Now where was that ssz bigot?
On Sat, 18 Nov 2000, Neil Johnson wrote:
Is there something wrong with ssz.com. I haven't gotten any list mail and I
can get to the site.
Thanks.
Neil M. Johnson
[EMAIL PROTECTED]
http://www.interl.net/~njohnson
PGP Key Finger Print: 93C0 793F B66E A0C7
At 12:08 PM + 11/19/2000, Perry commented:
[I see you've never paid attention to how easy it is to get a
certificate, Ben. I suspect I could get one in the name of any company
with about 20 minutes of unskilled forgery. The level of checking done
is trivial. This wouldn't be a problem except
At 12:10 PM -0500 on 11/20/00, Arnold G. Reinhold wrote:
If CAs
included a financial guarantee of whatever it is they are asserting
when they issue a certificate, then all these problems would go away.
Right.
Like Ellison (and Metzger :-)) have said for years now, the only
"assertions"
as pure asside ... any SSL server certificate signed by any CA in my browswer's
CA list is acceptable.
for list of current valid signing CA's in a typical browswer see:
http://www.garlic.com/~lynn/aepay4.htm#comcert14
http://www.garlic.com/~lynn/aepay4.htm#comcert16
my broswer makes no
On Mon, 20 Nov 2000 [EMAIL PROTECTED] wrote:
as pure asside ... any SSL server certificate signed by any CA
in my browswer's CA list is acceptable.
my broswer makes no distinction on which CA signed what ...
and/or even what they signed. If I get a certificate signed
by any CA in my
On Sun, 19 Nov 2000 [EMAIL PROTECTED] wrote:
When the user goes to www.amazon.com, they get a plaintext http redirect
to amazon.hackeddomain.com, which does check.
Still confused...
The original connection to www.amazon.com is an SSL connection, right?
We are following an https: URL?
However the recounts work out I think it's pretty clear that in the
statitical sense we have a tie. The uncertainties are far larger than
the measured difference. Even the national totals are within about 0.1%.
This is probably 1 or 2 orders of magnitude less than the percentage of
disqualified
On Sun, Nov 19, 2000 at 08:56:31AM -0800, Ernest Hua wrote:
What is the likelihood that the public just ignores this
given the ruckus over the election?
Very high.
On Sun, Nov 19, 2000 at 12:00:29PM -0800, James A. Donald wrote:
--
At 01:29 PM 11/19/2000 -0500, [EMAIL PROTECTED] wrote:
Found in Usenet:
#I don't know if Reno is a traitor, but consider this:
#Between 1992 and 1997, there were approximately 2,500
#national
If this has been covered already, appologies..
In regards to comments about BGP and OSPF being used to re-route
traffic, this can be done easily with a TACACS+ or RADIUS profile.
These service authenticate users, and allocate netblocks/routes to
connections.
This means that they alter
At 1:25 PM -0500 11/20/00, R. A. Hettinga wrote:
At 12:10 PM -0500 on 11/20/00, Arnold G. Reinhold wrote:
If CAs
included a financial guarantee of whatever it is they are asserting
when they issue a certificate, then all these problems would go away.
Right.
Like Ellison (and Metzger
Jim Burnes wrote:
"I dont really have any recourse," he said.
Ummm, let me think. Move to a different ISP/NSP idiot!
I think the point here is that almost every ISP has weasel-wording in
their TOS which permits them to terminate service for any reason, or for
no reason
On Mon, 20 Nov 2000 [EMAIL PROTECTED] wrote:
as pure asside ... any SSL server certificate signed by any CA in my browswer's
CA list is acceptable.
for list of current valid signing CA's in a typical browswer see:
http://www.garlic.com/~lynn/aepay4.htm#comcert14
On Mon, 20 Nov 2000 [EMAIL PROTECTED] wrote:
So what is the acceptable threshold of errors? 1 in a 100? What if
that 1 is the invalid certificate that allows your bank account to be
compromised. CA's should either be 100% or 0% trustworthy. I do agree that
there needs to be a protocol
[EMAIL PROTECTED] wrote:
On Sat, 18 Nov 2000 [EMAIL PROTECTED] wrote:
Bram Cohen [EMAIL PROTECTED] writes:
Unless that problem is fixed, man in the middle is hardly made more
difficult - for example, Mallory could break into some random machine on
the net and steal it's
of
certificates for mismatches etc that might reveal an attempt at publishing a
fraudulent certificate.
