-BEGIN PGP SIGNED MESSAGE-
Further thoughts on this matter...
I think that we should escalate the level of liability a potential
attacker has to face when attempting to compromise a security system.
We should have laptops equipped with high explosives, such that the laptop
detonates
On Tue, 7 Aug 2001, Joseph Ashwood wrote:
2. Operator probably trustworthy
Impossible, and unnecessary. Don't assume any remops are trustworthy.
Actually it is absolutely necessary. If all operators are willing to
collude, then your precious anonymity is completely lost. A simple
On Fri, 31 Aug 2001, Faustine wrote:
Tim wrote:
But, as with Kirchoff's point, the attacker is going to get the design
eventually.
If getting the design eventually were good enough, why the keen interest
in putting in a large order for the beta? There's a reason.
As I recall, this was an
On Wed, 5 Sep 2001, Tim May wrote:
There may be an item in the Cyphernomicon about this misconception, that
common carrier status is something people apply for. It used to be
claimed by some (don't here it as much anymore) than even bookstores
could be treated as common carriers so long as
On Wed, 5 Sep 2001, Tim May wrote:
There may be an item in the Cyphernomicon about this misconception, that
common carrier status is something people apply for. It used to be
claimed by some (don't here it as much anymore) than even bookstores
could be treated as common carriers so long as
On Thu, 6 Sep 2001 [EMAIL PROTECTED] wrote:
-BEGIN PGP SIGNED MESSAGE-
[snip]
-BEGIN PGP SIGNATURE-
Version: Hush 2.0
wmAEARECACAFAjuYFYwZHGtleXNlci1zb3plQGh1c2htYWlsLmNvbQAKCRAg4ui5IoBV
n/9+AJ9eK/gSpH59ahQrotIOcYbOo8cHQgCeM0ki/sMKBda2tdCstCyN4LqFQWk=
=1jll
-END PGP
On Thu, 6 Sep 2001 [EMAIL PROTECTED] wrote:
-BEGIN PGP SIGNED MESSAGE-
[snip]
-BEGIN PGP SIGNATURE-
Version: Hush 2.0
wmAEARECACAFAjuYFYwZHGtleXNlci1zb3plQGh1c2htYWlsLmNvbQAKCRAg4ui5IoBV
n/9+AJ9eK/gSpH59ahQrotIOcYbOo8cHQgCeM0ki/sMKBda2tdCstCyN4LqFQWk=
=1jll
-END PGP
On Fri, 14 Sep 2001, Sandy Sandfort wrote:
Whoever opts to collect that $5,000,000 will forever live in fear.
Cost/benefit, you do the math. I'd opt for it in a heartbeat.
Assume that you could nearly guarantee a profit of $5mil or more by
shorting your stocks before a terrorist attack on
On Sat, 15 Sep 2001, Jim Choate wrote:
Yeah, you're fast running out of points that aren't dull.
Perhaps, but that's not my reason. I simply find you to be dull.
They people engaging in them certainly felt justified. Whether you agree
or not is really a different question. It also
On Sat, 15 Sep 2001, Jim Choate wrote:
Yeah, you're fast running out of points that aren't dull.
Perhaps, but that's not my reason. I simply find you to be dull.
They people engaging in them certainly felt justified. Whether you agree
or not is really a different question. It also
On Sat, 15 Sep 2001, Jim Choate wrote:
On Sat, 15 Sep 2001, Meyer Wolfsheim wrote:
Have there ever been any large-scale terroristic attacks where profit was
the only motive?
terrorism economics. Economics as a direct goal isn't the issue in
terrorism. You're 'mixing your metaphors
On Sat, 15 Sep 2001, Sandy Sandfort wrote:
Meyer Wolfsheim wrote:
Have there ever been any large-scale
terroristic attacks where profit was
the only motive?
Who said anything about profit?
I did.
