One thing to think about with respect to the RFID passports...
Um, uh...surely once in a while the RFID tag is going to get corrupted or
something...right? I'd bet it ends up happening all the time. In those cases
they probably have to fall back upon the traditional passport usage and
I don't agree.
One thing we do know is that, although Crypto is available and, in special
contexts, used, it's use in other contexts is almost counterproduct, sending
up a red flag so that those that Protect Our Freedoms will come sniffing
around and bring to bear their full arsenal of
: crypto on sonet is free, Tyler
Date: Tue, 25 Oct 2005 19:52:10 -0700
At 03:15 PM 6/8/04 -0400, Tyler Durden wrote:
Well, it's interesting to consider how/if that might be possible. SONET
scrambles the payload prior to transmission..adding an additional
crypto
layer prior to transmission would mean
Its unfortunate that some posters had to be reminded that anyone
calling for government-licensed reporters (and religions, as one
author included) deserves to have their carbon recycled, because
of the treason to the BoR. Tim May used to call government licensed
citizens special objects. Search
Cyphrpunk wrote...
The notion that someone who is willing to spend months in jail just to
keep a promise of silence needs killing is beyond bizarre and is
downright evil. This list supports the rights of individuals to tell
the government to go to hell, and that is exactly what Judy Miller
Apparently, it's possible to examine a color printer output and determine
make, model, and even print time.
http://www.eff.org/Privacy/printers/docucolor/
Soon we'll find out that toothbrushes are able to determine what I ate for
dinner and are regularly sending the info...
-TD
Uh...it's SAIC. I used to work for a subsidiary so I wouldn't touch this POS
with a ten-foot tempest pole.
-TD
From: [EMAIL PROTECTED] (Peter Gutmann)
To: [EMAIL PROTECTED]
Subject: TEMPEST PC for sale on ebay
Date: Sat, 15 Oct 2005 19:39:02 +1300
There's also some very nice advice for nontechnical people about things like
Mixmaster, checking IP addresses, and how to DO a lot of stuff making use of
the tools that are out there.
It's a great little book.
Oh yeah...I think Gilmore wrote a section in it.
-TD
From: Eugen Leitl [EMAIL
Steve Furlong wrote...
The noisy protocol has the added benefit of causing the network cable
to emit lots of radiation, frying the brains of TOR users. The only
defense is a hat made of flexible metal.
More than that, I'd bet they engineered that noise to stimulate the very
parts of the
Can anyone suggest a tool for checking to see if my Tor client is performing
any surreptitious signaling?
Seems to me there's a couple of possibilities for a TLA or someone else to
monitor Tor users. Tor clients purchased online or whatever could possibly
signal a monitoring agency for when
Well, the great thing about the Italians is that you can bet in large parts
of Italy the law is already routinely ignored. 6 months from now it will be
forgotten.
-TD
From: Eugen Leitl [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [EMAIL PROTECTED]: [IP] Italy requires logging of
In many segments of the credit card insutry meatspace is also irrelevant.
Anyone with a FICO greater than about 680 is almost certainly concered with
maintaining their reputation with the current crop of TRWs of the
world...collections efforts leverage the potential damage to the reputation,
Just a thought.
Wikipedia entries from anonymous sources, such as Tor, should have an
expiration date and revert back, unless a Wiki Admin or other trusted user
OKs the new entry.
-TD
From: Eugen Leitl [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [EMAIL PROTECTED]: Re: Pseudonymity
One way to build a psuedo-pseudonymous mechanism to hang off of Tor
that would be easy for the Wikipedians to deal with
would be to have a server that lets you connect to it using Tor,
log in using some authentication protocol or other,
then have it generate different outgoing addresses based on
No, this is important. If this isn't Cypherpunks material these days then
nothing is.