Gripp
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On
Behalf Of Ray Dillinger
Sent: Monday, November 20, 2000 11:41 AM
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re
On Mon, 20 Nov 2000, Arnold G. Reinhold wrote:
Perry's last sentence gets to the heart of the matter. If CAs
included a financial guarantee of whatever it is they are asserting
when they issue a certificate, then all these problems would go away.
They aren't going to.
-Bram Cohen
[EMAIL PROTECTED] wrote:
actually ... not really ... this was discussed early this summer as to what they
actually check ... and how trivial it is to fabricate necessary details to pass
such checking
random ref:
http://www.garlic.com/~lynn/aadsmore.htm#client3
in general it is
PROTECTED], [EMAIL PROTECTED],
[EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: Public Key Infrastructure: An Artifact...
[EMAIL PROTECTED] wrote:
actually ... not really ... this was discussed early this summer as to what
they
actually check ... and how trivial it is to fabricate
Of relevance to SSL and trust in DNS...
Even without stealing keys, there are unconventional ways of
circumventing SSL server authentication. That is, pretending to be an
SSL server that you are not.
For instance, a client might forget to verify in a resumed SSL session
that the server
On Sun, 19 Nov 2000, Steve Schear wrote:
A PC, using off-the-shelf HW, is capable of filtering a full 100 Mbps link
(144K packets/sec) as demonstrated by the BlackICE products
http://www.networkice.com/html/blackice_sentry.html
At 03:20 AM 11/20/00 +, Jim Dixon wrote:
Third, even if
oh yes, as to the other kinds of certificates.
basically this is an issue of trust establishment. there are various forms of
trust establishment, advertisement, brand, word-of-mouth, previous history, etc
... not just BBB or consumer report like stuff.
Transactions are highly skewed ... with
PROTECTED] on 11/19/2000 04:08:39 AM
To: Lynn Wheeler/CA/FDMS/FDC@FDC
cc: Bram Cohen [EMAIL PROTECTED], [EMAIL PROTECTED],
[EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED],
[EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: Public Key Infrastructure: An Artifact...
[EMAIL
--
At 01:29 PM 11/19/2000 -0500, [EMAIL PROTECTED] wrote:
Found in Usenet:
#I don't know if Reno is a traitor, but consider this:
#Between 1992 and 1997, there were approximately 2,500
#national security wiretaps requested by the FBI. Only one
#of these 2,500
Title: Conspiracy Theory #187389 (RE: Carnivore All-Consuming)
What is the likelihood that the public just ignores this
given the ruckus over the election?
Ern
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Friday, November 17, 2000 10:46 PM
To: [EMAIL
On Sat, 18 Nov 2000 [EMAIL PROTECTED] wrote:
EPIC FOIA...
http://www.latimes.com/wires/20001117/tCB00V0387.html
WASHINGTON--The FBI's controversial e-mail surveillance tool,
known as Carnivore, can retrieve all communications that go
through an Internet service -far more than FBI
Neil Johnson wrote:
Is there something wrong with ssz.com. I haven't gotten any list mail
and I
can get to the site.
ICANN action.
Jim has become dangerous.
- Original Message -
From: "Me" [EMAIL PROTECTED]
IIRC, and I probably don't, the Florida constitution was
recently
amended so as to make the positio9n of Secretary of State an
elected one.
Er, make that appointed. I don't know what the 9 means.
