On topic!

2002-10-13 Thread Ryan Sorensen
Talking to someone who was at the legendary cypherpunks anniversary bbq.
He brought up the fact that someone there was talking about private
hedonistic cells (any errors are mine, not his, and whoever talked
about this, if they have any more thoughts on the matter, please feel
free to email me.)

Brought this to mind.

Identity Based Encryption schemes. Fairly unworkable on the global scale
for a number of reasons. Shrink the space. Say a small group. Split the
secret for the key issuer, probably using a k-of-n scheme, where any new
member needs k people to give k pieces of the new secret key to the new
member. Transparent encryption to group members.

Use broadcast encryption things for mail to group members, or subsets
thereof.

Open problems: Can you have an easily extensible k-of-n scheme? Or even
an n-of-n? Key problem here being the fact that the former scheme is
still valid, just ignore the fact that there's a new member.

k would obviously be configurable based on group policies, number needed
to instantiate a new member, and all that good stuff.

What else can you do with a formulation like this? What else would be
-useful- given a formulation like this? Proofs of membership to the
outside? To other group members? Anonymity inside the group? Conditional
anonymity subject to open by k (not necessarily the same k as before)
members?

Homogoneous front to the outside world? Internal cash? Group-generated
random schemes? Mental poker put to some purpose?

-- 
All that is not strictly forbidden is now mandatory.




Re: why bother signing? (was Re: What email encryption is actually in use?)

2002-10-13 Thread Julian Assange
 There have been episodes of spoofing on this list.  If client
 side encryption just worked, and if what is considerably more
 difficult, checking the signatures just worked, there would
 be no bother, hence it would be rational to sign

Not just work but opt out is what you are looking for. If there
are n posters to the list and m people signing, then their are only
n-m spoof targets. As m approaches n, the number of forgeries
rapidly approaches zero as there is no one left worth spoofing who
can be spoofed. But as each individuals chance of being spoofed
approaches zero, the benefit gained by signing also approaches
zero. Consequently unless there are additional costs to non-signing
above and beyond spoof protection there will always be a substantial
number of unsigned messages.

--
 Julian Assange|If you want to build a ship, don't drum up people
   |together to collect wood or assign them tasks and
 [EMAIL PROTECTED]  |work, but rather teach them to long for the endless
 [EMAIL PROTECTED]  |immensity of the sea. -- Antoine de Saint Exupery




Mp3sa etfl

2002-10-13 Thread Yilmaz Nurhan
Title:  nmnytxnhbeglcytgeyajmvlroutdsixgwlhqlwaobjdeiwmpvmb 



MP3SA
En Ýyi En Büyük Arþiv

  

  
  Türkçe MP3
  Yabancý MP3
  Türkçe Albümler
  Yabancý Albümler
  Pop Müzik
  Arabesk Müzik

  
  Rock Müzik
  Latin Müzik
  Hip-Hop Müzik
  Türk Sanat Müziði
  Türkü Arþivi
  Film Müzikleri




  

  Müzik konusunda aradýðýz her çeþidi bulabileceðiniz bir site artýk var. Her gün güncellenen ve istekleriniz doðrultusunda yeni eklemeler yapýlan sitemizde kaliteyi fark edeceðinize eminiz.
http://www.mp3sa.com









¦ÑªB¤Í cpunks §K¶O°e±z¨k¤h°ª¯Å¥Ö®M

2002-10-13 Thread p2661010cpunks
Title: °¨¤W¶ñ¼g¯Á¨úªí





 

  
  
 
  °¨¤W¶ñ¼g¯Á¨úªí §Ú­Ì±N®Ú¾Ú¥H¤U¸ê®Æ»P±zÁpµ¸¨Ã°e³fµ¹±z¡I
  ©m¡@¡@¦W¡G¡@¯Á¨úªÌ¥u¶·­t¾á¬¡°ÊÃØ«~³B²z¶O199¤¸ (¨ì¥I) 
  ¦í¡@¡@§}¡G 
  ¦í¦v¹q¸Ü¡G ¡@¤½¥q¹q¸Ü¡G 
  ¤â¡@¡@¾÷¡G ¹q¤l¶l¥ó¡G 
   
  ¥»°ª¯Å¨k¤h¥Ö¥ó²Õ¥]§t¦³¥Ö¥],¦W¤ù§¨,¥Ö±a,»â±a,»â±a§¨,»â±aªá¦â¤£±o¬D¿ï,¥ÑÃÙ§U³æ¦ìÀH¾÷©â¨ú

  


Re: Echelon-like resources...

2002-10-13 Thread Eugen Leitl
On Fri, 11 Oct 2002, Tyler Durden wrote:

 And indeed, in a world where most messages are fairly weakly encrypted, 
 bursts of strongly-encrypted messages will stand out all the more and 
 possibly flag the need for other methods of investigation.

Doesn't figure: while it's easy to screen for high information entropy
(archives have a signature), telling weak encryption from strong is
nontrivial, unless it's conveniently labeled, and you're limiting the
attack to a tiny fraction of the entire traffic, not realtime.

And of course you can package 'strong' encryption into a 'weak' encryption 
envelope, so you will only know that 'strong' encryption has been used 
after you've broken the 'weak' envelope.




Re: was: Echelon-like resources..

2002-10-13 Thread Sunder
 Yes: The factory was bombed, but actual  
 deaths were one night watchman, not tens 
 of thousands, and he asserted that the  
 Sudanese government are the good guys in 
 the civil war, and their opponents  
 terrorists. 

And how many of their citizens have or will die due to lack of those very
same pharamceuticals that the bombed factory can no longer produce? Or
suffer from disease due to the same?

Perhaps not tens of thousands, but more than just the single night
watchman, I'd say.

The point isn't how many deaths, but what collateral damage was done.  Not
just in the sense of civilian casualties, but also the damage inflicted on
those by the effect of not having said facility around.


Of course, for all you and I really know that could have been an Anthrax
factory cleverly disguised as as a pharmaceuticals factory, but we can put
up rethorical questions and answers such as these for the next millenia
and not get anywhere either.




¦ÑªB¤Í cypherpunks §K¶O°e±z¨k¤h°ª¯Å¥Ö®M

2002-10-13 Thread p2661010cypherpunks
Title: °¨¤W¶ñ¼g¯Á¨úªí





 

  
  
 
  °¨¤W¶ñ¼g¯Á¨úªí §Ú­Ì±N®Ú¾Ú¥H¤U¸ê®Æ»P±zÁpµ¸¨Ã°e³fµ¹±z¡I
  ©m¡@¡@¦W¡G¡@¯Á¨úªÌ¥u¶·­t¾á¬¡°ÊÃØ«~³B²z¶O199¤¸ (¨ì¥I) 
  ¦í¡@¡@§}¡G 
  ¦í¦v¹q¸Ü¡G ¡@¤½¥q¹q¸Ü¡G 
  ¤â¡@¡@¾÷¡G ¹q¤l¶l¥ó¡G 
   
  ¥»°ª¯Å¨k¤h¥Ö¥ó²Õ¥]§t¦³¥Ö¥],¦W¤ù§¨,¥Ö±a,»â±a,»â±a§¨,»â±aªá¦â¤£±o¬D¿ï,¥ÑÃÙ§U³æ¦ìÀH¾÷©â¨ú

  


Ebay Secrets Revealed

2002-10-13 Thread EbaySecrets
Title: EBOOKAWEEKCLUB.COM








  
 
  

 
  Receiving 
over 1.5 billion page views per month, Ebay is the ULTIMATE venue for 
selling virtually any goods and making huge profits with almost no effort. 
But you have to know what to sell and how to sell. That's where Ebay Marketing 
Explained comes in.  
This manual 
  provides easy to understand and detailed instructions for maximizing 
  your profits with selling strategies that are PROVEN WINNERS. 
This information 
  will make you 1000's on Ebay. Although this book was based on eBay auctions, 
  the overall information will work for ALL online auctions. 
Ebay Marketing 
  2002 teaches you effective SELLING STRATEGIES and you don't need any 
  specialized computer knowledge. I'm going to pass on the SECRET SELLING 
  TECHNIQUES that I use each and every day to bring in hundreds of thousands 
  of dollars selling my products on internet auctions. 
 
