On Tue, 9 Apr 2002, Tim May wrote:
Physics-wise, it's a jiveass fantasy. No way are there micro-strips
readable from a distance in today's currency, and very likely not in the
next 20 years. (I don't dispute that a careful lab setup could maybe
read a note at a few meters, in a
On Wed, 10 Apr 2002, Adam Back wrote:
You don't need the minter's secret key to identify the double-spender.
Anyone who happens to see two coin transcripts answering different
challenges with the same coin private key can recover all the
attributes of the coin, including the identity
On Wed, 10 Apr 2002, Eugen Leitl wrote:
The tags are passive. All tags (whether inductive or electrostatic) must
be energized from the outside. The pumping energy can be shielded, as can
the RF emission of the tags itself. The environment is noisy. The tags
send simultaneously from the
On Wed, 10 Apr 2002, Adam Back wrote:
Is there anything specific PKILAB have said about Brands certs?
No, it was early in the set up when it was discussed. Sounds like
they want to at least listen to him :-)
btw I did a google search for PKILAB and Brands to see if I could find
anything
On Thu, 11 Apr 2002, Adam Back wrote:
Well I also am pretty anti-patent, especially the xor-cursor and
business process kind, but at least these ecash patents are not
frivolous patents (well Chaum's RSA blinding online scheme may look
pretty simple once you've seen it but Brands stuff is
On Thu, 11 Apr 2002, Nomen Nescio wrote:
Changing trust to believe advances the discussion not one whit.
Alice trusts Bob to sign keys accurately; Alice believes that Bob signs
keys accurately. The change doesn't add anything.
In fact if anything it's a step backwards. Trust is a
On Mon, 29 Apr 2002, Neil Johnson wrote:
I made a sign for a friend who had recently purchased a Vette.
It said please ignore, this car is just a AMC Pacer with a REALLY GOOD paint
job.
You gotta be old enough to remember the pacer for that to make sense tho
:-) I hope it was big
On Wed, 1 May 2002, Tim May wrote:
According to The Progressive, which I assume is the same outfit that
published the H-bomb plans, a bunch of activists were blocked from
yup. I was there :-)
traveling to D.C. for a protest march. More than just a couple, in fact.
This looks like
On Wed, 22 May 2002, Steve Furlong wrote:
No problem --- I was just waxing my bikini line.
(This disgusting mental image courtesy of the Janet Reno Full Frontal
Nudity Collection.)
(That disgusting mental image courtesy of me.)
That depends on the gender preference of the reader I think -
On Fri, 24 May 2002, gfgs pedo wrote:
hi,
Does any 1 have a reference to the actual Mersenne
Twister algorithm?
Thank u.
I've got code posted on the authors web page. Do a web search of Mersenne
Twister and you'll get there eventually.
Patience, persistence, truth,
Dr. mike
On Fri, 24 May 2002, Trei, Peter wrote:
My mind has been boggled, my flabbers have been ghasted.
Yes. It is not really possible to put into words just how insane this is
is it? I'm gonna try to sit down with a senator's aide who's working on
this as soon as possible, I think the guys from
On Sun, 26 May 2002, John Young wrote:
Thomas Friedman in the New York Times today:
http://www.nytimes.com/2002/05/26/opinion/26FRIE.html
Webbed, Wired and Worried, May 26, 2002
[...]
Silicon Valley staunchly opposed the Clipper Chip, which
would have given the government a back-door key
On Tue, 28 May 2002, Steve Furlong wrote:
My senators are Clinton and Schumer. Makes me damn proud to be an
American, I tell you. Neither's office has responded to any of my
Yeah, that's a grim position to be in. At least my congress critters
write back.
letters, probably because I didn't
On Wed, 29 May 2002, Curt Smith wrote:
I agree that under-the-hood encryption is becoming more and
more prevalent, and that it generally improves security. Also,
the widespread use of encryption technology helps protect
cryptorights in general as important to the public good.