As for the Wikipedia folks, I can't imagine having a more intelligent batch
of people disagree. There's is a very practical matter: Reducing the
hassles, particularly when said hassles in general deteriorate
That's trivial: charge Tor-originated users for editing. That 0.0001% (all
three of them) that actually contributes to Wikipedia will be resourceful
enough to create untraceable payment accounts.
..and ensure that all future Tor-originated Wikipedia entries are about
anonymous payments and
Stupid assholes. Despite all the tech work in India going on, their military
apparently didn't realize that the world changed a long time ago (way before
Google). And if they can somehow block google, then I can merely purchase
the photos on the black market from a private satellite.
-TD
Oh...-that's- your point:
No, Wikipedia needs to realize that the IP address correlation they enjoy
outside of Tor is a happy accident, and that they should stop treating IP
addressess as user credentials. If they want credentials, they need to
implement them.
Well, is it reasonable to
Dont' agree here...
From: Steve Furlong [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: [EMAIL PROTECTED]: Re: Hello directly from Jimbo at
Wikipedia]
Date: Wed, 28 Sep 2005 09:41:34 -0400
On 9/28/05, Roy M. Silvernail [EMAIL PROTECTED] wrote:
A Wikiwhiner wrote
I have valid
Sorry...I don't understand...why would psuedonymity services be provided
within Tor?
An external reputation/psuedonymity server would of course reduce a Tor
users' anonymity to mere psuedonymity, but I don't see how it would do
anything more, and who cares? If Wikipedia (or anyone) doesn't
What the heck are you doing there for three weeks? Buying some golden
triangle goods?
I hear it's beautiful, however, but it's not like you took a direct
international flight there...
-TD
From: Peter Thoenen [EMAIL PROTECTED]
To: Eugen Leitl [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject:
the great Tyler Durden was
able to get a Tor client up-and-running, but I find it suspicious that this
early wave of Tor users also happen to have a high % of vandals...something
stinks.
A very subtle attack, perhaps? If I were so-and-so, I consider it a real
coup to stop the kinds
]
Subject: Re: Wired on Secrecy Power Sinks Patent Case
Date: Sun, 25 Sep 2005 23:55:48 -0700
At 09:14 AM 9/20/2005, Tyler Durden wrote:
Very interesting CPunks reading, for a variety of reasons.
http://www.wired.com/news/technology/0,1282,68894,00.html?tw=wn_tophead_1
Of course, the fact
phone to see
if it's always transmitting your location [priv]]
Date: Thu, 22 Sep 2005 10:11:10 -0700 (PDT)
From: Tyler Durden [EMAIL PROTECTED]
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to
see if
it's always transmitting
Are you sure?
-TD
From: R.A. Hettinga [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see
if it's always transmitting your location [priv]]
Date: Thu, 22 Sep 2005 10:05:31 -0400
At 2:59 PM +0200 9/22/05, Eugen Leitl wrote:
Very interesting CPunks reading, for a variety of reasons.
http://www.wired.com/news/technology/0,1282,68894,00.html?tw=wn_tophead_1
Of course, the fact that Lucent has been in shit shape financially must have
nothing to do with what is effectively a state-sponsored protection of
intellectual
On 2005-09-20T12:14:13-0400, Tyler Durden wrote:
Very interesting CPunks reading, for a variety of reasons.
http://www.wired.com/news/technology/0,1282,68894,00.html?tw=wn_tophead_1
I'm sick of this mosaic theory being used to justify preventing access
to unclassified information.
--
War
A few more Tor questions..
Are there yet commercial Tor web hosters? How much would this cost vs
hosting one's own node? Since I assume the website actually resides on a
single node, there is the slight problem of the node owner knowing, at
least, that he had been paid to host X sites, on
, Peter [EMAIL PROTECTED]
To: Tyler Durden [EMAIL PROTECTED]
Subject: RE: The ghost of Tim May
Date: Fri, 9 Sep 2005 09:17:47 -0400
Tyler Durden wrote:
Ulex Europae wrote...
