Re: An attack on paypal --> secure UI for browsers
> The solution to this is Palladium (NGSCB). > > You'd want each ecommerce site to download a Nexus Computing Agent into > the client. This should be no more difficult than downloading an Active-X > control or some other DLL. The NCA has a manifest file associated with it No shit? This is moronic. But then it reflects the impaired cognitive abilities of corpdrones in mintel. I pay for the "computer", and then all these corporations start downloading shit to my "computer" in order to make it safe for me to use it, right ? I am lay person and need to trust these people, as I am clueless about stuff they download. But their web page says it's good. This all happens *after* I buy the computer. So, to recap, I pay several $K for the "computer" and then have to customize it so that it becomes "safe". The computer, as malladium authenticates the computer. Why do I want $3,000 authentication token ? No, mintel making money is not the right answer. Try again. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Calendar - Free online calendar with sync to Outlook(TM). http://calendar.yahoo.com
Re: IQ, g, flying
> Just FYI, if you read up on G (general intelligence factor), you will > learn that the *only* cause of death that increases with G is dying in > airplanes. Surviving flying is very much similar to exercising safe crypto practices; you must examine the source and recompile PGP for each message. Once you start to _believe_ that it's a sound code, you are on your way out of the gene pool. Hint to Tim: 99.7% of flyers, including all instructors, believe. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Calendar - Free online calendar with sync to Outlook(TM). http://calendar.yahoo.com
Re: Peer-to-Peer File Sharing and Copyright
> eye-opener (the full paper goes into more detail). My conclusion > after reading this (well before also actually, but it re-enforced the > view) is that the safest and simplest thing to do is to just publish > such software anonymously. Again, motivation. The number of programmers that would publish a usable package which has not even theoretical means of being traced to them is very limited. Even signing it and keeping the key is a risk. Also, there is a question of quality. From what I've seen, best engineers work for shitloads of money. Open source stars are far from the best. Some are pretty shitty. And 100% anonymous ones are bound to be even worse. It takes a rather unique person to anonymously publish a good package that will make a difference and which any bozo could claim for himself. The fact that such even never happened supports this view. We are running against the basic law: nature abhors philanthropy. It will not happen. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Movies - coverage of the 74th Academy Awards. http://movies.yahoo.com/
RE: I'm no "agent."
> choice of law between the "laws of men," and "the laws of mathematics" smack > of some fallacy? > > Not hiring a single lawyer, not even _consulting_ (emphasis his) a lawyer, > more truly means you are a complete moron and disdain even calculated risk. It should be considered that Mr. May perhaps meant to say that one does not turn to bacteria for help in fighting infection. One uses antibiotics. I can understand that from the fungal point of view the purpose of the world is to be sucked dry by the fungus. Advanced fungi, however, should be able to comprehend that this opinion is not shared by the victims. "Suckees" is probably the legal term. Once I saw a sticker (from shmoo, I think) that said: "If you are a part of solution, you are a part of the problem". Does this help ? = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Movies - coverage of the 74th Academy Awards. http://movies.yahoo.com/
Re: design considerations for distributed storage networks
> Suggestions for more criteria welcome. Motivation. I cannot find a non-computer paradigm that relates to sharing in-house private resources with unknown others. This maybe the the principal conceptual obstacle. Outside irrelevantly low-numbered activist circles, masses just do not want to share without very obvious and immediate gratification. Sharing copyrighted material in order to get the same is the only working example that I can see. If someone can point to reason why large number of people would give a fuck about fighting censorship, enhancing privacy and anonymity, I'd like to be enlightened. With working real-world examples. Unemployed cypherpunks do not count. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Movies - coverage of the 74th Academy Awards. http://movies.yahoo.com/
Re: Banned Research and Raids on "Secret Labs"
>this, but at least the point is arguable. The issue of whether human >cloning research is so intrinsically sensitive or dangerous that it >requires preemptive raids and fishing expeditions is a topic worth >discussing. For now, I'm pointing out some of the disturbing >constitutional issues. Cloning taboo, as all other taboos exist because of the influence they may have on the powers that be. Individual identity is a basis for so-called "legal system" and law enforcement in general. While corporations and governments (as in "powers that be") are allowed group/communal identities, mere citizen-units are not. I think that there is a generic fear that powerful individuals (cloning is off-limits to wage slaves) would somehow become more powerful if they can copy themselves. Also, lot of the System is based on the strict reproduction control, individuals coming out in unapproved manner would mess that up. Can you imagine Tim May *brought up* by Tim May ? Horrible. But I don't think that it can be stopped. There is a strong incentive for corporations to breed obedient workers and for the state to breed servile citizens. That is much more economical and less risky than having to brainwash each and every new generation. Soon you'll see middle-aged bald and impotent managers asking the meekest and lowest paid 10-hr/day workers if they will donate some stem cells for a day off. Same thing will happen in the voting booths. Get personalized email addresses from Yahoo! Mail http://personal.mail.yahoo.com/
