Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]]

2005-09-30 Thread sunder

Tyler Durden wrote:

Actually, depending on your App, this would seem to be th very 
OPPOSITE of a moot point.

-TD


Indeed!

I've been ignoring this list for a while, so sorry for the late posting.

I remember sometime in late 99, I had one of the early blackberry 
pagers, the small ones that ate a single AA battery which lasted about a 
week or so, and had email + a small web browser inside of it.  It wasn't 
the blackberry phone.  Anyway, long story short, one day, said pager 
crashed (it is a computer after all) and I was trying to figure out how 
to reboot it, so I thought, fuck it, and removed the battery, the fucker 
stayed ON!  For over 15 minutes!


Gee, I wonder why anyone would design a cell phone or pager to be able 
to stay on after its battery is pulled out.  Yeah, yeah, it's just a 
capacitor or an internal rechargeable battery, but why would you want 
such a feature?


Fast forward to 2005.  Most cell phones are after all small computers 
with a transceiver, microphone, and speaker, and recently GPS 
receivers.  And now we have reports of the GPS info being transmitted 
all the time, oops! it's a bug, we meant to turn it off. uh huh.  Just 
how much work would it be to reprogram the soft power off key, so it 
shuts off all the lights, and display, but still transmits GPS info, 
just less often?  Or also transmit audio?  What are the odds that the 
code on the phone already comes with this feature built in?


Of course, if it was legal to scan on cell phone frequencies, you might 
be able to confirm what it's sending and when, but of course, it's not 
legal to do that.  Even to your own phone.


Of course some phones are more equal than others.  For example, T-Mobile 
SideKick, which if you write an email and decide to cancel it, but 
you're out of range, exposes its evil self with Sorry, we can't let you 
delete the email you're composing, because it hasn't been sent to the 
server yet!  Gee, I wonder what that means?  Nah, it's just a bug.  (Of 
course, this is a totally owned platform, where T-Mobile owns your data, 
not you, oops, make that the hackers of a few months ago..)
Oh and if said phone is running out of batteries, it starts to complain 
loudly until you recharge it.  Um, yeah, it likes being on at all 
times.  You can hear it transmit occasionally when it's near amplified 
computer speakers or your car radio. 

Fun that, but could be useful.  Especially if you heard it transmit 
while it's supposedly off. (I've honestly not heard it transmit while 
it's off)


Are we just too paranoid?  Nah, that's just a bug in human firmware, 
we'll fix that in the next brainwashing session.


(BTW: what the fuck's up with all the weirdo subject lines?  There's a 
perfectly good From:  line in all SMTP headers, we don't need this 
shit in the subject line for fuck's sake!  What's this, the return of 
Jim Choate?)




Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]]

2005-09-28 Thread sunder

Tyler Durden wrote:

Actually, depending on your App, this would seem to be th very 
OPPOSITE of a moot point.

-TD


Indeed!

I've been ignoring this list for a while, so sorry for the late posting.

I remember sometime in late 99, I had one of the early blackberry 
pagers, the small ones that ate a single AA battery which lasted about a 
week or so, and had email + a small web browser inside of it.  It wasn't 
the blackberry phone.  Anyway, long story short, one day, said pager 
crashed (it is a computer after all) and I was trying to figure out how 
to reboot it, so I thought, fuck it, and removed the battery, the fucker 
stayed ON!  For over 15 minutes!


Gee, I wonder why anyone would design a cell phone or pager to be able 
to stay on after its battery is pulled out.  Yeah, yeah, it's just a 
capacitor or an internal rechargeable battery, but why would you want 
such a feature?


Fast forward to 2005.  Most cell phones are after all small computers 
with a transceiver, microphone, and speaker, and recently GPS 
receivers.  And now we have reports of the GPS info being transmitted 
all the time, oops! it's a bug, we meant to turn it off. uh huh.  Just 
how much work would it be to reprogram the soft power off key, so it 
shuts off all the lights, and display, but still transmits GPS info, 
just less often?  Or also transmit audio?  What are the odds that the 
code on the phone already comes with this feature built in?


Of course, if it was legal to scan on cell phone frequencies, you might 
be able to confirm what it's sending and when, but of course, it's not 
legal to do that.  Even to your own phone.


Of course some phones are more equal than others.  For example, T-Mobile 
SideKick, which if you write an email and decide to cancel it, but 
you're out of range, exposes its evil self with Sorry, we can't let you 
delete the email you're composing, because it hasn't been sent to the 
server yet!  Gee, I wonder what that means?  Nah, it's just a bug.  (Of 
course, this is a totally owned platform, where T-Mobile owns your data, 
not you, oops, make that the hackers of a few months ago..)
Oh and if said phone is running out of batteries, it starts to complain 
loudly until you recharge it.  Um, yeah, it likes being on at all 
times.  You can hear it transmit occasionally when it's near amplified 
computer speakers or your car radio. 

Fun that, but could be useful.  Especially if you heard it transmit 
while it's supposedly off. (I've honestly not heard it transmit while 
it's off)


Are we just too paranoid?  Nah, that's just a bug in human firmware, 
we'll fix that in the next brainwashing session.


(BTW: what the fuck's up with all the weirdo subject lines?  There's a 
perfectly good From:  line in all SMTP headers, we don't need this 
shit in the subject line for fuck's sake!  What's this, the return of 
Jim Choate?)




Re: Well, they got what they want...

2005-07-28 Thread sunder

Steve Schear wrote:



The term 'securisimilitude' (from verisimilitude) comes to mind.

Steve

True, but I think the goal was FUD and it worked. 

On Tuesday (I think) both the Metro and AMNY free rags reported that all 
of a sudden there was a rash of suspicious packages being reported.  Ya 
think?  Another incident was of a homeless guy putting his luggage on a 
ticket counter and claiming it had a bomb in it.  Think someone yanked 
his chain to the point where he'd sarcasm himself into jail?  Of course 
the bright bulbs in charge evacuated all of Penn Station supposedly.


In another article, one that stated NYCLU was against the searches, but 
claimed most people were happy to open their bags and some even walked 
up to the cops, opened their bags and said here, look at mine, another 
gave a quote from a supposed police officer saying that July had a ~23% 
drop in crime.  Well, that's nice and all, but the bag searches started 
only 3 days before, so WTF does the crime rate for July (which hasn't 
yet ended) have anything to do with bag searches that just started? 

The funniest part are the letters to the editors thanking the police and 
saying how wonderful it is to be living in a country where you're safe.  
Of course, if you were to tell these folks 10 years ago, that you'll be 
subject to search when entering the subway, or that you couldn't bring a 
nail clipper with you when boarding an airplane, they'd go Shucks, no 
way that would happen in my country!


