[EMAIL PROTECTED] wrote:
Calling a system whose central premise is "there shall
be no private
data bases" a "noble goal" is precisely like calling
communism a
noble goal.
(Mind you, many analyses of communism start with this
approach, e.g.,
"While communism is a noble goal, it cannot work,
Gil Hamilton wrote:
I guess that's just the government demonstrating the point I'm making,
namely that it can take away at any time what it has given.
it could also be the big bully showing the wannabe bully who's got more
muscle.
OK, now I've got your definition of "right". It comes
Jim Choate wrote:
As of today the current toad.com member list is below.
I can't believe that 1) the who command is enabled on toad, and 2) that you'd
post all these addresses to the list. Talk about a massive invasion of privacy.
--PH
_
Get Your
To: All staff, Los Alamos National Laboratory
From: Bill Richardson, Secretary of Energy
Dear staff members:
Due to an unfortunate overreaction by the Republican Congress to our
minor difficulties
in the security area, we're being forced to tighten up just a bit.
Effective Monday:
1. The
This is precious. Thanks to Patric Henry I caught this (Choate
being filtered out.)
I always wanted to be the Big Brother, and envied NSA and
others - but now I have my OWN list of 812 cpunk subscribers.
Think of possibilities.
Thank you, Choate.
(Hello, Emmanuel Motchane ! So many euros and
PLEASE SAVE THIS WELCOME MESSAGE! PLEASE READ THIS
MESSAGE - IT CONTAINS ANSWERS TO MOST COMMON QUESTIONS!
Welcome to internetday-text!
SUBSCRIBING:
Send a blank message to:
Please direct feedback and/or questions you have to
[EMAIL PROTECTED] , do not just reply to the brainteaser
newsletter.
Today's brainteaser:
Can you recognize this song title re-written with extraneous
verbiage?
Homo sapiens preceded with commercially acceptable mixtures
typically consisting
To whom it may concern,
My name is Wesley Booth, I'm currently twenty years of age and
have completed two years of University studying Environmental
Science.
Having lived in Papua New Guinea(Bougainville) for 6 1/2 years
of my life, I had two leave due to the war in mid 1990. I've had a
Indianapolis recently passed a law (ordinance?) that business owners may
not allow children under 18 to play video games with violent or sexual
content unless accompanied by a parent or guardian. Any said games must
be out-of-sight by said children, else said owner will be forced
to
Hello,
I'm hoping someone out there can point me in the direction of
explanations for remailer property strings, like the following
example:
$remailer{"shinn"} = "[EMAIL PROTECTED] cpunk mix pgp
pgponly remix latent hash cut test ek ekx esub inflt50 rhop20 reord
post klen500";
Now I know what
That's right a USA business line that doesn't have to be installed in your
building.
= Run an anonymous business with a phone number that isn't traced back to
you!
= Classified Ads, offshore businesses, mail order, etc.
= Outsource your phone system
= Automatically screen your calls
=
You wrote:
Now I know what most of these strings mean since
http://www.publius.net/rlist.html has a breakdown of most of them.
However, some of the strings are not defined. These in particular
have me scratching my head: ekx, esub, inflt50, rhop20 and klen500.
The Reliable documentation
I am in the unfortunate situation of having to run a server in a
machineroom which I don't completely trust.
At 05:20 PM 7/18/00 -0900, Paul Holman wrote
Some folks at the Cypherpunks meetings have been working on projects
using the Dallas Semi iButton, which is a cheap FIPS140-1 Level 1
I found a great new Internet company - CashFiesta.com that has created a product that
everyone can benefit from. They pay you while you work or play on your computer. They
even pay you when your friends are using their computers. It's free to join and your
privacy
is completely protected.
george how do i get my own spam email address
15 matches
Mail list logo