At 12:39 AM 01/04/2003 -0800, Sarad AV wrote:
There has been much speculation around Fermi's famous
question: Where are they? Why haven't we seen any
traces of intelligent extraterrestrial life?. One way
in which this question has been answered (Brin 1983)
is that we have not seen any traces of
At 02:18 AM 01/03/2003 -0800, Tim May wrote:
On Wednesday, January 1, 2003, at 08:55 PM, Michael Cardenas wrote:
People do break cyphers, by finding weaknesses in them. Are you saying
that you think that current cyphers are unbreakable?
You know not whereof you speak.
Breaking RSA or similar
At 11:50 AM 12/13/2002 -0500, R. A. Hettinga wrote:
...It had to happen sooner or later, I suppose...
--- begin forwarded text
From: [EMAIL PROTECTED]
Subject: [e-gold-list] Announcing Seagold.net: E-mail Privacy, Secure,
Encrypted, accepts e-gold
...
Introducing Seagold.net, a secure web-based
At 03:57 PM 12/19/2002 -0500, Adam Shostack wrote:
On Mon, Dec 16, 2002 at 04:56:12PM -0500, John Kelsey wrote:
| I think this would help, but I also think technology is driving a lot of
| this. You don't have to give a lot more information to stores today than
| you did twenty years ago for
At 03:07 AM 12/21/2002 -0800, Sarad AV wrote:
hi,
Don't encrypt, post it by snail mail.
I remember reading this in pgp's help document.
It addresses why we glue over our envelope and seal it.
It ofcourse is concealing (for the govt) and privacy (for the user).
The govt. never asks letters not to
At 11:41 AM 12/31/2002 -0800, Michael Cardenas wrote:
I only ask this because I'm deciding whether to
study computational neuroscience or cryptography in grad school.
Are you planning to get a PhD and/or do research,
or just a terminal master's degree to do engineering?
If you're planning to
At 12:27 PM 12/31/2002 -0800, Michael Cardenas wrote:
On Tue, Dec 31, 2002 at 12:12:02PM -0800, Tim May wrote:
On Tuesday, December 31, 2002, at 11:32 AM, Michael Cardenas wrote:
As for your point about prescription drugs, box cutters, kitchen knives
being trackable, I assume this is a troll
At 09:49 AM 12/31/2002 -0800, Kevin Elliott wrote:
Interesting point on grocery cards... Why do they have your name at all?
Remember when people used checks and had check cashing cards
at grocery stores? Some grocery store chains used courtesy cards
to replace that function. More
From 1997 Reason Interview...
LOOKING FOR RESULTS
Nobel laureate Ronald Coase on rights, resources, and regulation
Interviewed by Thomas W. Hazlett
Again, in 1960, Coase rearranged the study of economics with his essay The
Problem of Social Cost. It analyzed what happens when economic
At 01:35 PM 12/20/2002 -0800, Mike Rosing wrote:
On Fri, 20 Dec 2002, Major Variola (ret) wrote:
The moral equivalent of the pre-telegraph French semaphore soldiers
doing the macarena...
:-)
To the tune of I'm a lumberjack and I'm ok.
:-)
Hey, you're hearing that more and more often in
At 6:11 PM -0800 on 12/12/02, Lucky Green wrote:
Agreed. A few years ago, some would advocate that on the Internet,
no national laws apply. This was, of course, nonsense. Instead,
every single national, regional, and local law in effect today
anywhere in the world applies to anything you do to
At 05:21 AM 12/13/2002 +, Peter Fairbrother wrote:
Dave Del Torto wrote:
Resumes should be in plain
ASCII text format with a PGP signature (detached sigs are OK) and on
floppy disk or CD-R also containing a copy of the applicant's PGP
public key.
Fuck off.
If you think that a PGP key
At 10:00 PM 12/10/2002 -0600, Jim wrote:
On Tue, 10 Dec 2002, Tim May wrote:
(Sidebar: I often wish for TIVO radio.