I love the smell of propaganda in the morning.  It smells like FUD.



Re: Well, they got what they want...

2005-07-28 Thread sunder

Steve Schear wrote:



The term 'securisimilitude' (from verisimilitude) comes to mind.

Steve

True, but I think the goal was FUD and it worked. 

On Tuesday (I think) both the Metro and AMNY free rags reported that all 
of a sudden there was a rash of suspicious packages being reported.  Ya 
think?  Another incident was of a homeless guy putting his luggage on a 
ticket counter and claiming it had a bomb in it.  Think someone yanked 
his chain to the point where he'd sarcasm himself into jail?  Of course 
the bright bulbs in charge evacuated all of Penn Station supposedly.


In another article, one that stated NYCLU was against the searches, but 
claimed most people were happy to open their bags and some even walked 
up to the cops, opened their bags and said here, look at mine, another 
gave a quote from a supposed police officer saying that July had a ~23% 
drop in crime.  Well, that's nice and all, but the bag searches started 
only 3 days before, so WTF does the crime rate for July (which hasn't 
yet ended) have anything to do with bag searches that just started? 

The funniest part are the letters to the editors thanking the police and 
saying how wonderful it is to be living in a country where you're safe.  
Of course, if you were to tell these folks 10 years ago, that you'll be 
subject to search when entering the subway, or that you couldn't bring a 
nail clipper with you when boarding an airplane, they'd go Shucks, no 
way that would happen in my country!


I love the smell of propaganda in the morning.  It smells like FUD.



Re: Well, they got what they want...

2005-07-24 Thread sunder

Tyler Durden wrote:

Saw a local security expert on the news, and he stated the obvious: 
Random searches and whatnot are going to do zero for someone 
determined, but might deter someone who was thinking about blowing 
up the A train. In other words, everyone here in NYC knows that we've 
given up a lot for the sake of the appearence of security, but no one 
seems to give a damn.


I wouldn't say we've given up at all - after all, we've had no choice 
in the matter. We weren't asked if we wanted to be searched, we weren't 
asked if we were willing to give up liberty for the appearance of 
security, we weren't asked if we were ok with atrocities such as the 
unpatriot act, or the national ID disguised as a standardized driver's 
license, we weren't asked if we were willing to pay lots of tax dollars 
to finance more police on every corner and all the toys that they have 
purchased for these tasks, or the various hollow cement flower pots, 
and other barricades.


It's not exactly a liberty that we have sacrificed, when it was taken 
away without consent.  There is another word for this: theft.




Re: Well, they got what they want...

2005-07-24 Thread sunder

Tyler Durden wrote:

Saw a local security expert on the news, and he stated the obvious: 
Random searches and whatnot are going to do zero for someone 
determined, but might deter someone who was thinking about blowing 
up the A train. In other words, everyone here in NYC knows that we've 
given up a lot for the sake of the appearence of security, but no one 
seems to give a damn.


I wouldn't say we've given up at all - after all, we've had no choice 
in the matter. We weren't asked if we wanted to be searched, we weren't 
asked if we were willing to give up liberty for the appearance of 
security, we weren't asked if we were ok with atrocities such as the 
unpatriot act, or the national ID disguised as a standardized driver's 
license, we weren't asked if we were willing to pay lots of tax dollars 
to finance more police on every corner and all the toys that they have 
purchased for these tasks, or the various hollow cement flower pots, 
and other barricades.


It's not exactly a liberty that we have sacrificed, when it was taken 
away without consent.  There is another word for this: theft.




Re: /. [Intel Adds DRM to New Chips]

2005-06-07 Thread sunder

DiSToAGe wrote:


not a backdoor, we forget to much that every system is only 1 and 0
through electricity and physical circuits. If you can make them you can
watch them (with time and monney i agree). Perhaps thinking that datas
(certs, instructions) can be hidden behind a physical thing is only a
dream ? I ask myself if not every cryptosystem where you must have
something hidden or physically not accessible in point of the
process is not sure ?

 

In theory the above is absolutely correct.  In practice, it's extremely 
difficult to properly implement an accurate enough emulator, however as 
an emulator writer you have far more advantages than disadvantages 
despite the 10-100x in slowdown.  (Speaking from personal experience - 
no, nothing on the kind of scale we're talking about here.)  You can 
always have your virtual CPU decide that when it sees a certain 
instruction, to disobey it.  For example, when it sees a checksum check, 
to decide to jump around it and so forth.


Gotta love it when you can fool a program into thinking that 2+2=5 and 
that everything is still A-OK with that!  ;-)


If you can interface with real (protected) hardware, you might even be 
able to get around public key schemes with the emulator.  HP/Agilent 
made some wonderful logic analyzers, which are very useful against 
ancient hardware (think Motorola 68K chips at around 5MHz) too bad 
nothing in the GHz range is (cheaply?) available out there, but there's 
lots that can be done.


What can be done?  For example, if you have something like Palladium or 
whatever it's called these days, you an always build a machine that has 
custom RAM that can change at the flip of a switch - sort of like the 
old EEPROM emulators, but with RAM chips that can be flipped to a ROM 
instead.  You flip a switch after the DRM core has validated your BIOS 
and operating system, and at some point once the CPU cache gets drained, 
it winds up running code that it did not boot, code which you've written 
to do *OTHER* things for example - simply change the IRQ vectors to 
point to your code and you've taken over...  Mind you, all this is 
easier said that done, but it is possible to implement.


Remember, security is a chain, and each (media?) player out there is a 
link in that chain.  It only takes one broken player to wipe out your 
entire investment in that DRM pipe dream. 

Any employee with access can leak the master keys and the game is over.  
Any wily hardware hacker with plenty of time on his hands can take a 
shot at reverse engineering any (media) player to the point of cracking 
it, etc.  In the end, it's a waste of time and money for the makers of 
DRM as there's enough interest that someone somewhere will break it at 
some point in the near future. 

You can play cat and mouse games by watermarking the output with the 
serial # of the player in order to lock out cracked players, but the 
attacker only has to break more than one player (perhaps two different 
models so they get both serial # and model #) and compare the resulting 
outputs from the same movie to figure out which bits contain the 
watermarks.  XOR is very nice for figuring this out. :-)


None of this worries me, because I don't give a rats ass about copying 
movies or what not.  Couldn't care less about it.  I'll wait for the 
shit to make it to HBO, it's usually not worth watching the waste of 
Hollywood plotless overhyped crud anyway, so why worry about copying 
it?  The few titles that are worth watching, are also well worth buying, 
and after a few months they can be had for under $20, so why bother?