The point under discussion was cost/benefit analysis. Don't engage in
Inchoate over
On Sat, 15 Sep 2001, Sandy Sandfort wrote:
Meyer Wolfsheim wrote:
Have there ever been any large-scale
terroristic attacks where profit was
the only motive?
Who said anything about profit?
I did.
The point under discussion was cost/benefit analysis. Don't engage in
Inchoate over
[This is becoming a rat-hole, and I'm not interested getting too far into
it. I think most of you understand my point.]
On Sat, 15 Sep 2001, Jim Choate wrote:
Different societies have different definitions of evil; some evils are
hard to justify by any means, however.
They people engaging
On Sat, 15 Sep 2001, Howie Goodell wrote:
Meyer Wolfsheim wrote:
Assume that you could nearly guarantee a profit of $5mil or more by
shorting your stocks before a terrorist attack on the World Trade Center.
Would you perpetrate such a crime, and frame the sand-niggers?
The plot
Gentlemen,
It was recently mentioned on this list that there were additional
restrictions placed on the use of ciphers by private citizens during World
War II. I'm curious if anyone knows of a good resource for further
information on this topic.
(Now, inevitably, Choate is going to sent me a
MSNBC is reporting that Congress is thinking of requiring all citizens
and non-citizens in the United States to carry ID cards.
We're already half-way there. With our photo-id driver's licenses, and
required identification before boarding airplanes, convenient travel and
lack of anonymity go
Expect a crackdown on Internet anonymity, rather than a reversal of the
loosened crypto regulations. The death bell may be tolling for anonymous
Internet access in libraries and cyber-cafes, but so far I have yet to see
anything to make the case for a second round of the GAK war.
[...]
In
MSNBC is reporting that Congress is thinking of requiring all citizens
and non-citizens in the United States to carry ID cards.
We're already half-way there. With our photo-id driver's licenses, and
required identification before boarding airplanes, convenient travel and
lack of anonymity go
On Fri, 21 Sep 2001, Anonymous wrote:
Grow a spine, Phil, you jellyfish. You think Ford is upset because
their U-Haul truck was used by Timmy to blow up the Federal Building?
Tears in the shower? Please... spare me. This isn't a fucking Dickens
novel or the goddamn string section of the
On Fri, 21 Sep 2001, Anonymous wrote:
Grow a spine, Phil, you jellyfish. You think Ford is upset because
their U-Haul truck was used by Timmy to blow up the Federal Building?
Tears in the shower? Please... spare me. This isn't a fucking Dickens
novel or the goddamn string section of the
On Sun, 23 Sep 2001, Tim May wrote:
Interesting that the cyberliberties crowd was so eager to launch a
Boycott Adobe campaign because of their sin that they attempted to
defend their property rights, but no one is launching a Boycott Oracle
campaign over Larry Ellison's fascist support for
On Sun, 23 Sep 2001, Tim May wrote:
Interesting that the cyberliberties crowd was so eager to launch a
Boycott Adobe campaign because of their sin that they attempted to
defend their property rights, but no one is launching a Boycott Oracle
campaign over Larry Ellison's fascist support for
Expect a crackdown on Internet anonymity, rather than a reversal of the
loosened crypto regulations. The death bell may be tolling for anonymous
Internet access in libraries and cyber-cafes, but so far I have yet to see
anything to make the case for a second round of the GAK war.
[...]
In
On Fri, 21 Sep 2001, Tim May wrote:
It's too bad so many people are so confused about what a Web of Trust
is.
Do I need a positive picture ID of Lucky Green to communicate with him
securely? Black Unicorn? Pr0duct Cypher? Eric Hughes? Attila the Hun?
The notion that a particular
On Fri, 21 Sep 2001, Tim May wrote:
It's too bad so many people are so confused about what a Web of Trust
is.
Do I need a positive picture ID of Lucky Green to communicate with him
securely? Black Unicorn? Pr0duct Cypher? Eric Hughes? Attila the Hun?
