Re: Private Homes may be taken for public good

2005-06-24 Thread Thomas Shaddack
On Thu, 23 Jun 2005, Tyler Durden wrote: How do you take out a bulldozer? Anti-tank mine?

Re: Private Homes may be taken for public good

2005-06-24 Thread Thomas Shaddack
On Thu, 23 Jun 2005, Tyler Durden wrote: How do you take out a bulldozer? Anti-tank mine?

Re: Stash Burn?

2005-05-02 Thread Thomas Shaddack
On Mon, 2 May 2005, Tyler Durden wrote: yes, this reminded me of another brilliant idea. Why don't some cars have a little tiny furnace for stash destruction? If you've got an on-board stash and some Alabama hillbilly with a badge pulls you over, you just hit the button and have you're

Re: Your epapers, please?

2005-04-03 Thread Thomas Shaddack
On Thu, 31 Mar 2005, Major Variola (ret) wrote: At 10:08 PM 3/31/05 +0200, Eugen Leitl wrote: government plan to insert remotely readable chips in American passports, calling the chips [2]homing devices for high-tech muggers, So the market for faraday-cages for your passport will

Re: Your epapers, please?

2005-04-03 Thread Thomas Shaddack
On Thu, 31 Mar 2005, Major Variola (ret) wrote: At 10:08 PM 3/31/05 +0200, Eugen Leitl wrote: government plan to insert remotely readable chips in American passports, calling the chips [2]homing devices for high-tech muggers, So the market for faraday-cages for your passport will

Re: SHA1 broken?

2005-03-07 Thread Thomas Shaddack
FPGAs will have very hard time to be as fast as dedicated CPUs, frequency-wise. The FPGA structures have to be too generic, and are much bigger than specialized structures of the CPUs, so they have higher capacity, which limits the maximum achievable switching frequency. The length of the

RE: Team Building?? WIMPS!!

2005-02-14 Thread Thomas Shaddack
On Thu, 10 Feb 2005, Tyler Durden wrote: Well, I didn't say it would be easy. We'd definitely need to split up into teams...one to handle the alarm systems, Teamwork is essential here. Maybe attract a lightning with a rocket on a wire[1], the induced current will do the job with the sensors

RE: Team Building?? WIMPS!!

2005-02-13 Thread Thomas Shaddack
On Thu, 10 Feb 2005, Tyler Durden wrote: Well, I didn't say it would be easy. We'd definitely need to split up into teams...one to handle the alarm systems, Teamwork is essential here. Maybe attract a lightning with a rocket on a wire[1], the induced current will do the job with the sensors

Re: campus network admins

2004-11-04 Thread Thomas Shaddack
On Thu, 4 Nov 2004 [EMAIL PROTECTED] wrote: I recently violated the network user agreement (they packet-sniffed and got the username/password for my FTP server and didn't like what I was sharing with myself) and was informed by the admin that I am now 'under observation' and that they hope

Re: campus network admins

2004-11-04 Thread Thomas Shaddack
On Thu, 4 Nov 2004 [EMAIL PROTECTED] wrote: I recently violated the network user agreement (they packet-sniffed and got the username/password for my FTP server and didn't like what I was sharing with myself) and was informed by the admin that I am now 'under observation' and that they hope

Re: Airport insanity

2004-10-20 Thread Thomas Shaddack
On Tue, 19 Oct 2004, James A. Donald wrote: The US government should expose and condemn these objectionable practices, subvert moderately objectionable regimes, and annihilate more objectionable regimes. The pentagon should deprive moderately objectionable regimes of economic resources,

Re: Airport insanity

2004-10-20 Thread Thomas Shaddack
On Tue, 19 Oct 2004, James A. Donald wrote: The US government should expose and condemn these objectionable practices, subvert moderately objectionable regimes, and annihilate more objectionable regimes. The pentagon should deprive moderately objectionable regimes of economic resources,

RE: Airport insanity

2004-10-18 Thread Thomas Shaddack
On Mon, 18 Oct 2004, James A. Donald wrote: a. The probability ratios don't work out so that the overwhelming majority of people you throw off planes are innocent. Provided the number of people you throw off planes is rather small, I don't see the problem. It isn't a problem for

RE: Airport insanity

2004-10-18 Thread Thomas Shaddack
On Mon, 18 Oct 2004, James A. Donald wrote: Thomas Shaddack wrote: It isn't a problem for you until it happens to you. Who knows when being interested in anon e-cash will become a ground to blacklist *you*. I know when it will happen. It will happen when people interested in anon