At 06:21 PM 11/19/00 +, Jim Dixon wrote:
On Sat, 18 Nov 2000 [EMAIL PROTECTED] wrote:
EPIC FOIA...
http://www.latimes.com/wires/20001117/tCB00V0387.html
WASHINGTON--The FBI's controversial e-mail surveillance tool,
known as Carnivore, can retrieve all communications that go
[EMAIL PROTECTED] wrote:
#Except that the legal motion was filed by the Reps, not the Dems,
#originally. They brought it on them-damn-selves. Idiots.
No one asked the Florida Supreme Court to freeze the certification.
My current opinion is that they should take the .2% error rate
Mr. May:
At 5:31 PM -0500 11/17/00, David Honig wrote:
At 03:05 PM 11/17/00 -0500, Tim May wrote:
years, many decades, to publish learned articles on chads, pregnant
chads,
And despite all the talk, chad pregnancy is still a problem in America
today. You know all those chads are just going to
To: "'Digital Bearer Settlement List'" [EMAIL PROTECTED],
[EMAIL PROTECTED], [EMAIL PROTECTED]
cc:(bcc: Lynn Wheeler/CA/FDMS/FDC)
Subject: RE: Schneier: Why Digital Signatures are not Signatures (was
Re:CRYPTO-GRAM, November 15, 2000)
The Word example actually
--
At 9:07 AM -0800 11/17/00, Marshall Clow wrote:
900 people -- $186M. That's $206K each. That's a lot of money to
put into a 'bank'.
Tim May:
And a lot of money for "Christian Patriots."
Not to belittle either Christians or Patriots, but folks like this
typically have
Bram Cohen wrote:
On Sat, 18 Nov 2000, Ben Laurie wrote:
[EMAIL PROTECTED] wrote:
In any case, the domain name infrastructure has been looking at ways to beef up
the integrity of its operation ... like having public keys registered as part of
domain name registration.
How
I did a traceroute (well, mswindoze tracert, anyway), and got a
"destination unreachable" from a machine at realtime.net in Austin.
SSZ has often been unreliable; I think it's connected by ISDN,
and it's raining down in Texas.
At 06:30 PM 11/18/00 -0600, Neil Johnson wrote:
Is there something
Bram Cohen [EMAIL PROTECTED] writes:
Unless that problem is fixed, man in the middle is hardly made more
difficult - for example, Mallory could break into some random machine on
the net and steal it's public key, then hijack local DNS and when someone
goes to amazon.com redirect them to
Bram Cohen [EMAIL PROTECTED] writes:
Unless that problem is fixed, man in the middle is hardly made more
difficult - for example, Mallory could break into some random machine on
the net and steal it's public key, then hijack local DNS and when someone
goes to amazon.com redirect them to
ot; [EMAIL PROTECTED]
To: "Neil Johnson" [EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Saturday, November 18, 2000 7:03 PM
Subject: Re: ssz.com network trouble
I did a traceroute (well, mswindoze tracert, anyway), and got a
"destination unreachable" from a machine at realtime.net
[EMAIL PROTECTED] wrote:
there are issues about authentication ... like conceptual frame-works of
something you have, something you know, and something you are.
No, no! Don't go there! I am fond of the things that I am and do not
want to encourage people to steal bits of me.
Two ways is
On Sat, 18 Nov 2000, Ben Laurie wrote:
Bram Cohen wrote:
And if you build a protocol which is a pain to use, noone will use it.
What, like SSL, for example?
SSL is not a pain to use, and it isn't effective against man in the middle
attacks, since an attacker could simply make the end
PROTECTED] (bcc: Lynn
Wheeler/CA/FDMS/FDC)
Subject: Re: Public Key Infrastructure: An Artifact...
On Sat, 18 Nov 2000, Ben Laurie wrote:
Bram Cohen wrote:
And if you build a protocol which is a pain to use, noone will use it.
What, like SSL, for example?