The notion that a particular
[My apologies to the list for continuing this thread. I should know
better.]
On Wed, 26 Sep 2001, Karsten M. Self wrote:
Incorrect. There is no PGP/MIME support in Outlook, and the Eudora
PGP/MIME handling is less than perfect.
My information is different, though I've not used Outlook in
On Wed, 26 Sep 2001, Duncan Frissell wrote:
In the case of peace officer questioning, you can just ask them to leave.
No need to hide.
The main reason not to invite peace officers in is because of the risk
they might see something which would give rise to probable cause for a
search.
If
On Wed, 26 Sep 2001 [EMAIL PROTECTED] wrote:
It is discouraging to see the disdain in which many of you hold the FBI
during a time when we need cooperation and insight from nontraditional
sources.
we --- do you mean WE ALL need... or WE AT THE FBI need...
Interesting wording, indeed.
On Fri, 19 Oct 2001, Declan McCullagh wrote:
[I agreed to delete Anonymous' name before posting, but it is fair to point
out that Anonymous works for a company that is in some areas a competitor
to ZKS.
[snip]
This would also include any cookies set from
zeroknowledge.com, (which ZKS sets
On Sat, 20 Oct 2001, Karsten M. Self wrote:
on Sat, Oct 20, 2001 at 12:56:02PM -0700, Giovanna Imbesi ([EMAIL PROTECTED]) wrote:
Last night my friend and I stopped at a Venice club/bar. At the door
they were doing the normal ID check, but then took my driver's license
and swiped it into
On Wed, 24 Oct 2001, Tim May wrote:
I don't have time to respond in depth to the points Tim makes here, so I
have snipped a lot of them. I intend to come back and comment in more
detail later.
Largely, I am in agreement. However, in the paragraphs I've quoted below,
Tim touches on a
On Wed, 24 Oct 2001, Tim May wrote:
I didn't dismiss it. In fact, I wrote more about this issue, which I
haven't seen brought up by anyone else here, than 95% of all posts to
Cypherpunks have in their entire amount of original material!
My apologies. Dismiss was not the correct word.
I
Oregon refuses to ignore basic constitutional rights for the sake of the
war on terrorism:
Portland police have refused a U.S. Justice Department request for help
in interviewing Middle Eastern immigrants as part of its sweeping
terrorism investigation, saying it would violate state law.
Arabs
See Sandy? Even a blind clock finds a squirrel twice a day.
-MW-
On Thu, 29 Nov 2001, Jim Choate wrote:
Bush is full of shit.
On Fri, 30 Nov 2001, Sunder wrote:
Following which the buyer posts all the signed emails between self and
seller detailing the fraudulent transaction.
Worthless, as all of those messages could have been forged. Or did you
mean to say that they had been dated by a third party timestamping
http://www.banscrewdrivers.com
We hope that by ultimately banning the sale and use of screwdrivers, we
can make the world a little bit safer, and increase compassion towards
victims of screwdriver crimes and accidents.
[...]
-MW-
Another proprietary key format. Why not base such a system on OpenPGP?
Hmm. AES-256 with SHA-256? Children, what's wrong with the balance in this
system?
How does a user verify authenticity of another user's public key?
Aside from being incompatible with anything else on the net, how is this
Most of us now are happy, for example, to tolerate facial recognition
technology at stadiums, and to proffer our driver's licenses at frequent
car, truck and airport checkpoints. We no longer can travel anonymously,
and that may be acceptable given the risks we now face. But while the
ability to
On Mon, 3 Dec 2001, Tim May wrote:
This is the reputation of a reputation.
As soon as people tumble to the fact that Tom Clancy has sold his
nym/reputation to some hack writer, that is, let them put his name on
their words, then the reputation of Tom Clancy falls.
