cyphrpunk wrote:
The main threat to
this illegal but widely practiced activity is legal action by
copyright holders against individual traders. The only effective
protection against these threats is the barrier that could be provided
by anonymity. An effective, anonymous file sharing network
From: R.A. Hettinga [EMAIL PROTECTED]
Sent: Oct 25, 2005 8:34 AM
To: cryptography@metzdowd.com, [EMAIL PROTECTED]
Subject: On the orthogonality of anonymity to current market demand
...
That is to say, your analysis conflicts with the whole trend towards
T-0 trading, execution, clearing and
Title: THE NATIONALIST ALLIANCE WEEK
THE NATIONALIST
ALLIANCE WEEK
Speak The Truth And Fear
No-one
www.allnationalist.com email: [EMAIL PROTECTED]
in a week where we see rioting
in Birmingham over sexual attacks commited by asian men and the mass media
coverage
we see that a program in
Is it possible that Skype doesn't use RSA encryption? Or if they do, do
they do it without using any padding, and is that safe?
No ,Skype use RSA encryption:
Each party contributes 128 random bits toward the 256-bit session key.
The contributions are exchanged as RSA cryptograms. The two
Link: http://slashdot.org/article.pl?sid=05/10/26/0424211
Posted by: ScuttleMonkey, on 2005-10-26 10:26:00
denis-The-menace writes According to an article from newscientist,
scientists have devised a system to [1]use microwave energy for
surveillance. If people are speaking inside the
Yo Variola! Did you notice the date stamp on that post?
Did you do a stint on Survivor or something?
Or as I said to the short-lived Tom Veil, What, no Starbucks near your
Unabomber shack?
-TD
From: Major Variola (ret) [EMAIL PROTECTED]
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
Subject:
--- Travis H. [EMAIL PROTECTED] wrote:
[snip]
Another issue involves the ease of use when switching between a
[slower] anonymous service and a fast non-anonymous service. I have
a
tool called metaprox on my website (see URL in sig) that allows you
to
choose what proxies you use on a
On Mon, 24 Oct 2005, cyphrpunk wrote:
Is it possible that Skype doesn't use RSA encryption? Or if they do,
do they do it without using any padding, and is that safe?
You may want to read the report itself:
http://www.skype.com/security/files/2005-031%20security%20evaluation.pdf
and
Dear user cypherpunks,
You have successfully updated the password of your Minder account.
If you did not authorize this change or if you need assistance with your account, please contact Minder customer service at: [EMAIL PROTECTED]
Thank you for using Minder!
The Minder Support Team
I'm one of those that believes that agrees with Louis Brandice's dissenting
opinion about the constitutionality of wiretaps. That they violate the
privacy of those parties who call or are called by the party being wiretapped.
I have written on this in 2002/2003. There seem to be at least two
Date sent: Tue, 25 Oct 2005 00:38:36 +0200
To: cyphrpunk [EMAIL PROTECTED]
Copies to: John Kelsey [EMAIL PROTECTED], Ian G [EMAIL
PROTECTED],
[EMAIL PROTECTED], cryptography@metzdowd.com, [EMAIL PROTECTED]
From: [EMAIL
--
Steve Schear [EMAIL PROTECTED]
Yes, but unfortunately it is not clear at all that
courts would find the opposite, either. If a lawsuit
names the currency issuer as a defendant, which it
almost certainly would, a judge might order the
issuer's finances frozen or impose other measures
John Kelsey wrote:
From: cyphrpunk [EMAIL PROTECTED]
Digital wallets will require real security in user PCs. Still I don't
see why we don't already have this problem with online banking and
similar financial services. Couldn't a virus today steal people's
passwords and command their banks to
--
John Kelsey
What's with the heat-death nonsense? Physical bearer
instruments imply stout locks and vaults and alarm
systems and armed guards and all the rest, all the way
down to infrastructure like police forces and armies
(private or public) to avoid having the biggest gang
end up
On Wed, 26 Oct 2005, JЖrn Schmidt wrote:
--- Travis H. [EMAIL PROTECTED] wrote:
[snip]
Another issue involves the ease of use when switching between a
[slower] anonymous service and a fast non-anonymous service. I
have a tool called metaprox on my website (see URL in sig) that
allows
On 2005-10-26T08:21:08+0200, Stephan Neuhaus wrote:
cyphrpunk wrote:
The main threat to
this illegal but widely practiced activity is legal action by
copyright holders against individual traders. The only effective
protection against these threats is the barrier that could be provided
Travis H. wrote:
Part of the problem is using a packet-switched network; if we had
circuit-based, then thwarting traffic analysis is easy; you just fill
the link with random garbage when not transmitting packets.
OK so far ...
There are two problems with this; one, getting
enough
Hello,
At 25/10/05 07:18, cyphrpunk wrote:
http://www.hbarel.com/Blog/entry0006.html
I believe that for anonymity and pseudonymity technologies to survive
they have to be applied to applications that require them by design,
rather than to mass-market applications that can also do
Travis H. wrote:
Part of the problem is using a packet-switched network; if we had
circuit-based, then thwarting traffic analysis is easy; you just fill
the link with random garbage when not transmitting packets. I
considered doing this with SLIP back before broadband (back when my
friend
On Tue, 2005-10-25 at 23:40 -0500, Travis H. wrote:
Many of the anonymity protocols require multiple participants, and
thus are subject to what economists call network externalities. The
best example I can think of is Microsoft Office file formats. I don't
buy MS Office because it's the best
Thanks for notifying us with your weight problem concerns.