SSL is not a pain to use
On Sat, 18 Nov 2000 [EMAIL PROTECTED] wrote:
note also that current SSL infrastructure is vulnerable to things like domain
name hijacking; aka, at least part of SSL protocol is to make sure that you
really are talking to the host that you think you are talking to ... i.e. the
SSL certificate
[EMAIL PROTECTED] wrote:
note also that current SSL infrastructure is vulnerable to things like domain
name hijacking; aka, at least part of SSL protocol is to make sure that you
really are talking to the host that you think you are talking to ... i.e. the
SSL certificate contains
Bram Cohen wrote:
On Sat, 18 Nov 2000 [EMAIL PROTECTED] wrote:
note also that current SSL infrastructure is vulnerable to things like domain
name hijacking; aka, at least part of SSL protocol is to make sure that you
really are talking to the host that you think you are talking to ...
On Sat, 18 Nov 2000, Ben Laurie wrote:
Bram Cohen wrote:
Unless that problem is fixed, man in the middle is hardly made more
difficult - for example, Mallory could break into some random machine on
the net and steal it's public key, then hijack local DNS and when someone
goes to
Bram Cohen wrote:
On Sat, 18 Nov 2000, Ben Laurie wrote:
Bram Cohen wrote:
Unless that problem is fixed, man in the middle is hardly made more
difficult - for example, Mallory could break into some random machine on
the net and steal it's public key, then hijack local DNS and
The problem with all of these things is that they are still based on
creating an association between a domain name and a key, when in fact what
you want is an association between some abstract concept of a counterparty
which exists in an end user's mind (like, say, amazon) and the ownership
On Sat, 18 Nov 2000, Ben Laurie wrote:
Bram Cohen wrote:
Unless that problem is fixed, man in the middle is hardly made more
difficult - for example, Mallory could break into some random machine on
the net and steal it's public key, then hijack local DNS and when someone
goes
Schneier's piece does a good job of listing some of the problems with
digital signatures, but he really throws the baby out with the
bathwater when he concludes that "Digital signatures aren't
signatures." This has been his habit lately. The book _Secrets and
Lies_ is filled with plenty of
At 11:52 AM -0500 11/17/00, [EMAIL PROTECTED] forwarded:
http://www.foxnews.com/national/1117/d_ap_1117_84.sml
#
#Group accused of operating bank to defraud IRS
#
#10.54 a.m. ET (1609 GMT) November 17, 2000
#
[snip]
#The illegal bank, operated out a warehouse just east of
To: "'Digital Bearer Settlement List'" [EMAIL PROTECTED],
[EMAIL PROTECTED], [EMAIL PROTECTED]
cc:(bcc: Lynn Wheeler/CA/FDMS/FDC)
Subject: RE: Schneier: Why Digital Signatures are not Signatures (was
Re:CRYPTO-GRAM, November 15, 2000)
The Word example actually
-
From: "Jim Burnes" [EMAIL PROTECTED]
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Friday, November 17, 2000 1:59 AM
Subject: Re: Florida Supreme Court freezes certification
On Fri, 17 Nov 2000, [EMAIL PROTECTED] wrote:
Florida Supreme Court freezes certification.
(That's it
At 11:52 AM 11/17/00 -0500, [EMAIL PROTECTED] wrote:
#The illegal bank, operated out a warehouse just east of Portland,
#offered customers anonymous banking transactions to conceal income
#and assets, according to IRS Special Agent Kathleen Sulmonetti.
#Nine hundred customers
As an aside ... AADS (http://www.garlic.com/~lynn/ ) relies on existing business
processes that provide secure bindings in account records ... just adding public
key digital signature to existing authentication processes for
non-face-to-face and/or face-to-face transactions (i.e. the meaning
...which brings us to
http://www.acs.ohio-state.edu/units/law/swire1/pscrypto.htm
Which is, mostly, based on Professor Peter Swire's opinion on the
cypherpunk "identity is bits" paradigm delivered at FC97, though apparently
edited some since then.
Not that I agree with him, at all, actually,
White Supremacist Tim "I'd like to see a race riot" May Moroned:
#Even if meant in jest, as a comment on the situation,
#it undermines the basic issue of law.
Like, "Needs killing."