What is cause for worry is that it's quite _possible_ for Intel or other 
chip manufacturers to insert backdoors in their hardware which someone 
will go through the trouble of discovering, which does put everyone at 
risk.  No matter how good your operating system and firewall rules, if 
your network card (and drivers) decide to bend over upon receiving a 
specially crafted packet, you're owned just the same. 

Mind you, I've never run across anything close to this, except perhaps 
the old F00FC7C8 bug in the original pentium (which really was a DOS, 
not a back door) and the old UltraSparc I in 64 bit mode multiuser 
hole.  The Pentium IV hyperthreading bug is something recent to worry 
about along the same line of thought.


Sadly, you haven't got much choice in this matter, you have to assume 
that you can trust the hardware that you run on (unless you're willing 
to make your own and have the resources to do so, etc.)




Re: /. [Intel Adds DRM to New Chips]

2005-06-06 Thread sunder

DiSToAGe wrote:


not a backdoor, we forget to much that every system is only 1 and 0
through electricity and physical circuits. If you can make them you can
watch them (with time and monney i agree). Perhaps thinking that datas
(certs, instructions) can be hidden behind a physical thing is only a
dream ? I ask myself if not every cryptosystem where you must have
something hidden or physically not accessible in point of the
process is not sure ?

 

In theory the above is absolutely correct.  In practice, it's extremely 
difficult to properly implement an accurate enough emulator, however as 
an emulator writer you have far more advantages than disadvantages 
despite the 10-100x in slowdown.  (Speaking from personal experience - 
no, nothing on the kind of scale we're talking about here.)  You can 
always have your virtual CPU decide that when it sees a certain 
instruction, to disobey it.  For example, when it sees a checksum check, 
to decide to jump around it and so forth.


Gotta love it when you can fool a program into thinking that 2+2=5 and 
that everything is still A-OK with that!  ;-)


If you can interface with real (protected) hardware, you might even be 
able to get around public key schemes with the emulator.  HP/Agilent 
made some wonderful logic analyzers, which are very useful against 
ancient hardware (think Motorola 68K chips at around 5MHz) too bad 
nothing in the GHz range is (cheaply?) available out there, but there's 
lots that can be done.


What can be done?  For example, if you have something like Palladium or 
whatever it's called these days, you an always build a machine that has 
custom RAM that can change at the flip of a switch - sort of like the 
old EEPROM emulators, but with RAM chips that can be flipped to a ROM 
instead.  You flip a switch after the DRM core has validated your BIOS 
and operating system, and at some point once the CPU cache gets drained, 
it winds up running code that it did not boot, code which you've written 
to do *OTHER* things for example - simply change the IRQ vectors to 
point to your code and you've taken over...  Mind you, all this is 
easier said that done, but it is possible to implement.


Remember, security is a chain, and each (media?) player out there is a 
link in that chain.  It only takes one broken player to wipe out your 
entire investment in that DRM pipe dream. 

Any employee with access can leak the master keys and the game is over.  
Any wily hardware hacker with plenty of time on his hands can take a 
shot at reverse engineering any (media) player to the point of cracking 
it, etc.  In the end, it's a waste of time and money for the makers of 
DRM as there's enough interest that someone somewhere will break it at 
some point in the near future. 

You can play cat and mouse games by watermarking the output with the 
serial # of the player in order to lock out cracked players, but the 
attacker only has to break more than one player (perhaps two different 
models so they get both serial # and model #) and compare the resulting 
outputs from the same movie to figure out which bits contain the 
watermarks.  XOR is very nice for figuring this out. :-)


None of this worries me, because I don't give a rats ass about copying 
movies or what not.  Couldn't care less about it.  I'll wait for the 
shit to make it to HBO, it's usually not worth watching the waste of 
Hollywood plotless overhyped crud anyway, so why worry about copying 
it?  The few titles that are worth watching, are also well worth buying, 
and after a few months they can be had for under $20, so why bother?



What is cause for worry is that it's quite _possible_ for Intel or other 
chip manufacturers to insert backdoors in their hardware which someone 
will go through the trouble of discovering, which does put everyone at 
risk.  No matter how good your operating system and firewall rules, if 
your network card (and drivers) decide to bend over upon receiving a 
specially crafted packet, you're owned just the same. 

Mind you, I've never run across anything close to this, except perhaps 
the old F00FC7C8 bug in the original pentium (which really was a DOS, 
not a back door) and the old UltraSparc I in 64 bit mode multiuser 
hole.  The Pentium IV hyperthreading bug is something recent to worry 
about along the same line of thought.


Sadly, you haven't got much choice in this matter, you have to assume 
that you can trust the hardware that you run on (unless you're willing 
to make your own and have the resources to do so, etc.)




Re: Terrorist-controlled cessna nearly attacks washington

2005-05-12 Thread sunder
Bill Stewart wrote:
Sigh.  Terrified Student Pilot isn't the same as Terrorist.
Yeah, but they both start with the same four letters and sound alike, 
which seems to be the attention span of those who are afraid of the 
boogie man and consequentially imagine they see him under every rock, or 
bush.



Re: Terrorist-controlled cessna nearly attacks washington

2005-05-12 Thread sunder
Bill Stewart wrote:
Sigh.  Terrified Student Pilot isn't the same as Terrorist.
Yeah, but they both start with the same four letters and sound alike, 
which seems to be the attention span of those who are afraid of the 
boogie man and consequentially imagine they see him under every rock, or 
bush.



Re: Secure erasing Info (fwd from richard@SCL.UTAH.EDU)

2005-05-03 Thread sunder
Jason Holt wrote:
There are lots of pitfalls in secure erasure, even without considering
physical media attacks.  Your filesystem may not overwrite data on the same
blocks used to write the data originally, for instance.  Plaintext may be left
in the journal and elsewhere.  Even filling up the disk may not do it, as some
filesystems keep blocks in reserve.  I did a demo a few years ago where I
wrote plaintext, overwrote, then dumped the filesystem blocks out and found
parts of the plaintext.
For anybody who hasn't read it, the Gutmann paper is Secure Deletion of Data
from Magnetic and Solid-State Memory, and is highly recommended.  He shows
that even RAM isn't safe against physical media attacks.
 

Incase anyone's too lazy to google it, Peter Gutmann's paper can be 
found here: 
http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html

Good point.  So, modify that with - create a block-level encrypted file 
system on the flash drive, so long as you key and passphrase are good, 
you should be safe enough...  I've also seen this little toy:  
http://www.biostik.com/  a bit pricey, but depending on your threat 
model, might add another layer of protection.  Not something I'd 
personally bother with - esp with the recent stuff about how to make 
fake fingerprints, etc (funny thing is that your fingerprints will be on 
the case of this thing, so not much security there), but YMMV based on 
your threat model, right?But, as always, encrypt early and often.  :-D

Would make an interesting side conversation about how fingerprints are 
passwords, but passwords that can (now?) be easily stolen and replayed.  
IMHO, it casts doubt on a lot of biometric methods.  Wonder if it would 
be possible to create an image of an iris that would pass an iris scan, 
if so, both fingerprints and irises become much like permanent credit 
cards, but worse, which once duplicated, cannot be revoked.  One can 
imagine in the future once ATM's have iris scanners, that some evil 
group will set up a fake ATM with a very good CCD camera setup to 
capture irises as well as ATM cards and pin #'s... and, why not, also 
finger prints if future ATM's use such scanners.




