting-people.org/archives/interesting-people/




IP: Routes of Least Surveillance (fwd)

2001-11-28 Thread Eugene Leitl



-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Wed, 28 Nov 2001 11:06:52 -0500
From: David Farber [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: IP: Routes of Least Surveillance


http://www.notbored.org/the-scp.html


From: Monty Solomon [EMAIL PROTECTED]

Routes of Least Surveillance
By Erik Baard

2:00 a.m. Nov. 28, 2001 PST

It's not the journey or the destination; it's the getting there
unseen that counts.

Or so goes the thinking behind a new mapping utility created by civil
libertarians to guide New Yorkers through Manhattan along routes with
the fewest surveillance cameras.

It's like Mapquest for dissidents and paranoiacs, or for those simply
creeped out by the feeling of being watched, constantly, by countless
mechanical eyes.

The service, called iSee, was created by the Institute for Applied
Autonomy, a group of technologists, and the New York Surveillance
Camera Project, an offshoot of the New York Civil Liberties Union.

...

http://www.wired.com/news/privacy/0,1848,48664,00.html


For archives see:
http://www.interesting-people.org/archives/interesting-people/




Re: Denning's Geo-crypto

2001-11-22 Thread Eugene Leitl

On Thu, 22 Nov 2001, Roy M. Silvernail wrote:

 Using a GPS coordinate set as keying material?  Hope it's just

Given that a GPS receiver gets ephemeris data, almanach data and
pseudorandom code from each currently visible sat it has probably to do
with the latter. Consider S/A (which may or may not be switched off now, I
haven't checked): if you've got a secret part of the key you can refine
your position despite deliberate degradation (selective availability) than
the party without the key.

 additional keying material.  Knowing the intended destination of
 something like a movie in transit to a theater seems pretty easy, and
 the set of GPS coordinates encompassing your average multiplex would
 seem to be pretty small compared to the usual keyspaces discussed
 here.




Re: Denning's Geo-crypto

2001-11-22 Thread Eugene Leitl

On Thu, 22 Nov 2001, Eugene Leitl wrote:

 Given that a GPS receiver gets ephemeris data, almanach data and
 pseudorandom code from each currently visible sat it has probably to do
 with the latter. Consider S/A (which may or may not be switched off now, I
 haven't checked): if you've got a secret part of the key you can refine
 your position despite deliberate degradation (selective availability) than
 the party without the key.

Forgot the URL: http://www.csr.utexas.edu/texas_pwv/midterm/gabor/gps.html

The PRN is a tapped feedback shift register.




Re: Carnivore To Get Magic Lantern

2001-11-21 Thread Eugene Leitl

On Wed, 21 Nov 2001 [EMAIL PROTECTED] wrote:

 2. Add ID token (e.g., Dallas Semi iButton) support to gpg

Doesn't suffice, if you see/encrypt clear on a compromised machine. Air
gap or a dedicated hardened crypto machine (embedded with a private eye
type of display connected to the main machine via a simple, provably
secure protocol).

Airgap (MOD sneakernet) is the easiest solution so far. But we've been
through this before.




IP: Encryption: How Prevalent Is It? (fwd)

2001-11-21 Thread Eugene Leitl



-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Mon, 12 Nov 2001 09:35:31 -0500
From: David Farber [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: IP: Encryption: How Prevalent Is It?


Date: Mon, 12 Nov 2001 09:27:00 -0500
From: Dorothy E. Denning [EMAIL PROTECTED]
Organization: Georgetown University

Encryption: How Prevalent Is It?
Oct. 15, 2001 By Lisa Boomer-Smith

snip

To learn more about encryption practices, InformationWeek Research fielded a
national survey this summer with the President's Export Council
Subcommittee on
Encryption. Of the 500 sites surveyed, two-thirds report using encryption to
protect company data. Of those sites using encryption technologies, 71% are
strongly committed to data encryption, while 21% are somewhat committed.

snip

http://www.informationweek.com/story/IWK20011011S0015

See also: http://www.informationweek.com/857/encryption.htm

--
Prof. Dorothy E. Denning
Georgetown University
http://www.cs.georgetown.edu/~denning


For archives see:
http://www.interesting-people.org/archives/interesting-people/




IP: Risks of belief in identities: [risks] Risks Digest 21.74 (fwd)

2001-11-21 Thread Eugene Leitl



-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Mon, 12 Nov 2001 08:57:54 -0500
From: David Farber [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: IP: Risks of belief in identities: [risks] Risks Digest 21.74


Date: Sat, 10 Nov 2001 11:54:17 PST
From: Peter G. Neumann [EMAIL PROTECTED]
Subject: Risks of belief in identities

For those of you who might believe that national ID cards might be a good
idea, check out the December 2001 *Commun.ACM* Inside Risks column by me
and Lauren Weinstein, previewed on my Web site
   http://www.csl.sri.com/neumann/insiderisks.html
in anticipation of a U.S. House hearing next Friday on that subject.

It is not just the cards themselves that would entail risks, but even moreso
all of the supporting infrastructures, widespread accessibility to
networking, monitoring, cross-linked databases, data mining, etc., and
particularly the risks of untrustworthy insiders issuing bogus
identification cards -- as happened a few years back on a large scale in the
Virginia state motor vehicle agency (RISKS-11.41).

The latest item on the ease of getting phony or illegal or unchecked
identification papers is found an article by Michelle Malkin (Creators
Syndicate Inc.), which I saw in the *San Francisco Chronicle* on 10 Nov
2001: Abdulla Noman, employed by the U.S. Department of Commerce, issued
bogus visas in Jeddah, Saudi Arabia, in one case in 1998 charging
approximately $3,178.  The article also notes a variety of sleazy schemes
for obtaining visas, in some cases without ever appearing in person and
without any background checks, and in other cases for ``investments'' of a
hundred and fifty thousand dollars.  The article concludes with this
sentence: ``Until our embassy officials stop selling American visas blindly
to every foreign investor waving cash, homeland security is a pipe dream.''
I'm not sure that conclusion is representative of the full nature of the
problem of bogus identification, but the problem is clearly significant.
A driver's license or a passport or a visa or a National ID card is not
really proof of identity or genuineness or anything else.


For archives see:
http://www.interesting-people.org/archives/interesting-people/




IP: Wanna make biological weapons and take out cities? $10. (fwd)

2001-11-21 Thread Eugene Leitl



-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Wed, 21 Nov 2001 14:37:50 -0500
From: David Farber [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: IP: Wanna make biological weapons and take out cities?  $10.


Date: Wed, 21 Nov 2001 10:58:28 -0600
From: [EMAIL PROTECTED]
Subject: Wanna make biological weapons and take out cities?  $10.
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
X-Mailer: SPRY Mail Version: 04.00.06.17

Here's a disturbing story from today's New York Times:

  http://www.nytimes.com/2001/11/21/national/21BOOK.html?todaysheadlines

I sure hope that the government is investigating and following each and every
person who buys a copy of this book... I wonder if there's a way to force
Tobiason to foot the bill for that security?

In any case, jerks like this clearly aren't helping to keep our nation
secure...
if anything, crap like this will make our government MORE repressive (not
less).

[quote]

November 21, 2001

THE HOW-TO BOOK
In Utah, a Government Hater Sells a Germ-Warfare Book

By PAUL ZIELBAUER with WILLIAM J. BROAD

SALT LAKE CITY, Nov. 19 — At the Crossroads of the West gun show here last
weekend, weapons dealers sold semi- automatic rifles and custom-made pistols,
and ammunition wholesalers unloaded bullets by the case. But perhaps the most
fearsome weapon for sale in the cavernous, crowded exposition center was a
book.

Next to the Indian handicraft booth, Timothy W. Tobiason was selling
printed and
CD copies of his book, Scientific Principles of Improvised Warfare and Home
Defense Volume 6-1: Advanced Biological Weapons Design and Manufacture, a
germ-warfare cookbook that bioterrorism experts say is accurate enough to be
dangerous.

Mr. Tobiason, an agricultural-chemicals entrepreneur from Nebraska with a
bitter
hatred for the government, said he sold about 2,000 copies of his
self-published
book a year as he moved from gun show to gun show across America. The book,
which includes directions for making mail delivered anthrax, suggests
that the
knowledge necessary to start an anthrax attack like the one that has
terrorized
the East Coast is readily accessible.

snip


For archives see:
http://www.interesting-people.org/archives/interesting-people/




FYI:Development list (was: Re: [mix-l] Verifying DH/DSS Sigs) (fwd)

2001-11-19 Thread Eugene Leitl



-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Wed, 14 Nov 2001 13:20:37 -0800 (PST)
From: Len Sassaman [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Development list (was: Re: [mix-l] Verifying DH/DSS Sigs)

Hi folks,

For those of you interested in contributing to/knowning more about the
development of Mixmaster, there is a list set up on SourceForge for that
purpose.

http://lists.sourceforge.net/lists/listinfo/mixmaster-devel


Thanks,

Len

On Tue, 13 Nov 2001, QuickSilver wrote:

 Hi All!