This is kinda
On Fri, 31 May 2002, surinder pal singh makkar wrote:
I am a newbie in cryptography. What I have learnt till
now is that in assymeric cryptography scenario we have
a private key and we generate the public key
corresponding to it and then we send it to the central
agency.
You don't have to
On Mon, 3 Jun 2002, Dave Emery wrote:
And telling the public that they face serious jail time if they
don't turn in that Creative Soundblaster from the old PC in the attic
closet isn't going to fly. The sheeple may be sheep but even they
aren't going to accept that kind of nonsense
On Thu, 6 Jun 2002, Nomen Nescio wrote:
So there you go. A little technical for cypherpunks, but unfortunately
coderpunks, like the little old lady, has fallen and it can't get up.
A shame really. The math is the best part of it all.
Patience, persistence, truth,
Dr. mike
On Thu, 6 Jun 2002, Major Variola (ret) wrote:
Jeezum, how old *are* you? We haven't called vacuum tubes 'valves' for
some
time.. Must get tiresome carting around the Leyden jar condensers for
your differential
analyzer..
the Brits have been calling tubes valves forever. Just like a
On Thu, 13 Jun 2002, Tom wrote:
actually, as with most laws, the basic idea behind the moral rights
isn't that bad, it just got perverted.
if used differently, the morale rights part could well be used to put
a limit on the corporate abuse of copyright. for example, I could
envision an
Date: Sun, 23 Jun 2002 12:53:42 -0700
From: Paul Harrison [EMAIL PROTECTED]
Subject: Re: Ross's TCPA paper
I would think a TCP _with_ ownership of the TPM would be every paranoid
cypherpunk's wet dream. A box which would tell you if it had been tampered
with either in hardware or software?
On 27 Jun 2002, David Wagner wrote:
No, it's not. Read Ross Anderson's article again. Your analysis misses
part of the point. Here's an example of a more problematic vision:
you can buy Microsoft Office for $500 and be able to view MS Office
documents; or you can refrain from buying it
On Thu, 27 Jun 2002, Marcel Popescu wrote:
Is there a defense against MITM for Diffie-Hellman? Is there another
protocol with equivalent properties, with such a defense? (Secure
communications between two parties, with no shared secret and no out-of-band
abilities, on an insecure network.)
On Thu, 27 Jun 2002, Lucky Green wrote:
David wrote:
It's not clear that enabling anti-competitive behavior is
good for society. After all, there's a reason we have
anti-trust law. Ross Anderson's point -- and it seems to me
it's one worth considering
-- is that, if there are
On Mon, 8 Jul 2002 [EMAIL PROTECTED] wrote:
Voluntary DRM can never stop piracy. With voluntary DRM, people
can break once on one machine, then run the latest Napster
replacement on the every machine on the internet in non DRM mode,
and copy that file that was ripped on one machine, to
The academics think that TCPA technology is already solved. I haven't
read the whole paper, but y'all might find it interesting.
--Begin Forward ---
From: Sean Smith [EMAIL PROTECTED]
Date: Wed, 10 Jul 2002 09:18:22 -0400
You know, as long as we're
On Thu, 11 Jul 2002, gfgs pedo wrote:
suppose a cryptanalysis only has encrypted data-how is
going 2 know which is the encrytion algorithm used 2
encrypt the data ,so that he can effeciently
cryptanalyse if
1:he has large amount of cipher text only
2:has large amount of plain text and
On Fri, 12 Jul 2002, John Young wrote:
The US Dept. of Commerce Technology Administration is inviting the
public to make comments for the upcomming Workshop on Digital
Entertainment and Rights Management. The workshop will be held on
July 17.
http://www.ta.doc.gov/comments/comments.htm
On Fri, 12 Jul 2002, John Young wrote:
The US Dept. of Commerce Technology Administration is inviting the
public to make comments for the upcomming Workshop on Digital
Entertainment and Rights Management. The workshop will be held on
July 17.
http://www.ta.doc.gov/comments/comments.htm
On Sun, 14 Jul 2002, Tim May wrote:
For starters, why don't you start writing in standard English?