Okay, I've been in a hole in the ground for a few years.
What happened
to Tim May?
May's ghost haunts and trolls lesser
What?
A pirate radio station in the Carribean is jamming broadcasts in New
Orleans? I find that hard to believe.
-TD
From: Eugen Leitl [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [EMAIL PROTECTED]: [IP] Radio jamming in New Orleans during rescue
operations]
Date: Fri, 9 Sep 2005
Like I said:
We need a WiFi VoIP over Tor app pronto! Let 'em CALEA -that-. Only then
will the ghost of Tim May rest in piece.
Then again, the FBI probably loves hanging out in Starbucks anyway...
-TD
From: Eugen Leitl [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [EMAIL PROTECTED]:
SQ wrote...
A Houston (TX, USA) public library? Could be next to impossible, as well
as excellent cause for revocation of your library card
Oh no! Loss of the Houston library card! My passport to knowledge!!!
criminal prosecution if caught.
Well, the idea would be not to get caught. I'm
Shawn Quinn wrote...
For the people that only route stuff like HTTP traffic through your Tor
node, it will be a benefit. If I'm IRCing and get routed through your
node, that's a different story (but it's no different than the bad old
days of IIP where people dropped off by the dozens when
While the US certainly has been interfering with Chavez
and generally trying to mess around in Venezuela for a while,
most of what's happening here is just that
Chavez is running off at the mouth for domestic political reasons.
(Pat Robertson was partly doing that also and partly just
Fascinating little gizmo.
Got a question...sorry I'm just too f'in busy to keep up with this side,
but...
How long will it take the Greater Tor Network to notice the existence of
this little node?
In other words, if I go into a Starbucks with this thing, can my laptop or
whatever start
some of those growers are
good customers of RSA products!
-TD
From: Trei, Peter [EMAIL PROTECTED]
To: Tyler Durden [EMAIL PROTECTED], cypherpunks@minder.net,
[EMAIL PROTECTED]
Subject: RE: [EMAIL PROTECTED]: [Politech] Montana Supreme Court justice
warns Orwell's 1984 has arrived [priv
Coderman wrote...
the state of oregon just passed a law (yet to be put into effect) that
requires a prescription from a doctor for all sudafed (pseudo
ephedrine) purchases. the problem isn't drug addicts killing
themselves with corrosive fluids, as this would be a problem that
solves itself
Holy Fuck we need some smarter people in this society.
OK, you threw away your trash. I see no inherent reason why someone else
can't grab it. But INFORMATION about you isn't trash. Then again, you do
throw away the photons that exit through your windows, so I guess cops
should be able to
.
-Tyler Durden
Remember, L-IIIa is your friend. :-)
And SG IIIb yours.
-TD
--
Yours,
J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF
I like the idea of belief in drug-prohibition as a religion in that it is
a strongly held belief based on grossly insufficient evidence and
bolstered
Sorry. Got you mixed up with the other dude.
You seem willing to back up any slams with facts quotes, so all respect is
given. A good fight strengthens us, a sniper smells of MwGs.
Sorry again.
-TD
From: J.A. Terranson [EMAIL PROTECTED]
To: Tyler Durden [EMAIL PROTECTED]
CC: [EMAIL
Hey...this looks interesting. I'd like to see the email chain before this.
While living in China I learned that whatever Jong Nan Hai most vociferously
denies will almost certainly be true, so even Chinese Government propaganda
is very interesting.
-TD
From: Dave Howe [EMAIL PROTECTED]
...I'm
the guy even the locals won't fuck with.
-Tyler Durden
From: Steve Thompson [EMAIL PROTECTED]
To: Tyler Durden [EMAIL PROTECTED]
CC: [EMAIL PROTECTED]
Subject: Re: Gubmint Tests Passport RFID...