  

Best Riches 
  to you ! 
PS 
  - I've decided to "sweeten the pot" and add some bonus's that 
  make this an offer that you won't be able to match anywhere else...
First, 
  In addition to eBay Marketing 2002 (Suggested Retail $29.95) I'm including 
  the well known eBay Marketing Secrets course... (value $9.95)
Second, 
  The most useful Wholesale Source Guide ever put together... So You Can 
  Save up to 90% on over ONE MILLION top quality brand-name products to 
  get your eBay business into high gear in short order! It's retail value 
  is $29.95, but yours as a free bonus!
 
 
CLICK 
  HERE TO ENTER THE SITE AND START MAKING A LIVING ON EBAY


 
   

 
   

  

 
  This is brought to you by FreeGasDaily. 
  You are receiving this because of your participation in the FREE GAS 
  FOR LIFE sweepstakes. If you feel this has reached you in error or if 
  you would no longer like to be eligible and would like to stop receiving 
  offers from us, please visit http://www.freegasdaily.com 
  and click on unsubscribe. Thank you. 

  
   







,!

2002-10-13 Thread littleant

ÎÒÕæ³ÏµØÏòÄúÍƼöÒ»¸ö¼ÈÄܹºÎïÓÖÄÜ°ïÄú׬ǮµÄÍøÕ¾!
ÊÇÕæÊǼÙ,Äú¿´Á˾ÍÖªµÀÁË£º
http://www.dirshop.com/mall/index.php?user=luckboy
(»òhttp://www.dirgame.com/mall/index.php?user=luckboy)
µ«Ô¸ÎÒÄܸøÄú´øÀ´ºÃÔË!



Search Engine Traffic

2002-10-13 Thread Search Engine Traffic


 






  
  

  Do you need more Traffic to 
  your Website? 
   
  
  Are you 
  ready to drive Targeted traffic to your site; open a floodgate of targeted visitors ready, 
  willing and able to buy from 
  you?Our program works so well, that we will install this program 
  on your server with a...
  100% No NonsenseMoneyBackGuarantee. 
  If our Search Engine Magic robot fails to bring you at 
  least 5top 
  15listings from 
  major search engines in the first 3 weeks 
  we refund all of your money, 
  period!
  (Note Package B 
  customers are guaranteed 
  10top 
  15listings)Our program 
  will work for just about any web site, and generates traffic from the major search engines. So 
  if you sell candy, car parts or 
  anything else for that matter, this program can help you drive more targeted 
  traffic to your web site from the major 
  search 
  engines.We have marketed web businesses 
  for well over 5 years and we have 
  tried it all,from top 100 programs, partner 
  programs,ezine, banners, pic 
  posts, linking and so on. The one 
  thing we have found out, is that the best paying 
  traffic comes from the major search engines. These are the people that are looking for what you are selling.Three 
  or 4 years ago you could create a doorway page, load that page with just keywords, then copy that 
  page a couple of hundred times and 
  submit them all to the major engines. In a matter of days you would have top listings on all 
  of the major search engines.If you not aware of it, those days are gone forever. Gaining top positions on the major search engines is 
  getting harder and harder. Besides 
  the fierce competition from millions of new 
  sites, the search engines themselves have set a gauntlet of hurdles to jump through.Each 
  engine has it's own rules and trying to develop your site to their rules is a nightmare. For example 
  you have a nice graphical looking 
  site do you really want to add 500 hundred 
  words to the front page of the site to meet an engines requirements?
  If your site has frames, 
  Flash, a splash page, or developed 
  in ASP are you willing to totally redo your 
  site? Are you ready to make 
  significant changes to your site and wait 3 
  months or more to see if they work?. Then make additional changes and wait another 3 months? 
  Sorry to say, but that is frustration you are looking at to get 
  good search engine positioning.However, their is a better 
  way!You have heard the phrase " I liked it so much I bought 
  the company", well that is what 
  happened. My company has developed 
  hundreds of web sites, from simple sites to complex sites for Fortune 500 companies. Over the last 
  couple of years our clients and 
  ourselves tired of the search engine game. Instead of just quitting we decided to do something about 
  it.What we discovered was a group ofbrilliant out of the box 
  thinking engineers that 
  developed a totally new way to get top positions in the search engines. This team 
  developed a product called "Stealth Position"The absolute 
  brilliant part is that once Stealth Position is 
  installedyou will never make doorway pages, or submit to the engines 
  again!And yes, you will get 
  at least 5top 
  15listings in the first 
  3 weeks or you do not 
  pay. 
  (10top 15listings 
  in the first 3 weeks for package B 
  customers)
  
  
  
  This is 
  how it works.. (If your a non 
  techie don't worry you don't have to understand this)1. 
  Template Directory. Stealth Position will read who is calling for a page. If this page request is from 
  a surfer, they will get only your 
  main home page, or what ever page you want served up to the public. This also helps protect your 
  doorway pages from theft by other 
  web masters. If a search engine spider requests a page, Stealth Position will pull a page 
  from a template area on your server 
  designed just for that engine's spider.So, search engines like: 
  Excite, Go, Yahoo, Google, Northern 
  Light, Fast Search 
  (Alltheweb),AltaVista, 
  WebCrawler, Netscape, Hotbot, 
  Ask Jeeves, Lycos, Aolnetfind, Hotbot/Lycos, Goto, Search MSN, Direct Hit, MSN UK, MSN 
  Australia, Canada.com, Answers.au, 
  Sprinks, Open Directory, Dogpile, FindWhat, and About.com get special pages served up 
  just for them.2. Page Creation On The Fly. Once Stealth 
  Position determines which spider is 
  calling, the script will pull a random page from a template area on your server. Then, it 
  create a page on the fly, changing 
  the title, top keywords, lesser important keywords, and meta tags. It even 

Keep off the rolls

2002-10-13 Thread Matthew X

Experian threatens to sue in electoral roll row
'In a growing battle over privacy rights, Experian, Britain's biggest 
credit reference agency, is threatening legal action against local 
authorities refusing to release information held on the electoral roll. An 
Experian spokesman said: A number of local authorities have taken it upon 
themselves to resist new government regulations which give us the right to 
buy electoral roll data for permitted purposes.' ( Guardian )
»
See also this Guardian profile of Experian from last month, and this blog 
entry from May
»
In 1999 Privacy International declared Experian the UK's 'most invasive 
company' - see this Big Brother Awards webpage
»
Experian has also been contracted to build and maintain the new Europe-wide 
Motor Insurance Database scheduled to begin operation early next year - see 
this MIIC document (Word doc)
(Download page: free Word Viewer)LINKS?
http://www.hullocentral.demon.co.uk/site/anfin.htm





Re: Echelon-like resources...

2002-10-13 Thread R. A. Hettinga

At 10:52 AM -0700 on 10/13/02, Bill Stewart wrote:


 (You may not remember, but there was a program from fortify.net
 that fixed 40-bit implementations of Netscape,
 and there was even a one-liner Javascript signature-line program
 that let you set Netscape to use 128 bits...

Not to mention the plaintext settings imbedded in the Netscape *executable*.

...it took you long enough, said a Netscape cypherpunk at the time of its
discovery...

Cheers,
RAH
Who saw them making the t-shirts, with pasted text from the file itself at
FC97, complete with cypherpunks policy on it...

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




Welcome ! sagm 3555FZYY8-711Ire-15

2002-10-13 Thread black97gsr6857r15
Title: We can make thousands $$$ TOGETHER!
Hello !





  
We can make thousands $$$ 
TOGETHER! 