Even if English is not your first or second language, using such
cutisms as u for you and
any 1 for anyone is much more misleading than using the standard,
defined words.
Get up on the wrong
On Wed, 31 Jul 2002, Michael Motyka wrote:
Quite clearly cash has got to go! I'm not sure how tough this would be
to sneak past the slumbering electorate. Pretty tough I expect. But the
usage level is certainly going down while the percentage of electronic
transactions is skyrocketing. We've
On Fri, 9 Aug 2002, Jay Sulzberger wrote:
There are many solutions at the level of technical protocols that solve
the projection of these problems down to the low dimensional subspace of
technical problems. Some of these technical protocols will be part of
a full system which accomplishes
On Fri, 9 Aug 2002, AARG! Anonymous wrote:
: Allow computers separated on the internet to cooperate and share data
: and computations such that no one can get access to the data outside
: the limitations and rules imposed by the applications.
It seems to me that my definition is far more
On Fri, 9 Aug 2002, AARG! Anonymous wrote:
Of course his analysis is spoiled by an underlying paranoia. So let me
ask just one question. How exactly is subversion of the TPM a greater
threat than subversion of your PC hardware today? How do you know that
Intel or AMD don't already have
On 11 Aug 2002, David Wagner wrote:
Ben Laurie wrote:
Mike Rosing wrote:
The purpose of TCPA as spec'ed is to remove my control and
make the platform trusted to one entity. That entity has the master
key to the TPM.
Now, if the spec says I can install my own key into the TPM
On Mon, 12 Aug 2002, AARG! Anonymous wrote:
It is clear that software hacking is far from almost trivial and you
can't assume that every software-security feature can and will be broken.
Anyone doing security had better assume software can and will be
broken. That's where you *start*.
On Mon, 12 Aug 2002, AARG! Anonymous wrote:
Ideally you'd like your agent to truly be autonomous, with its own data,
its own code, all protected from the host and other agents. It could even
carry a store of electronic cash which it could use to fund its activities
on the host machine. It
On Tue, 13 Aug 2002, James A. Donald wrote:
To me DRM seems possible to the extent that computers themselves
are rendered tamper resistant -- that is to say rendered set top
boxes not computers, to the extent that unauthorized personnel are
prohibited from accessing general purpose
On Tue, 13 Aug 2002, Lucky Green wrote:
Gary Jeffers
Sent: Tuesday, August 13, 2002 3:07 PM
To: [EMAIL PROTECTED]
Subject: A faster way to factor prime numbers found?
A faster way to factor prime numbers found?
AFICT, the proposed algorithm is for a test for primality and does not
On Thu, 15 Aug 2002, Adam Back wrote:
Summary: I think the endorsement key and it's hardware manufacturers
certificate is generated at manufacture and is not allowed to be
changed. Changing ownership only means (typically) deleting old
identities and creating new ones.
Are there 2
On Thu, 15 Aug 2002, Lucky Green wrote:
Hopefully some of those people will not limit themselves to hypothetical
attacks against The Spec, but will actually test those supposed attacks
on shipping TPMs. Which are readily available in high-end IBM laptops.
But doesn't the owner of the box
On Fri, 16 Aug 2002, AARG! Anonymous wrote:
Here are some more thoughts on how cryptography could be used to
enhance user privacy in a system like TCPA. Even if the TCPA group
is not receptive to these proposals, it would be useful to have an
understanding of the security issues. And the
On Wed, 4 Sep 2002, Matthew X wrote:
Attacks on police soar
By TANYA GILES
04sep02
VIOLENT crime against police is rising: more than 2300 officers were
attacked while on duty in one year.