 I'm having a problem verifying these signatures with mix2.9b12(win).
 RSA keys verify fine but with DH/DSS I get PGP_SIGBAD returned from my
 pgp_decrypt call and the sig buffer is completely empty rather than
 containing sig info. PGP, on the other hand, verifies the same
 signatures ok.

 Has anyone else run into this. I think I must be missing something.

 Thanks,

 Richard
 --
 R.Christman
 Benchmark Software
 [EMAIL PROTECTED]
 http://quicksilver.skuz.net



 Yahoo! Groups Sponsor -~--
Universal Inkjet Refill Kit $29.95
Refill any ink cartridge for less!
Includes black and color ink.
http://us.click.yahoo.com/Vv.L9D/MkNDAA/ySSFAA/kgFolB/TM
-~-

To Post a message, send it to:   [EMAIL PROTECTED]
To Unsubscribe, send a blank message to: [EMAIL PROTECTED]

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/






[CrackMonkey] overheard on gale (fwd)

2001-11-19 Thread Eugene Leitl



-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Wed, 14 Nov 2001 09:16:14 -0800
From: Nick Moffitt [EMAIL PROTECTED]
To: Mama's lil' monkeys love shortnin' bread [EMAIL PROTECTED]
Subject: [CrackMonkey] overheard on gale

To [EMAIL PROTECTED]  Fugu/1.1.7

Hrm.  So I'm definitely quitting havenco in the next 6 months.
I think I will do an ecash company (I will have cash and dividend
income from havenco to finance it)

I hope second system effect doesn't apply to startups.  HavenCo is
semi-successful and fairly reasonable; I'm afraid if I do a new
company I will overengineer a lot of it.

-- Ryan Lackey [EMAIL PROTECTED] at 11-14 07:35:07



-- 
INFORMATION GLADLY GIVEN BUT SAFETY REQUIRES AVOIDING UNNECESSARY CONVERSATION

01234567 - The amazing* indent-o-meter!
^   (*: Indent-o-meter may not actually amaze.)

___
CrackMonkey: Non-sequitur arguments and ad-hominem personal attacks
http://crackmonkey.org/mailman/listinfo/crackmonkey




RE: Monkeywrenching airport security

2001-11-18 Thread Eugene Leitl

On Sat, 17 Nov 2001, David Honig wrote:

 At 10:57 AM 11/17/01 -0800, Sandy Sandfort wrote:
 Airport chemical sniffers apparently look for the signature of nitrogen
 compounds, not explosives, per se.  I've often wondered how many weekend

Unless they look for nitrogen in bulk of the specimen (PGNAA), a very
expensive/low-processivity technique unsuitable for mass luggage screening
they're limited to stuff stuck to surfaces (lasers, swabbing/ion motility
spectrometer)  and volatile sniffers (chemical sensors, canines).

Many classes of explosives contain no nitrogen, many of those which
contain nitrogen and are free of volatile tracers don't emit much
volatiles, if properly packaged even very volatile explosives (say, methyl
or ethylnitrate) can be sealed (glass bottles). Generally, the maker and
the packager, unless they work very cleanly/are suited should not be the
courier, nor the outer containers be present in the contaminated area.

In short, detection probability is only high for sloppy/dumb people.

 gardeners have gotten hassled and delayed because of trace amounts of
 ammonia-based fertilizers on their person and effects.  If you plan to fly,

Salts are different from traces of uncombusted nitrocellulose deposited on
any surface of a nearby gun being fired.

 be sure to wash your hands thoroughly before heading out for the airport if
 you have been shoot, gardening or house cleaning.

 I've wondered about that too; airport sniffers must have encountered
 Miracle Gro and angina nitro during the early days, measuring

Nitroglycerin is not volatile, is present in large dilution (~0.1%) in
small quanitities (pharma bottle). Ditto nitrate salts in a water
solution.

 a false alarm rate.  Shooting is scary; you could contaminate
 your car driving back from the range, then contaminate your
 travel gear.

I think you should be able to get a good positive if you'd fire several
rounds of vanilla smokeless with baggage surface being near the muzzle
of the gun. Try it sometime, if you're unafraid of winding up in a
database. I've found that transporting computer parts (motherboard) in
hand luggage can suffice to trigger swabbing (if you're really bored you
can discuss detection of Semtex traces with airport security).

 The explosives expert in one of the older terror trial docs on cryptome
 says things suggesting that a few washes will remove traces.  (And contaminate
 clothes washed with them.)

Just use an overall when you're at the range, and wash it separate.

 I once checked out the screen on a sniffer, and they list nitrates
 as a category.  I suppose having PETN (another category) detected
 on your laptop would be harder to explain :-)

If you want to fool the security, you should become familiar with the type
of detectors used on your luggage. Of course, best solution is using human
factors to not have your stuff being screened at all.

-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3




Re: Cypherpunk failures

2001-11-18 Thread Eugene Leitl

On Sat, 17 Nov 2001, Declan McCullagh wrote:

 This is actually partly true -- even Freenet, perhaps the most
 promising cypherpunkly project with live code right now, barely gets a
 mention on the list.

Mojonation is ailing, too. Barely a trickle of few posts/week on all mojo
lists taken together.




[BIOWAR] Chemcial/Biological Satellite Course (fwd)

2001-11-17 Thread Eugene Leitl

-- Forwarded message --
Date: Sat, 17 Nov 2001 11:07:53 -0500
From: Patricia Doyle, PhD [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [BIOWAR]  Chemcial/Biological Satellite Course

Those interested in taking the 3 day satellite seminar presented by USAMRIID
and USAMRICD go to biomedtraining.org and register for the FREE 3 day event.
  12:30pm-4:30pm Nov. 27, 28  29th.
There is no charge to view the broadcast and it is going to be presented at
downlink sites around the US, Southern Canada, Puerto Rico, Alaska and
Hawaii.
Those who wish to view online webcast, also register at that website. CME
credit available for the course.
A rebroadcast will take place in Dec., I believe around Dec. 9th.

I have taken the courses and find the material to be extremely accurate, and
timely.

Simply log onto biomedtraining.org, register for username and password, then
pick the site you choose to view the broadcast and register. After
registration, call or email site facilitator for confirmation of
registration. Simple as that. Last year we even got free luch, (sandwhichs
and soda) and text book.
Those who cannot attend the broadcast can still download program materials
on the biomedtraining.org site. pdf files available.

At this time in history, we do not want to let these learning opportunities
go by.

Patricia Doyle

Patricia A. Doyle, PhD
Please visit my Emerging Diseases message board at:
http://www.clickitnews.com/emergingdiseases/index.shtml
Zhan le Devlesa tai sastimasa
Go with God and in Good Health


_
Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp

Post to: [EMAIL PROTECTED] Unsubscribe to: [EMAIL PROTECTED] List info: 
www.topica.com/lists/biowar

==^
This email was sent to: [EMAIL PROTECTED]

EASY UNSUBSCRIBE click here: http://topica.com/u/?bz8Q0W.a9I0on
Or send an email to: [EMAIL PROTECTED]

T O P I C A -- Register now to manage your mail!
http://www.topica.com/partner/tag02/register
==^





IP: Beyond Carnivore: FBI Eyes Packet Taps (fwd)

2001-10-21 Thread Eugene Leitl



-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Sun, 21 Oct 2001 06:07:48 -0400
From: David Farber [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: IP: Beyond Carnivore: FBI Eyes Packet Taps



From: Monty Solomon [EMAIL PROTECTED]
Subject: Beyond Carnivore: FBI Eyes Packet Taps


October 18, 2001
Beyond Carnivore: FBI Eyes Packet Taps
By  Max Smetannikov

Expect the FBI to expand its Internet wiretapping program, says a
source familiar with the plan.

