At 05:14 PM 3/27/02 -0800, Meyer Wolfsheim wrote:
-BEGIN PGP SIGNED MESSAGE-
Additionally, Aimee is an Outlook user, and mattd is a Eudora user. The
forgery referenced below was sent from Eudora.
And strings in exe's can't be edited?
I know of folks who've edited the PGP header line to
I've been thinking about noncentralized self-organizing network
topologies since George
posted his query. First, there are several problems that any P2P
network faces in the future
hostile world:
1. ISPs blocking its ports
2. The entry points to P2P are vulnerable ---web sites that
At 09:28 AM 3/29/02 -0800, Greg Broiles wrote:
At 08:55 AM 3/29/2002 -0800, Major Variola (ret) wrote:
1. ISPs blocking its ports
2. The entry points to P2P are vulnerable ---web sites that
point
to dynamic list of *tella
servents, or the Kazaa site that points to active Kazaa
From
http://afsf.lackland.af.mil/Organization/AFSFC/SFP/AF%20Pubs/VEHICLE%20BOMB%20MITIGATION%20GUIDE.PDF
referenced on cryptome:
Another fertilizer-based explosive used by
terrorists is Urea Nitrate (its components are urea, sulfuric acid,
nitric acid, and sodium cyanide).
As is well known,
At 06:06 PM 4/4/02 -0800, Bill Stewart wrote:
It was one of the lessons they taught you after
making sure that you really understood that
if you can't see the fnords, they won't eat you
To prevent emotional disturbances when they fall into them
the Swedes fill them with water and call them
At 10:01 AM 4/17/02 -0400, Trei, Peter wrote:
I'd argue that a nightmare scenario for the statists and snoops would
be
for commonly used applications to use crypto by default, ... This would
make distinguishing interesting from uninteresting traffic much more
difficult.
If that app is a
[This story includes unforgable-document assumptions (ooh, a
*hologram*),
drivers'-license-as-ID, and Ca police disregard for Fed immigration
violations
in favor of maintaining the peace. (This latter is interesting when
combined
with U.S. Cannot Block Oregon Suicide Law, Judge Rules
At 11:22 AM 4/21/02 +0200, Eugen Leitl wrote:
I disagree here somewhat. Cryptography ttbomk doesn't have means of
construction of provably strong PRNGs, especially scalable ones, and
with
lots of internal state (asymptotically approaching one-time pad
properties), and those which can be mapped
At 10:18 AM 4/25/02 -0700, Tim May wrote:
On Thursday, April 25, 2002, at 07:45 AM, Major Variola (ret) wrote:
Predictability gets much worse if one of the walls of a pool-table is
curved,
then the uncertainty in a perfectly-round ball's momentum is
magnified after reflection, compared
http://www.newscientist.com/news/news.jsp?id=ns2256
Airbus, the European jet manufacturer, is planning to build concealed
cameras into the light fittings above the seats in its aircraft. The
idea is to let the crew monitor passengers and spot hijackers before
they strike. The cameras also
At 12:21 PM 5/24/02 -0700, Curt Smith wrote:
If there were servers on the internet which automatically
displayed all plaintext e-mail messages which passed through
them as webpages (for the bored, curious, and opportunistic),
THEN everyone would see the value of encrypted e-mail.
Hmm, didn't
At 09:03 PM 5/24/02 -0700, Eric Cordian wrote:
The FBI currently has its shorts in a wad over the numerous Web sites
featuring the short but poignant last moments of Wall Street Journal
reporter Daniel Pearl.
It seems unlikely that creation, sale, or possession of depictions of
Americans being
Something stinks in Tenn, and its not the Gores this time:
Among his recent cases was the death of Harvard University biologist Don
Wiley, whose fall from a Memphis bridge in December fueled fears of
terrorist kidnappings. The medical examiner also helped identify the
body of Katherine Smith,
from Intel sources, quoted by eweek 3 jun 02:
Itanium 2 does 1,440 secure transactions/sec,
nearly three times the performance of an 8-CPU
Ultrasparc III server
FWIW; there was a thread on SSL performance
here some time ago.