It's called cron and your friendly TV card w/ FM radio.
There are also USB-controlled external radios from people like D-Link.
(They don't use the USB for audio, just for
At 08:43 AM 12/11/2002 -0800, Tim May wrote:
On Wednesday, December 11, 2002, at 01:31 AM, Morlock Elloi wrote:
In a way, Mathew's and Choate's attack upon the list has done
us a favour. The list is now effectively restricted to those
with the will and ability to use filters, which raises the
At 08:52 AM 12/09/2002 -0600, Harmon Seaver wrote:
Anyone know anything about Akamai (www.akamai.com, also
akamaitechnologies.com)? I was getting about a zillion hits on my web server
from them this morning. They seem to offer services to gov't agencies
according
to their website.
Akamai's
At 02:17 AM 12/05/2002 +, Peter Fairbrother wrote:
OK, suppose we've got a bank that issues bearer money.
Who owns the bank? It should be owned by bearer shares, of course.
Why?
Or the propounders wanting to: make a profit/control the bank?
There are two main reasons honest people start
At 11:38 PM 12/06/2002 -0600, Jim Choate wrote:
You should have tried this back in the late 80's with a single frame VHS
recorder and an Amiga Video Toaster...one frame at a time, thank god for
AREXX ;)
If you were actually using the Video Toaster, and not just the Amiga's CPU,
you had what
At 11:36 PM 11/19/2002 -0800, Tim May wrote:
On Tuesday, November 19, 2002, at 11:20 PM, Tim May wrote:
* Add additional names...perhaps some in-laws, relatives, college
friends, or colleagues of those who are responsible for this Witch Hunt.
It may be unfortunate to implicate some
At 10:23 AM 11/24/2002 -0600, Neil Johnson wrote:
(Referring to previous thread about capturing video.)
As I sit here looking at a 64 MB SD Card that I just picked up for $28 at my
local Wally World, I was wondering why it (or it is larger capacity brethren)
couldn't be used to record video and
That, or it's a dot-com that didn't make it,
or an office-space construction that someone hoped to sell to a dot-com
but missed the boom. There's huge amounts of that in SF.
At 05:37 PM 11/24/2002 -0600, Neil Johnson wrote:
On Sunday 24 November 2002 04:49 pm, Tarapia Tapioco wrote:
There is a
At 01:02 PM 11/18/2002 -0500, Declan McCullagh wrote:
http://news.com.com/2010-1069-966164.html
Perspective: Say hello to Big Brother
By Declan McCullagh
November 18, 2002, 7:05 AM PT
WASHINGTON--Like it or not, the proposed Department of Homeland
Security firmly establishes
At 02:27 PM 11/18/2002 -0800, Bill Frantz wrote:
At 10:42 AM -0800 11/15/02, Sunder wrote:
What's disturbing about this is that we are on someone's list as e-gold
customers or something, and this is very likely the same spoofer that had
earlier set up e-golb.com and attempted the same kind of
James Donald writes:
In principle it should be possible to create poker playing
software where the server cannot cheat, but it is not obvious
to me how this can be done.
Does anyone know of a cheat proof algorithm?
At 05:40 AM 11/15/2002 +0100, Nomen Nescio wrote:
Sure, there are any
At 10:51 AM 11/12/2002 -0800, James A. Donald wrote:
Alleged attempts to introduce internet currencies have a ninety
percent humbug and fraud rate.
And the other 10% have unsustainable business plans
:-)
At 09:20 AM 11/07/2002 -0800, our local weapon of mass destruction forwarded:
Sharon Shea-Keneally, principal of Mount Anthony Union High School in
Bennington, Vermont, was shocked when she received a
letter in May from military recruiters demanding a list of all her
students, including names,
http://www.theregister.co.uk/content/5/27917.html
German secret service taps phones, bills buggees
By Tim Richardson
Posted: 04/11/2002 at 14:30 GMT
A software error is being blamed for an incident in which mobile phone
users discovered they were being bugged by German secret squirrels.
