Title: Yahoo! Email Verification
Help
Do not reply to this message. If this account doesn't belong to you, please follow the instructions at the end of this email.
Hello cypherpunks@minder.net,
We have received your request to join the hersey-serbest
group hosted by Yahoo! Groups, a free, easy-to-use community service.
This request will expire in 7 days.
TO BECOME A MEMBER OF THE GROUP:
1) Go to the Yahoo! Groups site by clicking on this link:
On Wed, Oct 26, 2005 at 08:41:48PM -0500, Shawn K. Quinn wrote:
1) You have told your HR person what a bad idea it is to introduce a
dependency on a proprietary file format, right?
Telling is useless. Are you in a sufficient position of power to make
them stop using it? I doubt it, because
- Forwarded message from Roger Dingledine [EMAIL PROTECTED] -
From: Roger Dingledine [EMAIL PROTECTED]
Date: Wed, 26 Oct 2005 16:55:36 -0400
To: [EMAIL PROTECTED]
Subject: EFF is looking for Tor DMCA test case volunteers
User-Agent: Mutt/1.5.9i
Reply-To: [EMAIL PROTECTED]
Fred asked me
- Forwarded message from Kerry Bonin [EMAIL PROTECTED] -
From: Kerry Bonin [EMAIL PROTECTED]
Date: Thu, 27 Oct 2005 06:52:57 -0700
To: [EMAIL PROTECTED], Peer-to-peer development. [EMAIL PROTECTED]
Subject: Re: [p2p-hackers] P2P Authentication
User-Agent: Mozilla Thunderbird 1.0.6
- Forwarded message from David Farber [EMAIL PROTECTED] -
From: David Farber [EMAIL PROTECTED]
Date: Wed, 26 Oct 2005 19:28:46 -0400
To: Ip Ip ip@v2.listbox.com
Subject: [IP] EFF: Court Issues Surveillance Smack-Down to Justice Department
X-Mailer: Apple Mail (2.734)
Reply-To: [EMAIL
Thanks for notifying us with your weight problem concerns.
Our 2 Nutritionists are online 24 hours a day to answer your questions or
concerns.
Virginia Carter and Robert Rogers have been nutritionists for the past
10 years and are recommending that you try a 2-3 month supply of hoodia.
At 08:41 PM 10/26/05 -0500, Shawn K. Quinn wrote:
On Tue, 2005-10-25 at 23:40 -0500, Travis H. wrote:
Many of the anonymity protocols require multiple participants, and
thus are subject to what economists call network externalities.
The
best example I can think of is Microsoft Office file
[Using the *financial* angle, having to show state-photo-ID is
overturned to vote
is overturned. Interesting if this could be used for other cases where
the
state wants ID.]
Today: October 27, 2005 at 12:33:27 PDT
Court Blocks Ga. Photo ID Requirement
ASSOCIATED PRESS
ATLANTA (AP) - A
Here's a very interesting case where (c)holders are trying
to ban fair use (educational) of (c) material. I agree with
their motivations ---Kansan theo-edu-crats need killing for their
continuing child abuse-- but I don't see how they can get around the
fair use provisions.
(Bypassing whether
Thanks for notifying us with your weight problem concerns.
Our 2 Nutritionists are online 24 hours a day to answer your questions or
concerns.
Patricia Jones and Charles Roberts have been nutritionists for the past
10 years and are recommending that you try a 2-3 month supply of hoodia.
At 12:23 PM -0700 10/27/05, Major Variola (ret) wrote:
Why don't you send her comma-delimited text, Excel can import it?
But, but...
You can't put Visual *BASIC* in comma delimited text...
;-)
Cheers,
RAH
Yet another virus vector. Bah! :-)
--
-
R. A. Hettinga mailto: [EMAIL
On 10/26/05, Shawn K. Quinn [EMAIL PROTECTED] wrote:
On Tue, 2005-10-25 at 23:40 -0500, Travis H. wrote:
Many of the anonymity protocols require multiple participants, and
thus are subject to what economists call network externalities. The
best example I can think of is Microsoft Office
At 8:18 PM -0700 10/27/05, cyphrpunk wrote:
Keep the focus on anonymity. That's what the cypherpunks list is
about.
Please.
The cypherpunks list is about anything we want it to be. At this stage in
the lifecycle (post-nuclear-armageddon-weeds-in-the-rubble), it's more
about the crazy bastards
The cypherpunks list is about anything we want it to be. At this stage in
the lifecycle (post-nuclear-armageddon-weeds-in-the-rubble), it's more
about the crazy bastards who are still here than it is about just about
anything else.
Fine, I want it to be about crypto and anonymity. You can
On Thu, 2005-10-27 at 20:18 -0700, cyphrpunk wrote:
This is off-topic. Let's not degenerate into random Microsoft bashing.
Keep the focus on anonymity. That's what the cypherpunks list is
about.
Sorry, but I have to disagree. I highly doubt that Microsoft is
interested in helping users of
On 10/25/05, Travis H. [EMAIL PROTECTED] wrote:
More on topic, I recently heard about a scam involving differential
reversibility between two remote payment systems. The fraudster sends
you an email asking you to make a Western Union payment to a third
party, and deposits the requested amount
On Thu, 2005-10-27 at 23:28 -0400, R.A. Hettinga wrote:
RAH
Who thinks anything Microsoft makes these days is, by definition, a
security risk.
Indeed, the amount of trust I'm willing to place in a piece of software
is quite related to how much of its source code is available for review.
Wasn't there a rumor last year that Skype didn't do any encryption
padding, it just did a straight exponentiation of the plaintext?
Would that be safe, if as the report suggests, the data being
encrypted is 128 random bits (and assuming the encryption exponent is
considerably bigger than 3)?
On 10/26/05, James A. Donald [EMAIL PROTECTED] wrote:
How does one inflate a key?
Just make it bigger by adding redundancy and padding, before you
encrypt it and store it on your disk. That way the attacker who wants
to steal your keyring sees a 4 GB encrypted file which actually holds
about a
From: Kerry Bonin [EMAIL PROTECTED]
Date: Thu, 27 Oct 2005 06:52:57 -0700
To: [EMAIL PROTECTED], Peer-to-peer development. [EMAIL PROTECTED]
Subject: Re: [p2p-hackers] P2P Authentication
User-Agent: Mozilla Thunderbird 1.0.6 (Windows/20050716)
Reply-To: Peer-to-peer development. [EMAIL
Travis H. wrote:
Part of the problem is using a packet-switched network; if we had
circuit-based, then thwarting traffic analysis is easy; you just fill
the link with random garbage when not transmitting packets. I
considered doing this with SLIP back before broadband (back when my
friend
On Tue, 2005-10-25 at 23:40 -0500, Travis H. wrote:
Many of the anonymity protocols require multiple participants, and
thus are subject to what economists call network externalities. The
best example I can think of is Microsoft Office file formats. I don't
buy MS Office because it's the best
On Wed, Oct 26, 2005 at 08:41:48PM -0500, Shawn K. Quinn wrote:
1) You have told your HR person what a bad idea it is to introduce a
dependency on a proprietary file format, right?
Telling is useless. Are you in a sufficient position of power to make
them stop using it? I doubt it, because
At 08:41 PM 10/26/05 -0500, Shawn K. Quinn wrote:
On Tue, 2005-10-25 at 23:40 -0500, Travis H. wrote:
Many of the anonymity protocols require multiple participants, and
thus are subject to what economists call network externalities.
The
best example I can think of is Microsoft Office file
25 matches
Mail list logo