Nothing new here. Fisher
So far, U.S. and European authorities battling terrorism and cybercrime
have apparently focused their surveillance elsewhere. The FBI and the
National Security Agency, which monitors international telecommunications,
declined to comment on what strategy, if any, they have for dealing with
On Wed, 12 Dec 2001, Faustine wrote:
I don't know, how about traffic analysis?
Yes, but see my previous post.
Exploiting (publicly) undisclosed holes in the remailer software?
Same problem as traffic analysis if you are talking about compromising the
remailer. Doesn't work after the fact.
On Tue, 18 Dec 2001, David Honig wrote:
Can't spam be repelled by not forwarding email not encrypted to
the remailer's key?
Who is to say that spammers won't use remailer clients that automatically
encrypt to the remailers' keys?
Using remailer clients should be *easy*. Saying this is too
On Sat, 29 Dec 2001, Bill Stewart wrote:
Obviously there are some destinations that need to be exceptions.
Usenet's easy - keep track of known mail2news gateways,
and any time you send mail to Usenet, you need to put lots of disclaimers
about it's remailed, it's probably forged, there's no
On Fri, 18 Jan 2002, F. Marc de Piolenc wrote:
Von Buelow: Right, but actually it was astounding: There are 26
intelligence services in the U.S.A. with a budget of $30 billion--
26? Huh? Okay - CIA, DIA, NSA, the State Department's intel/security
arm, the individual Armed Services... that
On the East Coast, Ashcroft announced that the US is on its highest state
of alert for terror attacks.
On the West, the DEA led an armed raid against a medical marijuana
facility in San Francisco, arresting four people, stealing 600
marijuana plants, and depriving California's ill of their
On Fri, 22 Feb 2002, Neil Johnson wrote:
I believe that Ron Rivest (the R in RC4) has already created a version for
jail-cell use.
Pick up a copy of Cryptonomicon by Neal Stephenson. It's used in the book
and there is an appendix in
the back that explains the algorithm in good detail.
I bought a USA Today this morning.
This, in itself, isn't news, though it is out of character for me. I
usually read my news online, and eschew printed papers. But today was
different.
On Page 14A was the most beautiful thing I have ever seen.
There, in full page black and white print was US
On Sun, 10 Feb 2002, Anonymous wrote:
As someone I knew who used to work for the US
government once told me, the only perfect crime
is the one for which you aren't even a suspect.
Perfectly sound reasoning--and if he knew this as
a civilian there's no reason on this earth to
think he would
On Thu, 9 Jan 2003, Tyler Durden wrote:
Soma? Despite the fact that I've read large chunks of the Rig Vedas, I
don't remember anything called Soma (unless this is a Brave New World
Reference). Of course, the Bhagavad Gita is a subsection of the
Mahabaratabut I don't imagine this is what
On Sat, 11 Jan 2003, Bill Stewart wrote:
Any time you post to a list of a bunch of people you don't know,
you might be posting to a list of a bunch of people you don't like.
Reading the archives sometimes helps.
A (hopefully) helpful hint for the newcomers to this list: Bill is usually
the
On Mon, 13 Jan 2003, Tim May wrote:
Samsung unveil new 3G camcorder phone
http://www.3gnewsroom.com/3g_news/jan_03/news_2906.shtml
Hardly Brinworld. And T-Mobile has had it for awhile.
Why is warmed-over technology news given headlines?
... and they lie about it being 3G (which doesn't
On Tue, 14 Jan 2003, Steve Mynott wrote:
... and they lie about it being 3G (which doesn't exist yet.)
It's a CDMA2000 phone which is 3G.
3G networks exist in many parts of the world, although behind schedule
in other parts.
Hmm. I actually can't find any specs on that phone's max speed.
On Sat, 18 Jan 2003, Harmon Seaver wrote:
Ah, now I see. Before, I was thinking that he was talking about the passage
where Onan pulls out and spills his seed on the ground, which, somehow, became a
prescription against masturbation, although reading it, especially in context,
is clearly
On Thu, 23 Jan 2003, Eric Cordian wrote:
Nonetheless, it's an interesting story.