Re: Email Certification?

2005-05-02 Thread sunder
Suggestion - you can do what advertisers do - encode a web bug image as 
part of some jucy html emails on a web server that you own and check 
your logs.  (not sure if hotmail or whatever allows this, as I don't use 
their cruft.)

Make sure that unlike a web bug you don't set the name so it looks like 
a web bug (i.e. don't call it 1x1.gif) and don't set the image size 
attributes on the IMG SRC tag to say 1x1.  Instead make the file name 
into something that looks like it came from a digital camera and put it 
in a path that matches that cover story.
ie: 
http://127.53.22.7/phightklub_files/2004-xmas-party-pix/JoeShmoeDrunkAndHigh/Kodak/DSC03284345.JPG

No guarantee that someone won't read the email as source and thus not 
grab the image too, but you can make it look like the content of the 
image is important to the message's content and jucy enough to make 
whomever you believe is spying on you want to fetch it.  i.e. Here's a 
picture of the party, you can clearly see he's got a crack pipe in his 
hand and his eyes are dialated.  I'm thinkin' of reporting him to deh 
fedz, what do u think?(I'm assuming that the feds are your threat 
model here, but you can vary this up with whatever threat model you 
think is appropriate.  i.e. if you think your woman is spying on you, 
make it a fake email from your supposed mistress, something she'd want 
to open - i.e. subject I'm gonna tell ur wife about us if you don't do X.)

I'd also make sure that nothing on the webserver itself points to the 
directory where this lives so it can't be picked up by the search 
spiders/bots accidentally, and make sure that you don't allow the 
directory it lives in to have an auto-index.

Then, watch the server logs like a paranoid hawk with a caffeine 
addiction problem and hope they bite, when they do, you know they've 
read the other emails.  You also have to make sure that you don't 
accidentally open these emails yourself, or leave an open web browser 
with your account where someone can randomly snoop.)

But of course, since you are using hotmail and you're about to receive 
this email, if your account is watched, guess what, you can no longer 
use this method.  Oh well.

Tyler Durden wrote:
 Yes, but this almost misses the point.
 Is it possible to detect ('for certain', within previously mentioned 
boundary conditions) that some has read it? This is a different problem 
from merely trying to retain secrecy.
 Remember, my brain is a little punch-drunk from all the Fight Club 
fighting.
 BUT, I believe that the fact that deeper TLAs desire to hide 
themselves from more run-of-the-mill operations might be exploited in an 
interesting way. Or at least force them to commit to officially 
surveiling you, thereby (one hopes) subjecting them to whatever frail 
tatters of the law still exist.
 A better example may be home security systems. If they're going to 
tempest you, I'd bet they'd prefer not to inform your local security 
company. They'd rather just shut down your alarm system and I bet this 
is easy for them.
 BUT, this fact may enable one to detect (with little doubt) such an 
intrusion, and about this I shall say no more...


Re: Secure erasing Info (fwd from richard@SCL.UTAH.EDU)

2005-05-02 Thread sunder
Yeah, but these days, I'd go with the largest flash drive I could 
afford.  USB2 or otherwise.  I don't believe you can recover data from 
these once you actually overwrite the bits (anyone out there know any 
different?).

They're either 1 or 0, there's no extra ferrite molecules to the left or 
the right of the track to pick up a signal from  ;-)  As always encrypt 
the data you write to the device. 

I wouldn't overwrite flash repeatedly (i.e. the Guttman method of 35 
writes) though, there's a limit on the number of writes, after which it 
goes bad.  I'd overwrite it once with random data.

Eugen Leitl wrote:
- Forwarded message from Richard Glaser [EMAIL PROTECTED] -
From: Richard Glaser [EMAIL PROTECTED]
Date: Wed, 27 Apr 2005 12:17:43 -0600
To: [EMAIL PROTECTED]
Subject: Secure erasing Info
Reply-To: Mac OS X enterprise deployment project
[EMAIL PROTECTED]
FYI:
Rendering Drives Completely Unreadable Can be Difficult
---
 




Re: Secure erasing Info (fwd from richard@SCL.UTAH.EDU)

2005-05-02 Thread sunder
Yeah, but these days, I'd go with the largest flash drive I could 
afford.  USB2 or otherwise.  I don't believe you can recover data from 
these once you actually overwrite the bits (anyone out there know any 
different?).

They're either 1 or 0, there's no extra ferrite molecules to the left or 
the right of the track to pick up a signal from  ;-)  As always encrypt 
the data you write to the device. 

I wouldn't overwrite flash repeatedly (i.e. the Guttman method of 35 
writes) though, there's a limit on the number of writes, after which it 
goes bad.  I'd overwrite it once with random data.

Eugen Leitl wrote:
- Forwarded message from Richard Glaser [EMAIL PROTECTED] -
From: Richard Glaser [EMAIL PROTECTED]
Date: Wed, 27 Apr 2005 12:17:43 -0600
To: [EMAIL PROTECTED]
Subject: Secure erasing Info
Reply-To: Mac OS X enterprise deployment project
[EMAIL PROTECTED]
FYI:
Rendering Drives Completely Unreadable Can be Difficult
---
 




NSA specifies elliptic-curve crypto for security applications

2005-03-07 Thread sunder
http://www.eet.com/sys/news/showArticle.jhtml?articleId=60404977
NSA specifies elliptic-curve crypto for security applications
By Loring Wirbel , EE Times 
http://www.eetimes.com/;jsessionid=3J52X3FMWO51MQSNDBGCKHSCJUMEKJVN
March 03, 2005 (10:22 AM EST)
URL: http://www.eet.com/article/showArticle.jhtml?articleId=60404977 
http://www.eet.com/article/showArticle.jhtml;jsessionid=3J52X3FMWO51MQSNDBGCKHSCJUMEKJVN?articleId=60404977sub_taxonomyID= 

SNIP
Last October, the agency referred to ECC as one of the few public-key 
systems that could meet equivalent security standards to the private-key 
AES.

NSA (Fort Meade, Md.) is recommending a series of algorithms called 
Suite B for securing sensitive and unclassified data. Suite B includes 
Elliptic-Curve Menezes-Qu-Vanstone and Elliptic-Curve Diffie-Hellman for 
key agreement, along with the Elliptic Curve Digital Signature Algorithm 
for digital signatures.

