I'll be covering the trial for at least one more day, Monday. Friday's
report about Bell taking the stand should be up on Wired News tomorrow morning.
Cyberpass.net is down and I haven't received any cpunx traffic since Friday.
-Declan
A young Jim Bell (note same glasses as current):
http://www.rdrop.com/~jimw/WCCF8/SemiDisk_booth.jpg
See also:
http://www.rdrop.com/~jimw/j-wccf8.shtml
On Sun, Apr 15, 2001 at 02:11:56PM -0700, Ray Dillinger wrote:
You sell Alice a credit history on Bob; Bob takes a new
identity; Alice is back to square one. Why would Alice
buy credit histories?
Not everyone will choose to be lost in the Net.
So the solution is simple: I sell Alice a new
The government argued that Bell had years in which to file a civil suit if
he truly believed there was wrongdoing, and his numerous _pro se_ motions
showed he knew how.
Bell is not alienated from his parents, who were there for the trial. Sad,
gentle folks.
-Declan
At 09:09 PM 4/20/01
This is nonsense. Even if you, say, don't believe (gays|blacks|IRS agents)
should have any rights, and you assault or shoot one, you maintain your
rights under the criminal justice system. To a trial by jury, to be
confronted with the evidence against you, and so on. --Declan
At 03:39 AM
FOR IMMEDIATE RELEASE Contact:
Pia Pialorsi
Monday, April 23,
2001 202-224-2670
107-38
Hearing on Booster Seats Set for Tuesday, April 24
The Consumer Subcommittee hearing Booster Seats and the
FOR IMMEDIATE RELEASE
Contact:
Robert Mendes da Costa
SecureMedia
(415) 345-7720
[EMAIL PROTECTED]
://www.politechbot.com/docs/cppa.text.html
Background (see wired.com for coverage tomorrow):
http://www.politechbot.com/cgi-bin/politech.cgi?name=morphed
-Declan
**
From: Bruce Taylor [EMAIL PROTECTED]
To: Declan McCullagh [EMAIL PROTECTED]
Subject: FW: Our amici brief in Supreme Court in child porn case
On Tue, Apr 24, 2001 at 03:08:19PM -0500, Aimee Farr wrote:
This caught me a nudder fish. I'm going into my reinforced steel shark cage,
'cause this tells Mr. Big Fish could be behind him (Tim is like those
three sharks with memory in that Deep Blue Sea movie.)
Aimee, I like you, I really
Yep. Brands' book is out from MIT Press, so it's even accessible.
(Well, relatively accessible; I keep planning on finishing it RSN.)
For someone to ask on cypherpunks for pointers to basic crypto
concepts and ignoring reading lists is like someone posting to a
political mailing list and asking
No argument here. I recall a lot of this was in the '96 legislative
session, especially the summer. I have some articles on the topic
archived at www.eff.org/pub/Publications/Declan_McCullagh
-Declan
On Wed, Apr 25, 2001 at 09:34:44AM +1000, Ralph Wallis wrote:
On Tuesday, 24 Apr 2001 at
On Tue, Apr 24, 2001 at 06:43:20PM -0700, Tim May wrote:
From our perspective, it will show the foolishness of government
overreaction (ordering a million animals to be slaughtered and burned
with tires and old pressure-treated lumber railroad ties).
Good summary. Here's an ENS report:
On Tue, Apr 24, 2001 at 09:27:10PM -0700, Tim May wrote:
If this becomes law, it will be a case of pure thoughtcrime. No victims,
no aggression against another person, no actual people. Just
thoughtcrime.
It is law, actually. Passed in 1996, with the Bruce Taylors of the
world testifying in
SENATE APPROPRIATIONS COMMITTEE Chemical Weapons Defense Subcommittee
hearing on Chemical Demilitarization. Witnesses: Joseph Westphal, acting
secretary of the Army; James Bacon, program manager, Chemical
Demilitarization; Michael Parker, program manager, Assembled Chemical
Weapons
Experts Highlight Shortcomings Of National Terrorism Preparedness
Response Capabilities
7 Date: Tue, 24 Apr 2001 18:01:41 -0400
7 Subject: 4/24/01 Experts Highlight Shortcomings Of National
Terrorism Preparedness Response Capabilities
7 From: Hansen, Steve [EMAIL PROTECTED]
I believe at least one FOIA request has been pending for the exact
FAA rule. I wrote about this a few years ago and asked the FAA to
clarify its position, and I never heard anything authoritative.
In a recent article, I pointed out that the trend is shifting: You
can now use kiosk check-in in
On Sat, Apr 28, 2001 at 06:32:08PM -0700, Tim May wrote:
None of the non-cryptographic methods are very resistant to legal,
technical, sniffing, and black bag attacks. And only multiply-chained
encrypted-at-each-stage messages, a la remailers, are adequate for
high-value messages.
If only
On Sat, Apr 28, 2001 at 08:49:43PM -0700, Tim May wrote:
Well, better than nothing. (Like I said in another article tonight,
the best is often the enemy of the good.) We knew even in 1992 that
remailers were a pale imitation of the DC Nets discussed a few
years earlier by Chaum and
On Sun, Apr 29, 2001 at 11:24:09PM -0700, Steve Schear wrote:
What if the sysadmin is intentionally located in an offshore location so
that they cannot be kept from notifying all users of the logging order?
Then we pass a cybercrime treaty to require them to follow U.S. laws.
Law enforcement
Steve,
Even assuming that what you say is true, and I suspect it is,
you'd be relying on protections enshrined in the law. The purpose
of this treaty, of course, is to change the law. :)
-Declan
On Mon, Apr 30, 2001 at 10:07:33AM -0700, Steve Schear wrote:
At 10:56 AM 4/30/2001 -0400, Declan
FOR IMMEDIATE RELEASE
May 1, 2001
For More Information Contact:
Andrea Andrews (202) 224-6518
WASHINGTON, DC - U.S. Senator Richard C. Shelby (R-AL), Chairman of
the Senate Intelligence Committee, will hold a press conference
Wednesday, May 2 to discuss
On Sat, Jun 21, 2003 at 11:24:30AM -0700, Bill Stewart wrote:
I've also found it was less trouble to get a beer and _dinner_
late at night than in much of California, though perhaps they
have rules requiring bars to also be restaurants.
I was in Salt Lake City just after the Olympics (and
today...
TECHNOLOGY
National Academies
Meeting of the Committee on Nanotechnology for the Intelligence Community.
Closed session summary posted after the meeting
Location: Keck Center of the National Academies, 500
5th St., NW, Washington, D.C..
Contact: James Killian, 202-334-1758;
http://www.denverpost.com/Stories/0,1413,36~53~1497971,00.html
..
The development of digital money, and encryption software restricting
government's ability to monitor Internet activity, are common goals among
the online anarchists and libertarians known as cypherpunks.
The ultimate purpose
On Sat, Jul 19, 2003 at 04:33:37PM -0400, [EMAIL PROTECTED] wrote:
IMHO, it is exactly this kind of commentary which scuttled an attack
on free encryption software in the wake of the attack. Moreover, the
monolith authentication schemes were also laid to rest or driven
Well, no. This kind of
at HavenCo?
http://rss.com.com/2100-1028_35059676.html?type=ptpart=rsstag=feedsubj=
ne
ws
Has 'haven' for questionable sites sunk?
By Declan McCullagh
Staff Writer, CNET News.com
August 4, 2003, 1:38 PM PT
LAS VEGAS--A widely publicized
project to transform a platform
26 matches
Mail list logo