Date: Sat, 13 Aug 2005 15:20:54 -0400 (EDT)
--- Tyler Durden [EMAIL PROTECTED] wrote
http://www.wired.com/news/privacy/0,1848,68451,00.html?tw=wn_tophead_2
And since one's passport essentially boils down to a chip, why not implant
it under the skin?
As for the encryption issue, can someone explain to me why it even matters?
It would seem to me that any on-demand access to
Whaddya know. Thompson said something that didn't make me want to beat him
to death...
I have a different threat model. I suggest that incompetence is _often_
deliberate and, at least to those who orchestrate such things, is designed
to leave or provide cracks in arbitrary systesm that will
Your telling me there's someone in Telcordia these days that does something
interesting in the cryptograhy field? Or is that his personal hobby...
-TD
From: R.A. Hettinga [EMAIL PROTECTED]
To: cryptography@metzdowd.com, [EMAIL PROTECTED]
Subject: [fc-announce] CFP FC'06: Financial
Reverse Rendition?
Here's where Liberals can take a stand...let's round up some of these
fuckers and stuff 'em in a shipping container on a Chinese barge to Italy.
I've done a quick google search and I've only found a couple of the names.
Is the complete list available?
-TD
From: Eugen
Actually, I did know that 300Mb/sec isn't super-huge for Denial of Service
attacks at least, but this is an obscure Tor node. Someone attacking it at
this stage in the game has a real agenda (perhaps they want to see if
certain websites get disrupted? Does Tor work that way for short-ish
Gee, that's great. A global organization that has taken the task of
worldwide censorship into its sweaty little hands.
Did the google cache'd versions of these sites dissappear too?
Tor networks, anyone?
-TD
From: R.A. Hettinga [EMAIL PROTECTED]
To: cryptography@metzdowd.com, [EMAIL
: Eugen Leitl [EMAIL PROTECTED]
To: Tyler Durden [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: [Clips] Finger points to British intelligence as al-Qaeda
websites are wiped out
Date: Mon, 1 Aug 2005 17:15:17 +0200
On Mon, Aug 01, 2005 at 10:54:26AM -0400, Tyler Durden wrote:
Tor networks
Thompson [EMAIL PROTECTED]
To: Tyler Durden [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: Well, they got what they want...
Date: Sat, 30 Jul 2005 16:32:57 -0400 (EDT)
--- Tyler Durden [EMAIL PROTECTED] wrote:
Well, apparently you haven't been getting any of my posts to the
Al-Qaeda
node
Well, apparently you haven't been getting any of my posts to the Al-Qaeda
node, otherwise the context would be clear.
As for...
Local authorities, however, can take these differences as meaningful and
act
upon them.
Yes they can. But should they?
From their perspective? Of course.
Any indication he was bludgeoned with a can of spam?
-TD
From: R.A. Hettinga [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [Clips] Russia's Biggest Spammer Brutally Murdered in Apartment
Date: Mon, 25 Jul 2005 23:09:11 -0400
--- begin forwarded text
Delivered-To: [EMAIL PROTECTED]
This premise, however, depends somewhat on the observation that the
so-called left and right-wing divisions of the political spectrum are
largely illusory. The most strident critics of diametric political
opposites in the press and elsewhere would disagree, but their very
occupations are
John Kelsey wrote...
I think the reality is a bit different. The random searches
won't keep someone who's planning an attack from trying to
carry it out, but it may delay their attack, if they made
plans based on the old security setup, not the new one. It
may also convince them to shift the
From: Steve Thompson [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: Well, they got what they want...
Date: Sat, 23 Jul 2005 16:01:30 -0400 (EDT)
--- Tyler Durden [EMAIL PROTECTED] wrote:
...I'm sure most are aware that random searches has begun here in NYC,
at subway stations
..I'm sure most are aware that random searches has begun here in NYC, at
subway stations and in the LIRR. Contraband (drugs, etc...) can get the
owner arrested.