Investigators had a list of 20 possible suspects, but Fischer was moved
to the top. Detectives said
they attached a tracking device to her car, hoping to catch her in the
act.
On Sunday, more than 30 razor blades were found hidden in Alicia Park in
Mission Viejo. Had
Fischer been there, the
At 12:25 PM 6/6/02 -0700, Morlock Elloi wrote:
There are also a lot of motion artefacts which give a certain feel do
DVD
image - but then, that may become fashionable, as valve amplifiers are
again
Jeezum, how old *are* you? We haven't called vacuum tubes 'valves' for
some
time.. Must
Intercepted a live broadcast of a CA state board on privacy reviewing
some breaching of a state comptroller's servers which manage
state deductions. The Teale Data Center incident alluded to at
http://www.privacy.ca.gov/stateemployee.htm
and at the gnarly URL:
On April 9, the City and County of Denver Vital Records
Office was robbed of over 2,300 sheets of preprinted
security paper that can be used to create birth and death
certificates. In addition, the electronic seal machine
that produces an embossed seal of the City and County of
Denver was
At 01:42 PM 6/6/02 -0700, Tim May wrote:
Someone said something earlier about tube/valve amps giving a boost to
the high end, for older, hearing-damaged rockers.
Mr. Elloi wrote first about the fashion for valve audio amps and then
mentioned that some yahoos listen with Dolby emphesis. I
Listen to electronic dance music, lose your right to freely assemble.
http://www.leginfo.ca.gov/pub/bill/asm/ab_1901-1950/ab_1941_bill_20020515_amended_asm.html
BILL NUMBER: AB 1941AMENDED
BILL TEXT
AMENDED IN ASSEMBLY MAY 15, 2002
AMENDED IN ASSEMBLY APRIL 4,
On Israel's decision to deport families of martyrs:
A Palestinian legislator, Salah Tamari, called deporting families an
illegal,
unlawful and inhuman measure. Why should somebody be accountable for
someone elses actions?
http://www.news.scotsman.com/international.cfm?id=685972002
Someone
Towards the bottom of this article its mentioned that Mitnick submitted
a list of Nortel's
[1] 'security' barriers to r00t [2] on a widely used piece of telco
switching equiptment.
One wonders how many copies of this info circulate in TLA's technical
intercept depts?
[1] (presumably obsolete :-)
At 08:16 PM 6/29/02 +0200, Anonymous wrote:
When an artist releases a song or some other creative product to the
world, they typically put some conditions on it. If you want to listen
to and enjoy the song, you are obligated to agree to those conditions.
If you can't accept the conditions, you
At 07:25 PM 6/30/02 -0500, xganon wrote:
Ryan Lackey provides a detailed analysis, but he gets off to a bad
start
right at the beginning:
DRM systems embedded in general purpose computers, especially if
mandated, especially if implemented in the most secure practical
manner (running the
At 09:31 PM 7/1/02 -0700, Tim May wrote:
Unfortunately it is being introduced at the same time as there is
legislation proposed, the SSSCA, to outlaw general purpose
computers
Anyone who believes this, or even repeats it as a rumor, is on drugs.
I have half a dozen computers, all usable in
At 05:19 PM 7/2/02 -0400, Jack Lloyd wrote:
Real time video still requires
something fairly high end, but give it a year.
The compression function could be integrated into the videocamera,
relieving that CPU burden. Playback is more problematic.
At 02:32 PM 7/3/02 -0500, Anonymous wrote:
Gee, maybe I should head for Cali and set up a linux cluster shop.
The pay is good, less fog than SF, and traffic is better than the 101.
If you get nabbed and turn, you'll even get a new ID from the USG,
without having to do that work yourself :-)
When Mowbray began to get the feeling that he couldn't leave even if he
wanted to, he asked, Am I being
detained?
When a diplomatic security official told him no, Mowbray announced
that he was leaving.
At which point, the guard stepped in front of Mowbray and said, Now,
you're being detained.