Two police were killed in their car by a 27 year old driver in Wisconsin
USA last month. No motive
On Wed, 31 Dec 1969, Bill Frantz wrote:
I have been asked to audit some source code to see if the programmer
inserted a backdoor. (The code processes input from general users, and has
access to the bits that control the privilege levels of those users, so
backdoors are quite possible.) The
On Mon, 28 Oct 2002, Tyler Durden wrote:
In antoher context I've wondered about the possibility of wireless,
near-real-time video upload. With 3G this will cetainly be easy, but I'm
wondering if there are soft/hard gadgets that can auto-upload stuff.(In
addition, 3G looks like it's going to
On Wed, 30 Oct 2002, Steve Schear wrote:
At 03:35 PM 10/30/2002 +0100, Anonymous [EMAIL PROTECTED] wrote:
Speaking of jamming, I've thought for a long time that a
portable jamming device would be very nice to have. Something
that jammed *all* frequencies, or at least everything from
10 or
On Thu, 31 Oct 2002, Steve Schear wrote:
Information about the damage such lasers could inflict is classified. But in
general, experts say, a 25-kilowatt laser could blind an enemy sensor several
hundred miles away. It also could put a hole through a sheet of metal from a
distance of several
On Sun, 3 Nov 2002, Lucky Green wrote:
Tim wrote:
Microsoft calls its technology Palladium. Intel dubs it
LaGrande.
I say we call it LaGrab.
Has anybody on the list seen any official specs, datasheets, etc. for
Intel's LaGrande feature set? Any documents that could be donated to
On Wed, 6 Nov 2002, Harmon Seaver wrote:
On Wed, Nov 06, 2002 at 04:02:54PM -0800, Bill Stewart wrote:
Reported on the NANOG list
80% of Amsterdam is without power, one AMS-IX site is without no-break
power for an other few weeks, others are running out of UPS capacity.
Shit! Holy
On Wed, 6 Nov 2002, James A. Donald wrote:
--
Reading the Wifi report,
http://www.weca.net/OpenSection/pdf/Wi-
Fi_Protected_Access_Overview.pdf
it seems their customers stampeded them and demanded that the
security hole be fixed, fixed a damned lot sooner than they
intended to fix it.
On Sat, 9 Nov 2002, Major Variola (ret) wrote:
Specific use-cases can be written: the GI who took the picture; the
photo-developer-tech who
kept copies; the bored netop who intercepted the pix; an activist who is
under insert type
surveillance.
Anyone interested? And what does it mean (if
On Sun, 10 Nov 2002, Adam Shostack wrote:
A full police state can't prevent anything, it can just make some
things less common. For example, samizdat in the USSR still got
copied and passed around. Drug use is a problem in US prisons. Etc.
that kind of info can be limited by simply
On Wed, 13 Nov 2002, Tyler Durden wrote:
Damn what a pack of geeks! (Looks like I might end up liking this list!)
It's full of nut cases too :-)
I have not, however, heretofore considered that there could exist systems
that had some form of completeness built in. My intuition (which is
On Wed, 13 Nov 2002, Sam Ritchie wrote:
That's the whole deal with the bible, and its various internal
contradictions. If anything can be proven true in the bible, then there's no
room for faith anymore, which nullifies religious beliefs; and if anything
can be proven false, then there's no
On Thu, 14 Nov 2002, [iso-8859-1] Andri Isidoro Fernandes Esteves wrote:
The religious person is always battling against reality wich with a minimum
of inteligence from the observer always bring doubts on the truth of his
faith.
It's a state of mind wich can only be compared with mental
On Mon, 18 Nov 2002, Adam Shostack wrote:
Ross Perot demonstrated that you can buy your way into an election
now. Maybe we should just admit that that's the case. Could it be
worse than the unofficially sold elections and gerrymandered districts
we have now?
I think it's pretty well
On Mon, 18 Nov 2002, Tyler Durden wrote:
Me, I don't like the idea of people actualy selling votes, but I think I
like the idea of people BEING ABLE to sell their votes.
But then votes are property, and property can be transfered, so
you could sell your vote from your will, and dead voters
On Mon, 18 Nov 2002, Sunder wrote:
But you forget - the BATF agents were all beeped and informed to not
bother to come in to work that day, and instead met up elsewhere, suited
up so they could arrive just in time (a few minutes after the boom) to be
heroic.
That indicates something, what
On Tue, 19 Nov 2002, Eric Cordian wrote:
This of course is not a true tale, but an incredible simulation to make a
point.