AES and Secure Hashing Algorithm also are included in Suite B.



Theory of Secure Computation - Joe Killian, NEC Labs

2005-02-18 Thread sunder
http://www.uwtv.org/programs/displayevent.asp?rid=2233
A bit sparse on details, but a good overview of all sorts of secure 
protocols.  Our friends Alice and Bob are of course present in various 
orgies of secure protocols.  :)



Theory of Secure Computation - Joe Killian, NEC Labs

2005-02-18 Thread sunder
http://www.uwtv.org/programs/displayevent.asp?rid=2233
A bit sparse on details, but a good overview of all sorts of secure 
protocols.  Our friends Alice and Bob are of course present in various 
orgies of secure protocols.  :)



Re: new egold phisher - this time it's a malware executable

2005-01-23 Thread sunder
Got another one today with a RAR attachment claiming it was a screen 
shot.  Text is:

Dear Sir
Yesterday you have arrived the amount of $1000 into my account. Of 
course, I do not object, but you probably were mistaken number of the 
account when transferred, and it happens not first time. Please look an 
attached screenshot of all your transfers into my account. I have no 
idea why you transfer money to me, as I do not know you, and I need no 
money. If you were mistaken, I'll return this money to you!
Sincerely.

Nice... what's next?  an egold transfer from a lawyer claiming a long 
lost uncle kicked the bucket and left me a fortune? :-D

Wheee!
sunder wrote:
So, the e-gold phishers are at it again... received a very nice email 
this morning with an attachment.  The Received-From header showed this 
beauty: from 195.56.214.184 
([EMAIL PROTECTED] [195.56.214.184] 
(may be forged))

Indeed!
Don't know if it's a trojan, spyware, virus, or worm, and I couldn't 
care less since I don't use egold, but would be interesting (just for 
curiosity's sake) if someone were to disassemble it to see what it does. 
 It's probably a password grabber of some kind, so falls under spyware, 
but who knows what other evil payloads were in the attachment.

ROTFL!
-
Text said:
Dear E-gold Customer,
Herewith we strongly recommend you to install this Service Pack to your 
PC, as lately we have received a lot of complains regarding unauthorized 
cash withdrawals from our customers' accounts. This upgrade blocks all 
currently known Trojan modules and eliminates the possibility of cash 
withdrawals without your authorization. We highly recommend to install 
this Service Pack to secure your accounts.
Please note, that E-gold doesn't take any responsibility and doesn't 
accept any claims regarding losses caused by fraudulent actions, if your 
account has not been duly protected by the present Service Pack.

Please find enclosed the archive of the Service Pack installation file 
in the attachment to this message.




Re: new egold phisher - this time it's a malware executable

2005-01-22 Thread sunder
Got another one today with a RAR attachment claiming it was a screen 
shot.  Text is:

Dear Sir
Yesterday you have arrived the amount of $1000 into my account. Of 
course, I do not object, but you probably were mistaken number of the 
account when transferred, and it happens not first time. Please look an 
attached screenshot of all your transfers into my account. I have no 
idea why you transfer money to me, as I do not know you, and I need no 
money. If you were mistaken, I'll return this money to you!
Sincerely.

Nice... what's next?  an egold transfer from a lawyer claiming a long 
lost uncle kicked the bucket and left me a fortune? :-D

Wheee!
sunder wrote:
So, the e-gold phishers are at it again... received a very nice email 
this morning with an attachment.  The Received-From header showed this 
beauty: from 195.56.214.184 
([EMAIL PROTECTED] [195.56.214.184] 
(may be forged))

Indeed!
Don't know if it's a trojan, spyware, virus, or worm, and I couldn't 
care less since I don't use egold, but would be interesting (just for 
curiosity's sake) if someone were to disassemble it to see what it does. 
 It's probably a password grabber of some kind, so falls under spyware, 
but who knows what other evil payloads were in the attachment.

ROTFL!
-
Text said:
Dear E-gold Customer,
Herewith we strongly recommend you to install this Service Pack to your 
PC, as lately we have received a lot of complains regarding unauthorized 
cash withdrawals from our customers' accounts. This upgrade blocks all 
currently known Trojan modules and eliminates the possibility of cash 
withdrawals without your authorization. We highly recommend to install 
this Service Pack to secure your accounts.
Please note, that E-gold doesn't take any responsibility and doesn't 
accept any claims regarding losses caused by fraudulent actions, if your 
account has not been duly protected by the present Service Pack.

Please find enclosed the archive of the Service Pack installation file 
in the attachment to this message.




new egold phisher - this time it's a malware executable

2005-01-21 Thread sunder
So, the e-gold phishers are at it again... received a very nice email 
this morning with an attachment.  The Received-From header showed this 
beauty: from 195.56.214.184 
([EMAIL PROTECTED] [195.56.214.184] 
(may be forged))

Indeed!
Don't know if it's a trojan, spyware, virus, or worm, and I couldn't 
care less since I don't use egold, but would be interesting (just for 
curiosity's sake) if someone were to disassemble it to see what it does. 
 It's probably a password grabber of some kind, so falls under spyware, 
but who knows what other evil payloads were in the attachment.

ROTFL!
-
Text said:
Dear E-gold Customer,
Herewith we strongly recommend you to install this Service Pack to your 
PC, as lately we have received a lot of complains regarding unauthorized 
cash withdrawals from our customers' accounts. This upgrade blocks all 
currently known Trojan modules and eliminates the possibility of cash 
withdrawals without your authorization. We highly recommend to install 
this Service Pack to secure your accounts.
Please note, that E-gold doesn't take any responsibility and doesn't 
accept any claims regarding losses caused by fraudulent actions, if your 
account has not been duly protected by the present Service Pack.

Please find enclosed the archive of the Service Pack installation file 
in the attachment to this message.



new egold phisher - this time it's a malware executable

2005-01-21 Thread sunder
So, the e-gold phishers are at it again... received a very nice email 
this morning with an attachment.  The Received-From header showed this 
beauty: from 195.56.214.184 
([EMAIL PROTECTED] [195.56.214.184] 
(may be forged))

Indeed!
Don't know if it's a trojan, spyware, virus, or worm, and I couldn't 
care less since I don't use egold, but would be interesting (just for 
curiosity's sake) if someone were to disassemble it to see what it does. 
 It's probably a password grabber of some kind, so falls under spyware, 
but who knows what other evil payloads were in the attachment.