The next step, of course, will be to start grabbing anyone carrying
terrorist propaganda, such as the Qu'ran, leaflets, or even the
Quit inciting me to bake US troops into pies. I didn't want to do it, but
you made such a convincing argument that I just had to. it's all your fault:
You FORCED me to bake Corp Anderson and Lieutenant Sanders into pies. (Well,
I actually didn't bake them in pies but baked some GI Joe action
How secure can I make a Java sandbox from the rest of the network I'm on?
Can I make it so that my network administrator can't see what I'm typing? In
other words, a secure environment that's sitting on an insecure machine.
And of course, there's a short term 'solution' (which will work until
That is interesting. One wonders if in certain circles of Russia people are
much more careful with their data and encrypting it. Who knows? A country
like that might evolve some fairly rigorous privacy procedures. Here in the
US it's, Our data is safe because people will go to jail if they hack
Hey...can some clever Cypherpunk think of a nice poison pill for ED?
Theoretically, something like that is possible, but my only ideas aren't so
hot. For instance, and elderly couple could sow some form of radioactive
substance into their grounds, in quantities that would take longer than
Well, James Dobson (right wing Christian evangelical) is targeting some of
these same judges, so I don't think the Democrat Republican division
you're pointing to here is all that valid. In other words, some of those
same judges are hated by the right.
-TD
From: James A. Donald [EMAIL
Ya' knew that had to happen!
Funny but, reading it, it seems like it would be fairly easy to convince the
Town board of 5 people that this is a good idea, and from an economic
standpoint it just might be!. In much of New Hampshire any revenue at all
from something like this is going to
What the hell are all of you smoking? This court has *talked* about
restricting inappropriate use of the commerce clause, but when it comes to
*doing*, they're 100% behind 100% Federal expansion *through* the Commerce
clause.
Doesn't anyboy actually LOOK at whats going on anymore, or are we all
Holy crap. Some shitty little township can now bulldoze your house because
someone wants to convert the space into a Waffle House.
http://www.msnbc.msn.com/id/8331097/
Where's Tim May when you need him? Where's the RAGE?
How do you take out a bulldozer? (Remember, bulldozer operators can
Yeah, but this steps crosses a line, I think. Before, your home could be
taken for a public project. Now, the supreme court has ruled that your home
can be taken for a public project that consists entirely of private
development, in the name of the public good, which is supposed to equal
Any idea how much it would cost? How much time is involved? (My constraint
is the latter and not so much the former.)
-TD
From: Eugen Leitl [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [EMAIL PROTECTED]: [i2p] weekly status notes [jun 21]]
Date: Tue, 21 Jun 2005 23:28:21 +0200
Speaking
Sounds great. Citigroup couldn't be bothered to encrypt millions of their
customer's detailed data prior to shipping them out via UPS, so I'm SURE
they won't screw this up.
-TD
From: Eugen Leitl [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [EMAIL PROTECTED]: [IP] Cell Phones Now Playing
Eugen Leitl wrote...
Online activation of software is already quite widespread, so it seems
customers are willing to accept restriction to ownership and use.
Well, that's an interesting phenomenon. In industrialized nations where the
price of software is fairly low compared to the wages,
Eugen Leitl wrote...
from the get-you-where-you-live dept.
Badluck writes Microsoft and the entertainment industry's holy grail
of controlling copyright through the motherboard has moved a step
closer with Intel Corp. now embedding [1]digital rights management
within in its
OK...what;s the best exchange service for transferring dollars (perhaps via
paypal or credit cards) into egold?
-TD
Other versions of the press release are fairly amusing, and can be
paraphrased as follows:
Imagining a world where most nations are allied against the United States,
the CIA is currently...
-TD
From: Eugen Leitl [EMAIL PROTECTED]
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: /.
OK, what's the best way to put up a website anonymously?
Let's assume that it has nothing to do with national security...the Feds
aren't interested.
BUT, let's assume that the existence and/or content of the website would
probably direct a decent amount of law-suits.