Yeah, it was funny. Not sure what the point was...
The earth currently has a population of just slightly over six billion
people. This means that a 200 gigabyte drive
On Wed, 20 Nov 2002, Vincent Penquerc'h wrote:
I just hope that Americans see this, and see that what they're
going to get from this behavior isn't world domination, but either
a genocide of half the planet, or a life in a bared wire world,
with no freedom left, in a vain attempt to protect
There's a few opinionated people on this list, I think :-)
Patience, persistence, truth,
Dr. mike
-- Forwarded message --
From: MX%[EMAIL PROTECTED] Jonathon Giffin 20-NOV-2002 18:19:49.35
To: MX%[EMAIL PROTECTED]
CC:
Subj: [PKILAB] [SECRSCH] DMCA Feedback
For anyone
On Sat, 23 Nov 2002, Tim May wrote:
Interesting logo/symbol the Information Awareness Office has: the
Illuminati-inspired eye in the pyramid looking down on the entire world.
And check out the comment at the bottom:
A lot of initiatives have been started since 911, but DARPA is in a
position
On Sun, 24 Nov 2002, Blanc wrote:
How sort of amusing it is to read this, from the site: It is not
sufficient that we put the pieces together after the fact, it is essential
that we understand terrorist plans ahead of time so that we may prevent or
preempt.
Yeah, it'd be self parody if it
On Fri, 6 Dec 2002, Tyler Durden wrote:
But I have utilized a stopgap strategy for a number of years now that has
worked pretty good:
1) If I hear silence for more than a moment or two I hang up the phone.
Yeah, I've done that for a while now. But here in wisconsin (USA)
we have a new law
On Sat, 7 Dec 2002, Tim May wrote:
Frankly, millions of these fascists need a simple solution: a tree, a
horse, and a rope.
There aren't enough horses :-)
Patience, persistence, truth,
Dr. mike
On Mon, 9 Dec 2002, Harmon Seaver wrote:
Maybe somebody doesn't like the new look on my http://www.oshkoshbygosh.org
site.
heh, as someone who drives by Oshkosh a few times a year, I think that's a
great satire. Good luck staying alive :-)
Patience, persistence, truth,
Dr. mike
On Mon, 9 Dec 2002, Anonymous wrote:
It already has. And the hell with the horses -- tie the other end of the rope
to a fast car.
That would give a new meaning to drawn and quartered. There's a lot of
bureaucrats who need that performed on them.
Patience, persistence, truth,
Dr. mike
On Wed, 11 Dec 2002, Morlock Elloi wrote:
Does this vindicate homeopathy ?
I thought the rules were you have to have a smily to signify a joke. But
I guess on the net there are no rules :-)
Patience, persistence, truth,
Dr. mike
On Fri, 13 Dec 2002, Trei, Peter wrote:
For the Russians, 'a few' was over 70.
I hope for a non-violent restoration - this sort
of thing could give the Libertarian Party legs,
if they handled it right.
Agreed. And they may have not even need to handle it perfectly
right, since the main
On Fri, 13 Dec 2002, Anonymous wrote:
Interesting approach. But exactly how does that hinder the FBI
demanding a booksellers customer list, or a library's patron
check out record, or a black bag job on a personal computer, or
thousands of CALEA taps, or the Total Information Awareness
On Fri, 13 Dec 2002, Anonymous wrote:
Vote? Are you kidding? OK, here is your task. Since all but one
member of congress voted FOR the USA PATRIOT ACT, exactly what
party or what candidates do you suggest be elected in support of
civil liberties in the US? You don't seem to get this. Or on
On Fri, 13 Dec 2002, Sarad AV wrote:
The Taliban is still very much alive,when troops moved
into kabul there were no traces of the taliban.They
took what ever they wanted and were 'refugees'
sneaking out when the bombing started.They placed what
they needed ,every body else needed to
On Sat, 14 Dec 2002, Steve Furlong wrote:
The point was, the content providers aren't providing the
entertainment. The daughters are talking (and talking!) to their
friends with no help from the big companies other than providing the
connectivity. I believe that was Olyzko's point in the
On Sun, 15 Dec 2002, Sarad AV wrote:
Firstly,they cannot be exterminated.There is no proof
of identity as we may have in our countries and no
body will ask for it either,since most don't have one.