Re: Airport insanity

2004-10-18 Thread Thomas Shaddack
On Mon, 18 Oct 2004, James A. Donald wrote: Sadre protected himself with Iraqi women and young children as human shields, showing that he expected the Pentagon to show more concern for Iraqi lives than he did. Pentagon protects their people by distance - being it by bombing from high

RE: Airport insanity

2004-10-18 Thread Thomas Shaddack
On Mon, 18 Oct 2004, James A. Donald wrote: a. The probability ratios don't work out so that the overwhelming majority of people you throw off planes are innocent. Provided the number of people you throw off planes is rather small, I don't see the problem. It isn't a problem for

RE: Airport insanity

2004-10-18 Thread Thomas Shaddack
On Mon, 18 Oct 2004, James A. Donald wrote: Thomas Shaddack wrote: It isn't a problem for you until it happens to you. Who knows when being interested in anon e-cash will become a ground to blacklist *you*. I know when it will happen. It will happen when people interested in anon

Re: Airport insanity

2004-10-18 Thread Thomas Shaddack
On Mon, 18 Oct 2004, James A. Donald wrote: Sadre protected himself with Iraqi women and young children as human shields, showing that he expected the Pentagon to show more concern for Iraqi lives than he did. Pentagon protects their people by distance - being it by bombing from high

Re: Airport insanity

2004-10-18 Thread Thomas Shaddack
On Sun, 17 Oct 2004, James A. Donald wrote: -- James A. Donald: If you really look like the shoe bomber, then you should have to drive, or use public transport. Thomas Shaddack Ever tried to drive to Europe? Or to Hawaii? Hard biscuit Do I interpret this statement

Re: Airport insanity

2004-10-17 Thread Thomas Shaddack
On Sun, 17 Oct 2004, James A. Donald wrote: -- James A. Donald: If you really look like the shoe bomber, then you should have to drive, or use public transport. Thomas Shaddack Ever tried to drive to Europe? Or to Hawaii? Hard biscuit Do I interpret this statement

Re: Airport insanity

2004-10-16 Thread Thomas Shaddack
On Sat, 16 Oct 2004, James A. Donald wrote: If you really look like the shoe bomber, then you should have to drive, or use public transport. Ever tried to drive to Europe? Or to Hawaii? Why airplanes don't count as a form of public transport? So by that rationale, every Arab should

Re: Airport insanity

2004-10-16 Thread Thomas Shaddack
On Sat, 16 Oct 2004, James A. Donald wrote: If you really look like the shoe bomber, then you should have to drive, or use public transport. Ever tried to drive to Europe? Or to Hawaii? Why airplanes don't count as a form of public transport? So by that rationale, every Arab should

Re: RFID Driver's licenses for VA

2004-10-09 Thread Thomas Shaddack
On Thu, 7 Oct 2004, Sunder wrote: So the cops and RFID h4x0rZ can know your true name from a distance. and since RFID tags, are what, $0.05 each, the terrorists and ID counterfitters will be able to make fake ones too... Whee! Given the power requirements for doing anything more than dumb

Re: RFID Driver's licenses for VA

2004-10-07 Thread Thomas Shaddack
On Thu, 7 Oct 2004, Sunder wrote: So the cops and RFID h4x0rZ can know your true name from a distance. and since RFID tags, are what, $0.05 each, the terrorists and ID counterfitters will be able to make fake ones too... Whee! Given the power requirements for doing anything more than dumb

Re: Foreign Travelers Face Fingerprints and Jet Lag

2004-10-03 Thread Thomas Shaddack
On Sun, 3 Oct 2004, J.A. Terranson wrote: (1) There are also a number of non-rebar+concrete walls in place to keep US citizens from leaving; Please elaborate?

Re: Foreign Travelers Face Fingerprints and Jet Lag

2004-10-03 Thread Thomas Shaddack
On Sun, 3 Oct 2004, J.A. Terranson wrote: (1) There are also a number of non-rebar+concrete walls in place to keep US citizens from leaving; Please elaborate?