Our 2 Nutritionists are online 24 hours a day to answer your questions or
concerns.
Charles Hernandez and Pamela King have been nutritionists for the past
10 years and are recommending that you try a 2-3 month supply of hoodia.
At 03:15 PM 6/8/04 -0400, Tyler Durden wrote:
Well, it's interesting to consider how/if that might be possible. SONET
scrambles the payload prior to transmission..adding an additional
crypto
layer prior to transmission would mean changing the line rate, so
probably a
no-no.
Tyler, one can
Yo Variola! Did you notice the date stamp on that post?
Did you do a stint on Survivor or something?
Or as I said to the short-lived Tom Veil, What, no Starbucks near your
Unabomber shack?
-TD
From: Major Variola (ret) [EMAIL PROTECTED]
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
Subject:
cyphrpunk wrote:
The main threat to
this illegal but widely practiced activity is legal action by
copyright holders against individual traders. The only effective
protection against these threats is the barrier that could be provided
by anonymity. An effective, anonymous file sharing network
Part of the problem is using a packet-switched network; if we had
circuit-based, then thwarting traffic analysis is easy; you just fill
the link with random garbage when not transmitting packets. I
considered doing this with SLIP back before broadband (back when my
friend was my ISP). There are
From: R.A. Hettinga [EMAIL PROTECTED]
Sent: Oct 25, 2005 8:34 AM
To: cryptography@metzdowd.com, [EMAIL PROTECTED]
Subject: On the orthogonality of anonymity to current market demand
..
That is to say, your analysis conflicts with the whole trend towards
T-0 trading, execution, clearing and
On Mon, 24 Oct 2005, cyphrpunk wrote:
Is it possible that Skype doesn't use RSA encryption? Or if they do,
do they do it without using any padding, and is that safe?
You may want to read the report itself:
http://www.skype.com/security/files/2005-031%20security%20evaluation.pdf
and
--- Travis H. [EMAIL PROTECTED] wrote:
[snip]
Another issue involves the ease of use when switching between a
[slower] anonymous service and a fast non-anonymous service. I have
a
tool called metaprox on my website (see URL in sig) that allows you
to
choose what proxies you use on a
If you have
to be that confident in your computer security to use the payment
system, it's not going to have many clients.
Maybe the trusted computing platform (palladium) may have something to
offer after all, namely enabling naive users to use services that
require confidence in their own
Is it possible that Skype doesn't use RSA encryption? Or if they do, do
they do it without using any padding, and is that safe?
No ,Skype use RSA encryption:
Each party contributes 128 random bits toward the 256-bit session key.
The contributions are exchanged as RSA cryptograms. The two
John Kelsey wrote:
From: cyphrpunk [EMAIL PROTECTED]
Digital wallets will require real security in user PCs. Still I don't
see why we don't already have this problem with online banking and
similar financial services. Couldn't a virus today steal people's
passwords and command their banks to
I'm one of those that believes that agrees with Louis Brandice's dissenting
opinion about the constitutionality of wiretaps. That they violate the
privacy of those parties who call or are called by the party being wiretapped.
I have written on this in 2002/2003. There seem to be at least two
On 2005-10-26T08:21:08+0200, Stephan Neuhaus wrote:
cyphrpunk wrote:
The main threat to
this illegal but widely practiced activity is legal action by
copyright holders against individual traders. The only effective
protection against these threats is the barrier that could be provided
On Wed, 26 Oct 2005, JЖrn Schmidt wrote:
--- Travis H. [EMAIL PROTECTED] wrote:
[snip]
Another issue involves the ease of use when switching between a
[slower] anonymous service and a fast non-anonymous service. I
have a tool called metaprox on my website (see URL in sig) that
allows
--
Steve Schear [EMAIL PROTECTED]
Yes, but unfortunately it is not clear at all that
courts would find the opposite, either. If a lawsuit
names the currency issuer as a defendant, which it
almost certainly would, a judge might order the
issuer's finances frozen or impose other measures
--
John Kelsey
What's with the heat-death nonsense? Physical bearer
instruments imply stout locks and vaults and alarm
systems and armed guards and all the rest, all the way
down to infrastructure like police forces and armies
(private or public) to avoid having the biggest gang
end up
Travis H. wrote:
Part of the problem is using a packet-switched network; if we had
circuit-based, then thwarting traffic analysis is easy; you just fill
the link with random garbage when not transmitting packets.
OK so far ...
There are two problems with this; one, getting
enough
Hello,
At 25/10/05 07:18, cyphrpunk wrote:
http://www.hbarel.com/Blog/entry0006.html
I believe that for anonymity and pseudonymity technologies to survive
they have to be applied to applications that require them by design,
rather than to mass-market applications that can also do
39 matches
Mail list logo