ROTFL!
-
Text said:
Dear E-gold Customer,
Herewith we strongly recommend you to install this Service Pack to your 
PC, as lately we have received a lot of complains regarding unauthorized 
cash withdrawals from our customers' accounts. This upgrade blocks all 
currently known Trojan modules and eliminates the possibility of cash 
withdrawals without your authorization. We highly recommend to install 
this Service Pack to secure your accounts.
Please note, that E-gold doesn't take any responsibility and doesn't 
accept any claims regarding losses caused by fraudulent actions, if your 
account has not been duly protected by the present Service Pack.

Please find enclosed the archive of the Service Pack installation file 
in the attachment to this message.



Gait advances in emerging biometrics

2004-12-14 Thread Sunder

Original URL: http://www.theregister.co.uk/2004/12/14/alt_biometrics/
Gait advances in emerging biometrics

By John Leyden (john.leyden at theregister.co.uk)
Published Tuesday 14th December 2004 15:07 GMT

Great Juno comes; I know her by her gait.
William Shakespeare, The Tempest

Retinal scans, finger printing or facial recognition get most of the 
publicity but researchers across the world are quietly labouring away at 
alternative types of biometrics.

Recognition by the way someone walk (their gait), the shape of their ears, 
the rhythm they make when they tap and the involuntary response of ears to 
sounds all have the potential to raise the stock of biometric techniques. 
According to Professor Mark Nixon, of the Image Speech and Recognition 
Research Group at the University of Southampton, each has unique 
advantages which makes them worth exploring.

SNIP

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Gait advances in emerging biometrics

2004-12-14 Thread Sunder

Original URL: http://www.theregister.co.uk/2004/12/14/alt_biometrics/
Gait advances in emerging biometrics

By John Leyden (john.leyden at theregister.co.uk)
Published Tuesday 14th December 2004 15:07 GMT

Great Juno comes; I know her by her gait.
William Shakespeare, The Tempest

Retinal scans, finger printing or facial recognition get most of the 
publicity but researchers across the world are quietly labouring away at 
alternative types of biometrics.

Recognition by the way someone walk (their gait), the shape of their ears, 
the rhythm they make when they tap and the involuntary response of ears to 
sounds all have the potential to raise the stock of biometric techniques. 
According to Professor Mark Nixon, of the Image Speech and Recognition 
Research Group at the University of Southampton, each has unique 
advantages which makes them worth exploring.

SNIP

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Acoustic Keyboard Eavesdropping

2004-12-13 Thread Sunder
Not new news, but interesting anyway.

http://www.nytimes.com/2004/12/12/magazine/12ACOUSTIC.html
(bugmenot's your uncle)

Acoustic Keyboard Eavesdropping
By STEPHEN MIHM

Published: December 12, 2004

When it comes to computer security, do you have faith in firewalls? Think 
passwords will protect you? Not so fast: it is now possible to eavesdrop 
on a typist's keystrokes and, by exploiting minute variations in the 
sounds made by different keys, distinguish and decipher what is being 
typed. 

SNIP

This means that firewalls and passwords will amount to nothing if someone 
manages to bug a room and record the cacophony of keystrokes. Asonov 
managed to pull off this feat with readily available recording equipment 
at a short distance. Even as far away as 50 feet, and with significant 
background noise, he was able to replicate his success using a parabolic 
microphone. He also anticipated an obvious practical objection: how does a 
would-be eavesdropper get into a building and spend enough time to 
''train'' a computer program to recognize the keystrokes of a particular 
keyboard? Not a problem: it seems that keyboards of the same make and 
model sound sufficiently alike -- regardless of who is typing -- that a 
computer trained on one keyboard can be unleashed on another.

SNIP



--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-


RE: Optical Tempest FAQ

2004-12-05 Thread Sunder
IMHO, if you light up two or more other identical CRT's and have them 
display random junk it should throw enough noise to make it worthless - 
(and would put out enough similar RF to mess with RF tempest) there might 
be ways to filter the photons from the other monitors out, but, it would 
be difficult.

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Thu, 2 Dec 2004, Tyler Durden wrote:

 Interesting.
 Contrary to what I thought (or what has been discussed here), only a 
 'scalar' of detected light is needed, not a vector. In other words, merely 
 measuring overall radiated intensity over time seems to be sufficient to 
 recover the message. This means that certain types of diffusive materials 
 will not necessarily mitigate against this kind of eavesdropping.
 
 However, his discussion would indicate that the various practical concerns 
 and limitations probably limit this to very niche-type applications...I'd 
 bet that it's very rare when such a trechnique is both needed as well as 
 useful, given the time, the subject and the place.
 
 -TD
 
 From: Sunder [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Subject: Optical Tempest FAQ
 Date: Thu, 2 Dec 2004 10:27:04 -0500 (est)
 
 http://www.cl.cam.ac.uk/~mgk25/emsec/optical-faq.html
 
 Along with tips and examples.
 
 Enjoy, and don't use a CRT in the dark. :-)



Optical Tempest FAQ

2004-12-02 Thread Sunder
http://www.cl.cam.ac.uk/~mgk25/emsec/optical-faq.html

Along with tips and examples.

Enjoy, and don't use a CRT in the dark. :-)

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



RE: Optical Tempest FAQ

2004-12-02 Thread Sunder
IMHO, if you light up two or more other identical CRT's and have them 
display random junk it should throw enough noise to make it worthless - 
(and would put out enough similar RF to mess with RF tempest) there might 
be ways to filter the photons from the other monitors out, but, it would 
be difficult.

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Thu, 2 Dec 2004, Tyler Durden wrote:

 Interesting.
 Contrary to what I thought (or what has been discussed here), only a 
 'scalar' of detected light is needed, not a vector. In other words, merely 
 measuring overall radiated intensity over time seems to be sufficient to 
 recover the message. This means that certain types of diffusive materials 
 will not necessarily mitigate against this kind of eavesdropping.
 
 However, his discussion would indicate that the various practical concerns 
 and limitations probably limit this to very niche-type applications...I'd 
 bet that it's very rare when such a trechnique is both needed as well as 
 useful, given the time, the subject and the place.
 
 -TD
 
 From: Sunder [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Subject: Optical Tempest FAQ
 Date: Thu, 2 Dec 2004 10:27:04 -0500 (est)
 
 http://www.cl.cam.ac.uk/~mgk25/emsec/optical-faq.html
 
 Along with tips and examples.
 
 Enjoy, and don't use a CRT in the dark. :-)



Optical Tempest FAQ

2004-12-02 Thread Sunder
http://www.cl.cam.ac.uk/~mgk25/emsec/optical-faq.html

Along with tips and examples.

Enjoy, and don't use a CRT in the dark. :-)

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Re: Broward machines count backward

2004-11-07 Thread Sunder
It sounds suspiciously like an int16 issue.