Stewart Baker, a partner with law firm Steptoe  Johnson, is a former
general counsel to the National Security Agency. He says the FBI has
spent the last two years developing a new surveillance architecture
that would concentrate Internet traffic in several key locations
where all packets, not just e-mail, could be wiretapped. It is now
planning to begin implementing this architecture using the powers it
has under existing wiretapping laws.

http://www.interactiveweek.com/article/0,3658,s%253D605%2526a%253D16678,00.asp


For archives see:
http://www.interesting-people.org/archives/interesting-people/




Re: Explosives found at Greyhound bus terminal

2001-10-21 Thread Eugene Leitl

On Fri, 19 Oct 2001, Greg Newby wrote:

 For the interested, here's a great recipe for composition 4
 explosives: http://www.pointlesswasteoftime.com/tech/c4.html

Since some of the chemicals cited in above recipe are not so easily
obtainable, so feel free to substitute them by powdered RDX and a
plasticizer in a 91:9 ratio. A good plasticizer can be made from
polyisobutylene, motor oil, and Di(2-ethylhexyl) sebaceate.





IP: U.S. On Verge of 'Electronic Martial Law' (fwd)

2001-10-21 Thread Eugene Leitl



-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Sun, 21 Oct 2001 12:39:42 -0400
From: David Farber [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: IP: U.S. On Verge of 'Electronic Martial Law'

U.S. On Verge of 'Electronic Martial Law'--Researcher
Newsbytes (10/15/01); Featherly, Kevin

The United States is unduly clamping down on the Internet in order to root
out terrorist activities online, argues University of Illinois professor
Heidi Brush, who says the federal government would do better to rethink the
conceptual framework of U.S. communications instead. She spoke at the
recent Internet Research 2.0 gathering for the Association of Internet
Researchers. Although offering no concrete fixes to the problem, Professor
Brush painted a grim picture of Internet martial law being imposed in a
vain attempt to capture distributed terrorist groups. Terrorists' style of
Net war, a term coined earlier by experts at the RAND policy think tank,
would prove elusive to counter by the lumbering centralized government, she
said.

http://www.newsbytes.com/news/01/171130.html


For archives see:
http://www.interesting-people.org/archives/interesting-people/




Re: used lab equiptment

2001-10-21 Thread Eugene Leitl

On Thu, 18 Oct 2001 [EMAIL PROTECTED] wrote:

 A specialized ultrasonic device is not required to produce micron fine
 aerosol powders.  All one needs is a used and cleaned print head

In fact not, pressure waves strong enough to aerosol liquid will also
cause cavitation, resulting in heating and destruction of material.

 assembly and its piezo pulse circuitry.  Nozzle apertures are
 typically 25-50 micron and if the material is suspended, in weak

Ever tried pushing a bacterial suspension through a printer head
(processivity set aside)? It will clog it up in no time.

 concentration, in a solution which quickly evaporates but doesn't harm
 the spores it should produce moderate quantities of fine powder
 quickly.

Um, why don't we quit armchair microbiology, and stick to what we can
best: produce lots of uninformed speculations? Oh.

 If smaller sizes are desired a field ring charged to 1000-3000v DC can
 be placed around and in front of the nozzles.  If operated in sync
 with the nozzle pulses it can cause a the emerging droplets to cascade
 to nanometer size via the electrospray effect (now becoming common in
 drug production).  See
 http://www.essex.ac.uk/bs/staff/colbeck/index.htm#appas

I think it should be easy enough to look up relevant patents online,
assuming one is bored enough.




FYI: Speak Freely for Unix 7.5 Pre-Release Available (fwd)

2001-10-18 Thread Eugene Leitl



-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Thu, 18 Oct 2001 13:52:24 +0200
From: John Walker [EMAIL PROTECTED]
To: Speak Freely Mailing List [EMAIL PROTECTED]
Subject: Speak Freely for Unix 7.5 Pre-Release Available

This announcement pertains only to Speak Freely for Unix.
Users of the Windows version need read no further.

A pre-release of Speak Freely for Unix (Linux, FreeBSD,
Solaris, IRIX, etc.) version 7.5 is now available.  This
release is intended for early adopters interested in
testing one or more of the new capabilities and/or
verifying whether problems intended to be resolved in this
release actually have been.  If you're engaged in modifying
Speak Freely or adapting code from it for use in other
applications, the code clean up in this version makes it a
better starting point for your work.

Download Information


Speak Freely for Unix 7.5 may be downloaded from:

 http://www.fourmilab.ch/speakfree/unix/download/7.5/speak_freely-7.5.tar.gz

This is a gzipped TAR archive containing complete source code;
the format of the distribution is unchanged from earlier
releases.  The distribution contains a complete development
log in the file log.doc.  An extract from this document including
all changes in 7.5 and several prior versions may be read
on-line at:

 http://www.fourmilab.ch/speakfree/unix/download/7.5/sfunix_log_7.5.html

New Features


Support has been added for Federal Standard 1016 CELP
(Code-Excited Linear Prediction) audio compression, via
a new -celp switch in sfmike.  This algorithm compresses
voice-grade audio to a 4800 bit per second data stream with
quality comparable to that of GSM (13000 bits/second)
compression.  CELP compression (but not decompression)
is fantastically computationally intense.  While a 50 MHz
486 suffices for GSM, the price of admission for CELP
is on the order of a 600 MHz Pentium III or equivalent.
Note that for floating-point intense code like this
performance depends more on processor architecture than
clock rate: a 300 MHz UltraSPARC (v9), which has five
floating point units and can issue two floating point
instructions at once, runs CELP compression about three
times faster than real time notwithstanding its slower
clock.

Sfecho now permits simulation of transmission errors on
poor connections.  A new -z option lets you specify a
percentage of packets to randomly drop and shuffle.  This
allows testing error-tolerant algorithms by running sfecho
on a local machine, set to emulate a channel with
properties like the one the algorithm is intended to
cope with.

Robust transmission mode may now be used with any
compression mode in Speak Freely protocol, not just LPC10.
A separate -robustN option on sfmike sets the number of
sequence numbered copies of each packet to be sent, which
may now be as many as 8.

Processing of robust mode packets in sfmike is greatly
improved over the bonehead algorithm I originally used.
Each packet contains a sequence number which increments
modulo 256.  Previously, packets were discarded only if
they contained precisely the same sequence number as the
immediately preceding one.  The new code computes the
difference between the current packet's sequence number and
that of the last one played (taking account of the modulo
256 wrap-around) and discards the packet if its sequence
number is less than or equal to that of the last packet,
but not more than 16 less.  This should discard most
packets shuffled by multipath routing, while limiting the
maximum loss in the case of intermittent outages which
completely lose sync to at most 16 packets.

A sample speech file containing four sentences spoken by
male and female speakers (originally supplied as a test for
the CELP library) is now included as speech.au in the
Speak Freely distribution.  (The original test file was 8
kHz 16 bit PCM--the version supplied in the distribution
has been recoded as 8 kHz mu-law, Speak Freely's native
format.)  This file allows evaluation of different
compression modes and diagnosis of problems due to audio
input hardware settings (clipping, insufficient input gain,
incorrect sampling rate, or conversion to mu-law, etc.) by
comparing live audio against this properly recorded file.

Bug Fixes
-

Transmission of face images now works when the audio stream
is encrypted.  (Fix by Ivan Popov.)

LPC10 audio compression should no longer be vulnerable to
compiler optimisation problems on various platforms, nor
to potential byte order or alignment problems.  The
original LPC10 codec was machine-translated from FORTRAN
into KR C and contained numerous constructs which invited
code generation problems.  The code is now fully prototyped
ANSI C and should no longer have 

Threat Recognition Testing (fwd)

2001-10-05 Thread Eugene Leitl



-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Fri, 5 Oct 2001 04:49:08 -0700
From: J. R. Molloy [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Threat Recognition Testing

Brain fingerprinting: What you thought, what I meant
David Coursey
http://www.zdnet.com/anchordesk/stories/story/0,10738,2816429,00.html
The name: Brain Fingerprinting is a particularly unfortunate name that
suggests an ability to somehow gather the contents of someone's brain for
identification. It is also painfully close to brain washing. For this
discussion, I will propose a more accurate, descriptive term: Threat
Recognition Testing, or when used in criminal investigations, Evidence
Recognition Testing.

What the test looks for: Threat Recognition Testing seeks to determine whether
the subject being tested recognizes certain items--which may be images of
physical items, pictures, or terminology. If the subject being tested
recognizes enough specific items, he or she can be assumed to have certain
training or experience. In actual testing, the technique was used to find 100
percent of the FBI agents in a test group without falsely selecting civilians
as FBI agents.

How was this done: The subjects were shown words and images that only an FBI
agent would recognize. The non-FBI agents did not recognize these images and
words.