Presumably there's no
Variola wrote...
Three minutes. This is it - ground zero.
Would you like to say a few words to mark
the occasion?
Narrator: ...i... ann... iinn... ff...
nnyin...
Narrator: [Voice over] With a gun barrel
between
Wow! 16 Saudis! A veritable tidal wave.
-TD
From: James A. Donald [EMAIL PROTECTED]
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
Subject: Re: Lions and tigers and iraqi minutemen
Date: Wed, 25 May 2005 09:03:17 -0700
--
James A. Donald:
While it doubtless would have been better to behead
Now that was an enjoyable and even marginally relevant piece of RAHspam.
From: R.A. Hettinga [EMAIL PROTECTED]
To: cryptography@metzdowd.com, [EMAIL PROTECTED]
Subject: Len Adleman (of R,S, and A): Universities need a little Limbaugh
Date: Tue, 17 May 2005 14:39:56 -0400
A little humor this
Relax, dude. It was a joke.
The point was that in the US there's hardly anyone (TLAs included) that
would not have snickered at the original joke, given the brood that was
holed up in Union Station.
-TD
From: Anonymous [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: RE: Terrorist-controlled
new terrorist target: Union Station
You used a remailer for THAT?!!
-TD
Yeah...it's pretty fuckin' pointless. Tantamount to proving a guy pointing a
gun at you is actually pointing a gun at you, TO the guy pointing the gun at
you.
-TD
From: Gil Hamilton [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: [rationalchatter] Interesting Trial - IRS trial - July 11th
I dunno...I don't see a ton of Leitl stuff on the al-qaeda node. That which
does come through seems fairly relevant. I'm thinking Choate and RAH are
tsk-ing his failed attempt at pure stream-of-consciousness posting.
-TD
From: Eugen Leitl [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re:
Man, that chic's a little dizzy. Good sweater meat, though.
-TD
From: J.A. Terranson [EMAIL PROTECTED]
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
Subject: [rationalchatter] Interesting Trial - IRS trial - July 11th (fwd)
Date: Mon, 9 May 2005 19:46:34 -0500 (CDT)
-- Forwarded message
Yes, but only provided the universe lasts long enough for those digits to be
computed!
-TD
From: John Kelsey [EMAIL PROTECTED]
To: Sarad AV [EMAIL PROTECTED], [EMAIL PROTECTED]
CC: [EMAIL PROTECTED]
Subject: Re: Pi: Less Random Than We Thought
Date: Fri, 6 May 2005 09:42:09 -0400 (GMT-04:00)
Cypherpunk:
While I respect your forthrightness you are unfortunately wrong. Read the
chapters on Randon Mumber generation from Numerical Recipes in C and you
get just a small glimpse of how sticky the issue is, particularly when it
comes to computers (which are innately non-random, by the
I checked out those links...hilarious! Check this out (remember, this gal is
running for Senator of Alabama!):
On the way to the hotel my cab driver, having heard the conversation
with the Border Guard, expressed an interest in learning more about my
work. So I filled him in as much as I could
Hum. Well, maybe. I guess a dual use argument wouldn't fly.
Wait...that furnace should be able to reheat burgers also.
-TD
From: R.W. (Bob) Erickson [EMAIL PROTECTED]
To: 'Tyler Durden' [EMAIL PROTECTED],[EMAIL PROTECTED]
Subject: RE: Stash Burn?
Date: Mon, 2 May 2005 12:34:15 -0400
Eh...for email you may have a point, but I'm not 100% convinced. In other
words, say they want to monitor your email account. Do you really believe
they are going to tap all major nodes and then filter all the traffic just
to get your email? This is that whole, The TLAs are infinitely powerful
them to give up their
'phishing' expeditions.
-TD
From: Bill Stewart [EMAIL PROTECTED]
To: Tyler Durden [EMAIL PROTECTED]
CC: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: Email Certification?