Re: Firewall Spoofing
>education on what the outlaw cops, judges and >spooks are up to: But ... but ... it works only on windoze ! John, this is actually good news. Think of it as culling the weak and sick sheeple. This computer/internet thing is gone too far in favour of the state. The only thing that will cause the change is more pain, and more severe. When local pigs start earning their points by turning in subjects that peeked into genitals below prescribed age, or downloaded mp3s or whatever, the said subjects will be under evolutionary pressure to improve. Apple and Linux distributors should seize this opportunity: no DIRT here ! And when they get subverted it will be BeOS and something else. Gestapo is the best way to exterminate the monoculture. Stop wearing the fucking yellow armband. Get personalized email addresses from Yahoo! Mail - only $35 a year! http://personal.mail.yahoo.com/
All your bits are belong to us
Dutch discover that once you give bits to someone, you don't own/control them: http://www.heise.de/tp/english/inhalt/te/7691/1.html Dutch law enforcement should get easier access to personal data stored by companies Jelle van Buuren 21.05.2001 Police wants to screen whole groups of citizens to see if they can establish criminal patterns Dutch police can get easier access to personal information of clients stored in company's databases. All the information stored by companies will be available to the police, proposes the commission Mevis in a report launched at Monday last week. The minister of Justice said he would adopt the proposals in new legislation. According to the commission, lead by Professor P. Mevis, the current investigative powers no longer satisfy the needs of the police in the information society. Privacy rules are often an obstacle, as are legal definitions, which are not adjusted to the digital developments. Companies don't know what their obligations are. In many cases companies cooperate voluntary in providing confidential client information. But according to the commission Mevis, this situation is not acceptable for both parties. The commission therefore proposes new investigative powers for the police. Police officers should, without the need of a legal order, get the power to ask personal information like name, address, living place, client number, bank account, access codes, and registration plate. The personal information does not have to belong to suspects; the police are authorised to ask this kind of information for a group of persons, to investigate networks and communications, and floods of money or goods. This is called pro-active investigation: the screening by police of whole groups of citizens to see if they can establish criminal patterns. A whole range of companies will be forced to work with the police: telephone companies, Internet providers, lease companies, car rental companies, travelling agencies, flying companies, garages, real estate agencies, credit card companies, insurance companies, mortgagors, transport companies, banks, accountants, chemical industry, chambers of commerce, educational institutes, art houses, hospitals, hotels and jewellers. Location data that will give information where persons or goods were on certain times, which for instance are stored by warehouses and super markets (bonus cards!), telephone companies, travel companies, credit card companies and banks, also have to be given to the police. For this kind of information a legal order by the public prosecutor is needed and there has to be the suspicion of a crime punishable by four years or more. 'Sensitive information', like information on political believes, race, health, sexual habits or membership of trade unions, can be demanded when there is a serious breach of the legal order. The commission further proposes the power to ask for 'future data', so companies will be obliged to give every bit of new information they obtain in the future. Companies can also get the obligation to work up their registers or database to analyse or combine all bits of information. The commission and the minister of Justice said at the time of the release of the report that the proposals strike a 'fair balance' between the needs of the law enforcement authorities, the companies and the protection of privacy. According to civil liberties groups, the proposals only reflect the wishes of police. 'The law enforcement authorities drew up their list of presents and they got them all. This proposals means a huge increase in the power of police, with little or none means of control,' commented Bits of Freedom. __ Do You Yahoo!? Yahoo! Auctions - buy the things you want at great prices http://auctions.yahoo.com/
Re: Kirkland SSN document, comments and snapshot of what we're talking about
I apologize for not following the stuff. Could someone please explain in few simple sentences what was the reason for the original publishing of SSN data in the first place ? __ Do You Yahoo!? Yahoo! Auctions - buy the things you want at great prices http://auctions.yahoo.com/
Re: Burglar tools in a surveillance society
> have homemade tools and devices for retail theft including metal or > foil-lined shopping bags that override and evade these surveillance > systems. Senate Bill 966 provides that a person commits a Class A So, in addition to "The C Programming Language" book, the following items will be controlled, restricted and licensed: - Aluminum foil - Mylar foil, including emergency insulating blankets Good subjects are transparent in the broad sense. Yahoo! Auctions - buy the things you want at great prices http://auctions.yahoo.com/