Re: A secure voting protocol
At 05:53 PM 11/13/00 -0500, Declan McCullagh wrote: On Mon, Nov 13, 2000 at 11:08:01AM -0800, Tim May wrote: A "vote at home" protocol is vulnerable to all sorts of mischief that has nothing to do with hackers intercepting the vote, blah blah. Righto. Absentee ballots require a witness, usually an officer (if you're in the military) or a notary-type, to reduct in par tthe intimidation problem. The state of Oregon uses vote-by-mail for their elections, though I think there's an option for physical delivery if you want. I'd be surprised if they require witnesses - if anything, that encourages your spouse to look at how you voted. I've never been required to have witnesses for voting with absentee ballots in New Jersey or California. Besides, in places like Chicago or Tammany-era New York City, it'd be easy for the Party to obtain notaries to witness ballots. "OK, Mr. Jones, the stamp on your ballot, and here's the stamp on your bottle of whiskey. Next, please!" and optionally to put the correct party ballots in the correct box and the incorrect party ballots in the round container. Thanks! Bill Bill Stewart, [EMAIL PROTECTED] PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
Re: The Ant and the Grasshopper, Election Version
Mac Norton wrote: And then the locusts descend. And they feed. Because the ants and the grasshoppers never could get their shit together. 0/10 for entomology. Locusts *are* grasshoppers :-) Ken
Please take me off your mailing list!
Katz /. piece on improving political technology
-BEGIN PGP SIGNED MESSAGE- http://slashdot.org/article.pl?sid=00/11/09/2042224 While I understand the rubber-hose vote-coercion problem, My own opinion still remains that we need to solve the voting problem for *business* reasons, and that's how we'll get to use it first. You need secure voting protocols in order to control equity, after all, and, frankly, I'm not nearly as skeptical as others are about it. Without any reasons for my intuition here, I think that some of the problems some cryptographic experts have about internet voting are mostly bugbears, like "perfect" kidnapping scenarios for digital cash itself, for instance. And, of course, I think that the "problem" of selling votes is more one of attitude adjustment. After all we sell votes in corporations all the time, and, sooner or later, we're going to treat our force-control structures as non-monopolistic businesses instead of monopolistic nation-states. In the same way that religious freedom gave us religious denominations with democratic governance, sooner or later economic freedom will give us force-control that can be sold just like any other asset. Voteauction.com is a pointer to that, frankly. So, workable solutions for voting will happen first in *corporate* governance, in shareholder voting, proxies and so on. After we solve the problem of voting about *money*, mere politics will be a piece of cake. Financial cryptography is the only cryptography that matters. Political cryptography is a mere sideshow by comparison. Cheers, RAH -BEGIN PGP SIGNATURE- Version: PGPfreeware 6.5.8 for non-commercial use http://www.pgp.com iQEVAwUBOhE8HcUCGwxmWcHhAQG2HQf/UkPSaY6lwgIzuA4VOydZb+EpYX0kCnDn oCiG+zPq+0ktJ2Ykum3EFUANldxlAB/tVfDHCIuRiAskrQWNdEEDSFpLA2cjusqo hjfrZFLnmHiYsNONvngSU6AZBYWk/ctZOBNK2YKssZtjksk3810PU3SH+0fhCIAw vMW6wZOTMBa/V0LOwR3gJFM8N8WJfUqZ2pcrLG8eO2axqiYfkXCKcDCKxcumWHrA vpnP3wvRyKBdqFOf60Q0H+DEAeUpZb1kuJ4sKvzniri66lk/W15ImM0FKyAxvSVx ocHaJ09ZdBHUJuBC7hHv6zVwpUNCscwz8tO07Fg4XDTrXUn88EcAUg== =qoOX -END PGP SIGNATURE- -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Amazon's new user interface.
http://www.amazon.com/exec/obidos/subst/home/all-stores-ballot.html/106-5432 692-8816419 It's worth looking at. Peter
Re: Predicting a succesful society
Jim Choate wrote: It get's off it's home planet permanently. [and more.] Yes, thank you very much, indeed, absolutely. A suave-tailored and barbered and elocuted gentleman who runs UK's Internet Watch aroused the anti-censorship crowd with the query "should we allow an image of a penis up an infant's anus." "Absolutely not," the crowd vowed. Debate on splitting the profane image from the urbane text ensued. Text should be unfettered but not pix, it was agreed. The uncensorable textual image mouthed by the Internet Watch barker hung in the air to arouse unanimity on what's not permissable in a succesful secret-vice society. Onion kiddie-chat rooms, absolutely.