The Taliban would have cut their beard and hair and
mixed up with civilian population,while
On Sat, 14 Dec 2002, John Kelsey wrote:
The thing that's being missed here is that, if elections can be won by
running on a pro-freedom slate, politicians will be found to do that. Note
Running and winning are 2 different things. So far most libertarians
don't win, but it's slowly changing.
On Mon, 16 Dec 2002, Eugen Leitl wrote:
Realtime, cheap, reliable, invisible. Hard to fake, especially if combined
with other biometrics. Can be as sensitive as a canine, in principle.
[...]
http://www.eps.gov/spg/USA/USAMC/DAAD19/DAAD19-03-R-0004/SynopsisP.html
I would think anyone doing
On Mon, 16 Dec 2002, Major Variola (ret) wrote:
At 03:49 PM 12/14/02 -0800, Tim May wrote:
PLONK.
Hey, maybe Mike was talking about Mr. Booth, not Mr. Lincoln.
:-)
Tim has given me some motivation to work on an old idea. We'll see if I
get any time in the next year to make it happen.
On Wed, 18 Dec 2002, Adam Shostack wrote:
The Volkh conspiracy blog had this Learned Hand quote recently:
I often wonder whether we do not rest our hopes too much upon
constitutions, upon laws and upon courts. These are false
hopes; believe me, these are false hopes. Liberty lies in the
On Thu, 19 Dec 2002, Tim May wrote:
I just noticed a disclaimer in a t.v. ad for H-P computers.
Intended only for lawful uses. at the bottom of the screen towards
the end of the commercial.
Strange. Why would H-P or any other computer company feel the need to
include this
On Fri, 20 Dec 2002, Major Variola (ret) wrote:
Very good, sir. Your next assignment is to read about Mixmaster
anonymous remailer networks. Generally sending uniformly-sized (padded
or fragmented or noise) blocks at regular intervals is preferable (and
equivalent)
to your suggestion of
On Fri, 20 Dec 2002, Michael Cardenas wrote:
I'm not advocating armed rebellion. I'm saying that the current
political structures in power have massive political might and are
willing to use it to stay in power, as we are witnessing more everyday,
and anything that challenges that might will
On Fri, 20 Dec 2002, Major Variola (ret) wrote:
The moral equivalent of the pre-telegraph French semaphore soldiers
doing the macarena...
:-)
To the tune of I'm a lumberjack and I'm ok.
:-)
Patience, persistence, truth,
Dr. mike
On Fri, 20 Dec 2002, Michael Cardenas wrote:
I think that Bruce Schneier's terse comment just illustrates the
flippant attitude that lots of geeks have towards politics, and that
lots of people have also. Just because geeks know a lot about
technology, doesn't mean that they're impervious to
On Fri, 20 Dec 2002, Michael Cardenas wrote:
Ahh... I meant massive military might.
Not a whole lot of difference usually :-)
mike
On Fri, 20 Dec 2002, Trei, Peter wrote:
I think you meant the *Beretta* family, who
have been making fine fireams since the 1520's.
Yup, my spelling sucks :-)
Other really old companies:
Stora Enso Oyj of Helsinki, Finland, a
paper and board maker, began as a
copper mine in central
On Mon, 23 Dec 2002, Sandy Harris wrote:
Methinks its more complex than that. I'm surprised to see reports of
opium coming out of
Afghanistan at all.
It's been almost 30 years since you were there, so things have
definitly changed!
I was there in 1974, before the 1979 Russian invasion.