I should note that the high security building I live regards master keying
doors as a bad thing to do, and they have a key board and a signout
sheet in the main office.
On Mon, 3 Feb 2003, Thomas Shaddack wrote:
...and some very, very tiny fraction may have actually touched
some component which made them slightly ill.
Tf they ingested a part made of beryllium alloy, it could make them pretty
sick...
Gee golly! I'm so glad that CNN told me that the space
On Sun, 23 Mar 2003, Lucky Green wrote:
The question is - do I have to code this or has someone
already done it ?
http://www.lokmail.com/
It is inadvisable that anyone use Lokmail. The implications of a
trust-us encrypted mail service are obvious, and the people behind
Lokmail are of
Google itself has started doing a similar thing if you use its toolbar for
IE. Google's toolbar will phone home to google so that it can report the
Page rank value of every website you visit. (This is the value that
Google generates to determine how important a given web page is, based on
the
On Mon, 25 Mar 2002, Bill Stewart wrote:
While SSL implementations are mostly 1024 bits these days,
aren't PGP Diffie-Hellman keys usually 1536 bits?
The ElGamal encryption keys (Diffie-Hellman is a misnomer in PGP's case)
are usually 2048 bits, though the DSA signing keys are almost always
-BEGIN PGP SIGNED MESSAGE-
The lne list trims away some of the headers, so tracing this forgery back
to the source authoritatively is difficult, but one immediately thinks of
Deep Cover Agent mattd when reading this, as he seems incapable of using
the space bar in a consistent fashion.
NAI is now taking steps to remove the remaining copies of PGP from the
Internet, not long after announcing that the company will not release its
fully completed Mac OS X and Windows XP versions, and will no longer sell
any copies of its PGP software.
Do we still believe this was a pure
On Thu, 23 May 2002, Lucky Green wrote:
Adam wrote:
Which is too bad. If NAI-PGP went away completely, then
compatability problems would be reduced. I also expect that
the German goverment group currently funding GPG would be
more willing to fund UI work for windows.
Tell me about
On Thu, 23 May 2002, Curt Smith wrote:
This is a fairly accurate description of the situation, but
neglects to emphasize that the reason [1-cypherpunk] bothers
convincing [2-coerced associate] to use encrypted e-mail is
because [1] understands its importance and is attempting to
On Thu, 23 May 2002, Adam Back wrote:
On Thu, May 23, 2002 at 03:05:49PM -0400, Adam Shostack wrote:
So what if we create the Cypherpunks Root CA, which (either) signs
what you submit to it via a web page, or publish the secret key?
This won't achieve the desired effect because it will
On Thu, 14 Nov 2002, Keith Ray wrote:
It's been a number of years since Jim Bell wrote his infamous
Assassination Politics essay. If someone were to try to implement
the system today and not share Jim Bell's fate, they would need
absolute anonymity and security. The technical requirements
On Fri, 9 Aug 2002, Anonymous User wrote:
This program can be used by anonymous contributors to release partial
information about their identity - they can show that they are someone
from a list of PGP key holders, without revealing which member of the
list they are. Maybe it can help in
On Wed, 21 Aug 2002, Anonymous wrote:
Clearly we need a new approach. Here is a suggestion for a simple
solution which will give everyone an important secret that they will
avoid sharing.
At birth each person will be issued a secret key. This will be called
his Mojo.
[snip]
Now all
After attempting to kill PGP, NAI is now working on big brother in a
box.
From: http://news.com.com/2100-1001-955392.html?tag=fd_top
Security company Network Associates said Monday that it had purchased a
small start-up whose software lets corporations and others wiretap their
computer
... just making certain Lucky has seen this gem.