On Sat, 11 Nov 2000, R. A. Hettinga wrote:
Conventional, hierarchical PKI, built around the ISO standard X.509, has
been, and will continue to be, a substantial failure. This paper examines
that form of PKI architecture, and concludes that it is a very poor fit to
the real needs of
On Thu, 16 Nov 2000 [EMAIL PROTECTED] wrote:
Bram Cohen writes:
In the vast majority of cases, preventing man in the middle attacks is a
waste of time.
In the sense that, in the vast majority of communications, there is no
man in the middle attack being mounted?
Yes.
Couldn't the
Keep in mind that the recent E-Sign bill is not about digital signatures.
It's about electronic signatures.
An electronic signature doesn't necessarily have to have anything to
do with cryptography. It is simply an electronic means of registering
consent. This may be as simple as a mouse
On Tue, Nov 14, 2000 at 01:00:02PM -0800, petro wrote:
The impression that I get is that in Merry Old England,
voting is done by county, whereas in this country voting is done by
district.
You are quite wrong.
For the benefit of those not familiar with the American system:
[EMAIL PROTECTED][SMTP:[EMAIL PROTECTED]] wrote:
"Trei, Peter" [EMAIL PROTECTED] wrote:
#
#It would take at least two faithless electors to
#swing the election to Gore. One would make it
#a dead heat, and send the decision to Congress.
Ping pong, ping pong.
Isn't a
My personal recommendation for purchasing software would be
SuSE Linux. It will nearly double the speed of your Win98
machine, and comes with word processors etc having greater
functionality and reliability than those you cite below.
At US$55. it's not a bad deal at all. Should be
On Wed, 15 Nov 2000, Mike Binas wrote:
Date: Wed, 15 Nov 2000 17:05:31 -0500
From: Mike Binas [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
can you please send me some credit card numbers.
5, 12, 7, 194
--
Yours,
J.A. Terranson
[EMAIL PROTECTED]
If Governments really want us to behave
ading Comprehension Counts".
Please re-read the sentence you quoted.
I do not claim that it would be fairly simple to eliminate
*all* voter fraud, simply to eliminate *most* of the current schemes,
and at only a fairly small increase over what is now spent.
Heck, in th
What's missing from the inventory is material which would
disclose other ongoing investigations.
And how to tell which material is of genuine interest and
which is listed for camouflage. The public docs never
disclose everything but are often used to misinform.
Jim is being used as bait.
Tim May [EMAIL PROTECTED] wrote:
I would not trust such a system, or be willing to take night school
classes in crypto and higher math in order to begin to understand
the system...so imagine what other folks will think.
It won't happen in our lifetimes. It may happen in European nations,
but
, it grossly misrepresents the
ballot issue. In fact, the "butterfly ballot" issue has been put on
the back burner by the Democrat vermin. They are putting their
efforts into re-sampling and re-counting and fiddling with the
ballots in Volusia County, Broward County, Dade County, and P
Mr. May:
At 10:20 AM + 11/14/00, Ken Brown wrote:
But maybe to redraw the boundaries. That's a common problem in Britain.
Every now and again some government (almost always Conservative, for
reasons to do with gerrymandering I suspect) gets it into its head that
it would be a Good Thing if
Harmon Seaver[SMTP:[EMAIL PROTECTED]] wrote:
Peter Trei wrote:
Also, if you want to get high tech, use a fluorescent dye mixed
with DMSO. It'll penetrate deep into the skin, and be visible under
UV (no cosmetic objections). I suspect it'd take weeks to wear off.
Can't
petro[SMTP:[EMAIL PROTECTED]] wrote:
Mr. May:
At 10:20 AM + 11/14/00, Ken Brown wrote:
But maybe to redraw the boundaries. That's a common problem in Britain.
Every now and again some government (almost always Conservative, for
reasons to do with gerrymandering I suspect) gets it
You have no idea who you just pissed off, do you?