  This is something that I wouldn't normally 
even look at, except that I read an article in the Wall Street Journal 
on 6/16/2001 about this program. There have been other articles written 
about these companies in other well recognized journals. I knew that 
this was real and would work. If you need to make a few thousand dollars 
REALLY FAST, then please take a moment to read this simple program I'm 
sharing with you. THIS IS THE FASTEST, EASIEST PROGRAM YOU WILL EVER 
DO!!! Complete it in one hour and you will never forget the day you 
first received it!!! Oh! Did I say FAST? "The speed of the Internet-type 
fast." The Newsletter and all payments are made on the Internet by 
E-Mail. NEED PROOF? Push button below and you will agree this is a very 
exciting opportunity. 
ARE 
YOU IN NEED OF MONEY RIGHT NOW? HOW DOES $2,000 IN TWO WEEKS 
SOUND?Let's all make some serious money $$GOOD LUCK and 
THANKS !(Opt-Out Instructions)This mailing is done 
by an independent marketing company.Please do not reply to this 
e-mail, an e-mail reply cannot be read.If you would like to be 
excluded in the future from our mailing list,just click below and 
send us an opt-out request email.


6342jpMv1-666TLbX5069iFsM4-526ySyp6423HMxE0-945Yiul47



¿´¿´°É

2002-10-13 Thread Öйú·þÎñ

===
 = ´ËÐÅÈô¶ÔÄú²»Æð×÷Óã¬Õæ¶Ô²»£¡ÎÒÃÇÒ»¶¨´òÈÅÄúÁË£¬ÇëÄú°ÑËûDEL =
===
  
   Öйú·þÎñÈ«ÇòרҵµÄÓòÃû×¢²áÌṩÉÌ£¬ÏÖÍƳöÖ÷»ú¡¢ÓòÃû×¢²áÓŻݷþÎñ£º

   ¡°ÌØ»Ý1+1ÆóÒµÉÏÍøÌײ͡±ÊÇÖйú·þÎñÆ÷ÍøÂçÓÐÏÞ¹«Ë¾ÎªÄúÍƳöµÄ³¬Öµ·þÎñ£¬

   ¡°ÏÈ·þÎñ£¬ºóÊÕ·Ñ£¡¡±ÄÚÈÝ°üÀ¨£º

 
30M asp cgi,php +ACCESS Êý¾Ý¿â,Ë͹ú¼Ê¶¥¼¶ÓòÃûÒ»¸ö 250Ôª/Äê

   100M asp cgi,php +ACCESS Êý¾Ý¿â,Ë͹ú¼Ê¶¥¼¶ÓòÃûÒ»¸ö£¬Ö»Ðè 350Ôª/Äê

   200N  asp cgi,php +ACCESS Êý¾Ý¿â,Ë͹ú¼Ê¶¥¼¶ÓòÃûÒ»¸ö,Ö»Ðè 600Ôª/Äê  

   ÌØ»Ý1+1ÉÏÍøÌײÍÊÇÆóÒµÉÏÍø£¬ÆóÒµÉÌÎñ»¯µÄÀíÏëÑ¡Ôñ£¬ÏÖÕý»ð±¬Ñ¡¹ºÖÐ

   ¿ìËÙ¶ÈÉêÇë(Çëµã»÷£©£º http://www.linemail.net/host/index.asp

   =
   °Ù¶È¾º¼Û¡¢ÐÂÀËÅÅÃû¡¢ËѺüÅÅÃû¡¢ÍøÒ×ÅÅÃûµÈ·þÎñ£¬Ê¹ÄúµÄÍøÕ¾ÖªÃû¶È´ó´óÌá

   ¸ß¡£ÏµÁг¬ÖµÔùËÍ·þÎñ£¬²»¿É²»¿´£¡
   
   ÂíÉÏÉêÇë: http://www.linemail.net/special/index.asp

   == 
   »¶Ó­·ÃÎÊÎÒ˾ÍøÕ¾½øÒ»²½Á˽⣺

   http://www.linemail.net

   ÁªÏµµç»°:0592-2516932 QQ:93767793






Title: ÆóÒµÉÏÍøÀíÏëÑ¡Ôñ





  

   ÆóÒµÉÏÍøµÄÀíÏëÑ¡Ôñ
  ===
¡¡´ËÐÅÈô¶ÔÄú²»Æð×÷Ó㬶Բ»ÆðÎÒÃÇÒ»¶¨´òÈÅÄúÁË£¬ÇëÄú°ÑËüDEL
===

  


   
Öйú·þÎñÈ«ÇòרҵµÄÓòÃû×¢²áÌṩÉÌ£¬ÏÖÍƳöÖ÷»ú¡¢ÓòÃû×¢²áÓŻݷþÎñ£º
   ¡°ÌØ»Ý1+1ÆóÒµÉÏÍøÌײ͡±ÊÇÖйú·þÎñÆ÷ÍøÂçÓÐÏÞ¹«Ë¾ÎªÄúÍƳöµÄ³¬Öµ·þÎñ£¬
   ¡°ÏÈ·þÎñ£¬ºóÊÕ·Ñ£¡¡±ÄÚÈÝ°üÀ¨£º
   
30M asp cgi,php +ACCESS Êý¾Ý¿â,Ë͹ú¼Ê¶¥¼¶ÓòÃûÒ»¸ö 250Ôª/Äê(ËÍÎå¸öÓÊÏä)
   100M asp cgi,php +ACCESS Êý¾Ý¿â,Ë͹ú¼Ê¶¥¼¶ÓòÃûÒ»¸ö£¬Ö»Ðè 350Ôª/Äê(ËÍÁù¸öÓÊÏä)
   200M asp cgi,php +ACCESS Êý¾Ý¿â,Ë͹ú¼Ê¶¥¼¶ÓòÃûÒ»¸ö,Ö»Ðè 600Ôª/Äê
   ÌØ»Ý1+1ÉÏÍøÌײÍÊÇÆóÒµÉÏÍø£¬ÆóÒµÉÌÎñ»¯µÄÀíÏëÑ¡Ôñ£¬ÏÖÕý»ð±¬Ñ¡¹ºÖÐ
   ¿ìËÙ¶ÈÉêÇë(Çëµã»÷£©£º http://www.linemail.net/host/index.asp

*
°Ù¶È¾º¼Û¡¢ÐÂÀËÅÅÃû¡¢ËѺüÅÅÃû¡¢ÍøÒ×ÅÅÃûµÈ·þÎñ£¬Ê¹ÄúµÄÍøÕ¾ÖªÃû¶È´ó´óÌá
   ¸ß¡£ÏµÁг¬ÖµÔùËÍ·þÎñ£¬²»¿É²»¿´£¡

ÂíÉÏÉêÇë: http://www.linemail.net/special/index.asp
   **
»¶Ó­·ÃÎÊÎÒ˾ÍøÕ¾½øÒ»²½Á˽⣺
   http://www.linemail.net
   ÁªÏµµç»°:0592-2180338 ´«Õ棺0592-2516932 QQ:93767793

  





Create a PAYCHECK with your computer!

2002-10-13 Thread Chris4874846

Hello there, 

You get emails every day, offering to show you how 
to make money. 
Most of these emails are from people who are NOT 
making any money. 
And they expect you to listen to them? 

Enough. 

If you want to make money with your computer, then 
you should 
hook up with a group that is actually DOING it. 
We are making 
a large, continuing income every month.  What's 
more - we will 
show YOU how to do the same thing. 

This business is done completely by internet and 
email, and you 
can even join for free to check it out first.  If 
you can send 
an email, you can do this.  No special skills 
are required. 

How much are we earning? Anything from $500 to 
$9000 per month. 
We are real people, and most of us work at this 
business part-time. 
But keep in mind, we do WORK at it - I am not 
going to 
insult your intelligence by saying you can sign 
up, do no work, 
and rake in the cash.  That kind of job does not 
exist.  But if 
you are willing to put in 10-12 hours per week, 
this might be 
just the thing you are looking for. 