Re: Geopolitical Darwin Awards

2004-09-21 Thread Thomas Shaddack
On Sun, 19 Sep 2004, James A. Donald wrote: I don't recall the American revolutionaries herding children before them to clear minefields, nor surrounding themselves with children as human shields. Using children to clear minefields has its logic. They are often not heavy enough to trigger

Re: potential new IETF WG on anonymous IPSec

2004-09-17 Thread Thomas Shaddack
On Thu, 16 Sep 2004, Major Variola (ret) wrote: At 02:17 PM 9/16/04 -0700, Joe Touch wrote: Except that certs need to be signed by authorities that are trusted. Name one. You don't have to sign the certs. Use self-signed ones, then publish a GPG signature of your certificate in a known

Re: potential new IETF WG on anonymous IPSec

2004-09-17 Thread Thomas Shaddack
On Thu, 16 Sep 2004, Major Variola (ret) wrote: At 02:17 PM 9/16/04 -0700, Joe Touch wrote: Except that certs need to be signed by authorities that are trusted. Name one. You don't have to sign the certs. Use self-signed ones, then publish a GPG signature of your certificate in a known

Re: Geopolitical Darwin Awards

2004-09-15 Thread Thomas Shaddack
On Tue, 14 Sep 2004, Major Variola (ret) wrote: How about Iran stating that they're messing with UF6, when Israel[1] is a known pre-emptive bomber of Facilities to the East? That's pretty much tickling the dragon. Maybe they are playing a different game. They couldn't use the eventually

Re: potential new IETF WG on anonymous IPSec

2004-09-15 Thread Thomas Shaddack
On Wed, 15 Sep 2004, Ian Grigg wrote: The whole point of the CA model is that there is no prior relationship and that the network is a wild wild west sort of place - both of these assumptions seem to be reversed in the backbone world, no? So one would think that using opportunistic

Re: Geopolitical Darwin Awards

2004-09-14 Thread Thomas Shaddack
On Tue, 14 Sep 2004, Major Variola (ret) wrote: How about Iran stating that they're messing with UF6, when Israel[1] is a known pre-emptive bomber of Facilities to the East? That's pretty much tickling the dragon. Maybe they are playing a different game. They couldn't use the eventually

Re: Forest Fire responsible for a 2.5mi *mushroom cloud*?

2004-09-13 Thread Thomas Shaddack
On Sun, 12 Sep 2004, J.A. Terranson wrote: No big deal? Who are they kidding? A 2-mile wide cloud is WAY too big to be caused by a single explosion, unless REALLY big. The forest fire claim sounds more plausible in this regard. An existing cloud could be used for masking, though. But a

Re: anonymous IP terminology (Re: [anonsec] Re: potential new IETF WG on anonymous IPSec (fwd from hal@finney.org))

2004-09-13 Thread Thomas Shaddack
On Sun, 12 Sep 2004, R. A. Hettinga wrote: From: Adam Back [EMAIL PROTECTED] Subject: Re: anonymous IP terminology (Re: [anonsec] Re: potential new IETF At ZKS we had software to remail MIME mail to provide a pseudonymous email. But one gotcha is that mail clients include MIME boundary

Re: whatever is necessary

2004-09-04 Thread Thomas Shaddack
On Fri, 3 Sep 2004, Major Variola (ret) wrote: Just heard Clinton's going in the hospital to get a heart. Clinton was a victim of an assassination attempt by junk food. McQaeda, the cardiovascular terrorist organization endangering the Developed World and deemed responsible for millions

Re: whatever is necessary

2004-09-03 Thread Thomas Shaddack
On Fri, 3 Sep 2004, Major Variola (ret) wrote: Just heard Clinton's going in the hospital to get a heart. Clinton was a victim of an assassination attempt by junk food. McQaeda, the cardiovascular terrorist organization endangering the Developed World and deemed responsible for millions

Re: gmail as a gigabyte of an external filesystem

2004-09-03 Thread Thomas Shaddack
On Sun, 29 Aug 2004, Thomas Shaddack wrote: Question for the crowd: How difficult it would be to write a suitable crypto engine as a plug-in module for FUSE itself? Then we could have support for encrypted files on any filesystem accessible through FUSE. --- http

Re: gmail as a gigabyte of an external filesystem

2004-09-03 Thread Thomas Shaddack
On Fri, 3 Sep 2004, Adam Back wrote: Don't know anything about EncFS, but you could also use loopback encryption on top of gmailfs. Just make a large file in gmail fs, and make a filesystem in it via loopback virtual block device-in-a-file. According to the shards of knowledge about GmailFS