Re: Public Key Infrastructure: An Artifact...
As an aside ... AADS (http://www.garlic.com/~lynn/ ) relies on existing business processes that provide secure bindings in account records ... just adding public key digital signature to existing authentication processes for non-face-to-face and/or face-to-face transactions (i.e. the meaning of what is in the account bindings continues to be what the business processes have defined those meanings to be). existing e-commerce is straight forward because it operates almost totally within existing account-based business processes ... and the business transactions tend to include more complex bindings from the acocunt records (than just authentication) ... things like real-time credit-limit, open-to-buy, running totals, month-to-date and/or year-to-date activity, etc. the original PKI target from the early '80s for offline email authentication was a problem since it mostly any kind of authentication binding processes. "R. A. Hettinga" [EMAIL PROTECTED] on 11/11/2000 11:25:35 AM Please respond to "R. A. Hettinga" [EMAIL PROTECTED] To: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], Digital Bearer Settlement List [EMAIL PROTECTED] cc:(bcc: Lynn Wheeler/CA/FDMS/FDC) Subject: Public Key Infrastructure: An Artifact... http://www.anu.edu.au/people/Roger.Clarke/II/PKIMisFit.html Public Key Infrastructure: An Artifact Ill-Fitted to the Needs of the Information Society Abstract It has been conventional wisdom that, for e-commerce to fulfill its potential, each party to a transaction must be confident in the identity of the others. Digital signature technology, based on public key cryptography, has been claimed as the means whereby this can be achieved. Digital signatures do little, however, unless a substantial infrastructure is in place to provide a basis for believing that the signature means something of significance to the relying party. Conventional, hierarchical PKI, built around the ISO standard X.509, has been, and will continue to be, a substantial failure. This paper examines that form of PKI architecture, and concludes that it is a very poor fit to the real needs of cyberspace participants. The reasons are its inherently hierarchical and authoritarian nature, the unreasonable presumptions it makes about the security of private keys, a range of other technical defects, confusions about what it is that a certificate actually authenticates, and its inherent privacy-invasiveness. Alternatives are identified. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' For help on using this list (especially unsubscribing), send a message to "[EMAIL PROTECTED]" with one line of text: "help".
Infiltrating a Spy Conference
I thought you might find this story interesting: "Infiltrating a Spy Conference" http://www.alternet.org/story.html?StoryID=10014 - This story has been forwarded to you from http://www.alternet.org by [EMAIL PROTECTED]
Re: the ballot
At 10:50 AM -0800 11/14/00, Tim May wrote: The Democrat untermenchen are even trying to overrule the local canvassing boards which have said they "see no point" in a manual recount. Ja, I know the correct spelling is "untermenschen." After naming my Siamese cat "Nietzsche," I finally learned not to make any spelling errors in that oft-misspelled name. I even usually pronounce the name as it should be pronounced, not the usual American form. (Though one source says the name was originally Polish and so the "nee-chee" variant is almost acceptable.) --Tim May -- (This .sig file has not been significantly changed since 1992. As the election debacle unfolds, it is time to prepare a new one. Stay tuned.)
LA Times Registration
Welcome! You are now successfully registered at the Los Angeles Times Web site. Save this e-mail. It contains your user name and helpful tips on services for registered users. Your user name: cypherpunks101 If you ever lose your password, visit this web page: http://www.latimes.com/siteservices/loginhelp.htm Now that you're registered, you can immediately try the archives, Hunter, the crosswords and our bulletin boards. HUNTER * Set up a custom newspaper for FREE at http://www.latimes.com/cgi-bin/hunter.cgi ARCHIVES * If you want to retrieve a story from our archives which go back to 1990, you may do so now at http://www.latimes.com/archives/ CROSSWORDS * To access the last 7 days of L.A. Times crossword puzzles, please go to http://www.latimes.com/extras/crossword/ DISCUSSIONS * Join our boards to discuss new trends and current events in news, entertainment, sports, business and food recipes. http://www.latimes.com/discuss/ Thanks for joining us. Los Angeles Times Web Site Staff
Trusted Client Systems--echo var
This e-mail message is a reply to a Web page using the form2mail script. The reply was generated by a web page at www.starrtree.com. Dear Mr/s Joe Cypherpunk, Thank you for your interest in Trusted Client Systems unique suite of secure PCs, products and services. Your name has been added to our mailing list and you will be hearing from us shortly regarding our products, their prices, availability and special introductory offers. Thanks again for your interest, The Trusted Client Systems staff
No Subject
i hate you
Re: BSA deploys imaginary pirate software detector vans
(Large number of groups/lists he/she crossposted to have been removed.) At 2:32 PM -0800 11/13/00, Tib wrote: Hope I'm not being totally naive about the capability of computer hardware, but I sure don't recall my PC (or any that I have ever had or can think of seeing) having short range broadcasting capabilities. How would this be theorheticly possible (despite the utter nonsense that the rumor must be) to accomplish, if at all? Yes, you are being totally naive. --Tim May -- (This .sig file has not been significantly changed since 1992. As the election debacle unfolds, it is time to prepare a new one. Stay tuned.)