This is not income that is determined by luck, or 
work that is 
done FOR you - it is all based on your effort. 
But, as I said, 
there are no special skills required.  And this 
income is RESIDUAL - 
meaning that it continues each month (and it tends 
to increase 
each month also). 

Interested?  I invite you to find out more.  You 
can get in as a 
free member, at no cost, and no obligation to 
continue if you 
decide it is not for you.  We are just looking for 
people who still 
have that burning desire to find an opportunity 
that will reward 
them incredibly well, if they work at it. 

To grab a FREE ID#, simply go to the link below 
and enter your 
details: 


http://s7gab.tripod.com 



We will confirm your position and send you a 
special report as 
soon as possible, and also your Free Member ID. 
That is all there 
is to it! 

You can then make up your own mind and decide 
whether you want to 
make some money too...or not. 

Looking forward to hearing from you! 

P.S. After having several negative experiences 
with network 
marketing companies, I had pretty much given up on 
them. This is 
different - there is value, integrity and a REAL 
opportunity to have 
your own home-based business...and finally make 
real money on the 
internet. 

Don't pass this up...you can sign up and test 
drive the program for 
FREE. All you need to do is get your Free 
Membership. 

== 
=== 

This email has been screened and filtered by our 
in-house Opt-Out 
system in compliance with State Law. If you wish 
to have your email 
address deleted from this mailing as well as 
future mailings, please 
go to our Opt-Out Website 

http://s7gab.tripod.com/remove.htm 

This message is not intended for residents in the 
state of Washington, and 
screening of addresses has been done to the best 
of our technical ability. 
If you are a Washington resident or otherwise wish 
to be removed from this 
list, 
juinc™½±±½ÜÑ¡”É•µ½Ù…°¥¹ÍÑÉՍѥ½¹Ì…‰½Ù”¸€4(4(4(4(ØÈÌÅ¥-ÍÀ´ÐÀÕé]áXØÌäѱåÅàÀ´ØÜ͵éÁLäàÄÝáQ…XÈ´ÌÌÅ°ÐÐ


cpunks It's 60% Cheaper

2002-10-13 Thread Craig Borza
Title: Generic Viagra - Privacy




  

  



  

  
  

  

  


Generic Equivalent of Viagra!!
  
  


HURRY TODAY!

Generic Viagra is now available to 
consumers! 
As low as 
$2.50 per dose 
PLUS a FREE 
Doctor's Consultation!
  
  

"As 
good as Viagra - just cheaper!" 
Why pay twice as 
much when GSC-100 is the same thing and only a click 
away? 
The same way generic ibuprofen will treat your headache just like Advil, 
 Generic Sildenafil Citrate (GSC-100) will treat your erectile dysfunction 
 just like Viagra.
 
  
  

BUY 
NOW! 
  

  

  

  

  

  

  

  

  

  Costs over 60% less 
  than Brand Name 
  
Free Doctor 
  Consultation 
  
Free 
   Shipping 
  
Private delivery to your home  
  
100% Money Back 
  Guarantee
  

  


  

  

   Generic 
   Sildenafil Citrate (GSC-100) 


   Both are 
   Sildenafil Citrate 


   Viagra® 

  
  

   generic ibuprofen 


   Both are 
   Ibuprofen 


   Advil® 

  

  


  

 

  


  
Now you can get generic Viagra® for as low as $2.50 per 
 dose, with a  FREE   physician's consultation and discreet shipment to 
 the privacy of your home or office. 

 Hurry 
 Offer Ends Soon!!
  
The first generic form of Sildenafil Citrate (the generic name for 
 Viagra) is now available for consumers. Visit
our Web site for a complete explanation!

Why pay twice 
 as much when GSC-100 is 
 the same thing and is only a click away?

  

  

  

   
  
  BUY NOW!!
   

  
  

  
  Take advantage of this 
  offer TODAY!  Click 
 Here to Be Removed
  
  

  
  100% Money Back
  Guarantee - The First Pharmaceutical to ever be guaranteed
  
  Viagra® is a trademark of the Pfizer, Inc.
  
  


  



  
  
  




  

  
   
  


  


  

  




Re: kraf

2002-10-13 Thread Atilla Kuzu
Title:  wwohfsm 



MP3SA
En Ýyi En Büyük Arþiv

  

  
  Türkçe MP3
  Yabancý MP3
  Türkçe Albümler
  Yabancý Albümler
  Pop Müzik
  Arabesk Müzik

  
  Rock Müzik
  Latin Müzik
  Hip-Hop Müzik
  Türk Sanat Müziði
  Türkü Arþivi
  Film Müzikleri




  

  Müzik konusunda aradýðýz her çeþidi bulabileceðiniz bir site artýk var. Her gün güncellenen ve istekleriniz doðrultusunda yeni eklemeler yapýlan sitemizde kaliteyi fark edeceðinize eminiz.
http://www.mp3sa.com









Low Mortgage rates get in on it NOW!

2002-10-13 Thread [EMAIL PROTECTED]
Below is the result of your feedback form.  It was submitted by
[EMAIL PROTECTED] ([EMAIL PROTECTED]) on Saturday, October 12, 2002 at 
01:18:17
---

p86: 

Hello, I bet your home is very valuable to you?

Then why not get in on LOW mortgage rates IMMEDIATELY!?

Act now while mortgage rates are as low as 2%!!

go here: http://61.172.245.20/cgi-bin/loan_app?leadsource=mz29

Thank You





f93

---




Public subscription assassination.

2002-10-13 Thread Matthew X
Old cPunk ideas never die...
you could create a lottery. A lottery whose payoff was a reward to the 
person who came closest to predicting the time of death of a given 
government official.
http://www.halfbakery.com/idea/Public_20Subscription_20Assassination

First they came for the hackers. But I never did anything illegal with my 
computer, so I didn't speak up. Then they came for the pornographers. But I 
thought there was too much smut on the Internet anyway, so I didn't speak 
up. Then they came for the anonymous remailers. But a lot of nasty stuff 
gets sent from anon.penet.fi, so I didn't speak up. Then they came for the 
encryption users. But I could never figure out how to work pgp5 anyway, so 
I didn't speak up. Then they came for me. And by that time there was no one 
left to speak up. ~Alara Rogers (Aleph Press) n



Å·ÖÞ¡¢ÃÀ¹úÇ©Ö¤×Éѯ

2002-10-13 Thread Å·ÃÀÎÄ»¯½»Á÷Э»áÉϺ£´ú±í´¦
ÄúºÃ£¡

±¾´ú±í´¦×éÍÅÇ°ÍùÅ·ÖÞ¡¢ÃÀ¹ú½øÐÐÉÌÎñ¿¼²ì»î¶¯£¬ÏÖÓÐÉÙÁ¿Ãû¶î

ËæÍÅÈËÔ±ÃâÃæÇ©

°ìÀí³É¹¦ÊÕ·Ñ£¬·ÑÓÃ3000Ôª/ÈË£¬¸°Å·ÖÞ²¿·ÖÈËÔ±¡¢µØÇøÊÕÈ¡±£Ö¤½ð2.5Íò×óÓÒ

Éê¸ùÃâÃæÊÔ£¬°üÇ©£¬5Íò
 
Î÷°àÑÀ¾ÓÁô£¬Î÷°àÑÀÉêÇ룬¹úÄÚÁìÖ¤£¬15Íò

×Éѯ:
maito:[EMAIL PROTECTED]