How the test works: Subjects are hooked up to a device that measures brain
activity (the cerebral equivalent of a heart monitor) and shown a series of
images. An image or word the person recognizes presents a distinct brainwave
pattern when compared with an unrecognized image or word. The person cannot
consciously control this response.

The test does not care who you are, where you are from, your gender, religious
beliefs--anything other than whether you recognize a specific word or image.
All of the words and images can be given to the subject in advance without
affecting the test result.

When good people recognize bad things: It is obvious that a bank robber and an
FBI agent who investigates bank robberies would recognize many of the same
things. For that reason, additional images can be presented to subjects in
order to more precisely understand the context in which an object is
recognized. In an interactive testing system, this could be done
automatically, with the test adapting itself to probe more deeply into areas
of concern.

Does the test read someone's mind? The test does not determine what someone
is thinking, or even whether they are lying or not. It does, however,
determine if a person recognizes specific things. The test does not plant any
ideas or images into the subject's mind.

Here's an example of how the test might be used: Take one murder suspect, add
images only the murderer would know--faces of victims, locations, weapons,
etc.--and you should be able to separate the innocent from the potentially
guilty pretty quickly.

In a terrorist-screening scenario, you'd look for recognition of items related
to terrorist training and organizations. Score enough positives and you'd
become very interesting to the authorities.

This is not a technique for discovering things like whether you cheat on your
taxes or spouse (or both). It also won't tell whether you are a Republican,
Democrat, or something else, though it could determine whether you attended
one of the parties' national conventions (by testing you on what you would
have seen there).

The strengths: The test is excellent at clearing the innocent and, properly
given, can determine, if not always guilt, then at least what knowledge a
subject possesses, allowing for further investigation. The testing is
computerized, could require no human intervention, and is not racially,
ethnically, or culturally biased. Testing could take as little as 10 minutes,
but could be expanded to cover more items, thus adding the detail necessary to
separate security risks from non-risks.

The limitations: This technology has been tested and accepted by courts,
though additional testing certainly makes sense. There are also some technical
hurdles which today make the technique more suited for longer testing of
specific individuals (suspects) than quick testing of the general public
(screening).

This specifically relates to the devices used to record brain activity. With
digital signal processing, it should be possible to improve the
signal-to-noise ratio (which shortens the time needed for testing). Actually
creating the tests is a non-trivial matter, especially when screening for
potential problems rather than investigating an actual crime or incident.

---   ---   ---   ---   ---

Useless hypotheses, etc.:
 consciousness, phlogiston, philosophy, vitalism, mind, free will, qualia,
analog 

Re: [ISN] CRYPTO-GRAM SPECIAL ISSUE, September 30, 2001 (fwd)

2001-10-03 Thread Eugene Leitl



-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Wed, 3 Oct 2001 02:20:55 -0500 (CDT)
From: InfoSec News [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: [ISN] CRYPTO-GRAM SPECIAL ISSUE, September 30, 2001

Forwarded from: Aj Effin Reznor [EMAIL PROTECTED]

Pardon the rant.  Since Bruce went down his yellow brick road to the
Land Where Full Disclosure Is Bad, I have been wondering about the
usefulness of a crypto guy functioning as the head of a security
company.

InfoSec News was known to say.

 Watching the television on September 11, my primary reaction was
 amazement.

Thanks for reminding us that you're human...

 supports and collapse the World Trade Center.  It seems probable
 that they placed advantageous trades on the world's stock markets
 just before the attack.  No one planned for an attack like this.
 We like to think that human beings don't make plans like this.

From what I've gathered since the 11th, this *was* planned for, in a
sense. The scenario was deemed unlikely enough that any preparation
for such an occurance was considered pointless.


 It was also a new type of attack.  One of the most difficult
 things about a

(This line is important in a minute).


 Airline Security Regulations

 Computer security experts have a lot of expertise that can be
 applied to the real world.  First and foremost, we have
 well-developed senses of what security looks like.  We can tell
 the difference between real security and snake oil.  And the new
 airport security rules, put in place after September 11, look and
 smell a whole lot like snake oil.

We computer security experts.

(A) Bruce does crypto, not security.  When he made the cutover, and
rapidly rose to the rank of expert is unknown to me.

(B) It's always been said that no one who calls themself an expert in
anything, is.  And chances are the ones who don't, are.

 All the warning signs are there: new and unproven security
 measures, no real threat analysis, unsubstantiated security
 claims.  The ban on cutting

Claims like full disclosure is bad.  I'd like to see what studies
this ideology is based on.

 Parked cars now must be 300 feet from airport gates.  Why?  What
 security problem does this solve?  Why doesn't the same problem
 imply that passenger drop-off and pick-up should also be that far
 away?  Curbside check-in has been eliminated.  What's the threat
 that this security measure has solved?  Why, if the new threat is
 hijacking, are we suddenly worried about bombs?

Pudding, including proof.  Since this is a new style of hijacking,
then clearly this is all we must concentrate on?  I didn't see people
taking down firewalls just because Code Red  Nimda passed right
through and hit web servers.  No, new threats need to be responded to
without neglecting every previous threat.

Bruce seems to think that just because these guys were so clever, that
they'd never resort back to a simple car bomb parked next to an
airport terminal. No, they'd never go low-tech.  Think: Boxcutters.

 The rule limiting concourse access to ticketed passengers is
 another one that confuses me.  What exactly is the threat here?
 Hijackers have to be on the planes they're trying to hijack to
 carry out their attack, so they have to have tickets.  And anyone
 can call Priceline.com and name their own price for concourse
 access.

Unless they were simply planting a bomb in the luggage compartment.
You know, like an airport-employed *baggage*handler* would be able to
do.

Bruce is making far too many assumptions which, instead of bordering
on the fanatical are instead bordering on the blind.

 Increased inspections -- of luggage, airplanes, airports -- seem
 like a good idea, although it's far from perfect.  The biggest
 problem here is

Inspection of what, a hijacker?  Until a hijacking occurs, any
terrorist is merely a potential hijacker.  What are these inspections
for that Bruce supports?  Bombs?  The same ones he thinks are a
non-issue now?

 Positive bag matching -- ensuring that a piece of luggage does not
 get loaded on the plane unless its owner boards the plane -- is
 actually a good security measure, but assumes that bombers have
 self-preservation as a guiding force.  It is completely useless
 against suicide bombers.

Now bombs *are* an issue again!  This waffling is feeling rather
Clinton-esque!

 The real point of photo ID requirements is to prevent people from
 reselling tickets.  Nonrefundable tickets used to be regularly
 advertised in the newspaper classifieds.  Ads would read something
 like Round trip, Boston

This much I agree with.

  Biometrics in Airports

 You have to admit, it sounds like a good idea.  Put cameras
 throughout airports and other public congregation 

[ISN] Hijackers' e-mails sifted for clues Computer messages weresentuncoded (fwd)

2001-10-03 Thread Eugene Leitl



-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Wed, 3 Oct 2001 02:18:55 -0500 (CDT)
From: InfoSec News [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [ISN] Hijackers' e-mails sifted for clues Computer messages were
sentuncoded

Forwarded from: Patrice Auffret [EMAIL PROTECTED]

http://www.usatoday.com/usatonline/20011001/3496196s.htm

Hijackers' e-mails sifted for clues Computer messages were sent uncoded

By Kevin Johnson
USA TODAY

WASHINGTON -- Federal authorities believe that some of the 19
hijackers involved in the Sept. 11 terrorist attacks were using
computers in all-night Kinko's stores and cybercafes in South Florida
to coordinate their activities in the weeks before the assaults.

Investigators have amassed what they described as a ''substantial''
amount of e-mail traffic among the hijackers. Some of the messages
were exchanged in a mix of English and Arabic.

None of the communications, authorities said Sunday, involved the use
of encryption or other code to disguise the contents of the messages.

At least two laptop computers seized in the United States were being
examined closely by investigators. They hope to determine whether the
machines contained information that could help identify associates of
the hijackers in this country or provide leads about future terrorist
attacks, a senior law enforcement official said.

The disclosure appeared to be further evidence that the hijackers felt
free to conduct their business in the open without much fear they
would be discovered.

Late last month, law enforcement officials said they believed that the
hijackers or their associates did extensive scouting missions on
various airline routes before settling on flights originating in
Boston, Newark, N.J., and Washington.

Investigators said they believe that the hijackers selected the four
flights they commandeered Sept. 11 because passenger loads generally
were light and the fuel tanks on the jets, all on transcontinental
routes, were full.