At 03:27 PM 7/15/02 +0100, Peter Fairbrother wrote:
Optimizzin Al-gorithym wrote:
And while QM can't help you with a particular atom, it also doesn't
say
that its impossible that knowledge of internal states of the atom
wouldn't help you predict its fragmentation.
Yes it does.
Heisenberg
At 01:50 AM 7/16/02 -0700, gfgs pedo wrote:
The rules of physics are those that don't change
from time to time, or
place to place
i tend to disagree with this.
...
The mathametical observations rely on the parameters
that are taken to make the mathametical model.
if the parameters
Nice post,
Could this be warped into affecting wardriving for 802.11b connections?
The basestation's emissions could be considered 'private' even though
they're
not. The traffic could contain unencrypted voice packets, too.
At 03:15 PM 7/16/02 -0400, Dave Emery wrote:
The House just passed
(AP) - Four Army wives at Fort Bragg have been killed over the past six
weeks,
allegedly by their husbands, prompting the Army to announce Friday it
will
re-evaluate the base's family counseling program. Two Fort Bragg
soldiers killed their
wives in murder-suicides, and two others were charged
She even conceives of developing algorithms so advanced that society
might intervene, to get people liable to be recruited into cells back
on track
before they can be seduced by elements like Al Qaeda. There is a
possibility that with sufficient information about known terrorists we
could
evolve
(Note that this *is* political as the Fairgrounds are State property)
Dress Code Keeps 9 Hells Angels Out of Fair in Ventura
Security: The new policy is enforced after biker club members refuse to
remove vests marked with group's insignia. Their leader says he will
sue.
By
Court rules student's artwork not a threat to police
Published 9:35 a.m. PDT Thursday, August 1, 2002
CHICO, Calif. (AP) - A Pleasant Valley High School student's art
class painting that
showed him shooting a police officer who had cited him for
possessing marijuana did
not
At 12:48 PM 8/3/02 +0200, Eugen Leitl wrote:
On Sat, 3 Aug 2002, Morlock Elloi wrote:
Ah, the computers. Well, those that want computers will have them.
They may not be as cheap as today and there will not be as many of
them, but I think that all people *I* deal with will have them, so I
At 01:36 PM 8/27/02 +, Ryan Lackey wrote:
I'm not actually going to burningman this year, primarily due to low
remote access potential; I normally have a laptop and
cellphone/802.11b/100baseTX link with at most 15 minutes delay.
A satphone is under $2K and its under $3 minute. Cost-cutting
At 01:21 AM 8/31/02 -0700, Morlock Elloi wrote:
Just wondering ... in a life death situation (say, blackmailing att.
general), what would be the choice of readers of this forum:
a) use mixmaster remailer from their home/business/friend.
Like that one-degree of separation is comforting...
b)
Cryptome points to a paper http://www.sandia.gov/eqrc/critical/meyer.pdf
Using Integrated Circuits in Critical Applications Workshop
Integrated Circuits in Nuclear Weapon Applications
Wherein we learn, ca. 1997:
there are no chips in nukes (p 8)
Sandia is considering Java for nukes (p
In some parts of rural america, folks signal the presence of cops by
flashing their headlights
when driving.
Occurs to me that would be a cool function for SDR: press code for or
say cop. For N seconds,
phone periodically sends cop message picked up by other phones,
ignored by base station [1].
At 07:04 PM 9/18/02 -0700, Meyer Wolfsheim wrote:
People who want to play with gizmos to avoid becoming revenue sources
will
buy radar detectors (unless they live in places like VA, where it is
illegal to possess radar detection devices.)
People who like to *play* with gizmos will employ radar
At 11:08 AM 9/21/02 -0400, Greg Vassie wrote:
says Dr Ann Coavoukian, the commissioner of information and privacy
in
Ontario, U.S.A. People are lying and vendors don't know what is
false [or
As a resident of Ontario, Canada, I'm quite surprised to learn that
Ontario has been annexed by the
You see this? the Libyan said. This was created by an enemy of God.