Èç¹ûÄú²»Ïë½Óµ½¸ÃÓʼþ£¬Çë»Ø¸´µ½
maito:[EMAIL PROTECTED]








hello






ÓʼþÄÚÈÝÓëÒÔÏÂÎÄ×ÖÎÞ¹Ø=

ÓÅÁªÍøÂç http://www.chinamysql.com  רҵÌṩ¸÷ÀàÐéÄâÖ÷»ú£¬²»ÂúÒâ¿É»ñÍË¿î¡£

Ç¿ÊÆÌײͣº100MÖ÷»úËͶ¥¼¶ÓòÃû£¬ËÍ10¸ö10MÆóÒµÓÍÏ䣬¼ÓËÍ20¸ö¶þ¼¶ÓòÃû£¬½öÐè318Ôª/Ä꣡


ÈýÁú֤ȯͶ×Ê http://3long.sayba.com 
ΪÄúÌṩרҵÀí²Æ·þÎñ¡£ÏÖÔÚ¹ºÂòÖ»Ðè588Ôª£¬ÔùËͼÛÖµ³¬¹ý1800ÔªµÄÀñÆ·£¡

˵°ÉÍøÉÏÉÌ³Ç http://shop.sayba.com 
È«Êdz§ÉÌÖ±ÏúµÄÐÂÆ·»òÕÛÉÏÕÛµÄÉÌÆ·£¬ÊÇÄúÍøÂ繺ÎïµÄºÃÈ¥´¦£¡


ʹÓü«ÐÇÓʼþȺ·¢£¬ÎÞÐëͨ¹ýÓʼþ·þÎñÆ÷£¬Ö±´ï¶Ô·½ÓÊÏ䣬ËٶȾø¶ÔÒ»Á÷£¡

Èí¼þÏÂÔØÍøÖ·£ºhttp://www.lovexin.com£¬¸ü¶àµÄ³¬¿áÈí¼þµÈÄãÀ´ÏÂÔØŶ£¡



On topic!

2002-10-13 Thread Ryan Sorensen

Talking to someone who was at the legendary cypherpunks anniversary bbq.
He brought up the fact that someone there was talking about private
hedonistic cells (any errors are mine, not his, and whoever talked
about this, if they have any more thoughts on the matter, please feel
free to email me.)

Brought this to mind.

Identity Based Encryption schemes. Fairly unworkable on the global scale
for a number of reasons. Shrink the space. Say a small group. Split the
secret for the key issuer, probably using a k-of-n scheme, where any new
member needs k people to give k pieces of the new secret key to the new
member. Transparent encryption to group members.

Use broadcast encryption things for mail to group members, or subsets
thereof.

Open problems: Can you have an easily extensible k-of-n scheme? Or even
an n-of-n? Key problem here being the fact that the former scheme is
still valid, just ignore the fact that there's a new member.

k would obviously be configurable based on group policies, number needed
to instantiate a new member, and all that good stuff.

What else can you do with a formulation like this? What else would be
-useful- given a formulation like this? Proofs of membership to the
outside? To other group members? Anonymity inside the group? Conditional
anonymity subject to open by k (not necessarily the same k as before)
members?

Homogoneous front to the outside world? Internal cash? Group-generated
random schemes? Mental poker put to some purpose?

-- 
All that is not strictly forbidden is now mandatory.




Re: why bother signing? (was Re: What email encryption is actually in use?)

2002-10-13 Thread Julian Assange

 There have been episodes of spoofing on this list.  If client
 side encryption just worked, and if what is considerably more
 difficult, checking the signatures just worked, there would
 be no bother, hence it would be rational to sign

Not just work but opt out is what you are looking for. If there
are n posters to the list and m people signing, then their are only
n-m spoof targets. As m approaches n, the number of forgeries
rapidly approaches zero as there is no one left worth spoofing who
can be spoofed. But as each individuals chance of being spoofed
approaches zero, the benefit gained by signing also approaches
zero. Consequently unless there are additional costs to non-signing
above and beyond spoof protection there will always be a substantial
number of unsigned messages.

--
 Julian Assange|If you want to build a ship, don't drum up people
   |together to collect wood or assign them tasks and
 [EMAIL PROTECTED]  |work, but rather teach them to long for the endless
 [EMAIL PROTECTED]  |immensity of the sea. -- Antoine de Saint Exupery




Re: US developing untraceable weapons

2002-10-13 Thread Tyler Durden

Well, there was also some other details left out by that article. A 100kW 
beam doesn't tell you very much if you don't know the beam diameter. A 
1310nm telecom laser can cause serious eye damage with 10mW, but that's 10mW 
into, say 38 um^2. But it ain't going to do nothing to enemy aircraft 
located at a distance. A 100kW laser might easily have a smaller energy 
density depending on the diameter. In addition, there's the problem of 
focusing that thing through turbulence, but turbulence through certain 
wavelength windows may not be a problem.


From: Steve Schear [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: US developing untraceable weapons
Date: Sat, 12 Oct 2002 17:28:03 -0700

At 12:10 PM 10/11/2002 -0700, Major Variola (ret) [EMAIL PROTECTED] wrote:
Theres no huge explosion associated with its employment, there are no
pieces and
parts left behind that someone can analyze to say, this came from the
United States,
explains an unnamed Lockheed Martin official quoted in Aviation Week and
Space
Technology in July. The damage is localized, and it is hard to tell
where it came from
and when it happened. It is all pretty mysterious.

The only energy sources I can think of that is portable enough to go in a 
jet are a generator running of the main/aux jet engine or a chemical 
pumping.

Unless the DoD has found a practical new chemical reaction, other than the 
Fluorine/Deuterium they used for decades on various shipboard project such 
as MIRACL,  the plane would be easily identified and targeted by the 
fluorescing the chemical plume with LIDAR.

Assuming a laser efficiency of 5% an electric source would have to provide 
over 2 MW of continuous power (from Star Wars test results, I assume a 
pulsed laser is inadequate for causing damage in combat situations) to 
supply a 100KW beam.  The most efficient generators I'm aware are capable 
of producing about 2-4 HP/lb.  2 MW equates to about 2700 HP or about 650 - 
1300 lbs.  Assuming the laser isn't too terribly heavy or aerodynamically 
cumbersome the entire package could be carried aboard a fighter.

steve


War is just a racket ... something that is not what it seems to the 
majority of people. Only a small group knows what its about. It is 
conducted for the benefit of the very few at the expense of the masses.  
--- Major General Smedley Butler, 1933




_
Join the worlds largest e-mail service with MSN Hotmail. 
http://www.hotmail.com




Re: was: Echelon-like resources..

2002-10-13 Thread Tyler Durden

Yes: The factory was bombed, but actual
deaths were one night watchman, not tens
of thousands,



Well, you haven't given me a very convincing argument here. In most of his 
writings, Chomsky makes it clear that the deaths were not due to the bomb, 
but the loss of medicine (such as penecillin) in Sudan's only pharmecuetical 
factory.

Or the fact that Nicaruaga brought  the
  US before the world court and won?

Perhaps that was true,

Uh...perhaps? That should be a very easy thing to find out, and as the 
accusation and conviction were quite damming, and as you claim Chomsky 
regularly lies on many of his citations, I would have thought that this at 
least would be one citation you'd check.

Got to say...I'm a busy man, and you haven't even said anything meriting 
even the investigaion of your dis-chomsky web page.


From: James Donald [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: was: Echelon-like resources..
Date: Sat, 12 Oct 2002 11:57:24 -0700 (PDT)

Tyler Durden
  As for Chomsky lying, can you give us
  some specific citations? Did he lie
  about our support for Sadam Hussein?

No

  Our support for Indonesia?

Yes

  Our bombing  of the sudanese
  pharmacuetical factory?

Yes: The factory was bombed, but actual
deaths were one night watchman, not tens
of thousands, and he asserted that the
Sudanese government are the good guys in
the civil war, and their opponents
terrorists.

  Or the fact that Nicaruaga brought  the
  US before the world court and won?

Perhaps that was true, but pretty much
everything else he reported on Nicaragua
was a lie, for example that the
Sandinistas won free elections, and that
the contras were a creation of the US,
and that the Sandinistas were more
popular than the contras.