-- Forwarded message --
Date: Mon, 2 Sep 2002 10:37:23 -0700 (PDT)
From: Mike Benham [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Outlook S/MIME Vulnerability
On Wed, 11 Sep 2002, Lisa wrote:
http://www.cacr.math.uwaterloo.ca/hac/
http://developers.slashdot.org/developers/02/09/11/1616231.shtml?tid=93
Handbook of Applied Cryptography
Posted by michael on Wednesday September 11, 12:24PM
from the complete-from-adelman-to-zimmerman dept.
cconnell
On Sat, 21 Sep 2002, Major Variola (ret) wrote:
At 11:08 AM 9/21/02 -0400, Greg Vassie wrote:
says Dr Ann Coavoukian, the commissioner of information and privacy
in
Ontario, U.S.A. People are lying and vendors don't know what is
false [or
As a resident of Ontario, Canada, I'm quite
On Sun, 6 Oct 2002, Morlock Elloi wrote:
It seems to be strange that he wrote at [EMAIL PROTECTED],
an address which is also given on his web page, but
ping pipeline.com doesn't work.
Sorry to resort to ad hominem, but you're a technological imbecile.
There is this magic thing in DNS
On Thu, 17 Jul 2003, Mike Rosing wrote:
On Thu, 17 Jul 2003, Tyler Durden wrote:
The conspiracy theorist is telling me there's some reason they floated the
optical tempest story, though I can't quite figure out what that reason
is...
The main purpose is for academic gain. If you'd
If one were inclined to host a cypherpunks list node, where would one
obtain the necessary information?
-MW-
NAI is now taking steps to remove the remaining copies of PGP from the
Internet, not long after announcing that the company will not release its
fully completed Mac OS X and Windows XP versions, and will no longer sell
any copies of its PGP software.
Do we still believe this was a pure
On Thu, 23 May 2002, Adam Back wrote:
On Thu, May 23, 2002 at 03:05:49PM -0400, Adam Shostack wrote:
So what if we create the Cypherpunks Root CA, which (either) signs
what you submit to it via a web page, or publish the secret key?
This won't achieve the desired effect because it will
On Thu, 23 May 2002, Curt Smith wrote:
This is a fairly accurate description of the situation, but
neglects to emphasize that the reason [1-cypherpunk] bothers
convincing [2-coerced associate] to use encrypted e-mail is
because [1] understands its importance and is attempting to
On Fri, 9 Aug 2002, Anonymous User wrote:
This program can be used by anonymous contributors to release partial
information about their identity - they can show that they are someone
from a list of PGP key holders, without revealing which member of the
list they are. Maybe it can help in
On Wed, 21 Aug 2002, Anonymous wrote:
Clearly we need a new approach. Here is a suggestion for a simple
solution which will give everyone an important secret that they will
avoid sharing.
At birth each person will be issued a secret key. This will be called
his Mojo.
[snip]
Now all
On Fri, 30 Aug 2002, Adam Shostack wrote:
I'd like to suggest that while this may be fun, usability and getting
millions of users to see that remailers are useful to them is a more
useful goal.
I agree, although I fail to see how working on this would interfere with
that goal in any way.
... just making certain Lucky has seen this gem.
-- Forwarded message --
Date: Mon, 2 Sep 2002 10:37:23 -0700 (PDT)
From: Mike Benham [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Outlook S/MIME Vulnerability
On Wed, 11 Sep 2002, Lisa wrote:
http://www.cacr.math.uwaterloo.ca/hac/
http://developers.slashdot.org/developers/02/09/11/1616231.shtml?tid=93
Handbook of Applied Cryptography
Posted by michael on Wednesday September 11, 12:24PM
from the complete-from-adelman-to-zimmerman dept.
cconnell
On Sat, 21 Sep 2002, Major Variola (ret) wrote:
At 11:08 AM 9/21/02 -0400, Greg Vassie wrote:
says Dr Ann Coavoukian, the commissioner of information and privacy
in
Ontario, U.S.A. People are lying and vendors don't know what is
false [or
As a resident of Ontario, Canada, I'm quite
On Sun, 6 Oct 2002, Morlock Elloi wrote:
It seems to be strange that he wrote at [EMAIL PROTECTED],
an address which is also given on his web page, but
ping pipeline.com doesn't work.