[EMAIL PROTECTED] (Major Variola ret) writes:
http://www.washtimes.com/national/20021104-81830128.htm
Officials attempt to get inside cells of al Qaeda in U.S.
At 11:09 PM 11/04/2002 -0500, Elyn Wollensky wrote:
your point would be
;~)
If people start showing up at Cypherpunks
Reported on the NANOG list
There's been an explosion in a power distribution center in amsterdam,
over
half the city is without power, and, as far as I know, the Nikhef building
is competely powerless, Telecity is running on backup generators. Redbus
building seems at least partially up, but
Estimating crowd sizes is difficult even if you don't have
good visibility, and for most events, there are at least
two or three sets of people estimating crowd size who have
axes to grind that bias their results. Washington DC's
especially bad about that.
According to the newsblurb we heard in
At 06:31 PM 10/27/2002 -0800, Tim May wrote:
On Sunday, October 27, 2002, at 01:04 PM, Bill Stewart wrote:
[Hmm. lne.com spam-blocked me on the first attempt.
Can you provide details?
If lne.com is blocking posts, I will have to find another CP node.
I don't think Eric will mind me
[Sorry about any duplicated - lne.com spam-blocked me the first time.]
At 01:34 PM 10/27/2002 +0100, Eugen Leitl wrote:
Advent of another technology wide deployment of which we must delay as
long as possible. ...
Unfortunately, brinistas welcome this development because they idiotically
assume
[Hmm. lne.com spam-blocked me on the first attempt.
Given the identity of the research group, I forgot to add the obvious
The computer says he's a rambling wreck from Georgia Tech.
]
At 01:36 AM 10/27/2002 -0400, Declan McCullagh wrote:
See also:
At 06:02 PM 10/21/2002 -0700, Major Variola (ret) wrote:
So two illegals are going back because they were in a white van
near a pay phone. They're fortunate, they only got the
12gauge in the face and the asphalt facial;
in a month it'll be a cruise missile first, forensics later.
If this were
http://www.satirewire.com/news/aug02/encryption.shtml
HACKERS BEG BORING PEOPLE TO STOP ENCRYPTING EMAIL
Security Experts Concur Most of You Have Nothing Worth Encrypting Anyway
San Jose, Calif. (SatireWire.com)
In an unusual worldwide appeal, the International Brotherhood of
Computer Hackers
Subject: Fwd: BNA's Internet Law News (ILN) - 10/18/02
FINLAND CONSIDERING NEW INTERNET SPEECH RESTRICTIONS
Finland is considering establishing changes to its freedom
of speech laws that focus on the Internet. A proposed bill
would allow a court to order an online publication to remove
messages
[There's been some discussion of whether you can trust hardware crypto.]
At 11:54 AM 10/18/2002 -0400, Tyler Durden wrote:
OK...a follow up question (actually, really the same question in a
diferent form).
Let's say I had a crypto chip or other encryption engine, the code of
which I could not
At 10:52 PM 10/17/2002 -0700, Morlock Elloi wrote:
I have a working OTP system on $40 64 Mb USB flash disk on my keychain.
Cute. Is it available?
$39 + tax in Fry's.
I don't mean the disk - there are lots of those.
I mean your software.
Also, can your tool use floppies instead of USB keys?
At 02:04 PM 10/17/2002 +0200, Eugen Leitl wrote:
It is important to note that currently NMR bases systems only allow for
6 qubits. Only very recently we're getting practical qubits in solid state.
.
Everybody realizes that we're discussing currently completely theoretical
vulnerabilities,
At 12:16 PM 10/17/2002 -0700, Morlock Elloi wrote:
I have a working OTP system on $40 64 Mb USB flash disk on my keychain.
Cute. Is it available?
How do you prevent other applications from reading the file off your
USB disk, either while your application is using it or some other time?