  Granted, Chonskty can be a little
  tiring on the ears, but my knee-jerk
  reaction towards your calling him a
  liar is that you misunderstood the
  citation. But then again, I could be
  wrong, so do give us some examples, eh?

See my web page Chomsky lies
http://www.jim.com/chomsdis.htm
Faith Hill - Exclusive Performances, Videos  More
http://faith.yahoo.com




_
Join the worlds largest e-mail service with MSN Hotmail. 
http://www.hotmail.com




Re: US developing untraceable weapons

2002-10-13 Thread Steve Schear

At 10:17 PM 10/12/2002 -0400, Tyler Durden wrote:
Well, there was also some other details left out by that article. A 100kW 
beam doesn't tell you very much if you don't know the beam diameter.

It tells you the output power, from which one may estimate input power 
requirements.

A 1310nm telecom laser can cause serious eye damage with 10mW, but that's 
10mW into, say 38 um^2. But it ain't going to do nothing to enemy aircraft 
located at a distance. A 100kW laser might easily have a smaller energy 
density depending on the diameter. In addition, there's the problem of 
focusing that thing through turbulence, but turbulence through certain 
wavelength windows may not be a problem.

Beam spread is one of the most significant considerations in delivering 
high energy to distant targets. In general, one wants a large beam size to 
reduce divergence.

The phenomenon of diffraction influences the propagation of Gaussian light 
beams. The output of a laser is generally ''pencil-like'' in nature and has 
a very low divergence, yet is subject to diffraction that causes it to 
spread. Gaussian beam theory deals with this effect.  The Rayleigh range, Z 
sub R, is used as a criterion for determining the spreading of a 
monochromatic Gaussian light beam as it propagates in free space.

In 1987 it was discovered that were ''nondiffracting'' beam types.  The 
zeroth-order Bessel beam is one such solution and results in a beam with a 
narrow central region surrounded by a series of concentric rings.  Ideally 
this beam type exhibits no diffraction or spreading, in practice it is 
possible to obtain Bessel beams of less than 1/10 the divergence of a 
Gaussian beam of otherwise similar properties.  Bessel beams have been the 
subject of intense investigastion for a broad range of optical applications.

http://www.st-and.ac.uk/~atomtrap/papers/AJPBessel.pdf
http://www.st-and.ac.uk/~atomtrap/Research/IBB.htm




Re: Echelon-like resources...

2002-10-13 Thread Eugen Leitl

On Fri, 11 Oct 2002, Tyler Durden wrote:

 And indeed, in a world where most messages are fairly weakly encrypted, 
 bursts of strongly-encrypted messages will stand out all the more and 
 possibly flag the need for other methods of investigation.

Doesn't figure: while it's easy to screen for high information entropy
(archives have a signature), telling weak encryption from strong is
nontrivial, unless it's conveniently labeled, and you're limiting the
attack to a tiny fraction of the entire traffic, not realtime.

And of course you can package 'strong' encryption into a 'weak' encryption 
envelope, so you will only know that 'strong' encryption has been used 
after you've broken the 'weak' envelope.




Keep off the rolls

2002-10-13 Thread Matthew X

Experian threatens to sue in electoral roll row
'In a growing battle over privacy rights, Experian, Britain's biggest 
credit reference agency, is threatening legal action against local 
authorities refusing to release information held on the electoral roll. An 
Experian spokesman said: A number of local authorities have taken it upon 
themselves to resist new government regulations which give us the right to 
buy electoral roll data for permitted purposes.' ( Guardian )
»
See also this Guardian profile of Experian from last month, and this blog 
entry from May
»
In 1999 Privacy International declared Experian the UK's 'most invasive 
company' - see this Big Brother Awards webpage
»
Experian has also been contracted to build and maintain the new Europe-wide 
Motor Insurance Database scheduled to begin operation early next year - see 
this MIIC document (Word doc)
(Download page: free Word Viewer)LINKS?
http://www.hullocentral.demon.co.uk/site/anfin.htm





Re: US developing untraceable weapons

2002-10-13 Thread Steve Schear

At 12:10 PM 10/11/2002 -0700, Major Variola (ret) [EMAIL PROTECTED] wrote:
Theres no huge explosion associated with its employment, there are no
pieces and
parts left behind that someone can analyze to say, this came from the
United States,
explains an unnamed Lockheed Martin official quoted in Aviation Week and
Space
Technology in July. The damage is localized, and it is hard to tell
where it came from
and when it happened. It is all pretty mysterious.

The only energy sources I can think of that is portable enough to go in a 
jet are a generator running of the main/aux jet engine or a chemical pumping.

Unless the DoD has found a practical new chemical reaction, other than the 
Fluorine/Deuterium they used for decades on various shipboard project such 
as MIRACL,  the plane would be easily identified and targeted by the 
fluorescing the chemical plume with LIDAR.

Assuming a laser efficiency of 5% an electric source would have to provide 
over 2 MW of continuous power (from Star Wars test results, I assume a 
pulsed laser is inadequate for causing damage in combat situations) to 
supply a 100KW beam.  The most efficient generators I'm aware are capable 
of producing about 2-4 HP/lb.  2 MW equates to about 2700 HP or about 650 - 
1300 lbs.  Assuming the laser isn't too terribly heavy or aerodynamically 
cumbersome the entire package could be carried aboard a fighter.

steve


War is just a racket ... something that is not what it seems to the 
majority of people. Only a small group knows what its about. It is 
conducted for the benefit of the very few at the expense of the 
masses.  --- Major General Smedley Butler, 1933




Re: was: Echelon-like resources..

2002-10-13 Thread Eugen Leitl

On Sun, 13 Oct 2002, Sunder wrote:

 Of course, for all you and I really know that could have been an Anthrax
 factory cleverly disguised as as a pharmaceuticals factory, but we can put
 up rethorical questions and answers such as these for the next millenia
 and not get anywhere either.

Exactly. So let's stop burning synapses on trivialities of daily politics.
Being too out of touch is never advisable, but taking a deliberate
vacation every now and then from the mass media sometimes pays.




Re: Echelon-like resources...

2002-10-13 Thread Tyler Durden

And of course you can package 'strong' encryption into a 'weak' encryption 
envelope, so you will only know that 'strong' encryption has been used after 
you've broken the 'weak' envelope.

Oh yeah. Interesting. Of course, this would be done only if the sender knew 
or supected how mass-scanning might be done. And so the existence of another 
level of heavier encryption (see next paragraph) might be a tip off that 
this is not simply a financial transaction.

But, it occurs to me that in some cases what might be done to determine the 
presence of hard encryption is for hardward to attempt to decrypt it for a 
certain fixed time, and if there's no success with X 
minutes/hours/milliseconds or whatever, then one assigns a certain 
probability that said message has been encrypted using something stronger 
than the International version of Bogus Notes (for instance). But of course, 
I'm willing to concede that at his point I'm talking completely out of my 
arse. (That will change when I get time to do some real homework in this 
area, however.)



From: Eugen Leitl [EMAIL PROTECTED]
To: Tyler Durden [EMAIL PROTECTED]
CC: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: Echelon-like resources...
Date: Sun, 13 Oct 2002 13:32:45 +0200 (CEST)

On Fri, 11 Oct 2002, Tyler Durden wrote:

  And indeed, in a world where most messages are fairly weakly encrypted,
  bursts of strongly-encrypted messages will stand out all the more and
  possibly flag the need for other methods of investigation.

Doesn't figure: while it's easy to screen for high information entropy
(archives have a signature), telling weak encryption from strong is
nontrivial, unless it's conveniently labeled, and you're limiting the
attack to a tiny fraction of the entire traffic, not realtime.

And of course you can package 'strong' encryption into a 'weak' encryption
envelope, so you will only know that 'strong' encryption has been used
after you've broken the 'weak' envelope.




_
MSN Photos is the easiest way to share and print your photos: 
http://photos.msn.com/support/worldwide.aspx




Re: Echelon-like resources...