On Mon, 23 Dec 2002, David Howe wrote:
It isn't that wildly inaccurate - losing both control rooms would be
(and has been on at least one occasion) an absolute nightmare. on that
occasion, technicians had to get a five-year batch of radiation in ten
minutes by going in, operating *one* valve
On Tue, 24 Dec 2002, Matthew X wrote:
The containment vessel may survive a jet impact but the control room and/or
temporary pools of spent fuel lying outside the containment vessel might
not survive. A nuclear core without monitored control because everything
outside the containment vessel is
On Mon, 23 Dec 2002, Anonymous via the Cypherpunks Tonga Remailer wrote:
The main question is - is 1984-type society stable ?
It's locally stable, but not globally stable. It eventually
has to collapse.
All this lamenting about hamstringed sheeple and fascist state does no
good if it cannot
On Tue, 24 Dec 2002, Marc de Piolenc wrote:
Matthew X wrote:
I don't recall a lot of scientific scoffing of the China Syndrome movie
when it came out.
You obviously didn't read Nuclear News. It was taken as a major joke
because it didn't have one thing right in it.
When it first came
On Tue, 24 Dec 2002, James A. Donald wrote:
On the other hand, our inability to emulate a nematode, or the
a portion of the retina, is grounds for concern. This does not
indicate that the mystery is QM, but does suggest that there is
some mystery -- some special quality either of individual
On Tue, 24 Dec 2002, Dave Howe wrote:
Not sure about Georgia - must be a fairly common problem though as I found a
case at Browns Ferry Alabama (1975) where it all went tits up - no radiation
That's it. I guess everything south of the mason-dixon line is the same
to me :-) Ooops.
danger on
On Wed, 25 Dec 2002, Eugen Leitl wrote:
But why doing it in the first place? To contaminate an area, causing high
costs for decontamination? Doesn't compute. Unless you just want to annoy.
If you want to kill people, stick to nerve agents. Maximum impact
(relatively volatile, excellent LD50),
On Tue, 31 Dec 2002, Nomen Nescio wrote:
One way out is to ditch quantum mechanics as being anything near a
description of reality as classical theories in essence are. Tim Boyer
of CUNY and a batch of Italian researchers have done a pretty convincing
job of showing that Ahranov-Bohm can be
On Wed, 1 Jan 2003, Eugen Leitl wrote:
I have a related question. I have a little server sitting in a wall
closet. Does anyone have an easy solution (preferably low tech) for
figuring out that the closet door has been opened?
from a kids cartoon a couple weeks ago: put a bowl of marbles next
On Tue, 31 Dec 2002, Tim May wrote:
* I expect most uses of customer courtesy cards are to try to get
some kind of brand loyalty going. People thinking Well, I have a card
at Albertson's, but not at Safeway, so I'll go to Albertson's.
They'd love that, but know better.
* Dossier-compiling
On Wed, 1 Jan 2003, Todd Boyle wrote:
Its not enough to put the chips next to the beer. They want
to examining the layout of all their shelf space.
The cash register data alone, is enough to do this, but
it doesn't work very well for shoppers who come and
buy chips on tuesday and beer on
On Wed, 1 Jan 2003, Michael Cardenas wrote:
People do break cyphers, by finding weaknesses in them. Are you saying
that you think that current cyphers are unbreakable?
Also, what about using biological systems to create strong cyphers,
not to break them?
We do pretty good already don't we
On Tue, 31 Dec 2002, Tyler Durden wrote:
Actually, Tyler Durden (ie, me) wrote what is attributed to the generic
anonymous name of Norman Nescio. Anyway,...
Yeah, the TD gave that away :-)
With all due respect, Pooey Dr Mike. Take a nice, straightforward EPR using
two correlated photons
On Thu, 2 Jan 2003, Anonymous wrote:
No. Bell's inequality tells us that there are no hidden variables.
It's not that we don't know the value of the measureable prior to
wavefunction collapse...the specific measureable doesn't exist prior to
wavefunction collapse. When Bell formulated the
On Fri, 3 Jan 2003, Sarad AV wrote:
As it says-they are self referecial statements.What do
we learn from the liars paradox?
We arrive at a senseless result-doesn't all other
paradoxes do that-with the difference that they pick
only either true or false-which they so strongly
beleive in and
1 - 100 of 190 matches
Mail list logo