Official interest in the hijackers' methods of communication comes as
the largest criminal investigation in U.S. history continues to widen.
The attacks left nearly 6,000 people dead or missing.



-
ISN is currently hosted by Attrition.org

To unsubscribe email [EMAIL PROTECTED] with 'unsubscribe isn' in the BODY
of the mail.




IP: Newsweek: FBI had one hijacker before Sept 11th and Justice DeptBumbled (fwd)

2001-10-03 Thread Eugene Leitl



-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Wed, 03 Oct 2001 12:59:34 -0400
From: David Farber [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: IP: Newsweek: FBI had one hijacker before Sept 11th and Justice
Dept Bumbled


Date: Wed, 03 Oct 2001 09:44:40 -0700
From: Robert J. Berger [EMAIL PROTECTED]

{The FBI and the Justice Dept had tools before Sept 11 and didn't use
them. They don't need more ways to errode our civil liberties, they need
to be competent}

** Access Denied **
FBI agents in Minneapolis weren't given approval to search terrorist
suspect's hard drive by the Justice Department. If 'two and two' were put
together could hijackings have been stopped, asks one investigator. A Web
exclusive by Michael Isikoff and Daniel Klaidman

http://www.msnbc.com/modules/exports/ct_email.asp?/news/636610.asp

Oct. 1 —  Top Justice Department and FBI officials turned down a request
by Minneapolis FBI agents early last month for a special
counterintelligence surveillance warrant on a suspected Islamic terrorist
who officials now believe may have been part of the Sept. 11 plot to
attack the World Trade Center and Pentagon, NEWSWEEK has learned.

snip.
--



For archives see: http://www.interesting-people.org/




STILL OFF TOPIC: Re: America needs therapy

2001-10-02 Thread Eugene Leitl

On Mon, 1 Oct 2001, Steve Schear wrote:

 At 01:25 PM 10/1/2001 -0400, James B. DiGriz wrote:
 Declan McCullagh wrote:
 A far more productive application of corporate welfare would be if that
 money were spent on engineering research and development of geosynchronous
 solar power microwave relays, fusion and advanced fission reactors,

GEO is lousy: it's too far away, and it's packed already. Newer concepts
assume LEO with active microwave focus tracking of the rectenna ground
array with phased array antennas integrated into the solar array. You have
to have sufficient amounts of hardware in the sky for continuous line of
sight presence.

 permanent manned statons on the Moon, Mars, asteroids, etc. The planet and

Luna is closest, and it's near enough for relativistic lag being low
enough to allow teleoperation. Sending monkeys elsewhere would seem a
later stage.

 its politics would likely be a lot cleaner. Just one beneficial side effect.

 Research in geosynchronous power satellites is still being funded.  One
 program, started in Japan but which is now also funded by NASA, uses 5.7
 GHz transmission to a ground based RECifying anTENNAs.  Another project
 intends to use IR lasers.  My understanding is these projects are receiving
 serious funding and prototypes should fly soon.

Problem is high LEO launch costs. It would seem easier to build automated
and teleoperate fabbing and (linear motor) launching facilities on Luna,
and circularize orbit mostly by aerobraking.

-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3




Re: SF development (fwd)

2001-10-02 Thread Eugene Leitl

-- Forwarded message --
Date: Mon, 01 Oct 2001 16:30:17 -0400
From: Kirk Reiser [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: Re: SF development

I don't know what happened to Brian however as far as I know John
Walker is still lurking.  Development is anything but halted.  Ron
Bessem has a mixing version of the windows speak freely and Jonnas and
I have a unix/linux version in cvs.

Changes have not been happening quickly recently but that is because
we are both busy on other projects.  You are of course welcome to get
involved and help with the development.  There's plenty of room for
everyone.

cvs -d:pserver:[EMAIL PROTECTED]:/usr/src/CVS login
password: please
cvs -d:pserver:[EMAIL PROTECTED]:/usr/src/CVS co
speak_freely (unix/linux) or win_sf for windows)

  Kirk

  * * *

To unsubscribe from this mailing list, send E-mail containing
the word unsubscribe in the message body (*not* as the
Subject) to [EMAIL PROTECTED]





Re: America needs therapy

2001-10-01 Thread Eugene Leitl

On Mon, 1 Oct 2001, Harmon Seaver wrote:

 Not true at all. Biodiesel is being marketed in the US today at
 competitive prices, and obviously, like anything else, economies of
 scale would bring down that price. Ethanol is another one. Brazil run

Biodiesel and bioethanol are horribly inefficient as far as conversion of
solar energy and agricultural area is concerned. Large scale agriculture
is not exactly environmentally neutral. They're extreme niche or gimmick
fuels at best.

Synfuel and synthetic methanol as well as hydrogen via fuel reforming from
fossils and biomass/renewables is another thing entirely, and entirely
worthwhile. Both synthetic methanol and fuel reforming allows slow
migration to fuel cells, without pissing off the fossil fuel people.

 a large portion of it's vehicles on ethanol.

-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3




OFF TOPIC: Re: America needs therapy

2001-10-01 Thread Eugene Leitl

This is about as off-topic as the mold issue. You've been warned.

On Mon, 1 Oct 2001, Harmon Seaver wrote:

  Biodiesel and bioethanol are horribly inefficient as far as conversion of
  solar energy and agricultural area is concerned. Large scale agriculture
  is not exactly environmentally neutral. They're extreme niche or gimmick
  fuels at best.

 Where do you get that from? Are you saying that farmers aren't growing
 canola oil at a profit? Farmers are also growing corn and that corn is
 turned into ethanol at a profit.

No. I'm saying if you use bioethanol, biodiesel or oil made from
agricultural products you're milking a negligable fraction of the solar
constant (1.4 kW/m^2 flux hereabouts), even solar constant at the bottom
of this gravity well (varies greatly). Plus, you kill soil, reduce
biodiversity, contaminate ground water, reduce ground water level plus
cause salination in susceptible areas, burn energy for machines,
fertilizer  Co and create waste. There are also less tangible but
nevertheless real factors such as high material fluxes, associated
pollution, perpetuation of Carnot cycle machines and agromafia.

What we need is sufficient control of molecular self-replication that we
can use photons directly for photosynthesis or water photolysis. Before
we'll get that, we'll have to settle for conventional thin-film and
polymer photovoltaics, electrolysis and photoelectrolysis/photosynthesis.
I would think that CuInSe thin film would do very nicely today if
facade-integrated, before we get polymer.

 http://journeytoforever.org/ethanol.html

  Ethanol is a highly efficient fuel. A study by

Energy density of ethanol is about half of gasoline. You *can* use it in a
fuel cell or a fuel reformer, but methanol is easier. Methanol -
synthesis gas conversion is really clean.

the Institute of Local Self-Reliance in the
US found that using the best farming and
production methods, the amount of energy
contained in a gallon of ethanol is more than
twice the energy used to grow the corn and
convert it to ethanol.

So, assuming these people haven't been pulling data straight from their
ass, you have to burn half of the ethanol you would get from a square
meter of a field in order to do it. Not counting the presence of said
field, the agricultural infrastructure and the agrohol plant.

The US Department of Agriculture says
each BTU (British Thermal Unit, an energy
measure) used to produce a BTU of
gasoline could be used to produce 8 BTUs
of ethanol.

Now this says something else than journeyforever folks said. 8:1 is
something else than 2:1.

The non-profit American Coalition for
Ethanol says ethanol production is
extremely energy efficient, with a positive

Energy efficient as compared to what exactly? Nuke, fossil, photovoltaics,
wind? And, of course, energy is only a very small part of the picture.

energy balance of 125%, compared to 85%
for gasoline, making ethanol production by
far the most efficient method of producing
liquid transportation fuels.

Now, it's only 125%. Very strange numbers, these.

 

   If you are refering to the paper done by Pimental, that study was
 seriously flawed (so much so that one might think it was paid for by big oil)
 and thoroughly debunked.  See:
 http://journeytoforever.org/ethanol_energy.html

I do not refer to the study of Pimenthal, just seat of the pants ecology
and 8th class highschool level physics. I don't have time to google for
this stuff, but I'm sure you'll find enough references as to why
bioethanol and biodiesel are hardly a silver bullet.

-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3




IP: Do read -- EFF statement on opposition to MATA/ATA (fwd)

2001-09-23 Thread Eugene Leitl



-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Sun, 23 Sep 2001 06:25:50 -0400
From: David Farber [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: IP: Do read --  EFF statement on opposition to MATA/ATA


EFF members have asked why we have objected to some of the proposed
changes to wiretapping and other laws made in the aftermath of the recent
terrorist attacks on the U.S. We do not raise these objections lightly,
not are they light objections.  We fully support legitimate government
efforts to bring the perpetrators of these attacks to justice. Yet as a
watchdog for civil liberties, we are skeptical of claims that the only way
we can increase our security is by giving up our freedoms.  And a close
look at the specific measures proposed shows several areas that should
concern all Americans.