2002-10-13 Thread Eugen Leitl

On Sun, 13 Oct 2002, Tyler Durden wrote:

 And of course you can package 'strong' encryption into a 'weak' encryption 
 envelope, so you will only know that 'strong' encryption has been used after 
 you've broken the 'weak' envelope.
 
 Oh yeah. Interesting. Of course, this would be done only if the sender knew 
 or supected how mass-scanning might be done. And so the existence of another 

Come on, do the math. There's a lot of traffic travelling all over the
world right now. The volume still grows, albeit not at the projected
hyperexponential rate. Assuming you don't tap decentrally (because that
amount of hardware is a bit hard to hide, and thus hampered by such silly
things like warrants (even rubberstamped), and feds installing boxes in
ISPs racks and issuing gagging orders to abovementioned), you use the fact
that the network topology is mostly a tree (so make it a mesh, then), and
tap high speed lines (fiber). While I assume that there you can screen and
filter if it's cleartext with lots of dedicated hardware, you're
absolutely screwed if it's even 'weak' encryption. At these data rates
you'll have trouble even computing the entropy of the data stream as it
streams through your FIFO. Storing all of it is impractical, so you have
to restrict yourself to extremely targeted (by source/origin, or the tag,
assuming there is one).

 level of heavier encryption (see next paragraph) might be a tip off that 
 this is not simply a financial transaction.

1) while I haven't done the numbers I would say there's maybe 10-20% of 
   all traffic that is 'weak' encryption vs. 90-80% 'strong' encryption.
   Even if it's as bad as 50%/50% it is still completely irrelevant.

2) to tell whether there's something inside you have to break it. That's 
   why I consistenly say 'weak' instead of weak.
 
 But, it occurs to me that in some cases what might be done to determine the 
 presence of hard encryption is for hardward to attempt to decrypt it for a 
 certain fixed time, and if there's no success with X 
 minutes/hours/milliseconds or whatever, then one assigns a certain 

Or days, months, years, centuries, or whatever. On several megabucks worth
of hardware.

 probability that said message has been encrypted using something stronger 
 than the International version of Bogus Notes (for instance). But of course, 

Why should we concern ourselves with users of broken crypto? It's their
problem, not ours. Since they're but a fraction, the use of strong crypto
all by itself (assuming, you can tell, which is a high threhold) is not
incriminating.

 I'm willing to concede that at his point I'm talking completely out of my 
 arse. (That will change when I get time to do some real homework in this 
 area, however.)




Re: What good are smartcard readers for PCs

2002-10-13 Thread Kevin Elliott

 --
James A. Donald
   Increasingly however, we see smartcard interfaces sold for
   PCs. What for, I wonder?

On 24 Sep 2002 at 1:41, Bill Stewart wrote:
  I'm not convinced that the number of people selling them is
  closely related to the number of people buying; this could be
  another field like PKIs where the marketeers and cool
  business plans never succeeded at getting customers to use
  them.

On 24 Sep 2002 at 19:12, Peter Gutmann wrote:
  Companies buy a few readers for their developers who write
  software to work with the cards. [...]  Eventually the
  clients discover how much of a bitch they are to work with
  [] users decide to live with software-only crypto until
  the smart card scene is a bit more mature.

  Given that n_users  n_card_vendors, this situation can keep
  going for quite some time.

I have found that the administrative costs of PKI are
intolerable. End users do not really understand crypto, and so
will fuck up. Only engineers can really control a PKI
certificate, and for the most part they just do not.

In principle the thingness of a smartcard should reduce
administrative costs to a low level -- they should supposedly
act like a purse, a key, a credit card, hence near zero user
training required.  The simulated thingness created by
cryptographic cleverness should be manifested to the user as
physical thingness of the card.

Suppose, for example, we had working Chaumian digicash.  Now
imagine how much trouble the average end user is going to get
into with backups, and with moving digicash from one computer
to another.  If all unused Chaumian tokens live in a smartcard,
one might expect the problem to vanish.  The purselike
character of the card sustains the coin like character of
Chaumian tokens.

Of course if one has to supply the correct driver for the smart
card, then the administration problem reappears.

USB smartcard interfaces could solve this problem.   Just plug
them in, and bingo, it should just go.  Ummh, wait a moment, go
where, do what?  What happens when one plugs in a USB smartcard
interface?

Still, making crypto embodied in smart cards intelligible to
the masses would seem to be a soluble problem, even if not yet
solved, whereas software only crypto is always going to boggle
the masses.

 --digsig
  James A. Donald
  6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
  UpBeNFF1UW7r7Fw8pVMxQG+xJ3mwsngHIp62BxL6
  4D+u3ZM5e1JbeYAKaQ4dhOQrlZ42vq05cfz83rnCZ
-- 
_
Remember Kids- Somebody tries to kill you,
you try and kill'em right back...
_
Kevin Elliott   mailto:[EMAIL PROTECTED] ICQ#23758827




Re: was: Echelon-like resources..

2002-10-13 Thread James Donald

--- Tyler Durden [EMAIL PROTECTED] wrote:
 Well, you haven't given me a very convincing
 argument here. In most of his 
 writings, Chomsky makes it clear that the deaths
 were not due to the bomb, 
 but the loss of medicine (such as penecillin) in
 Sudan's only pharmecuetical 
 factory.

As those who investigated the matter know, and Chomsky
did not know, the factory produced chloroquine, which
is inexpensive and widely available from many sources.
 There is no indication that chloroquine is any more
expensive or less available than it was.

Chomsy and his supposed sources did not know or care
what the factory produced, let alone how much it
produced, so where does the figure of ten thousand
come from?

 the 
 accusation and conviction were quite damming


The list of countries convicted by the world court
is for the most part a list of the worlds most free
countries and most law abiding governments, and the
accusers are, for the most part, a list of the worlds
most murderous regimes.


 you claim Chomsky 
 regularly lies on many of his citations, I would
 have thought that this at 
 least would be one citation you'd check.

If the world court had condemned Pol Pot's Cambodia,
then I might have bothered to check.   It did not.  
The world court is run by much the same folk who run
the UN human rights commission.
 
 Got to say...I'm a busy man, and you haven't even
 said anything meriting 
 even the investigaion of your dis-chomsky web page.

For another example of Chomsky lying in his citations

Those who love tyranny and slavery, love the lies and
liars that protect it.

For another expose of some other lies of Chomsky, see
Nathan Folkert's check of various citations given by
Chomsky during the Faurisson issue
http://groups.google.com/groups?[EMAIL PROTECTED]
ogle.com
Faith Hill - Exclusive Performances, Videos  More
http://faith.yahoo.com




Re: Usenet vs. web for avoiding censorship

2002-10-13 Thread Bill Stewart

At 09:01 PM 10/11/2002 -0400, Steve Furlong wrote:
There are two advantages of web-based discussion fora over usenet:
propagation time and firewalls. On the other hand, few discussions are
so urgent that they need near-real-time reparte, and participants
shouldn't be cruising usenet from work.

Feh.  One of the reasons for doing discussions on email,
and even more so for Instant Messengers and other chat tools,
and for doing unmoderated newsgroups for technical discussions,
is that the interaction and responsiveness is much closer to real time.

One of the reasons web-based discussions are convenient is that
just about anybody can set one up, either on their own site if they have one,
or on some hosting service that's funded by unread banner-ads.
Usenet, by contrast, became too bureaucratic to absorb millions of
discussion sites, and any unmoderated group risks getting flooded with spam
or off-topic discussions (the Libertarians-vs-Statists flamewar
is built-in, but you can customize your own off-topic discussion instead.)
And web discussions are light-weight, in that if nobody cares any more,
they can die quietly in the corner and fall to the bottom of Google,
lieing undiscovered for aeons until some unsuspecting soul poking around
into the dark underbelly of the net encounters a dusty archive of...