This has blown many
operations and has caused more arrests than you can imagine. Why do you
think the brothers in
Germany got arrested? With this. When they were talking, the others were
listening It's nice, you
can
At 01:41 AM 9/24/02 -0700, Bill Stewart wrote:
They're also used for non-cellular phone minutes -
Ladatel in Mexico is a big user, and I've worked with some
British Telecom folks whose business cards are also
1-pound telephone smartcards.
Good lord, they only weigh mere grams here in the states
Using its official Xinhua News Agency, the government released an
extraordinary 1,100-word dispatch about the latest hacking incident,
saying it had traced the illegal transmissions over the Sino Satellite,
or Sinosat, system to a pirate broadcast operation in Taipei, Taiwan.
In a separate
At 02:39 PM 9/27/02 -0500, Lisa wrote:
I didn't suggest that they should be banned. I simply stated that this
was one consumer usage of the smart card reader.
Take a stress pill, Dave (and pass one this way). B.L. was clearly
being
sarcastic/rhetorical and no one following the thread would
The problem Mr. Howe describes is fundamental, folks:
encryption should be end-to-end even when the endpoints
are functionaries in a company. Because not all employees
are equal.
So yes Alice at ABC.COM sends mail to Bob at XYZ.COM and
the SMTP link is encrypted, so the bored upstream-ISP
At 11:52 AM 9/30/02 -0700, James A. Donald wrote:
--
What email encryption is actually in use?
PGP 5-7 on Win95+, using Eudora 3.05
talks to Mac whatever using 2.6.2
Signing is not generally necessary.
The chief barrier to use of outlook's email encryption
Outlook is one of Microsoft's
After reading the last paragraph in the excerpt below, it occurs to me
how
much fun could be had in DC with some chalk, even without an 802.11blah
receiver :-)
http://www.siliconvalley.com/mld/siliconvalley/4181308.htm?template=contentModules/printstory.jsp
Secret Service probes wireless
Not only is EM correct, but:
* many attacks are possible without worrying about keylength. Got
Scarfo?
* NIST/NSA picked the lamest AES. If I told you what lame meant, I'd
have to kill you.
* (Lack of) User motivation (related to man-machine issues) is still the
spooks' best friend. As
well as
The Sunnyvale Albertsons has those stupid loyalty cards again, after a
period without.
The card has a prominent Privacy Policy block, whose text is defeated by
the asterisked
italicized phrase, Except when compelled by law.
But amazingly, it has a box, too: I don't wish to fill out this form.
From: Trei, Peter [EMAIL PROTECTED]
I fail to see how anyone, anytime, anywhere, can support
the hunting of random non-consenting humans for sport.
Maybe its a PETA activist making a point...
Rifle and scope: $1,200
Box of .223 Hollowpoint: $6.99
Tarot Deck: $2.95
Scoring an FBI analyst: priceless
Some things are priceless. For everything else, there's MasterCard.
---
Dedicated to Eunice Squeal Like a Pig Stone
At 06:44 AM 10/22/02 -0700, Mike Rosing wrote:
On Wed, 31 Dec 1969, Bill Frantz wrote:
I have been asked to audit some source code to see if the programmer
inserted a backdoor.
Look for exception processing. Anywhere the code looks for a
particular
value, something like == 0x3456352e. That
Had some shyster not flinched (followed by a judge farting in the
wrong direction), medical records would have been bulk-searched by
police.
Judge Lifts Order for Pregnancy Records Sought in Investigation of
Abandoned Baby
So two illegals are going back because they were in a white van near a
pay phone.
They're fortunate, they only got the 12gauge in the face and the asphalt
facial;
in a month it'll be a cruise missile first, forensics later.
Mr. Godsniper, call us back. We couldn't trace^H^H^H^H^H hear you.
The
At 05:13 PM 10/21/02 -0400, Tyler Durden wrote:
So I guess the follow on question is: Even if you can look at the code
of a
RNG...how easy is it to determine if its output is usefully random,
or are
there certain Diffie-approved RNGs that should always be there, and
if not
something's up?
Start
t 11:21 PM 10/24/02 -0700, James A. Donald wrote:
I am a really big fan of Buffy.
Seek professional help.
but my experience with downloading TV shows suggests
that piracy is working better than ever.