Re: gmail as a gigabyte of an external filesystem

2004-09-02 Thread Thomas Shaddack
On Sun, 29 Aug 2004, Thomas Shaddack wrote: Question for the crowd: How difficult it would be to write a suitable crypto engine as a plug-in module for FUSE itself? Then we could have support for encrypted files on any filesystem accessible through FUSE. --- http

Suggestion

2004-08-18 Thread Thomas Shaddack
I hereby suggest to postpone the flamewars for the winter, when the weather brings the need of some spare waste heat. I thought we're above name-calling here. But perhaps it was just a quiet period and the current situation will rectify on its own in couple days, as it usually does. Besides,

Suggestion

2004-08-18 Thread Thomas Shaddack
I hereby suggest to postpone the flamewars for the winter, when the weather brings the need of some spare waste heat. I thought we're above name-calling here. But perhaps it was just a quiet period and the current situation will rectify on its own in couple days, as it usually does. Besides,

Re: yes, they look for stego, as a Hacker Tool

2004-08-15 Thread Thomas Shaddack
On Sat, 14 Aug 2004, Major Variola (ret) wrote: Argh. You misunderstood me. I don't want to find hash collisions, to create a false known hash - that is just too difficult. I want to make every file in the machine recognized as unidentifiable. No, I understood this. In a later post it was

Re: yes, they look for stego, as a Hacker Tool

2004-08-14 Thread Thomas Shaddack
On Fri, 13 Aug 2004, Major Variola (ret) wrote: Even if you map a particular hash into one of a million known-benign values, which takes work, there are multiple orthagonal hash algorithms included on the NIST CD. (Eg good luck finding values that collide in MD5 SHA-1 SHA-256

Re: yes, they look for stego, as a Hacker Tool

2004-08-14 Thread Thomas Shaddack
On Sat, 14 Aug 2004, Thomas Shaddack wrote: polymorphic or encrypted, but then they would be in the unknown category, along with user-created files. And programs :-) To be manually inspected by a forensic dude. Run a tool for signature changing preemptively, on *all* the files

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Thomas Shaddack
On Thu, 12 Aug 2004, Thomas Shaddack wrote: The NIST CDROM also doesn't seem to include source code amongst its sigs, so if you compile yourself, you may avoid their easy glance. A cool thing for this purpose could be a patch for gcc to produce unique code every time, perhaps using

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Thomas Shaddack
On Fri, 13 Aug 2004, Morlock Elloi wrote: A cool thing for this purpose could be a patch for gcc to produce unique code every time, perhaps using some of the polymorphic methods used by viruses. The purpose would be that they do not figure out that you are using some security program,

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Thomas Shaddack
On Fri, 13 Aug 2004, Sunder wrote: If you're suspected of something really big, or you're middle eastern, then you need to worry about PDA forensics. Otherwise, you're just another geek with a case of megalomania thinking you're important enough for the FedZ to give a shit about you. In

Re: yes, they look for stego, as a Hacker Tool

2004-08-13 Thread Thomas Shaddack
On Sat, 14 Aug 2004, Thomas Shaddack wrote: polymorphic or encrypted, but then they would be in the unknown category, along with user-created files. And programs :-) To be manually inspected by a forensic dude. Run a tool for signature changing preemptively, on *all* the files

Re: yes, they look for stego, as a Hacker Tool

2004-08-13 Thread Thomas Shaddack
On Fri, 13 Aug 2004, Major Variola (ret) wrote: Even if you map a particular hash into one of a million known-benign values, which takes work, there are multiple orthagonal hash algorithms included on the NIST CD. (Eg good luck finding values that collide in MD5 SHA-1 SHA-256

Re: Cryptome on ABC Evening News?

2004-08-13 Thread Thomas Shaddack
Can somebody record it in MPEG or DivX, please? :) It's difficult to get ABC News across the Atlantic without a dish. On Thu, 12 Aug 2004, R. A. Hettinga wrote: There's a teaser for tonight's 6:30 news about a wesite that publishes pipeline maps and the names and addresses of government

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Thomas Shaddack
On Fri, 13 Aug 2004, Sunder wrote: If you're suspected of something really big, or you're middle eastern, then you need to worry about PDA forensics. Otherwise, you're just another geek with a case of megalomania thinking you're important enough for the FedZ to give a shit about you. In

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Thomas Shaddack
On Fri, 13 Aug 2004, Tyler Durden wrote: And it seems to me to be a difficult task getting ahold of enough photos that would be believably worth encrypting. Homemade porn?