32K is close enough to 32767 after which a 16 bit integer goes negative 
when incremented.  Which is odd because it should roll over, not count 
backwards.

perhaps they did something like this:

note the use of abs on reporting.


int16 votes[MAX_CANDIDATES];

void add_a_vote(uint8 candidate)
{
 if (candidateMAX_CANDIDATES) return;
 votes[candidate]++;
}

void report(void)
{
 int i;

 for (i=0; iMAX_CANDIDATES; i++)
 {
  printf(Candidate %s got %d votes\n,candidates[i],abs(votes[i]));
 }

}

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Sat, 6 Nov 2004, R.A. Hettinga wrote:

 http://www.palmbeachpost.com/politics/content/news/epaper/2004/11/05/a29a_BROWVOTE_1105.html
 
 
 Palm Beach Post
 
 Broward machines count backward
 
  By Eliot Kleinberg
 
 Palm Beach Post Staff Writer
 
 Friday, November 05, 2004
 
 
 FORT LAUDERDALE - It had to happen. Things were just going too smoothly.
 
 Early Thursday, as Broward County elections officials wrapped up after a
 long day of canvassing votes, something unusual caught their eye. Tallies
 should go up as more votes are counted. That's simple math. But in some
 races, the numbers had gone . . . down.
 
 
 Officials found the software used in Broward can handle only 32,000 votes
 per precinct. After that, the system starts counting backward.



Re: Broward machines count backward

2004-11-06 Thread Sunder
It sounds suspiciously like an int16 issue.

32K is close enough to 32767 after which a 16 bit integer goes negative 
when incremented.  Which is odd because it should roll over, not count 
backwards.

perhaps they did something like this:

note the use of abs on reporting.


int16 votes[MAX_CANDIDATES];

void add_a_vote(uint8 candidate)
{
 if (candidateMAX_CANDIDATES) return;
 votes[candidate]++;
}

void report(void)
{
 int i;

 for (i=0; iMAX_CANDIDATES; i++)
 {
  printf(Candidate %s got %d votes\n,candidates[i],abs(votes[i]));
 }

}

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Sat, 6 Nov 2004, R.A. Hettinga wrote:

 http://www.palmbeachpost.com/politics/content/news/epaper/2004/11/05/a29a_BROWVOTE_1105.html
 
 
 Palm Beach Post
 
 Broward machines count backward
 
  By Eliot Kleinberg
 
 Palm Beach Post Staff Writer
 
 Friday, November 05, 2004
 
 
 FORT LAUDERDALE - It had to happen. Things were just going too smoothly.
 
 Early Thursday, as Broward County elections officials wrapped up after a
 long day of canvassing votes, something unusual caught their eye. Tallies
 should go up as more votes are counted. That's simple math. But in some
 races, the numbers had gone . . . down.
 
 
 Officials found the software used in Broward can handle only 32,000 votes
 per precinct. After that, the system starts counting backward.



Re: bin Laden gets a Promotion

2004-10-30 Thread Sunder
As usual, South Park is a great source of wisdom.  So, are you voting for 
the Giant Douche or the Turd Sandwich?

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Re: bin Laden gets a Promotion

2004-10-30 Thread Sunder
No! You must vote for the Giant Douche!  Or the Terrorists Win!

But won't someone think of the chldren!  If you vote for the Douche, 
the ChllLdren will die!


ROTFL!

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Sat, 30 Oct 2004, R.A. Hettinga wrote:

 At 2:42 PM -0400 10/30/04, Sunder wrote:
 the Turd Sandwich?
 
 Turd Sandwich, of course.
 
 Cheers,
 RAH
 
 -- 
 -
 R. A. Hettinga mailto: [EMAIL PROTECTED]
 The Internet Bearer Underwriting Corporation http://www.ibuc.com/
 44 Farquhar Street, Boston, MA 02131 USA
 ... however it may deserve respect for its usefulness and antiquity,
 [predicting the end of the world] has not been found agreeable to
 experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
 



Re: bin Laden gets a Promotion

2004-10-30 Thread Sunder
As usual, South Park is a great source of wisdom.  So, are you voting for 
the Giant Douche or the Turd Sandwich?

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Re: bin Laden gets a Promotion

2004-10-30 Thread Sunder
No! You must vote for the Giant Douche!  Or the Terrorists Win!

But won't someone think of the chldren!  If you vote for the Douche, 
the ChllLdren will die!


ROTFL!

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Sat, 30 Oct 2004, R.A. Hettinga wrote:

 At 2:42 PM -0400 10/30/04, Sunder wrote:
 the Turd Sandwich?
 
 Turd Sandwich, of course.
 
 Cheers,
 RAH
 
 -- 
 -
 R. A. Hettinga mailto: [EMAIL PROTECTED]
 The Internet Bearer Underwriting Corporation http://www.ibuc.com/
 44 Farquhar Street, Boston, MA 02131 USA
 ... however it may deserve respect for its usefulness and antiquity,
 [predicting the end of the world] has not been found agreeable to
 experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
 



Re: James A. Donald's insanity

2004-10-22 Thread Sunder

Where did I write to you that it's horrible thing to lock people up in
Gitmo, or that we (whomever that is) deserve to be attacked?  Show me
the email, with headers that says such a thing.

Oh, wait, you can't, because I never wrote such.  


Let's see, so you've got lots of people questioning your version of 
various events, and you've got claims that various people wrote things 
that they did not, and lots of people challenging the accuracy and indeed, 
truth of your statements.

Hmmm... So what is the obvious conclusion there?  The whole world must be
against you?  Nah, you're not important enough to be paranoid.  

So, what is the obvious conclusion?  No, no, 2+2 is not 5, even for
extremely large values of 2...  

Come on, come on, out with it, say it, say it...  That's right!  *Ding*
you're reality challenged.


Ah!  There, doesn't that feel better?  Now, please, go back and take your
meds before the nice men in the white coats come to take you to the funny
farm.



--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Thu, 21 Oct 2004, James A. Donald wrote:

 --
 On 21 Oct 2004 at 13:41, Sunder wrote:
  No you imbecile, I'm telling no one anything, other than you 
  to get a clue.  Where did I tell people who are under attack 
  to suck it up?
 
 When you tell us it is horrible to lock up in Gautenamo people 
 who show every sign of trying to kill us , and that we deserve 
 their past efforts to kill us, efforts that some of them 
 promptly resumed on release.  We are under attack, and you are
 telling us to suck it up. 



Re: James A. Donald's insanity

2004-10-22 Thread Sunder

Where did I write to you that it's horrible thing to lock people up in
Gitmo, or that we (whomever that is) deserve to be attacked?  Show me
the email, with headers that says such a thing.

Oh, wait, you can't, because I never wrote such.  