Sorry to resort to ad hominem, but you're a technological imbecile.
There is this magic thing in DNS
On 13 Dec 2002, Sleeping Vayu wrote:
Uh...I'd point out that this is no coincidence. The Conpiracy Theorist
would say that the War on Drugs was precisely the CIA's way to keep
its own drug prices high and continue funding their own little
activites.
Plausible.
Oh, and aside from the fatass
On Tue, 24 Dec 2002, Anonymous wrote:
(unrelated, I noticed that there is no un-crippled free version of PGP
for windows XP any more - 8.0 beta expired)
What about PGP 8.0 Freeware? That isn't crippled. (It doesn't include
automatic email plugins, which many think are a bad idea anyway, and
On Thu, 9 Jan 2003, Tyler Durden wrote:
Soma? Despite the fact that I've read large chunks of the Rig Vedas, I
don't remember anything called Soma (unless this is a Brave New World
Reference). Of course, the Bhagavad Gita is a subsection of the
Mahabaratabut I don't imagine this is what
On Mon, 13 Jan 2003, Tim May wrote:
Samsung unveil new 3G camcorder phone
http://www.3gnewsroom.com/3g_news/jan_03/news_2906.shtml
Hardly Brinworld. And T-Mobile has had it for awhile.
Why is warmed-over technology news given headlines?
... and they lie about it being 3G (which doesn't
On Tue, 14 Jan 2003, Steve Mynott wrote:
... and they lie about it being 3G (which doesn't exist yet.)
It's a CDMA2000 phone which is 3G.
3G networks exist in many parts of the world, although behind schedule
in other parts.
Hmm. I actually can't find any specs on that phone's max speed.
On Sat, 18 Jan 2003, Harmon Seaver wrote:
Ah, now I see. Before, I was thinking that he was talking about the passage
where Onan pulls out and spills his seed on the ground, which, somehow, became a
prescription against masturbation, although reading it, especially in context,
is clearly
On Thu, 23 Jan 2003, Eric Cordian wrote:
Nonetheless, it's an interesting story.
I should note that the high security building I live regards master keying
doors as a bad thing to do, and they have a key board and a signout
sheet in the main office.
On Sat, 1 Feb 2003, Eric Cordian wrote:
The look on your fellow astronauts'
faces right before the grenade you are
holding explodes --PRICELESS
Please. If we're going to toss around conspiracy theories, let's make sure
they are sane. I am having a hard time imagining a
On Sun, 23 Mar 2003, Lucky Green wrote:
The question is - do I have to code this or has someone
already done it ?
http://www.lokmail.com/
It is inadvisable that anyone use Lokmail. The implications of a
trust-us encrypted mail service are obvious, and the people behind
Lokmail are of
On Mon, 25 Aug 2003, Major Variola (ret) wrote:
I'm told by an organizer that
Bruce Schneier will be speaking at toorcon in San Diego this year.
See www.toorcon.org for info.
This is of interest why?
On Fri, 22 Aug 2003, Thomas Shaddack wrote:
Yet more info. Let's not overreact before we get complete dataset.
It is worth noting that the notice mentioned below was placed on the JAP
website only after the news of the back channel was made public on Usenet
and the various security mailing
On Sun, 31 Aug 2003, Anonymous wrote:
Some librarians are probably now thinking they have a patriotic duty to
see what people are reading and to report any suspicious behavior.
Part of the intent of the Patriot Act and the Library Awareness Program
was to bamboozle the nation's librarians
If one were inclined to host a cypherpunks list node, where would one
obtain the necessary information?
-MW-
97 matches
Mail list logo