This wasn't piracy, it was time-shifting. You, as an
American with a TV, could watch the
to decode
the morse or DTMF or 4Khz voice, clean up the audio.
From: Harmon Seaver [EMAIL PROTECTED]
Date: 2002/10/16 Wed PM 08:45:02 EDT
To: Major Variola (ret) [EMAIL PROTECTED]
CC: [EMAIL PROTECTED] [EMAIL PROTECTED]
Subject: Re: commericial software defined radio (to 30 Mhz, RX only)
Does
At 01:34 PM 10/27/02 +0100, Eugen Leitl wrote:
(Try [to] rewire parts of CNS in control of your motorics).
Actually, injuring yourself is a good way to do this. You'll screw up
the timing differences (albeit not the geometry) royally. We call
this a limp.
If you're interested in gait
Robert H. Moore, a software developer on the outskirts of St. Louis,
built a multimillion-dollar business out of helping people copy DVDs.
Now he's trying to prove that his products are legal.
Moore's wares enable the copying of discs even if they are scrambled to
prevent duplication, as are
At 12:01 PM 10/28/02 -0800, Tim May wrote:
It's going to be interesting to see how airlines and other security
narcs deal with fuel cells. The energy content of a small
canister/container of the fuel can be high. Given that butane lighters
are now banned...
Based on personal experience (e.g.,
At 10:44 PM 10/28/02 -0800, Charles Lucas wrote:
Goal:
To capture and distribute video in such a fashion that confiscation of
the
camera and other equipment will not result in confiscation of captured
video.
I dare you to call your system E-Jazeera
At 10:23 PM 10/28/02 -, Axolotl2 wrote:
On Sat, 26 Oct 2002 17:59:17 +1300 (NZDT), you wrote:
Next in the series:
FBI warns bouncy castles may be targeted
Nahh, FBI warns buses may be targeted, leading to late or missed
buses.
The primary targets will likely be places where citizen
At 10:19 PM 10/28/02 -0500, Dave Emery wrote:
On Mon, Oct 28, 2002 at 09:32:48PM -0500, Tyler Durden wrote:
Any chance this is the same Dave Emery who does the radio broadcasts?
(I
listen from WFMU). If so, man! If a tiny fraction of the stuff you
have
said over the years is true, well...brrr.
At 07:28 PM 10/29/02 -0500, Brian McWilliams wrote:
At 04:34 PM 10/28/2002, Major Variola (ret) wrote:
The e-mails were obtained earlier this month
by guessing the
login name and password
Did that Wired reporter just admit to a crime?
http://wired.com/news/conflict/0,2100,55967,00.html
What
At 07:53 AM 10/30/02 -0800, Steve Schear wrote:
At 03:35 PM 10/30/2002 +0100, Anonymous [EMAIL PROTECTED] wrote:
Speaking of jamming, I've thought for a long time that a
portable jamming device would be very nice to have.
Frequencies don't get jammed, specific communications channels between
South Dakota measure backs 'nullification' -
http://www.latimes.com/news/nationworld/nation/la-na-jury30oct30.story
Can't wait until some lawyer in a black robe tries to understand
Freenet...
which works with Java 1.4.0 on Win95, BTW
File-swapping 'Madster' must track songs
Friday, November 1, 2002 Posted: 10:03 AM EST (1503 GMT)
ALBANY, New York (AP) -- The
At 10:49 AM 11/2/02 -0800, Bill Frantz wrote:
(A number of years ago, there was a case where a
pilot, presumably asleep, flew right past Los Angles, over the Pacific
ocean, and crashed. ATC was very concerned, but couldn't do anything
to
wake the pilot.)
Around a year ago a small private jet
At 09:37 PM 11/2/02 -0800, Tim May wrote:
When I was at Intel we sent our designs for microprocessors to European
branches and/or partners. One set of designs sent to MATRA/Harris, a
partner in the 80C86, was stolen in transit. (The box of tapes arrived
in Paris, but the tapes had been replaced
FWIW
In the Si biz, its quite common to encrypt files. I've
seen (albeit lame, and with guessable passwords)
zip encryption and the classic crypt used.