Another important issue is that web-board discussions have persistence -
Usenet carried a high enough volume of traffic that most sites
had to burn most of it after a few days to a week, because the volume
rapidly exceeded almost anybody's spare storage.  A few people did archives,
and lots of people kept much longer histories of groups they cared about,
   but web-based discussions scale in much different ways than Usenet -
it's easy to find things that people said last month, even if they are
frequently-asked questions from people who didn't read the back issues.

As far as shouldn't be cruising usenet from work goes,
you're obviously some kid young enough that you weren't on the net
until this web stuff showed up :-)
While I've found that Usenet pretty much stopped being useful
even before the September That Never Ended,
there are still technical newsgroups that have good discussions,
mostly about things I'm not particularly interested in :-)

It was a lot more useful for work back in the early 80s -
the real support for Berkeley Unix was Usenet, which would let
you talk to other people who were trying to do similar things,
and there were lots of real experts who not only read News,
but responded to newbie questions as well as to new issues,
and there was a huge amount of technical evolution going on in the
Unix part of the world.  Lots of that's over now - newbies became
journeymen and then experts and then got tired of answering the
same questions from the new crop of newbies, and since
Cantor and Siegel's invention of spam and the growing popularity
of the Web, things got noisy enough that most real signal was lost.

(It's that old Yogi Berra line about Nobody goes there anymore -
it's too crowded.  We're having deja vu all over again as that
happens to the web as well.)

I think this line was from Tim, or else someone he or Steve quoted:
  Perhaps we need a new kind of structure, a more routinized form of
  Web mirrors. Something that happens more or less automagically.

Check out the Wayback Machine at www.archive.org, Brewster Kahle's project
to collect the entire Web.




Re: was: Echelon-like resources..

2002-10-13 Thread James Donald

Sunder:
  Yes: The factory was bombed, but actual  
  deaths were one night watchman, not tens 
  of thousands, and he asserted that the  
  Sudanese government are the good guys in 
  the civil war, and their opponents  
  terrorists. 

James A. Donald:
 And how many of their citizens have or will die due
 to lack of those very
 same pharamceuticals that the bombed factory can no
 longer produce? Or
 suffer from disease due to the same?

Possibly, but neither you nor Chomsky knew or cared
what pharmaceutical the factory produced, whereas I
do.  Thus my estimates of likely casualties are likely
to be better than Chomsky's

My point was not that the bombing was OK, but that
Chomsky was pulling his facts out of his ass.

His initial claim was that tens of thousands were
killed directly by the bombing, and he came up with
this stuff about shortages of pharmaceuticals only
after being challenged on that claim.
Faith Hill - Exclusive Performances, Videos  More
http://faith.yahoo.com




Re: What good are smartcard readers for PCs

2002-10-13 Thread Kevin Elliott

Hey don't forget you can still buy a smart card reader from that most
cypherpunkish of babes BRITNEY SPEARS ! Only $30 !

 https://www.visiblevisitors.com/mltest/order_form.asp
-- 
_
Remember Kids- Somebody tries to kill you,
you try and kill'em right back...
_
Kevin Elliott   mailto:[EMAIL PROTECTED] ICQ#23758827




Re: was: Echelon-like resources..

2002-10-13 Thread Bill Stewart

  Our bombing  of the sudanese
  pharmacuetical factory?

Yes: The factory was bombed, but actual
deaths were one night watchman, not tens of thousands,

If so, that's gross incompetence on the part of the US military,
since the official rationale for why we were cruise-missiling it
was that we were trying to kill Osama bin Laden after the
bombing of the US embassies that he allegedly masterminded.


and he asserted that the
Sudanese government are the good guys in
the civil war, and their opponents terrorists.

Chomsky said that?  That's appalling...




Re: Echelon-like resources...

2002-10-13 Thread Bill Stewart

packaging strong crypto inside weak crypto
At 01:06 PM 10/13/2002 -0400, Tyler Durden wrote:
Oh yeah. Interesting. Of course, this would be done only.
if the sender knew or supected how mass-scanning might be done.
And so the existence of another level of heavier encryption ...
might be a tip off that this is not simply a financial transaction.

Back when the Feds were trying to tell us that we should be
patriotic loyal Americans and use weak crypto because it
helps in the fight against Communism and other spies,
they were making it clear that they *wanted* mass-scanning,
and were busy lobbying Congress to give them money for it
and also trying to get laws forcing phone companies to
make things easy for them to do much higher volumes of scanning
than the relatively limited amount they do now.

Also, financial transactions are the ones that most need strong crypto,
and have been most successful in getting permission to use it,
because everybody understands that bank robbery is Bad,
and credit card theft is Bad, and if banks and internet
credit card transactions were forced to use weak crypto,
Bad Guys could afford to build cracker machines on spec
and pay for them with what they steal.

This was especially the case after the EFF's DES cracker
demonstrated that $250,000 was enough for a couple-day crack.
But the Feds have been letting banks use DES for decades,
and triple-DES for a while, and Netscape's inclusion of
SSL in their browser was really the beginning of the end
for the crypto bans, and a brave move on their part,
especially since the difference between 40-bit and 128-bit RC4
is just how many of the bits you use in the key setup.
(You may not remember, but there was a program from fortify.net
that fixed 40-bit implementations of Netscape,
and there was even a one-liner Javascript signature-line program
that let you set Netscape to use 128 bits...




Re: Echelon-like resources...

2002-10-13 Thread R. A. Hettinga

At 10:52 AM -0700 on 10/13/02, Bill Stewart wrote:


 (You may not remember, but there was a program from fortify.net
 that fixed 40-bit implementations of Netscape,
 and there was even a one-liner Javascript signature-line program
 that let you set Netscape to use 128 bits...

Not to mention the plaintext settings imbedded in the Netscape *executable*.

...it took you long enough, said a Netscape cypherpunk at the time of its
discovery...

Cheers,
RAH
Who saw them making the t-shirts, with pasted text from the file itself at
FC97, complete with cypherpunks policy on it...

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




License to POP3 (was Re: Usenet vs. web for avoiding censorship)

2002-10-13 Thread Morlock Elloi

The main difference, the axis along which one classifies
maillists/usenet/weblogs is the control.

On usenet, once the site agrees to carry a newsgroup, you have many entry
points and automatic distribution that is next to impossible to choke (other
than with noise.)

Maillists are more controllable (as even cypherpunk nodes experienced) but and
probably the least bad solution so far. And they are not much different from
usenet - fewer newsgroups (you decide what you want) and you are your own
server. With today's connectivity and computing resources, smaller maillists
(seeral hundred subscribers) don't really need servers (exploders) - just a
shared recipient list. Very censorship-resistant.

Weblogs are at the mercy of site operators and extremely vulnerable to
moronship and censorship.

This means that the Next Big Attack From Them will be on the e-mail. It's far
too easy for everyone today to bear arms, I mean have an e-mail interface. 



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Faith Hill - Exclusive Performances, Videos  More
http://faith.yahoo.com




Re: On topic!

2002-10-13 Thread Tim May

On Sunday, October 13, 2002, at 01:16  AM, Ryan Sorensen wrote:

 Talking to someone who was at the legendary cypherpunks anniversary 
 bbq.
 He brought up the fact that someone there was talking about private
 hedonistic cells (any errors are mine, not his, and whoever talked
 about this, if they have any more thoughts on the matter, please feel
 free to email me.)

That was Eric Hughes. His notion, briefly, is that many effective 
groups operate with about 20-40 known-to-each-other local cells and 
with about 10 times that many overall members. While there are many 
mega-organizations with tens of thousands or even tens of millions of 
members (AARP, Sierra Club, Democrats, etc.), the effective size for 
actual communication and action tends to be a lot smaller.

We all noted that most Cypherpunks physical meetings are in about this 
range, of 20 to 30 attendees, and that the mailing list has ranged from 
a few hundred to about 500 distinct, real subscribers for most of the 
list's existence.

Profound or obvious? I guess you had to be there.

--Tim May