--
At 01:13 PM 4/26/2001 -0700, [EMAIL PROTECTED] wrote:
Here's a question for you Tim,
I'm sure you've read about BSE, scrapie, kuru, Creutzfeld-Jakob et al.
Generally they seem to be species-specific but there is some crossover.
Let's assume that feeding ground up livestock to livestock is
I believe at least one FOIA request has been pending for the exact
FAA rule. I wrote about this a few years ago and asked the FAA to
clarify its position, and I never heard anything authoritative.
In a recent article, I pointed out that the trend is shifting: You
can now use kiosk check-in in
--
At 03:37 PM 4/27/2001 -0400, Faustine wrote:
We should hold ourselves and our friends to HIGHER standards if we
want to get somewhere in the long run.
You could start by holding yourself to the standard of actually having some
faint glimmering of knowledge about the research areas of
I wrote:
---
If you plan to stay on this list, I think it's long past time that
you spend several hours reviewing past developments in these areas.
(You see, the quick review process is much better than the method
you suggested re: economics, that people read the main textbooks.
People
Tim said:
At 2:24 PM -0500 4/28/01, Aimee Farr wrote:
Reading the IMC gag order, Henson, the latest anonymous poster stuff, and
Tim et. al. beating my head in pavement
Since many forums don't allow for 'nymity, (or people just don't), what
about a protected/offshore self-destruct
At 9:43 PM -0500 4/28/01, Aimee Farr wrote:
Tim said:
* Keith Henson chose to post under his own name, to appear in person
at COS offices and recruiting centers, to picket, and so on. He was
not trying to be anonymous or pseudonymous, so your proposal above
would be pointless in his
At 10:09 PM -0400 4/28/01, John Young wrote:
Finally, reading the NYT account of Kerry's team killing the
Vietnamese is sobering. The article is much more disturbing
than accounts of it have portrayed. Kerry's and other killers'
spin over the years have induced an intolerance for reading
the
On Sat, Apr 28, 2001 at 06:32:08PM -0700, Tim May wrote:
None of the non-cryptographic methods are very resistant to legal,
technical, sniffing, and black bag attacks. And only multiply-chained
encrypted-at-each-stage messages, a la remailers, are adequate for
high-value messages.
If only