Between engineers, and between lawyers and engineers.
Typically the encrypted info is an attachment to unencrypted
email (often describing its
At 11:17 PM 11/3/02 +0100, Thoenen, Peter Mr. EPS wrote:
Tried emailing direct but bounced so apologize to the list for the OT
content :)
You don't happen to have the url do you? Think it would make an
amusing
read.
Sorry, no. BTW, my nym is for humor value, and spam-avoidance, not
replies.
EWeek 21 Oct 2002 p 58, High-tech products invite tech crimes P.
Coffee
Writing about a consultant who tried to sell a client's software, and
got busted:
Next time, a code theif may use a BlackNet brokerage (as envisioned
in the
widely circulated essay by Timothy May) to avoid such traps.
[He is
At 10:13 AM 11/4/02 -0500, Tyler Durden wrote:
This is an interesting issue...how much information can be gleaned from
encrypted payloads?
Traffic analysis (who, how frequently, temporal patterns)
Size of payload
Is it possible for a switch or whatever that has
visibility up to layers 4/5/6 to
At 11:30 AM 11/6/02 -0800, Steve Schear wrote:
http://www.theregister.co.uk/content/5/27917.html
German secret service taps phones, bills buggees
I wonder if its possible if this billing incident wasn't a mistake, but
an
activist pulling down the pants of their security services.
You're an
At 05:46 AM 11/7/02 -0800, Sarad AV wrote:
hi,
Wi fi customers are more paranoid than comparingly
ordinary web users who are not so concerened of their
security.
That's just plain silly. Its like saying a cellphone user is more
paranoid than a landline user. It was entirely convenience,
with
Note that the Cypherpunks Image/Postscript Document Examination
Laboratories should be able
to amplify some of the (US; the unPOWs are black-bagged) faces in the
pix..
Pentagon Seeks Source of Photos
By PAULINE JELINEK
Associated Press Writer
At 08:32 PM 11/9/02 -0500, Tyler Durden wrote:
So I'm still playing with the idea of a publically-accessible document
that
outlines the strategies, technologies, aims and requirements for
somehow
uploading images and data to public repositorioes.
Such a document should enumerate the threat model
If you publish your keys, random others can link the key to the
published ID (e.g., email addr).
This means, at least with the PGP UI, that if Alice encrypts to Bob and
Carol (who don't know
each other, but Bob publishes his key and Carol downloaded it) then
Carol can see that the
message is
All you need is
1. A few activists incl. a few to capture the content (eg, videographer,
photographer) who are willing to carry a few extra pounds
2. Someone to pony up the equiptment (some of which must be treated as
expendable)
3. Someone to set up test the rig with the deployees.
Depending
3) stream via standardised protocol using (camouflaged) 8 3db omni
stick
antenna. Do this in AP mode.
Camoflaging this in the obvious place we note that our metallicized
underwear provides
a nice ground plane reflector, adding a db or two.
[Summary: Navajo is banned by employer because employees are being rude
in that language.
So the EEOC objects. Ironies: Navajo, codetalkers, feds. EEOC
harassing employer who is trying to prevent harassment (in Navajo) of
others.]
English group enters Navajo language fray
From the National
At 02:19 PM 11/20/02 -0500, Tyler Durden wrote:
From what I can grok this is not what I was looking for, but it IS a
valuable tool.
What's missing? What part of your threat model didn't they consider?
What I'm talking about, I think, would be better in certain scenarios,
as a
rubber-hose-holder
Got Aerosil?
What the heck is Aerosil? Is that like UBIK?
Extremely fine SiO2. Helps disperse pharmaceuticals,
anthrax, VX. Lots of others uses. Bugs U$G that
the New Next Target bought some.
What's UBIK? D'you mean Dr. Seuss' Ooblek?
Is Ooblek on the ITAR list?
---
Got Atropine?
At 11:38 AM 11/21/02 -0500, Tyler Durden wrote:
I was thinkin about this...