On Tue, 14 Nov 2000, morris wrote:
i hate you
--
When you are having a bad day, and it seems like everybody is trying to
tick you off, remember that it takes 42 muscles to produce a frown, but
only 4 muscles to work the trigger of a good
On Tue, 14 Nov 2000 [EMAIL PROTECTED] wrote:
Jim.. I hate to tell you, but instructions for toad.com no longer exist on
that website ANYWHERE.
If you're talking,
http://einstein.ssz.com/cdr/index.html#subinst
then you can't read for shit. Let me quote (as I am looking at it real
time),
#---guy
Oops, now Tim will kill me.
Geigertronics wrote:
#Pot, Kettle, Black
A, I'm picking on bully TimMay.
Cry me a river.
Wasn't there some articles some time ago about Microsoft doing research into
Tempest/Van Eck (sp) radiation ? It was speculated at the time that they
were going include software to "broadcast" their serial numbers so that
illegal copies could be detected.
This was a suggestion by Markus Kuhn
Neil Johnson wrote:
Wasn't there some articles some time ago about Microsoft doing research into
Tempest/Van Eck (sp) radiation ? It was speculated at the time that they
were going include software to "broadcast" their serial numbers so that
illegal copies could be detected.
That was a
This reminds me of the Monty Python skit with the Cat Detector Van...
"never seen so many bleedin' areals"
I_Have_No_Name_At_ALL@Ether wrote:
#Am I the only one delighting in the irony of someone
#using the name Orwell having no better writing skills...
Ah, start out with an ad hominem attack. Such writing skills.
I_Have_No_Name_At_ALL@Ether wrote:
#I merely point out that those who
Yes. Whoever subscribed you to the list. It isn't a "site" it is a
mailing list.
[EMAIL PROTECTED] wrote:
Can anyone tell how I can stop receiving emails from your site?
Gerry Inman
At 5:08 AM -0500 11/12/00, [EMAIL PROTECTED] wrote:
Bush actually lost votes, a very bad omen for him.
Partially detached chads tend to come off during
repeated runs through the tabulating machinery.
This recount is occurring without a court order,
it's provided for by Florida law.
Vulis,
At 19:28 -0500 11/11/00, [EMAIL PROTECTED] wrote:
If I ever find out your real name and where you live,
I'm going to come over and deal with you
LOL, I believe his name is Tim May and he lives in California,
somewhere around San Francisco. It's not exactly a big secret...
--
"As nightfall
Getting a little testy are we Tim?
Perhaps Mac needs to be hunted down and killed.
At 10:19 PM -0600 11/12/00, Mac Norton wrote:
Tim, that's just stupid.
MacN
And I don't need your prissy comments about my choice of words.
--Tim May
On Sun, 12 Nov 2000, Tim May wrote:
Live and let
Declan McCullagh [EMAIL PROTECTED] writes:
Bell was not coerced into taking the plea agreement; if
anything, he seems to have more mental resources to fight
the system than other defendants I have interviewed.
Unless the plea agreement specifies a sentence equal to the upper range
that
nd tried to vote for Gore after discovering
they accidentally voted for Buchanan. We demand a re-vote!"
* Stage Four of the FUD Campaign, current: "We demand a manual
recount. Two counts, the first one and then the state-mandated
machine recount, are not enough. We are certain that if
At 11:56 PM 11/9/00 -0800, petro wrote:
a Democrat -- and that might well be so. But I doubt the
Federal Election Commision will think much of a ballot
where 'you vote Democratic -- we'll fill in the blank'
is a legitimate vote.
I would say the same for any 'candidate', but they Republican,
At 11/10/00, Trei, Peter wrote:
There are new articles, dated today, in the cryptome. There is
a gap from Nov 5 thru Nov 9. Maybe he went on vacation.
Naaah. John doesn't go on vacations. I would be surprised if he
sleeps.
According to well-informed US government sources
ate your candor - and am confident that your
analysis of the economics of the bandwidth required to foil traffic
analysis was correct - I do think there's perhaps some room for
improvement re keeping people up-to-date on what sort of protection
they can expect from Freedom and ZKS.