That's
At 09:20 PM 10/16/2002 -0400, Sam Ritchie wrote:
ACTUALLY, quantum computing does more than just halve the effective key
length. With classical computing, the resources required to attack a given
key grow exponentially with key length. (a 128-bit key has 2^128
possibilities, 129 has 2^129,
David E. Weekly[SMTP:[EMAIL PROTECTED]]
As for PKI being secure for 20,000 years, it sure as hell won't be if
those million-qubit prototypes turn out to be worth their salt.
Think more like 5-10 years. In fact, just about everything except
for OTP solutions will be totally, totally
At 09:01 PM 10/11/2002 -0400, Steve Furlong wrote:
There are two advantages of web-based discussion fora over usenet:
propagation time and firewalls. On the other hand, few discussions are
so urgent that they need near-real-time reparte, and participants
shouldn't be cruising usenet from work.
Our bombing of the sudanese
pharmacuetical factory?
Yes: The factory was bombed, but actual
deaths were one night watchman, not tens of thousands,
If so, that's gross incompetence on the part of the US military,
since the official rationale for why we were cruise-missiling it
was that we
packaging strong crypto inside weak crypto
At 01:06 PM 10/13/2002 -0400, Tyler Durden wrote:
Oh yeah. Interesting. Of course, this would be done only.
if the sender knew or supected how mass-scanning might be done.
And so the existence of another level of heavier encryption ...
might be a tip off
At 06:53 PM 10/08/2002 -0500, Neil Johnson wrote:
Many major net service providers (ISP's and Web Sites) try to host at least
one of their DNS servers at different sites and on different network
providers (some are paranoid enough to use different implementations of BIND
and different OS
Somebody backdoored the source code for Sendmail on the official server.
So if you recompile from scratch, your sendmail is 0wned.
Another reason not to run mail systems as root
http://rss.com.com/2100-1001-961311.html?type=ptpart=rsstag=feedsubj=news
By Robert Lemos
Staff Writer, CNET
The following web page is about recent projects at the
Air Force Research Laboratory. Item 8 is about new wiretap technology,
designed to monitor large numbers of conversations for drug activity.
The accompanying artwork has a large and small version of a
wiretapper logo, which should be
Robin Whittle[SMTP:[EMAIL PROTECTED]] wrote:
.
[lots of good stuff about the music business clipped]
I think this is an accurate analysis of a really sad situation. Like
King Canute, the record companies are devoting most of their thinking
and resources to holding back the tide.
As
At 12:38 PM 10/06/2002 +0200, Mok-Kong Shen wrote:
It seems to be strange that he wrote at [EMAIL PROTECTED],
an address which is also given on his web page, but
ping pipeline.com doesn't work.
Lots of machines don't accept pings anymore,
either for security reasons or whatever.
That's
At 09:11 AM 10/01/2002 -0700, Major Variola (ret) wrote:
After reading the last paragraph in the excerpt below,
it occurs to me how much fun could be had in DC with some chalk,
even without an 802.11blah receiver :-)
Depending on how well-read the security folks are about warchalking,
you can
At 09:05 AM 10/01/2002 -0700, Major Variola (ret) wrote:
So yes Alice at ABC.COM sends mail to Bob at XYZ.COM and
the SMTP link is encrypted, so the bored upstream-ISP netops
can't learn anything besides traffic analysis.
But once inside XYZ.COM, many unauthorized folks could
intercept Bob's
At 09:38 PM 09/30/2002 -0700, Bram Cohen wrote:
Peter Gutmann wrote:
I recently came across a real-world use of steganography which hides extra
data in the LSB of CD audio tracks to allow (according to the vendor) the
equivalent of 20-bit samples instead of 16-bit and assorted other
At 09:38 AM 09/27/2002 -0400, Adam Shostack wrote:
The US Government has mistakenly given secret documents to the only
man charged so far in connection with the 11 September attacks,
Zacarias Moussaoui.
http://news.bbc.co.uk/2/hi/americas/2284325.stm
That wasn't because they gave him a security
At 07:53 PM 09/27/2002 -0500, Harmon Seaver wrote:
Forget the pencils and pens, just ban paper. Or perhaps a step in the right
direction would be to ban all paper except that made from hemp, thereby
solving
numerous problems at the stroke of a (gasp) pen.