It certainly looks like Concerned Authorities might be able to easily
stop a
Smart Mob from uploading the images of beatings, etc... this way.
That and
a round-up-and-grab knapsacks/laptops as evidence of illegal
activity,
At 04:59 PM 11/21/02 -0800, James A. Donald wrote:
--
According to Microsoft,
http://crypto.stanford.edu/DRM2002/darknet5.doc
Darknet is being undermined by free riders.
They attribute this to 2 things: most are on 56Kbps, and legal
harassment of
large sharers is possible.
I suspect it is
Geek 'Vigilantes' Monitor Border
By Michelle Delio | Also by this reporter Page 1 of 1
02:00 AM Nov. 22, 2002 PT
A group of tech-savvy ranchers in Arizona is using military technology
to monitor and apprehend illegal immigrants crossing the border from
Mexico
into the United States.
At 11:49 PM 11/24/02 +0100, Tarapia Tapioco wrote:
There is a huge concrete building, hardly any windows, occupying the
whole block-width between Market and Mission streets in san francisco,
one side being 11th street. Funny thing is that it has no markings at
all. The main entrance seems to be at
At 07:40 PM 11/24/02 -0600, Jim Choate wrote:
Bullshit. I (and several others) built a tank nearly ten years ago.
No big deal. Note that psychoactives (at least if you have any
experience
with them) don't modify the experience a great deal either. Certainly
not
to upset anyone this much, this
At 01:49 PM 11/25/02 -0800, James Donald wrote:
--
source code for mini web server with ssl
Some time back someone mentioned a web server for microsoft
windows.
It came in two versions, one of which supported SSL
It was mentioned in the context of brewing your own certificates,
since it
At 10:12 PM 11/24/02 +0100, Eugen Leitl wrote:
On Sun, 24 Nov 2002, Tyler Durden wrote:
I believe Daniel Hillis (or was it Jaron Lanier?) inserted
time-capsule
information into a cockroach's DNA and released it into the Boston
subways.
He calculated that this would be the way to preserve
At 12:06 PM 11/29/02 -0500, Tyler Durden wrote:
In the Chinese papers over the last few days they've been reporting an
incident that happened to a Chinese UC Berkeley college student, who
was
using her cell phone to discuss playing some sort of videogame. The
videogame involves placing explosives
At 02:57 PM 12/2/02 +, Peter Fairbrother wrote:
What I don't understand is how a node knows the location of a person
who
moves about in the first place.
Also, I don't like the idea that my location is known by the location
of my
equipment. But I know very little about geographical routing.
At 02:57 PM 12/2/02 +, Peter Fairbrother wrote:
What I don't understand is how a node knows the location of a person
who
moves about in the first place.
Also, I don't like the idea that my location is known by the location
of my
equipment. But I know very little about geographical routing.
At 06:51 PM 12/5/02 +0100, Eugen Leitl wrote:
Scientists often use radio tags to track elusive animals. But at last
week's Supercomputing 2002 conference in Baltimore, Maryland, they used
them on each other.
Each researcher carried a small transmitter
That's all very nice, but they'll still go
At 10:56 AM 12/7/02 -0800, Morlock Elloi wrote:
This, with obligatory cameras in cybercafes, is just plugging the
anonymity
holes.
Yep.
Also, one of unmentioned consenquences is that any security will make
self-organising networks harder to implement. Guess who benefits.
But we will always
There was an article in the press a month or so ago about some
town that was trying hard to restrict cybercafe hours,
because of gang activity there - I'm not sure how much of it's
just the same nonsense that tried to restrict video-game parlors,
and how much of it's because the local bullies
that the War on Terrorism should
be won in about 60 years, at which point the American citizens would
see
their civil liberties returned. Obviously, only traitors, agitators,
and
other enemy combatants would make the outrageous claim that this war
will likely last perpetually.
None
In a way, Mathew's and Choate's attack upon the list has done
us a favour. The list is now effectively restricted to those
with the will and ability to use filters, which raises the
required intelligence level.
It has also increased the utility/use of centrally-filtered exploders,
like
1 - 100 of 696 matches
Mail list logo