Re: yes, they look for stego, as a Hacker Tool

2004-08-13 Thread Thomas Shaddack
On Fri, 13 Aug 2004, Major Variola (ret) wrote: Any jpg which looks like noise will be of interest. And any stego program will make them look at your images (etc) more closely :-) Most of the programs they've hashed is so the forensic pigs can discount them. But they would find

Re: Forensics on PDAs, notes from the field

2004-08-12 Thread Thomas Shaddack
On Wed, 11 Aug 2004, Major Variola (ret) wrote: Obvious lesson: Steganography tool authors, your programs should use the worm/HIV trick of changing their signatures with every invocation. Much harder for the forensic fedz to recognize your tools. (As suspicious, of course). It should be

Re: Forensics on PDAs, notes from the field

2004-08-11 Thread Thomas Shaddack
On Wed, 11 Aug 2004, Major Variola (ret) wrote: Obvious lesson: Steganography tool authors, your programs should use the worm/HIV trick of changing their signatures with every invocation. Much harder for the forensic fedz to recognize your tools. (As suspicious, of course). It should be

Re: NSA Overcomes Fiber-Optic and Encryption

2004-08-11 Thread Thomas Shaddack
On Mon, 9 Aug 2004, John Young wrote: Excerpt below from a Baltimore Sun article of August 8, 2004. Some of it could be true, but. http://cryptome.org/dirnsa-shift.htm I think the correct title would be sidesteps instead of overcomes. It's a fundamentally different way (though the result is

Re: Michael Moore in Cambridge (download speech)

2004-08-11 Thread Thomas Shaddack
On Tue, 10 Aug 2004, Pete Capelli wrote: Being still currently undecided myself (although living in one of the 32 or so 'pre-ordained' states) I found this speech to be most cynical, opportunistic, divisive, and un-American ones I've listend to in awhile. Define un-American, please?

Re: On what the NSA does with its tech

2004-08-05 Thread Thomas Shaddack
On Wed, 4 Aug 2004, Hal Finney wrote: As you can see, breaking 128 bit keys is certainly not a task which is so impossible that it would fail even if every atom were a computer. If we really needed to do it, it's not outside the realm of possibility that it could be accomplished within 50

Re: On what the NSA does with its tech

2004-08-04 Thread Thomas Shaddack
On Wed, 4 Aug 2004, Hal Finney wrote: As you can see, breaking 128 bit keys is certainly not a task which is so impossible that it would fail even if every atom were a computer. If we really needed to do it, it's not outside the realm of possibility that it could be accomplished within 50

Terrorists wear neckties.

2004-08-01 Thread Thomas Shaddack
I don't worry about car bombs nor hijacked airplanes. I have better chance of being killed in a standardized ISO-compliant CE-marked car crash than getting into mere visual contact with a bomb blast. On the other side, the streams of bureaucrap the Hellhole also known as Brussels spews every

Re: X-Cypher, SIP VoIP, stupid propriatory crapola

2004-07-29 Thread Thomas Shaddack
On Wed, 28 Jul 2004, Dave Howe wrote: Particularly disgusted by the last paragraph | With encryption comes the problem of either managing public/private | keys, which must be kept secret, or the annoyance of transmitting a | secure key to a remote party over other secure methods.

Re: X-Cypher, SIP VoIP, stupid propriatory crapola

2004-07-28 Thread Thomas Shaddack
On Wed, 28 Jul 2004, Dave Howe wrote: Particularly disgusted by the last paragraph | With encryption comes the problem of either managing public/private | keys, which must be kept secret, or the annoyance of transmitting a | secure key to a remote party over other secure methods.

Re: Why there is no anonymous e-cash

2004-07-24 Thread Thomas Shaddack
On Mon, 19 Jul 2004, James A. Donald wrote: As I predicted, transactions are increasingly going on line. And as Hettinga predicted, the more anonymous and irreversible the transaction service, the cheaper and more convenient its services. All happening as predicted. So why don't we

Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-23 Thread Thomas Shaddack
On Thu, 22 Jul 2004, Major Variola (ret) wrote: My point is only that they will be killed should they leak their actual capabilities. Well... I am reading a book about intelligence now. Specifically, Ernst Volkman: Spies - the secret agents who changed the course of history. Amusing book;