Date: Wed, 27 Apr 2005 16:04:54 -0700
I'm still having trouble understanding your threat model
Are you continuing those dots correctly? I assumed they were leading to the
words Russian mob, which has become quite the powerful force in Brooklyn
these days.
-TD
From: Shawn K. Quinn [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: WebMoney
Date: Thu, 21 Apr 2005 09:15:06 -0500
On Wed,
Interesting. Gives a lower limit to certain storage questions. Guess it's no
suprise IBM's SAN product handled things here, it's been field-tested after
all.
-TD
GENEVA -- IBM and CERN, the European Organization for Nuclear Research,
today announced that IBM's storage virtualization software
From: Damian Gerow [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: WiFi Launcher?
Date: Fri, 25 Mar 2005 12:50:04 -0500
Thus spake Tyler Durden ([EMAIL PROTECTED]) [25/03/05 10:30]:
: Has anyone heard of a utility that can search for a WiFi hotspot while
: driving and then launch an email?
I
through.
Which leads to the possibility of perhaps attempting both strategies
simultaneously, but on different frequency bands.
-TD
From: Bill Stewart [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: WiFi Launcher?
Date: Fri, 25 Mar 2005 14:21:09 -0800
Thus spake Tyler Durden ([EMAIL
Hey...had an interesting idea I've been discussing.
Actually, no way it's crypto but it's certainly markets/anarchy, so read on
if you wish.
I'm thinking that that Drug Trafficking in the Golden Triangle might
actually be a form of arbitrage.
Let me explain...
China pegs it's currency to US
The simplest solution is to systematically spread one's DNA everywhere,
thus
making 'discovery' of it meaningless.
Yes, this is what I've been endeavoring to do, but my potential partners
don't seem to understand the urgency.
-TD
Hey...I never said May was an idiot. In fact, quite the opposite. His issues
with race and violence, I feel, don't emanate from stupidity by any means,
but are rather codifications of some kind of issues into his thinking. Get
him away from human matters and on the technical level he was
FPGAs probably make more sense for routers,
because you want the ability to change the firmware more often,
and a router has a bunch of other parts as well,
and realistically, cypher-cracking is not an
economically viable activity for most people,
so the cost-benefit tradeoffs are a bit twisted.
to an FPGA, though, for reasons above.
-TD
From: Riad S. Wahby [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: SHA1 broken?
Date: Tue, 8 Mar 2005 13:26:48 -0600
Tyler Durden [EMAIL PROTECTED] wrote:
Well, maybe I misunderstand your statement here, but in Telecom most
heavy
iron has plenty of FPGAs
Well, what would you call a network processor? An FPGA or a CPU? I think of
it as somewhere in between, given credence to the FPGA statement below.
-TD
From: Major Variola (ret) [EMAIL PROTECTED]
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
Subject: Re: SHA1 broken?
Date: Sat, 05 Mar 2005 06:51:24
But later, questioned by reporters, Mr. Everson noted that the I.R.S. law
enforcement staff has been cut by at least a quarter in recent years. Mr.
Wainstein, the United States attorney, said one of his prosecutors had
spent a year developing the case.
Anyone gigling? Notice that the amount he
Keefe says of Cryptome: The site is a good litmus test
for your attachment to freedom of speech. He is not happy about
excessiveness of any kind.
Attachment to freedom of speech?
'NK'.
-TD
Wanna cut to the chase here? I don't think Jennifer Anuston is a
cryptographer, and I got bored hacking my way through this reporter
commiserating at being at a high-end clip joint.
-TD
From: Bill Stewart [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Anguilla on $1000 a day - NYTimes
Date:
Are they just basically saying we just can't travel without identity
papers? If that's true, then I'd rather see us go through a real debate
that says we want to introduce required identity papers in our society
rather than trying to legislate it through the back door through
regulations that say
1 - 100 of 630 matches
Mail list logo