You don't need to do that - just
At 04:34 PM 09/23/2002 -0700, James A. Donald wrote:
The biggest application of smart cards that I know of are
anonymous phone minutes.
They're also used for non-cellular phone minutes -
Ladatel in Mexico is a big user, and I've worked with some
British Telecom folks whose business cards are
Sounds like libel to me.
So there's a published list, even if it's only published to cops,
saying This person is likely to commit a crime.
Leave aside the obvious civil liberties issues for the moment -
this seems like simple libel to me. At least for the Usual Suspects
who haven't yet been
At 12:58 AM 08/11/2002 -0700, Lucky Green wrote:
BTW, does anybody here know if there is still an email time stamping
server in operation? The references that I found to such servers appear
to be dead.
The canonical timestamping system was Haber Stornetta's work at
Bellcore, commercialized at
Click your heels together three times and say There's No Place Like Home
and you'll be back in bed in Kansas. And yer little dog, too
At 08:49 PM 07/09/2002 -0500, Harmon Seaver wrote:
On Tue, Jul 09, 2002 at 03:17:52PM -0400, Sunder wrote:
Sure, you can revive old hardware with Linux, but you'll find it runs KDE
3.0 or GNOME slower than windows 95 did on the same hardware. So unless
you're willing to also go to older
At 06:31 PM 07/06/2002 -0700, Joseph Ashwood wrote:
First, closed source testing, beginning in the late Alpha testing stage, is
generally done without any assistance from source code, by _anyone_, this
significantly hampers the testing.
This has led to observed situations where
QA engineers sign
The Indianapolis Star newspaper ran the NYTimes version of this story
with the headline Drug Peddling Pilots May Get Wings Clipped.
I was assuming it would be about revoking their pilots' licenses
or confiscating their airplanes, but no, it was about
shooting them down and machine-gunning any
standards for link layer and addressing formats and pricing,
though I'm not directly familiar with standards for shipping containers
where data encapsulation is required.
Thanks; Bill Stewart, [EMAIL PROTECTED]
From: Jon Zittrain [EMAIL PROTECTED]
Subject: Re: FC: Data
At 10:07 PM 06/26/2002 -0700, Lucky Green wrote:
An EMBASSY-like CPU security co-processor would have seriously blown the
part cost design constraint on the TPM by an order of magnitude or two.
Compared to the cost of rewriting Windows to have a infrastructure
that can support real security?
One of the usual arguments for key escrow was always
what if your employee dies and you can't get his data?
Secret Sharing techniques are of course a better approach,
or at least storing sealed envelopes in company safes
as a much better approach than pre-broken crypto.
There've been a couple of
At 09:43 PM 06/28/2002 +0200, Thomas Tydal wrote:
Well, first I want to say that I don't like the way it is today.
I want things to get better. I can't read e-books on my pocket computer,
for example, which is sad since I actually would be able to enjoy e-books
if I only could load them onto my
Bob - I'm not sure if you copied David separately/Bcc on your reply,
and I've dropped Cc:s to some of your lists that I'm not on,
and I missed your original message that David flamed you for
which you're flaming back about, but
Perhaps I've missed some really critical things the time or two
At 03:31 AM 06/29/2002 -0700, [EMAIL PROTECTED] wrote:
Thanks Bill, for passing on your message, along with the news that I've been
dissed and discussed by R.A. Hettinga. Naturally, he never informed me, nor
copied me his missives, nor invited me to answer. This appears to be quite
typical.
Vitas - I hope you're enjoying your stay at the Millenium Copthorne Hotels,
where you're using the internet service.
You can find all the cracking tools you need for Jane's at 128.11.100.130
and 167.216.248.42.