Re: CIA Website Update
Yes, the 16,000 declassified Chile/Allende overthrow docs are available: http://foia.state.gov From files of the State Dept, CIA, FBI, National Security Council, NARA, DIA, NSA, et al. A bounty of patriotic gore and defense/intel pork thanks to Dr. Strangelove and Dickster. And a new report on remaking the NRO to accelerate sat-spying technology development and at the same time lay on fat new layers of secrecy: http://www.nrocommission.com/toc.htm The commission was co-chaired by Official Secrets Porter Goss and hero Bob Kerrey. The report says openness is threatening US survival. Which mirrors SecDef Cohen's warning that technology is empowering citizens, business and allies to challenge USG supremacy. There has never been a better time for ever small claques demanding deeper government secrecy.
Re: your mail
On Tue, 14 Nov 2000, morris wrote: Date: Tue, 14 Nov 2000 19:59:58 -0600 From: morris [EMAIL PROTECTED] To: [EMAIL PROTECTED] i hate you What else would one expect from a student at the University of Arkansas? -- Yours, J.A. Terranson [EMAIL PROTECTED] If Governments really want us to behave like civilized human beings, they should give serious consideration towards setting a better example: Ruling by force, rather than consensus; the unrestrained application of unjust laws (which the victim-populations were never allowed input on in the first place); the State policy of justice only for the rich and elected; the intentional abuse and occassionally destruction of entire populations merely to distract an already apathetic and numb electorate... This type of demogoguery must surely wipe out the fascist United States as surely as it wiped out the fascist Union of Soviet Socialist Republics. The views expressed here are mine, and NOT those of my employers, associates, or others. Besides, if it *were* the opinion of all of those people, I doubt there would be a problem to bitch about in the first place...
Welcome to CNN Community
Welcome, Joe Cypher. You have registered as a provisional user for CNN Community. To become a full member, please visit the following URL: http://community.cnn.com/cgi-bin/WebX?confirm@@!user=65247auth=n4EvcoEla5K If the above link is truncated, or the text after the exclamation point is black, please copy and paste the entire link into the address window of your internet browser and press the enter key. In some email clients, the URL repeats. If you see the letters "HREF" followed by a repeat of the URL (http://community.cnn.com/...etc), be sure to only copy the information to the left of the second "HREF". Otherwise, just follow the link back to the message boards to activate your account. You may find our standards more stringent than other Web-based Communities. We are confident you will come to appreciate the friendly atmosphere and sharply focused discussions we strive to maintain. Comments posted on our message boards which violate our standards are routinely removed without further comment. Chatters who violate our standards while in our chat rooms will be removed from the chat server. Please abide by the following code of conduct that prohibits: -No profanity or obscenities of any kind, even disguised with *asterisks. -No personal attacks on other Community participants (personal attacks are defined as comments that reflect upon the person instead of their opinion) -Slanderous, defamatory, obscene, indecent, lewd, pornographic, violent, abusive, insulting, threatening and harassing comments are not tolerated. -Please do not stray from the discussion topic. -No impersonation of other participants or public figures. A user may choose an Bappropriate nickname/B on message boards or in chat as long as a real name is used in the personal information field (which is not publicly visible on message side). -No advertising of any kind, including non-profit organizations. -No copyrighted material is allowed. Please use links instead of quotes from sources outside CNN. -On message boards no oversize fonts, JavaScript, tables, headings or other advanced HTML commands are allowed. Please use only bold or colored fonts to emphasize your points. Thank you for joining us, and we look forward to having you visit.