First, these bills are not being carefully reviewed, or even reviewed at
all, by our lawmakers.   SA 1562 was introduced late at night and voted on
within a half hour, with several senators complaining that they had not
been given the chance to read it.  Similarly, both MATA and its later
incarnation, ATA, are long and complex bills, making changes throughout
our legal structure. Yet the Attorney General has asked for them to be
voted into law within a week.  This complete dismissal of the normal
processes for legislation should alarm anyone who believes in democratic
government.

Second, these changes are permanent.  EFF shares the desire to move
quickly now in order to better track the perpetrators of this shocking
attack.  But none of the legislative changes that have been proposed so
far is temporary -- these are broad ranging, permanent reductions in civil
liberties and privacy of all Americans.  History has shown that such laws,
passed in haste during a time of crisis, linger and cause difficulties
long after the crisis has passed.

Third, these proposed laws include provisions that appear to have nothing
to do with fighting terrorism, such as allowing wiretaps based upon
allegations of defacing a web site. If it is the case that low-level
computer defacement is a problem that relates to terrorism, we encourage
law enforcement to explain the connection. Instead, it seems that several
of the most worrisome provisions of the proposed laws are part of a
general law enforcement wish list rather than a specific response to
terrorism.

Finally, changes in surveillance authority are suggested without any
showing that the current requirements for FISA, Title III and pen/trap
surveillance posed a barrier to the investigation of the attacks.  We have
been told that FISA warrants were issued and served on major ISPs within
hours of the terrorist attacks last week.  There have been no reports that
the minimal processes required for these warrants have hampered the
investigations.

The EFF does not categorically oppose all changes in our laws or
regulations in response to the attack.  But responses that are unrelated
to increasing our security or that change parts of the laws that are not a
barrier to preventing of terrorism are not only bad policy, they run the
risk of lulling us into believing that we are more safe than we actually
are.  The EFF does not claim to be experts in anti-terrorism measures. We
are experts in civil liberties and privacy, however, and believe that any
lessening of those rights must be carefully debated and adequately justified.

The U.S. legal system has been based upon the basic precept that American
citizens should not be subject to surveillance unless there has been a
showing that he or she may have committed a serious offense.  Maybe we now
wish abandon that precept.  Maybe we now wish to live in a world where who
we e-mail and where we travel on the Internet is routinely monitored by
centralized government authorities. We at the EFF do not believe so. But
at a minimum, such changes must be subjected to informed public debate.

On September 11, President Bush said that freedom itself had been
attacked.  In our response to that horrible act, the understandable desire
to prevent future attacks should not lead us to do further, permanent
damage that same freedom.



For archives see: http://www.interesting-people.org/




Re: [linux-elitists] Cryptome up for mirroring (fwd)

2001-09-16 Thread Eugene Leitl



-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO  : N48 10'07'' E011 33'53'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Sun, 16 Sep 2001 08:54:12 -0400
From: Aaron Sherman [EMAIL PROTECTED]
To: Eugene Leitl [EMAIL PROTECTED]
Cc: Linux Elitists List [EMAIL PROTECTED]
Subject: Re: [linux-elitists] Cryptome up for mirroring

On Sat, Sep 15, 2001 at 11:01:30PM +0200, Eugene Leitl wrote:

 All blocks and limitations on downloads here have been removed. We
 request that bots and spiders be configured and monitored to avoid
 repetiveness, looping, recycling and checking previous downloads.
 Bandwidth trashing programs will be seen as attacks and blocked to
 assure access by others.

I'm also putting up a lot of the software that's currently listed on
freshmeat (gnupg and it's associated library packages, pgp2.6,
some email crypto packages, Perl and python interfaces to crypto,
and a more) up on Gnutella. I will be allowing downloads at a restricted
bandwidth, but hopefully these packages will be picked up and mirrored
across the gnutella network.

For folks interested in getting involved in the effort to assure
crypto access, please check out my comments on pps.sourceforge.net

-- 
Aaron Sherman
[EMAIL PROTECTED] finger [EMAIL PROTECTED] for GPG info. Fingerprint:
www.ajs.com/~ajs6DC1 F67A B9FB 2FBA D04C  619E FC35 5713 2676 CEAF
  I've committed many sins. Have I displeased you, you feckless thug?
   -President Bartlet, ``The West Wing''
___
linux-elitists
http://zgp.org/mailman/listinfo/linux-elitists




RE: SYMBOL

2001-09-16 Thread Eugene Leitl

On Sun, 16 Sep 2001, Sandy Sandfort wrote:

 As were buildings above 5 stories in ancient Rome.  Technology moves
 on. The question is not, Can 250-story buildings be made safe?  The
 only question is How can they be made safe?

The question is: why should we bother? Tall buildings have intrinsically
bad volume to crossection ratio, by definition. Both the static and the
infrastructure is vulnerable, so the efforts would be far better spent by
decentralizing the society. Monkeys want to see monkeys, fine. We have
video projectors and AR avatars for that, and last time I looked most of
the fiber was idle.




IP: [ I take it back djf ] U.S. Intelligence Gathering Reviewed(fwd)

2001-09-13 Thread Eugene Leitl


-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO  : N48 10'07'' E011 33'53'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Thu, 13 Sep 2001 08:25:22 -0400
From: David Farber [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: IP: [ I take it back djf ] U.S. Intelligence Gathering Reviewed


U.S. Intelligence Gathering Reviewed

By THE ASSOCIATED PRESS



Filed at 7:11 a.m. ET

NEW YORK (AP) -- A current emphasis on technology over human
intelligence-gathering, a funding shortage and an information
overload may help explain U.S. intelligence agencies' failure to
forestall the worst terror attack on American soil.

``Our raw intelligence has gotten weaker, partly because we're not
hiring, we're not paying and we're not analyzing what we're
collecting,'' said Anthony Cordesman, an anti-terrorism expert with
the Washington-based Center for Strategic and International
Studies.

His comments echoed those of former Secretary of State James A.
Baker III, who told CNN that ``it would be well ... to consider
beefing up some of our intelligence capabilities, particularly in
the areas of human intelligence.''

That's easier said than done, said Gideon Rose, managing editor of
Foreign Affairs magazine.

``It's incredibly difficult to find the right people who can
infiltrate these groups,'' Rose said. ``As far as making other
changes, it means going up against Washington's bureaucratic
inertia.''

During the Cold War, the United States began pouring billions into
satellite imagery, communications interception and reconnaissance
equipment. The tools were also useful in monitoring the moves of
organizations such as the PLO and the IRA -- which had traditional,
low-tech structures that were relatively easy to follow.

But the extraordinary costs meant cutbacks in personnel at the CIA
and the National Security Agency, the nation's international
eavesdropping arm.

As the Cold War came to a close, the number of threatening groups
increased tenfold just as the digital revolution hit, making global
communications suddenly very cheap and secure. Meanwhile, the
numbers of people working in U.S. intelligence remained constant.

These days, terrorists can download sophisticated encryption
software on the Internet for free, making it increasingly difficult
to tap into their communications.

One recent report said Osama bin Laden, a suspect in Tuesday's
attacks, has used complex digital masking technology called
steganography to send photos over the Internet bearing hidden
messages.

The head of NSA, Gen. Mike Hayden, acknowledged in an interview
with CBS' ``60 Minutes II'' earlier this year that his agency is
``behind the curve in keeping up with the global telecommunications
revolution,'' adding that bin Laden ``has better technology'' than
the agency.

Former national security adviser Sandy Berger said Wednesday that
the terrorists responsible for Tuesday's carnage displayed ``a
level of sophistication that is beyond what any intelligence outfit
thought was possible.'' Yet, many believe the perpetrators used
low-tech methods to elude Western intelligence.

Wayne Madsen, a former NSA intelligence officer, said he believes
the terrorists shunned e-mail and mobile phones, using couriers and
safe houses instead. He said it was likely the terrorists in each
of Tuesday's four hijacked planes didn't know the others existed.

Terrorist ``cells are kept small and very independent so
intelligence agencies can't establish any sort of network,'' Madsen
said.

Others say the big problem is not the technological shortcomings
but the inability to get inside tightly-knit organizations such as
bin Laden's.