Delivered-To: [EMAIL PROTECTED]
X-Originating-IP: [195.224.80.50]
From: cristian
F.B.I. Given Broad Authority to Monitor the Public
By THE ASSOCIATED PRESS
WASHINGTON (AP) -- Attorney General John Ashcroft on Thursday
gave the FBI broad new authority to monitor Internet sites,
libraries, churches and political organizations,
calling restrictions on domestic spying
Peter Wayner has a few books that deal with this and related topics.
Search for them on Amazon or wherever.
At 11:19 AM 05/29/2002 -0400, you wrote:
I am writing my dissertation on steganography. Basically I'm writing a
technical monograph that would be of use to undergraduate instructors.
What
At 12:43 AM 05/22/2002 -0400, R. A. Hettinga wrote:
At 11:49 PM -0400 on 5/21/02, Luis Villa wrote, on FoRK:
Well, yes, but you seem to be implying some sinister motive that
not all of us are reading between the lines clearly enough to see
:) I mean, otherwise, this just seems like a fairly
At 03:50 PM 05/12/2002 -0700, Tim May wrote:
On Sunday, May 12, 2002, at 07:00 AM, Jim Choate wrote:
On or about Sun, 12 May 2002, somebody wrote:
People don't actually have to understand it as long as they get paid,
of course. People who are getting paid want to get paid as cheaply
as
%2fa1qhqHICeS9a7ai2OltFkZiYgPDszCFjxJvJ3UztMHzmFTCWjOQiJv2UTeibsDTf5lX9Oul8Duzz5H7zRf28q5W1dNWEBuSwmIPN5CsnCBt%2fxKER0o8urmuYY0JLBD%2bcq4kxukn3wumZakgMOfn1A8xylUh5faGP64S6LM40YY9rGDpd4sUKuLClF5LIam8E%3d
Weather Forecast: high 70s.
---
Contact information, or if lost
Bill Stewart - +1-415-307-7119 - [EMAIL PROTECTED]
Dave
At 05:06 PM 05/04/2002 -0700, Morlock Elloi wrote:
Slightly unrelated, sort of poll:
Would anyone object if mail list software would limit number of daily messages
from the same source* to an arbitary percentage of total messages from all
sources ?
Yes - that's a job for client-side filters, not
At 12:41 AM 04/18/2002 -0400, An Metet wrote:
Maybe the subject line should actually be Die, Spammer, Die.
Don't go to JobsOnline.com -- it's a scam. They inundate you with
pop up ads while you're there, the kind that just don't quit, like
the porn sites, and once you've registered (which you
Ken Brown [EMAIL PROTECTED] writes:
For some reason the mention of a Susan B Anthony dollar stuck in my
brain as
an Alice B Sheldon dollar. Susan Anthony is a person who I've never heard
of. I'm almost tempted not to find out who she is or was to preserve a
nugget
of delicious cognitive
At 09:00 PM 04/11/2002 +0100, Ken Brown wrote:
Trei, Peter wrote:
Mea culpa. It's been a long time since I read 'Dangerous Visions'.
Must be, seeing as Harlequin was published in Galaxy magazine, then
reprinted in Ellison's Paingod and other Delusions, not in DV which
was an
At 06:53 PM 04/10/2002 -0700, and a number of other times, Tim May wrote:
--Tim May
Dogs can't conceive of a group of cats without an alpha cat. --David
Honig, on the Cypherpunks list, 2001-11
I've got three cats, and one of them very definitely is the alpha cat.
On the other hand, there's a
At 07:59 AM 04/08/2002 -0600, Anonymous wrote:
Any attacker who can control 100,000 machines is a major force on the
internet, while someone with a million or more is currently unstoppable:
able to launch massively diffuse DDOS attacks, perform needle in a
hayfield searches, and commit all sorts
On 2 Apr 2002 at 10:35, [EMAIL PROTECTED] wrote:
I've been monitoring the e-gold discussion list for some time and this
guy appears to be legit (i.e., a lack of negative comments). I have not
purchased from him, but am considering obtaining one of these. Would be
most interested in your
301 - 380 of 380 matches
Mail list logo