Low-cost thermal/multispectral imaging via mechanical slow-scan TV

2004-07-20 Thread Thomas Shaddack
Thermal imaging is a very powerful and very cool technology with many many applications in both security and engineering. However, the main obstacle for its wider usage in civilian sector is very high cost of the microbolometer array sensors. However, there are affordably cheap remote

Re: Texas oil refineries, a White Van, and Al Qaeda

2004-07-20 Thread Thomas Shaddack
On Tue, 20 Jul 2004, Justin wrote: HOUSTON (Reuters) - Law enforcement officials said on Monday they are looking for a man seen taking pictures of two refineries in Texas City, Texas. How difficult it is to wait for a sunny day, wire a digital camera to take two pictures per second with

Low-cost thermal/multispectral imaging via mechanical slow-scan TV

2004-07-20 Thread Thomas Shaddack
Thermal imaging is a very powerful and very cool technology with many many applications in both security and engineering. However, the main obstacle for its wider usage in civilian sector is very high cost of the microbolometer array sensors. However, there are affordably cheap remote

Cheap TDR for fibers?

2004-07-19 Thread Thomas Shaddack
The laser diodes used in eg. CD players have a feedback photodiode, sensing the laser's optical output. If the lasers used for optical fibers have similar mechanism too, and if the diode is sensitive to the light coming to it not only from the chip but also from the fiber itself, and can

Re: Secure telephones

2004-07-18 Thread Thomas Shaddack
On Sun, 18 Jul 2004, Bill Stewart wrote: If you're trying to build a usable cellphone, you've got much more stringent design criteria than a deskphone. I am painfully aware of it. You've got packaging requirements that force you into serious industrial design if you want something

Re: Secure telephones

2004-07-18 Thread Thomas Shaddack
On Sat, 17 Jul 2004, Steve Schear wrote: How about building a secure cell phone using GnuRadio as a core? That way you have maximum control afforded by the protocols. Several reasons valid at this moment (though I suppose (and hope) the situation will improve in next couple years). There is

Cheap TDR for fibers?

2004-07-18 Thread Thomas Shaddack
The laser diodes used in eg. CD players have a feedback photodiode, sensing the laser's optical output. If the lasers used for optical fibers have similar mechanism too, and if the diode is sensitive to the light coming to it not only from the chip but also from the fiber itself, and can

Re: vacuum-safe laptops ?

2004-07-18 Thread Thomas Shaddack
On Fri, 16 Jul 2004, Major Variola (ret) wrote: Um, even the small form factor PC on a board the size of your palm may still rely on caps in the power supply that don't handle 760 to 0 mm Hg/min so readily. However, if you use a low-power board, you have less current to filter the ripples

Re: vacuum-safe laptops ?

2004-07-18 Thread Thomas Shaddack
On Sat, 17 Jul 2004, Tyler Durden wrote: Sorry to need educating once again, but I had assumed can-shaped capacitors were gone from laptops in lieu of surface mount. Anyone know? (I don't own a laptop.) The can caps can be surface-mounted as well. The leads then look different, but the

Re: Secure telephones

2004-07-18 Thread Thomas Shaddack
On Sat, 17 Jul 2004, Steve Schear wrote: How about building a secure cell phone using GnuRadio as a core? That way you have maximum control afforded by the protocols. Several reasons valid at this moment (though I suppose (and hope) the situation will improve in next couple years). There is

Re: Secure telephones

2004-07-18 Thread Thomas Shaddack
On Sun, 18 Jul 2004, Bill Stewart wrote: If you're trying to build a usable cellphone, you've got much more stringent design criteria than a deskphone. I am painfully aware of it. You've got packaging requirements that force you into serious industrial design if you want something

Re: FIPS chassis/linux security engineer?

2004-07-17 Thread Thomas Shaddack
On Sat, 17 Jul 2004, Eric Murray wrote: For a seperate project, does anyone know of a small linux-ready/able box with ethernet? Gumstix looks cool but I need hardwire networking. Soekris, http://www.soekris.com/. PXA255, http://www.hw-server.com/hw_products/sld_hws.html Are there more,

Secure telephones

2004-07-17 Thread Thomas Shaddack
Pondering construction of a secure telephone. (Or at least a cellphone in general. The user interfaces and features available on virtually all the mass-market phones suck, to put it very very mildly, not even mentioning that there's no access to their firmware (so no chance of audit), poor or

Re: vacuum-safe laptops ?