``It's not easy to knock on bin Laden's cave and say we'd like to
join,'' said Frank Cilluffo, a senior analyst at the Center for
Strategic and International Studies. ``These are hard targets for
Americans to infiltrate and we need to recruit the kind of people
who have the language and the cultural understanding to gain access
to these organizations.''

Eugene Carroll, a Navy admiral and a defense expert, agreed.
``These people can only be countered by superb intelligence. The
U.S. doesn't have it,'' he said.

Experts say intelligence-gathering, to be effective, must involve
close coordination between eavesdropping and spying. In practical
terms, this means cooperation between the NSA and CIA.

Madsen said there is reason to believe the NSA received some good
intelligence showing bin Laden's involvement in Tuesday's attacks
but that it wasn't recognized as such.

``There's an information overload out there and not surprisingly it
becomes very hard to process, prioritize it and share it,'' said
Ian Lesser at the Rand Corporation think tank.

Others said that some of the best intelligence people had been lost
to the dot.com boom while promising junior 

Coordination, maximizing terror, hypotheses (fwd)

2001-09-12 Thread Eugene Leitl



-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO  : N48 10'07'' E011 33'53'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Wed, 12 Sep 2001 10:49:13 -0500
From: Jeff Bone [EMAIL PROTECTED]
To: Robert S. Thau [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Coordination, maximizing terror, hypotheses


*  The timing of the WTC attacks is extraordinary, and points not only to a
high degree of coordination but also to a keen sensibility in planning the
mission.  Consider:  if both planes had hit the buildings simultaneously,
there would've been very little footage of the second attack.  Too little time
between the attacks and there would've been less coverage and no real-time
horror;  too much time and the alert status might've been such that the second
collision could be prevented.

*  The targeting of the second attack may be a subtle pointer to state
involvement.  I understand that the part of the Pentagon that was hit houses
the nerve center for the Army's worldwide logistics command.  It appears that
this part of the building was intentionally targeted, as the plane apparently
performed an overshoot-and-return maneuver in order to line up with the south
side of the building, whereas it could've gone into the opposite side with no
such maneuver.  A small, highly-mobile group of perps wouldn't be concerned
about damaging the Army's logistical capability, as any retaliation would like
be air-based or, if ground-based, a smaller strike squad with separate /
minimal logistical concerns.  Crippling Army logistics might have been a
strategic consideration designed to minimize the ability to mount an
immediate, large-scale, ground-based response with traditional forces.
Further speculation:  this may point away from Afghanistan / Taliban
involvement and more towards Iraq or Iran, for the reasons noted earlier re:
the difficulty of mounting a ground-based invasion of Afghanistan.

*  Our own forces may have shot down the plane over Pennsylvania.  Dick Armey
was giving an interview last night, and after being asked leading questions by
Wolf Blitzer he started making comments about being given a classified
briefing with information specifically about that plane.  The interview was
then censored, with sound edited out for about 30 seconds.  I think this could
well be an open secret that the media has been let in on but gagged about in
order to minimize public backlash / confusion.  Other indications also exist,
in the news that's coming out about where and when fighters were scrambled.
This is clearly speculative, but a possibiliity.





http://xent.com/mailman/listinfo/fork




FC: FBI pushes Carnivore on network providers after attacks (fwd)

2001-09-12 Thread Eugene Leitl



-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO  : N48 10'07'' E011 33'53'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Wed, 12 Sep 2001 10:17:03 -0400
From: Declan McCullagh [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: FC: FBI pushes Carnivore on network providers after attacks



http://www.wired.com/news/politics/0,1283,46747,00.html

Anti-Attack Feds Push Carnivore
By Declan McCullagh ([EMAIL PROTECTED])
2:00 a.m. Sep. 12, 2001 PDT

WASHINGTON -- Federal police are reportedly increasing Internet
surveillance after Tuesday's deadly attacks on the World Trade Center
and the Pentagon.

Just hours after three airplanes smashed into the buildings in what
some U.S. legislators have dubbed a second Pearl Harbor, FBI agents
began to visit Web-based, e-mail firms and network providers,
according to engineers at those companies who spoke on condition of
anonymity.

An administrator at one major network service provider said that FBI
agents showed up at his workplace on Tuesday with a couple of
Carnivores, requesting permission to place them in our core, along
with offers to actually pay for circuits and costs.

[...]

Microsoft's Hotmail service has also been the target of increased
federal attention, according to an engineer who works there.

Hotmail officials have been receiving calls from the San Francisco
FBI office since mid-(Tuesday) morning and are cooperating with their
expedited requests for information about a few specific accounts, the
person said. Most of the account names start with the word 'Allah'
and contain messages in Arabic.

[...]




-
POLITECH -- Declan McCullagh's politics and technology mailing list
You may redistribute this message freely if you include this notice.
Declan McCullagh's photographs are at http://www.mccullagh.org/
To subscribe to Politech: http://www.politechbot.com/info/subscribe.html
This message is archived at http://www.politechbot.com/
-





[Remops] cracker, redneck down for awhile (fwd)

2001-09-11 Thread Eugene Leitl

-- Forwarded message --
Date: 11 Sep 2001 12:43:19 -0400
From: Andy Dustman [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: Remailer Operators [EMAIL PROTECTED]
Subject: [Remops] cracker, redneck down for awhile

SMTP is off at gacracker.org until things settle down. anon.efga.org
will stay up.

-- 
Andy Dustman PGP: 0x930B8AB6
@   .net http://dustman.net/andy
I'll give spammers one bite of the apple, but they'll
have to guess which bite has the razor blade in it.




[Remops] Re: Opinions on Operations due to bombings. (fwd)

2001-09-11 Thread Eugene Leitl

-- Forwarded message --
Date: Tue, 11 Sep 2001 09:23:44 -0700 (PDT)
From: Len Sassaman [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: [Remops] Re: Opinions on Operations due to bombings.

I'm not concerned that the remailer network is, was, or will be used by
the actual terrorists. What concerns me is the assholes who will
inevitably send bogus threats, tips, and other noise to various news
groups, federal offices, and officials.

I don't want to get caught in the middle of this. I'm sorry. I'm currently
unemployed and don't have the resources to defend myself. At this point
in time, a free-speech argument will not gain much sympathy with the feds,
judges, and general public.

And investigators don't need more noise to sort through. They'll have
enough as it is.

I'd like to see remailers continue operating. But this needs to settle.
I may put mine into middle, mix only mode if I feel up to it..

On Tue, 11 Sep 2001, J.Francois wrote:

 I no longer run an anon remailer but I still operate a public proxy.

 By now everyone is aware of the bombings here in the USA.

 So, do we suspend anon communications channels during the crises or do we stay
 operational.

 Opinions?


 --
 Jean Francois - JLF Sends...
 Once at a social gathering, Gladstone said to Disraeli,
 I predict, Sir, that you will die either by hanging or of some
 vile disease. Disraeli replied, That all depends, Sir, upon
 whether I embrace your principles or your mistress.


--

Len Sassaman

Security Architect|  I must play their game, of
Technology Consultant |   not seeing I see the game.
  |
http://sion.quickie.net   |--R .D. Laing









___
Remops mailing list
[EMAIL PROTECTED]
http://lexx.shinn.net/mailman/listinfo/remops




IP: LITTLE BROTHER MAY BE WATCHING YOU (WITH X10 VIDEOCAMS): fromnewsscan daily (fwd)

2001-09-10 Thread Eugene Leitl



-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO  : N48 10'07'' E011 33'53'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Mon, 10 Sep 2001 12:56:41 -0400
From: David Farber [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: IP: LITTLE BROTHER MAY BE WATCHING YOU (WITH X10 VIDEOCAMS): from
newsscan daily



  A company called X10 Wireless Technology is marketing its tiny color
  video cameras for their use in keeping an eye on your kids or even
  engaging in voyeuristic activity. One ad for the $79.99 device
  displays a bare-backed woman and the headline Quit Spying on People!
  (we never told you to do that). The technology uses radio frequencies
  for communication among devices within a 100-foot radius, and
  represents a development that one attorney says is outstripping
  everything we once contemplated about privacy. X10 devices have been
  found planted secretly in such places as college shower rooms,
  attorneys' offices, and corporate meeting rooms. (San Jose Mercury
  News 10 Sep 2001)
  http://www.siliconvalley.com/docs/news/svfront/027254.htm



For archives see: http://www.interesting-people.org/




[RRE]Your Face Is Not a Bar Code (fwd)

2001-09-08 Thread Eugene Leitl



-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO  : N48 10'07'' E011 33'53'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Fri, 7 Sep 2001 15:53:48 -0700
From: Phil Agre [EMAIL PROTECTED]
To: Red Rock Eater News Service [EMAIL PROTECTED]
Subject: [RRE]Your Face Is Not a Bar Code


=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
This message was forwarded through the Red Rock Eater News Service (RRE).
You are welcome to send the message along to others but please do not use
the redirect option.  For information about RRE, including instructions
for (un)subscribing, see http://dlis.gseis.ucla.edu/people/pagre/rre.html
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=



  Your Face Is Not a Bar Code:
  Arguments Against Automatic Face Recognition in Public Places

  Phil Agre
  http://dlis.gseis.ucla.edu/pagre/

  Version of 7 September 2001.
  2600 words.

