Yahoo!: Please Verify Your Email Address

2005-10-27 Thread my-yahoo-register
Title: Yahoo! Email Verification Help Do not reply to this message. If this account doesn't belong to you, please follow the instructions at the end of this email.

Please confirm your request to join hersey-serbest

2005-10-27 Thread Yahoo! Groups
Hello cypherpunks@minder.net, We have received your request to join the hersey-serbest group hosted by Yahoo! Groups, a free, easy-to-use community service. This request will expire in 7 days. TO BECOME A MEMBER OF THE GROUP: 1) Go to the Yahoo! Groups site by clicking on this link:

Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-27 Thread Eugen Leitl
On Wed, Oct 26, 2005 at 08:41:48PM -0500, Shawn K. Quinn wrote: 1) You have told your HR person what a bad idea it is to introduce a dependency on a proprietary file format, right? Telling is useless. Are you in a sufficient position of power to make them stop using it? I doubt it, because

[EMAIL PROTECTED]: EFF is looking for Tor DMCA test case volunteers]

2005-10-27 Thread Eugen Leitl
- Forwarded message from Roger Dingledine [EMAIL PROTECTED] - From: Roger Dingledine [EMAIL PROTECTED] Date: Wed, 26 Oct 2005 16:55:36 -0400 To: [EMAIL PROTECTED] Subject: EFF is looking for Tor DMCA test case volunteers User-Agent: Mutt/1.5.9i Reply-To: [EMAIL PROTECTED] Fred asked me

[EMAIL PROTECTED]: Re: [p2p-hackers] P2P Authentication]

2005-10-27 Thread Eugen Leitl
- Forwarded message from Kerry Bonin [EMAIL PROTECTED] - From: Kerry Bonin [EMAIL PROTECTED] Date: Thu, 27 Oct 2005 06:52:57 -0700 To: [EMAIL PROTECTED], Peer-to-peer development. [EMAIL PROTECTED] Subject: Re: [p2p-hackers] P2P Authentication User-Agent: Mozilla Thunderbird 1.0.6

[EMAIL PROTECTED]: [IP] EFF: Court Issues Surveillance Smack-Down to Justice Department]

2005-10-27 Thread Eugen Leitl
- Forwarded message from David Farber [EMAIL PROTECTED] - From: David Farber [EMAIL PROTECTED] Date: Wed, 26 Oct 2005 19:28:46 -0400 To: Ip Ip ip@v2.listbox.com Subject: [IP] EFF: Court Issues Surveillance Smack-Down to Justice Department X-Mailer: Apple Mail (2.734) Reply-To: [EMAIL

Regarding:Weight

2005-10-27 Thread Virginia Carter
Thanks for notifying us with your weight problem concerns. Our 2 Nutritionists are online 24 hours a day to answer your questions or concerns. Virginia Carter and Robert Rogers have been nutritionists for the past 10 years and are recommending that you try a 2-3 month supply of hoodia.

Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-27 Thread Major Variola (ret)
At 08:41 PM 10/26/05 -0500, Shawn K. Quinn wrote: On Tue, 2005-10-25 at 23:40 -0500, Travis H. wrote: Many of the anonymity protocols require multiple participants, and thus are subject to what economists call network externalities. The best example I can think of is Microsoft Office file

Court Blocks Ga. Photo ID Requirement

2005-10-27 Thread Major Variola (ret)
[Using the *financial* angle, having to show state-photo-ID is overturned to vote is overturned. Interesting if this could be used for other cases where the state wants ID.] Today: October 27, 2005 at 12:33:27 PDT Court Blocks Ga. Photo ID Requirement ASSOCIATED PRESS ATLANTA (AP) - A

blocking fair use? 2 Science Groups Say Kansas Can't Use Their Evolution Papers

2005-10-27 Thread Major Variola (ret)
Here's a very interesting case where (c)holders are trying to ban fair use (educational) of (c) material. I agree with their motivations ---Kansan theo-edu-crats need killing for their continuing child abuse-- but I don't see how they can get around the fair use provisions. (Bypassing whether

Regarding:Weight

2005-10-27 Thread Patricia Jones [Cypherpunks]
Thanks for notifying us with your weight problem concerns. Our 2 Nutritionists are online 24 hours a day to answer your questions or concerns. Patricia Jones and Charles Roberts have been nutritionists for the past 10 years and are recommending that you try a 2-3 month supply of hoodia.

Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-27 Thread R.A. Hettinga
At 12:23 PM -0700 10/27/05, Major Variola (ret) wrote: Why don't you send her comma-delimited text, Excel can import it? But, but... You can't put Visual *BASIC* in comma delimited text... ;-) Cheers, RAH Yet another virus vector. Bah! :-) -- - R. A. Hettinga mailto: [EMAIL

Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-27 Thread cyphrpunk
On 10/26/05, Shawn K. Quinn [EMAIL PROTECTED] wrote: On Tue, 2005-10-25 at 23:40 -0500, Travis H. wrote: Many of the anonymity protocols require multiple participants, and thus are subject to what economists call network externalities. The best example I can think of is Microsoft Office

Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-27 Thread R.A. Hettinga
At 8:18 PM -0700 10/27/05, cyphrpunk wrote: Keep the focus on anonymity. That's what the cypherpunks list is about. Please. The cypherpunks list is about anything we want it to be. At this stage in the lifecycle (post-nuclear-armageddon-weeds-in-the-rubble), it's more about the crazy bastards

Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-27 Thread cyphrpunk
The cypherpunks list is about anything we want it to be. At this stage in the lifecycle (post-nuclear-armageddon-weeds-in-the-rubble), it's more about the crazy bastards who are still here than it is about just about anything else. Fine, I want it to be about crypto and anonymity. You can

Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-27 Thread Shawn K. Quinn
On Thu, 2005-10-27 at 20:18 -0700, cyphrpunk wrote: This is off-topic. Let's not degenerate into random Microsoft bashing. Keep the focus on anonymity. That's what the cypherpunks list is about. Sorry, but I have to disagree. I highly doubt that Microsoft is interested in helping users of

Re: [fc-discuss] Financial Cryptography Update: On Digital Cash-like Payment Systems

2005-10-27 Thread cyphrpunk
On 10/25/05, Travis H. [EMAIL PROTECTED] wrote: More on topic, I recently heard about a scam involving differential reversibility between two remote payment systems. The fraudster sends you an email asking you to make a Western Union payment to a third party, and deposits the requested amount

Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-27 Thread Shawn K. Quinn
On Thu, 2005-10-27 at 23:28 -0400, R.A. Hettinga wrote: RAH Who thinks anything Microsoft makes these days is, by definition, a security risk. Indeed, the amount of trust I'm willing to place in a piece of software is quite related to how much of its source code is available for review.

Re: [EMAIL PROTECTED]: Skype security evaluation]

2005-10-27 Thread cyphrpunk
Wasn't there a rumor last year that Skype didn't do any encryption padding, it just did a straight exponentiation of the plaintext? Would that be safe, if as the report suggests, the data being encrypted is 128 random bits (and assuming the encryption exponent is considerably bigger than 3)?

Re: On Digital Cash-like Payment Systems

2005-10-27 Thread cyphrpunk
On 10/26/05, James A. Donald [EMAIL PROTECTED] wrote: How does one inflate a key? Just make it bigger by adding redundancy and padding, before you encrypt it and store it on your disk. That way the attacker who wants to steal your keyring sees a 4 GB encrypted file which actually holds about a

Re: [EMAIL PROTECTED]: Re: [p2p-hackers] P2P Authentication]

2005-10-27 Thread cyphrpunk
From: Kerry Bonin [EMAIL PROTECTED] Date: Thu, 27 Oct 2005 06:52:57 -0700 To: [EMAIL PROTECTED], Peer-to-peer development. [EMAIL PROTECTED] Subject: Re: [p2p-hackers] P2P Authentication User-Agent: Mozilla Thunderbird 1.0.6 (Windows/20050716) Reply-To: Peer-to-peer development. [EMAIL

Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-27 Thread Ben Laurie
Travis H. wrote: Part of the problem is using a packet-switched network; if we had circuit-based, then thwarting traffic analysis is easy; you just fill the link with random garbage when not transmitting packets. I considered doing this with SLIP back before broadband (back when my friend

Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-27 Thread Shawn K. Quinn
On Tue, 2005-10-25 at 23:40 -0500, Travis H. wrote: Many of the anonymity protocols require multiple participants, and thus are subject to what economists call network externalities. The best example I can think of is Microsoft Office file formats. I don't buy MS Office because it's the best

Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-27 Thread Eugen Leitl
On Wed, Oct 26, 2005 at 08:41:48PM -0500, Shawn K. Quinn wrote: 1) You have told your HR person what a bad idea it is to introduce a dependency on a proprietary file format, right? Telling is useless. Are you in a sufficient position of power to make them stop using it? I doubt it, because

Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-27 Thread Major Variola (ret)
At 08:41 PM 10/26/05 -0500, Shawn K. Quinn wrote: On Tue, 2005-10-25 at 23:40 -0500, Travis H. wrote: Many of the anonymity protocols require multiple participants, and thus are subject to what economists call network externalities. The best example I can think of is Microsoft Office file