2004-07-17 Thread Thomas Shaddack
On Fri, 16 Jul 2004, Major Variola (ret) wrote: Does anyone *know* (first or second hand, I can speculate myself) which laptops, if any, can safely go to zero air pressure (dropping from 1 atm to 0 in, say, 1 minute.) Sorry so late ---but your can-shaped capacitors might not handle the

Re: FIPS chassis/linux security engineer?

2004-07-17 Thread Thomas Shaddack
On Sat, 17 Jul 2004, Eric Murray wrote: For a seperate project, does anyone know of a small linux-ready/able box with ethernet? Gumstix looks cool but I need hardwire networking. Soekris, http://www.soekris.com/. PXA255, http://www.hw-server.com/hw_products/sld_hws.html Are there more,

Re: vacuum-safe laptops ?

2004-07-16 Thread Thomas Shaddack
On Fri, 16 Jul 2004, Major Variola (ret) wrote: Does anyone *know* (first or second hand, I can speculate myself) which laptops, if any, can safely go to zero air pressure (dropping from 1 atm to 0 in, say, 1 minute.) Sorry so late ---but your can-shaped capacitors might not handle the

Re: Mexico Atty. General gets microchipped (fwd)

2004-07-14 Thread Thomas Shaddack
On Tue, 13 Jul 2004, J.A. Terranson wrote: Forwarded for amusement http://www.cnn.com/2004/WORLD/americas/07/13/mexico.chip.reut/index.html Mexico attorney general gets microchip implant Politicians getting RFIDs. Will it spur a new generation of smart roadside bombs, landmines, and

Re: Bumazhkas

2004-07-13 Thread Thomas Shaddack
On Tue, 13 Jul 2004, Harmon Seaver wrote: Bumazhkas? I thought I was pretty familiar with most weapons of the world, but not Bumazhkas. What calibre are they? I've always liked those CZ Model 52 pistols and Model 32 subguns in .30Mauser. Loaded hot with a teflon coated bullet they

Re: Mexico Atty. General gets microchipped (fwd)

2004-07-13 Thread Thomas Shaddack
On Tue, 13 Jul 2004, J.A. Terranson wrote: Forwarded for amusement http://www.cnn.com/2004/WORLD/americas/07/13/mexico.chip.reut/index.html Mexico attorney general gets microchip implant Politicians getting RFIDs. Will it spur a new generation of smart roadside bombs, landmines, and

Re: Bumazhkas

2004-07-13 Thread Thomas Shaddack
On Tue, 13 Jul 2004, Harmon Seaver wrote: Bumazhkas? I thought I was pretty familiar with most weapons of the world, but not Bumazhkas. What calibre are they? I've always liked those CZ Model 52 pistols and Model 32 subguns in .30Mauser. Loaded hot with a teflon coated bullet they

Re: USA PATRIOT Act Survives Amendment Attempt

2004-07-12 Thread Thomas Shaddack
On Sat, 10 Jul 2004 [EMAIL PROTECTED] wrote: But we have a psychological mechanism here; many people tend to be tough when not under direct threat. Then they implement the mechanism. Then years flow by. Then the prosecutors come. But by then it is too late to cooperate. They are doomed

Re: USA PATRIOT Act Survives Amendment Attempt

2004-07-11 Thread Thomas Shaddack
On Sat, 10 Jul 2004 [EMAIL PROTECTED] wrote: But we have a psychological mechanism here; many people tend to be tough when not under direct threat. Then they implement the mechanism. Then years flow by. Then the prosecutors come. But by then it is too late to cooperate. They are doomed

Re: USA PATRIOT Act Survives Amendment Attempt

2004-07-11 Thread Thomas Shaddack
On Fri, 9 Jul 2004, Steve Schear wrote: This may best be accomplished by placing the data offshore and empowering the db operators with some non-repudiatable right of disclosure (especially under duress of a warrant). This may be impractical in some cases. Some months back I discussed a

Re: USA PATRIOT Act Survives Amendment Attempt (fwd from brian-slashdotnews@hyperreal.org)

2004-07-09 Thread Thomas Shaddack
On Fri, 9 Jul 2004, Steve Schear wrote: Quite a few book stores (including the local Half-Priced Books) now keep no records not required and some do not even automate and encourage their patron to pay cash. In California book sellers to such used/remaindered stores must identify themselves

