Title: postcards.org
You have just received a virtual
postcard from a family member!
.
You can pick up your postcard at
the following web address:
.
http://www2.postcards.org/?d21-sea-sunset
.
If you can't click on the web address
above, you can also
visit
From: cyphrpunk [EMAIL PROTECTED]
Sent: Oct 24, 2005 5:58 PM
To: John Kelsey [EMAIL PROTECTED]
Subject: Re: [fc-discuss] Financial Cryptography Update: On Digital Cash-like
Payment Systems
...
Digital wallets will require real security in user PCs. Still I don't
see why we don't already have
-BEGIN PGP SIGNED MESSAGE-
At 3:57 PM -0400 10/24/05, John Kelsey wrote:
More to the point, an irreversible payment system raises big practical
problems in a world full of very hard-to-secure PCs running the
relevant software. One exploitable software bug, properly used, can
steal an
Its unfortunate that some posters had to be reminded that anyone
calling for government-licensed reporters (and religions, as one
author included) deserves to have their carbon recycled, because
of the treason to the BoR. Tim May used to call government licensed
citizens special objects. Search
We encourage the publication of the (paper) school records which the FLA
hurricane reportedly distributed to locals, as part of an effort to show
the sheeple
how *well* the state guards their secrets. Particularly interested in
offspring
of state officials, not that their kids are likely go to
Nuclear Detection: Fixed detectors, portals, and NEST
teams wont work for shielded HEU on a national scale;
a distributed network of in-vehicle detectors is also
necessary to deter nuclear terrorism
http://iis-db.stanford.edu/evnts/4249/disarm.pdf
Maybe the FCC will require rad detectors in
| U.S. law generally requires that stolen goods be returned to the
| original owner without compensation to the current holder, even if
| they had been purchased legitimately (from the thief or his agent) by
| an innocent third party.
This is incorrect. The law draws a distinction between
- Forwarded message from David Farber [EMAIL PROTECTED] -
From: David Farber [EMAIL PROTECTED]
Date: Tue, 25 Oct 2005 14:08:43 -0400
To: Ip Ip ip@v2.listbox.com
Subject: [IP] Wiretapping innocent people on the Internet
X-Mailer: Apple Mail (2.734)
Reply-To: [EMAIL PROTECTED]
To: Declan
Its unfortunate that some posters had to be reminded that anyone
calling for government-licensed reporters (and religions, as one
author included) deserves to have their carbon recycled, because
of the treason to the BoR. Tim May used to call government licensed
citizens special objects. Search
- Forwarded message from Declan McCullagh declan@well.com -
From: Declan McCullagh declan@well.com
Date: Tue, 25 Oct 2005 13:23:23 -0700
To: politech@politechbot.com
Subject: [Politech] U.S. passports to receive RFID implants starting in
October 2006 [priv]
User-Agent: Mozilla
At 03:15 PM 6/8/04 -0400, Tyler Durden wrote:
Well, it's interesting to consider how/if that might be possible. SONET
scrambles the payload prior to transmission..adding an additional
crypto
layer prior to transmission would mean changing the line rate, so
probably a
no-no.
Tyler, one can
Hi,
I sent you an email last week and need to confirm everything now.
Please read the info below and let me know if you have any questions.
We are accepting your mortgage refinance application. If you have poor credit,
it is ok. You can get a refinance loan for a rock-bottom payment.
Part of the problem is using a packet-switched network; if we had
circuit-based, then thwarting traffic analysis is easy; you just fill
the link with random garbage when not transmitting packets. I
considered doing this with SLIP back before broadband (back when my
friend was my ISP). There are
If you have
to be that confident in your computer security to use the payment
system, it's not going to have many clients.
Maybe the trusted computing platform (palladium) may have something to
offer after all, namely enabling naive users to use services that
require confidence in their own
One intresting security measure protecting valuable digital assets (WM
protects private keys this way) is inflating them before encryption.
While it does not protect agains trojan applications, it does a surprisingly
good job at reducing attacks following the key logging + file theft pattern.
On 10/24/05, Steve Schear [EMAIL PROTECTED] wrote:
I don't think E-gold ever held out its system as non-reversible with proper
court order. All reverses I am aware happened either due to some technical
problem with their system or an order from a court of competence in the
matter at hand.
http://www.hbarel.com/Blog/entry0006.html
I believe that for anonymity and pseudonymity technologies to survive
they have to be applied to applications that require them by design,
rather than to mass-market applications that can also do (cheaper)
without. If anonymity mechanisms are
From: cyphrpunk [EMAIL PROTECTED]
Sent: Oct 24, 2005 5:58 PM
To: John Kelsey [EMAIL PROTECTED]
Subject: Re: [fc-discuss] Financial Cryptography Update: On Digital Cash-like
Payment Systems
..
Digital wallets will require real security in user PCs. Still I don't
see why we don't already have this
On Mon, Oct 24, 2005 at 02:58:32PM -0700, cyphrpunk wrote:
Digital wallets will require real security in user PCs. Still I don't
see why we don't already have this problem with online banking and
similar financial services. Couldn't a virus today steal people's
passwords and command their
-BEGIN PGP SIGNED MESSAGE-
At 3:57 PM -0400 10/24/05, John Kelsey wrote:
More to the point, an irreversible payment system raises big practical
problems in a world full of very hard-to-secure PCs running the
relevant software. One exploitable software bug, properly used, can
steal an
We encourage the publication of the (paper) school records which the FLA
hurricane reportedly distributed to locals, as part of an effort to show
the sheeple
how *well* the state guards their secrets. Particularly interested in
offspring
of state officials, not that their kids are likely go to
Nuclear Detection: Fixed detectors, portals, and NEST
teams wont work for shielded HEU on a national scale;
a distributed network of in-vehicle detectors is also
necessary to deter nuclear terrorism
http://iis-db.stanford.edu/evnts/4249/disarm.pdf
Maybe the FCC will require rad detectors in
Its unfortunate that some posters had to be reminded that anyone
calling for government-licensed reporters (and religions, as one
author included) deserves to have their carbon recycled, because
of the treason to the BoR. Tim May used to call government licensed
citizens special objects. Search
| U.S. law generally requires that stolen goods be returned to the
| original owner without compensation to the current holder, even if
| they had been purchased legitimately (from the thief or his agent) by
| an innocent third party.
This is incorrect. The law draws a distinction between
Its unfortunate that some posters had to be reminded that anyone
calling for government-licensed reporters (and religions, as one
author included) deserves to have their carbon recycled, because
of the treason to the BoR. Tim May used to call government licensed
citizens special objects. Search
25 matches
Mail list logo