  Copyright 2001 by Phil Agre.  You are welcome to forward this
  article in electronic form to anyone for any noncommercial reason.
  Please do not post it on any Web sites; instead, link to it here:

  http://dlis.gseis.ucla.edu/people/pagre/bar-code.html


Given a digital image of a person's face, face recognition software
matches it against a database of other images.  If any of the stored
images matches closely enough, the system reports the sighting to its
owner.  Research on automatic face recognition has been around for
decades, but accelerated in the 1990s.  Now it is becoming practical,
and face recognition systems are being deployed on a large scale.

Some applications of automatic face recognition systems are relatively
unobjectionable.  Many facilities have good reasons to authenticate
everyone who walks in the door, for example to regulate access to
weapons, money, criminal evidence, nuclear materials, or biohazards.
When a citizen has been arrested for probable cause, it is reasonable
for the police to use automatic face recognition to match a mug
shot of the individual against a database of mug shots of people who
have been arrested previously.  These uses of the technology should
be publicly justified, and audits should ensure that the technology
is being used only for proper purposes.

Face recognition systems in public places, however, are a matter for
serious concern.  The issue recently came to broad public attention
when it emerged that fans attending the Super Bowl had unknowingly
been matched against a database of alleged criminals, and when the
city of Tampa deployed a face-recognition system in the nightlife
district of Ybor City.  But current and proposed uses of face
recognition are much more widespread, as the resources at the end
of this article demonstrate in detail.  The time to consider the
acceptability of face recognition in public places is now, before
the practice becomes entrenched and people start getting hurt.

Nor is the problem limited to the scattered cases that have been
reported thus far.  As the underlying information and communication
technologies (digital cameras, image databases, processing power,
and data communications) become radically cheaper over the next two
decades, face recognition will become dramatically cheaper as well,
even without assuming major advances in technologies such as image
processing that are specific to recognizing faces.  Legal constraints
on the practice in the United States are minimal.  (In Europe the
data protection laws will apply, providing at least some basic rights
of notice and correction.)  Databases of identified facial images
already exist in large numbers (driver's license and employee ID
records, for example), and new facial-image databases will not be
hard to construct, with or without the knowledge or consent of the
people whose faces are captured.  (The images need to be captured
under controlled conditions, but most citizens enter controlled,
video-monitored spaces such as shops and offices on a regular basis.)
It is nearly certain, therefore, that automatic face recognition will
grow explosively and become pervasive unless action is taken now.

I believe that automatic face recognition in public places, including
commercial spaces such as shopping malls that are open to the public,
should be outlawed.  The dangers outweigh the benefits.  The necessary
laws will not be passed, however, without overwhelming pressure of
public opinion and organizing.  To that end, this article presents
the arguments against automatic face recognition in public places,
followed by responses to the most common arguments in favor.


Arguments against automatic face recognition in public places

 * The potential for abuse is astronomical.  Pervasive automatic
face recognition could be used to track individuals wherever they go.
Systems operated by different 

Re: secure IRC/messaging successor

2001-09-01 Thread Eugene Leitl


On Fri, 31 Aug 2001, Rich Salz wrote:

 Gale seems to have a better security story, but Jabber certainly has the
 momentum and large force behind it.

How does SILC http://www.silcnet.org/ fit the bill?

-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO  : N48 10'07'' E011 33'53'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3




Re: Borders UK and privacy

2001-08-30 Thread Eugene Leitl

On Wed, 29 Aug 2001, Declan McCullagh wrote:

 Maybe, but it seems like offense just got a boost. Passive biodefenses
 don't work against an active offense. If sniffers start landing on
 your skin and taking a microscopic sample, then they won't be trivial
 to defend against.

Biology can't help leaking bits, it's riddled with multiple fingerprints.
The only way to make sure is to rent a random telepresence box, the
control flow being routed through realtime traffic remixers.

By the time you have litte gadgets buzzing around who're after your DNA or
volatile MHC fragments we'll surely have these.

-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO  : N48 10'07'' E011 33'53'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3




Re: Borders UK and privacy

2001-08-30 Thread Eugene Leitl

On Thu, 30 Aug 2001, Duncan Frissell wrote:

 How about a tailored virus that modifies your DNA on a rotating basis
 in non significant fashion so that you're constantly new.  I wonder

Unless you go for full sequencing, you would have to jumble restriction
sites.

 if that would be theoretically possible?  Fun times.

Theoretically, yes. It would kill you in no time, though. Also,
quantitative transfection in an adult is a lot to ask for. Killer vector
indeed.

-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO  : N48 10'07'' E011 33'53'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3




secure IRC/messaging successor

2001-08-30 Thread Eugene Leitl


Gale http://www.gale.org/ seems a well thought out infrastructure. Is the
consensus this is it, or have I missed any alternatives?

TIA,

-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO  : N48 10'07'' E011 33'53'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3




'PARASITIC GRID' COULD UNDERMINE WIRELESS REVENUES (fwd)

2001-08-28 Thread Eugene Leitl


an idiot wrote:

 Would seem it's high time trying to get Mojo and Freenet to do onion
 routing, preparing for the wireless wave. Here's some work in progress
 on XML-RPC interface to Mojo (identical to Freenet).

doh, forgot the URL:
http://cvs.sourceforge.net/cgi-bin/viewcvs.cgi/~checkout~/mojonation/evil/hackerdocs/LJ_article.html?content-type=text/html




'PARASITIC GRID' COULD UNDERMINE WIRELESS REVENUES

2001-08-28 Thread Eugene Leitl


Would seem it's high time trying to get Mojo and Freenet to do onion
routing, preparing for the wireless wave. Here's some work in progress on
XML-RPC interface to Mojo (identical to Freenet).

Date: Tue, 28 Aug 2001 14:24:15 +0200
To: Eugene Leitl [EMAIL PROTECTED]
Subject: Fwd: NewsScan Daily, 27 August 2001 (Above The Fold)


'PARASITIC GRID' COULD UNDERMINE WIRELESS REVENUES
An underground movement is afoot to deploy free wireless access zones in
urban areas, building on the increasing popularity of wi-fi or 802.11b
technology -- a standard for wireless Ethernet that works on an unlicensed
portion of the spectrum. The movement, dubbed the parasitic grid by some,
is already thriving in New York, Seattle, San Francisco, Portland, British
Columbia and London. The concept is based on community-minded volunteers,
who offer other Internet users within a certain range -- say 300 feet -- a
free ride on their wireless connections. The trend is not going unnoticed
by the large wireless carriers in these cities. We are aware of the free
services springing up and are considering 802.11b wireless access as well,
not in place of currently scheduled rollouts but as an adjunct, says an
ATT Wireless spokesman. Meanwhile, so-called aggregators have developed
software that resides in the mobile device that can find any available
network and connect the user to it, creating, in effect, metropolitan-wide
free networks that may ultimately compete with fee-based wireless services.
It would even be able to say, 'Here is a list of the networks found' and
indicate which are free and which charge a fee, says an official at a
company that provides 802.11b services at hotels and airports. (InfoWorld 24
Aug 2001)
http://www.infoworld.com/articles/hn/xml/01/08/24/010824hnfreewireless.xml

[...]




Re: Jim Bell sentenced to 10 years in prison

2001-08-28 Thread Eugene Leitl

On Tue, 28 Aug 2001, Eric Cordian wrote:

 The larger question is what are we going to do about it?  Somehow
 Cypherpunks Write Code doesn't quite rise to the level of an
 appropriate response to these pigfuckers.

The most appropriate response would seem to implement

http://zolatimes.com/v2.26/jimbell.htm

with the judge being the first name on the list. Getting digicash to work
would be a real starter, anynymous donation submission infrastructure
another step.

Of course, cypherpunks are either too lazy, or to chicken for that.

Eugene -- both




  1   2   >