Re: USA PATRIOT Act Survives Amendment Attempt

2004-07-09 Thread Thomas Shaddack
On Fri, 9 Jul 2004, Steve Schear wrote: This may best be accomplished by placing the data offshore and empowering the db operators with some non-repudiatable right of disclosure (especially under duress of a warrant). This may be impractical in some cases. Some months back I discussed a

Re: [IP] Hi-tech rays to aid terror fight

2004-07-09 Thread Thomas Shaddack
On Thu, 8 Jul 2004, Major Variola (ret) wrote: 5. One could call terahertz hard RF in same way that hard x-rays bleed into soft gammas. But calling anything hard implies danger, and we mustn't scare the proles. Perhaps soft IR is better. Technically, it's closer to soft IR. If I remember

Re: Querying SSL/TLS capabilities of SMTP servers

2004-07-09 Thread Thomas Shaddack
cases. In the rest, I have to resort to telnet. Thanks a lot. Seems I have to learn perl. Looks powerful. On Thu, 8 Jul 2004, Justin wrote: On 2004-07-08T17:50:57+0200, Thomas Shaddack wrote: I cobbled up together a small bash shell script that does this. It lists the MX records for a domain

Re: USA PATRIOT Act Survives Amendment Attempt (fwd from brian-slashdotnews@hyperreal.org)

2004-07-09 Thread Thomas Shaddack
On Fri, 9 Jul 2004, Steve Schear wrote: Quite a few book stores (including the local Half-Priced Books) now keep no records not required and some do not even automate and encourage their patron to pay cash. In California book sellers to such used/remaindered stores must identify themselves

Querying SSL/TLS capabilities of SMTP servers

2004-07-08 Thread Thomas Shaddack
I cobbled up together a small bash shell script that does this. It lists the MX records for a domain, and then tries to connect to each of them, issue an EHLO command, disconnect, then list the output of the server, alerting if the server supports STARTTLS. It should be easy to further query

Re: [IP] Hi-tech rays to aid terror fight

2004-07-08 Thread Thomas Shaddack
On Thu, 8 Jul 2004, Major Variola (ret) wrote: 5. One could call terahertz hard RF in same way that hard x-rays bleed into soft gammas. But calling anything hard implies danger, and we mustn't scare the proles. Perhaps soft IR is better. Technically, it's closer to soft IR. If I remember

Querying SSL/TLS capabilities of SMTP servers

2004-07-08 Thread Thomas Shaddack
I cobbled up together a small bash shell script that does this. It lists the MX records for a domain, and then tries to connect to each of them, issue an EHLO command, disconnect, then list the output of the server, alerting if the server supports STARTTLS. It should be easy to further query

RE: photodisc search (was Re: BOUNTY BEAR is Faster ...)

2004-07-08 Thread Thomas Shaddack
A big database of images with metadata can be used to train a neural network (or other suitable AI approach) to recognize unknown images. On Thu, 8 Jul 2004, Tyler Durden wrote: Yeah, but this is a metadata search, correct? Seems to me Our Protectors(TM) are probably able to search a vast

Re: Privacy laws and social engineering

2004-07-07 Thread Thomas Shaddack
On Tue, 6 Jul 2004, Major Variola (ret) wrote: So, which is better, Schneier's books or Mitnick's? I suspect the former, but am curious what the community opinion is? You may like one side of the coin more than the other one, but they still belong to the same flat, dirty, formerly shiny

Re: Privacy laws and social engineering

2004-07-07 Thread Thomas Shaddack
On Tue, 6 Jul 2004, Major Variola (ret) wrote: So, which is better, Schneier's books or Mitnick's? I suspect the former, but am curious what the community opinion is? You may like one side of the coin more than the other one, but they still belong to the same flat, dirty, formerly shiny

Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-07 Thread Thomas Shaddack
Reading some news about the email wiretapping by ISPs, and getting an idea. There are various email forwarding services, which are nothing more than a SMTP server with pairs of [EMAIL PROTECTED] -- [EMAIL PROTECTED] Messages in storage have much lower judicial protection than messages in

Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-07 Thread Thomas Shaddack
On Tue, 6 Jul 2004, Hal Finney wrote: There are various email forwarding services, which are nothing more than a SMTP server with pairs of [EMAIL PROTECTED] -- [EMAIL PROTECTED] Right, mostly for use as disposable email addresses. I've used spamgourmet to good effect, myself. I

  1   2   3   4   5   >