If you are ever
On Fri, 10 Nov 2000 [EMAIL PROTECTED] wrote:
White Supremacist Tim "I'd like to see a race riot" May Moroned:
White Supremacist Tim "I'd like to see a race riot" May Moroned:
Y'all don't get it do you? Tim's not a racist -- racists like
race riots because they're about race, and they take
- Original Message -
From: "Ray Dillinger" [EMAIL PROTECTED]
I'm reasonably sure that a three-way shooting war between
sports
car enthusiasts, denture wearers, and shoe salesmen would make
Tim
just as happy as a race riot. Almost anything that carries
fear
and confusion to the
At 2:05 PM -0500 on 11/9/00, Jim Burnes wrote:
I've seen first hand the intent and demeanor of St. Louis
politics and its not pretty.
Agreed. I don't know if it still is, but, say, 23 years ago, St. Louis was
a great place to be *from*.
According to the wife, it's a really nice
a Democrat -- and that might well be so. But I doubt the
Federal Election Commision will think much of a ballot
where 'you vote Democratic -- we'll fill in the blank'
is a legitimate vote.
I would say the same for any 'candidate', but they Republican,
Democrat, Libertarian or Dead.
White Supremacist Tim "I'd like to see a race riot" May Moroned:
#I sort of hope the hundreds of lawyers sent down to
#Florida by the Gore Team succeed in throwing the
#election to Gore.
Yes, the closely recounted votes will turn to Gore.
Gore will be president.
White Supremacist
Michael,
Of course we can help you. Please send us the name, address and telephone
number of your friend and we will be glad to help.
Yours in Science,
John
on 10.11.00 19:34, Michael Gilman at [EMAIL PROTECTED] wrote:
Hi,
Interesting information, do you have additional info. regarding
(As a followup, I should say I see "RIGHT" in the sample ballot, but that is
not a requirement, but a suggestion, and I'd argue the ballots that
were used probably have substantially the same form.)
-Declan
On Wed, 08 Nov 2000, R. A. Hettinga wrote:
At 10:36 AM -0500 on 11/8/00, [EMAIL PROTECTED] wrote:
If the citizens of Missouri chose to elect a deceased person as Senator,
I think
that's exactly what they should get.
Would that we were all so fortunate. Imagine, a whole senate full of dead
Wasn't there some articles some time ago about Microsoft doing research into
Tempest/Van Eck (sp) radiation ? It was speculated at the time that they
were going include software to "broadcast" their serial numbers so that
illegal copies could be detected.
I wonder how the Supreme is going to
On Wed, Nov 08, 2000 at 08:20:23PM -0800, Tim May wrote:
At 7:02 PM -0800 11/8/00, Evan wrote:
what the hell is the electoral college still doing in existance? it
should have gone out w/ unlimited presidential terms voting with
their conscience my ass voting in a partisan fashion is
At 5:24 PM -0500 11/9/00, [EMAIL PROTECTED] wrote:
Spooky Cypherpunk Niggar Tim May Moroned:
#And, of course, Palm County will _not_ be given a
#second chance to vote in this election. I guarantee it.
It's either that or the choice you liked even less.
Oh, I _like_ that other choice.
Declan the Reporter wrote:
#Al Gore is only 630 votes away from winning the election
Now they'll have to wait until all the absentee ballots
are counted. They had to be postedmarked by midnight.
Approximately 10 days away.
Surreal.
Ken Brown[SMTP:[EMAIL PROTECTED]] wrote:
OK you folks on the downwind side of the Atlantic, now your election is
over (even if you won't know the result for 3 weeks yet), can you take
your weather back? We've had a month of egregious rain and floods over
here and I'm sure it has to be
At 3:49 AM -0500 11/8/00, Declan McCullagh wrote:
With 99.9 percent of the votes in Florida counted, Al Gore is only
630 votes away from winning the presidency. The Florida Department
of State reports -- in numbers updated in the last five minutes --
that George W. Bush won 2,898,865 votes
401 - 500 of 1141 matches
Mail list logo