Let's see, so you've got lots of people questioning your version of 
various events, and you've got claims that various people wrote things 
that they did not, and lots of people challenging the accuracy and indeed, 
truth of your statements.

Hmmm... So what is the obvious conclusion there?  The whole world must be
against you?  Nah, you're not important enough to be paranoid.  

So, what is the obvious conclusion?  No, no, 2+2 is not 5, even for
extremely large values of 2...  

Come on, come on, out with it, say it, say it...  That's right!  *Ding*
you're reality challenged.


Ah!  There, doesn't that feel better?  Now, please, go back and take your
meds before the nice men in the white coats come to take you to the funny
farm.



--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Thu, 21 Oct 2004, James A. Donald wrote:

 --
 On 21 Oct 2004 at 13:41, Sunder wrote:
  No you imbecile, I'm telling no one anything, other than you 
  to get a clue.  Where did I tell people who are under attack 
  to suck it up?
 
 When you tell us it is horrible to lock up in Gautenamo people 
 who show every sign of trying to kill us , and that we deserve 
 their past efforts to kill us, efforts that some of them 
 promptly resumed on release.  We are under attack, and you are
 telling us to suck it up. 



Re: Printers betray document secrets

2004-10-21 Thread Sunder
Simple way to test.  Get two printers of the same make and model.  Print 
identical documents on both printers, scan them, diff the scans.  Some 
will be noise, repeat several times, see which noise repeats and you get 
closer and closer to the serial #'s.

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Wed, 20 Oct 2004, Steve Thompson wrote:

 I seem to recall hearing a rumour that suggested that for years now, photocopiers 
 have been leaving their serial number on the copies they produce.  If true, and I am 
 inclined to believe it, it follows naturally that something similar might happen 
 with laser-printers and ink-jet printers.
 
 Ian Grigg [EMAIL PROTECTED] wrote: R.A. Hettinga wrote:
  
 
  US scientists have discovered that every desktop printer has a signature
  style that it invisibly leaves on all the documents it produces.
 
 I don't think this is new - I'm pretty sure it was
 published about 6 or 7 years back as a technique.
 
 iang
 
 
 
 
 
 -
 Post your free ad now! Yahoo! Canada Personals
 



Re: Airport insanity

2004-10-21 Thread Sunder

I made no claims, you did, rather I asked you sarcastically to validate
your claims, after which you further assumed on top of other mistaken
assumptions, that I made claims countering yours, which I did not.

Perhaps you should examine your own words.

IMHO, you are a misguided armchair general who sees yourself as equal to 
those scumbags that have risen in power to lead or enslave nations since 
you seem to constantly say they should have done X, and not Y and are 
constantly seeking to go against with reality with W should be the case, 
not X even though W cannot happen while X does.  Yes, that is my 
unprofessional opinion.  And yet, while impotent to achive your views of 
reality, you insist on sharing it, as if anyone gives a rats ass.

It was entertaining, but it's getting old.


I doubt that it would be long before you'll be sporting a tin foil hat.


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Thu, 21 Oct 2004, James A. Donald wrote:

 --
 On 20 Oct 2004 at 21:27, Sunder wrote:
 
  I repeat:
 
  And you were there and kept an eye on each and every guard, 
  interrogator, and prisoner to make sure that the POW's 
  weren't tortured?
 
 We know torture did not occur, because lots of people have been 
 released who were and are extremely hostile to the US, and who 
 do not claim torture.
 
  And you were there and witnessed the attrocities that said 
  prisoners committed in order to be placed in Gitmo?
 
 Why do you assert that the US must be guilty unless it can be
 proven innocent by extraordinary evidence, but the detainees
 must be innocent unless they can be proven guilty by
 extraordinary evidence?
 
 Doubtless there are some innocents in Gautenamo - but the usual 
 reason they are there is for being foreigners in Afghanistan in 
 the middle of a war with no adequate explanation. 
 
 --digsig
  James A. Donald
  6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
  PwxWpHJKrzapMUAE8Xc1hvpY0CWDO780ZY/6zW7b
  4b9RBklMS97dzSSANw7jVcZlASDxbNnLMhwLptK+Z
 



Re: Airport insanity

2004-10-21 Thread Sunder
No you imbecile, I'm telling no one anything, other than you to get a 
clue.  Where did I tell people who are under attack to suck it up?

All I did was point out that you weren't there and therefore any comment 
you care to make about it is bound to be flawed.

Please find yourself a clue store and open your wallet - wide.

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Thu, 21 Oct 2004, James A. Donald wrote:

 --
 On 21 Oct 2004 at 10:26, Sunder wrote:
  IMHO, you are a misguided armchair general who sees yourself 
  as equal to those scumbags that have risen in power to lead 
  or enslave nations since you seem to constantly say they 
  should have done X, and not Y
 
 When people are under attack, you cannot tell them to suck it 
 up, which is what you are doing.  If we had no government, we 
 might well be doing pogroms against american muslims - and a 
 good thing to.
 
 War causes governments, and causes governments to gain power, 
 but the US government was not the aggressor in this war.   US 
 government meddling in the middle east was unwise and 
 unnecessary, but it did not provoke, nor does it justify, this 
 war.
 
 The intent of a large minority of muslims was to start a holy 
 war between the west and Islam, and the majority of muslims 
 lack the will or courage to stop them, or even criticize them. 
 That was not the intent of Americans, or the American 
 government.  They started it, they meant to start it. Americans
 tried to avoid it, some of them are still trying to avoid it. 
 All Americans are still trying to conduct the war on the
 smallest possible scale, against the smallest possible subset
 of Islam, disagreeing only on how small that subset can be. 
 
 --digsig
  James A. Donald
  6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
  YeXgmiDN23gKNejAXLPSgfGxzFPVqFa/9pEDbWNr
  41sYVdSvXQCEQniQVEIYWhWw2HjtvpvuHtQ0QXUaI
 



Re: Printers betray document secrets

2004-10-21 Thread Sunder
Simple way to test.  Get two printers of the same make and model.  Print 
identical documents on both printers, scan them, diff the scans.  Some 
will be noise, repeat several times, see which noise repeats and you get 
closer and closer to the serial #'s.

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Wed, 20 Oct 2004, Steve Thompson wrote:

 I seem to recall hearing a rumour that suggested that for years now, photocopiers 
 have been leaving their serial number on the copies they produce.  If true, and I am 
 inclined to believe it, it follows naturally that something similar might happen 
 with laser-printers and ink-jet printers.
 
 Ian Grigg [EMAIL PROTECTED] wrote: R.A. Hettinga wrote:
  
 
  US scientists have discovered that every desktop printer has a signature
  style that it invisibly leaves on all the documents it produces.
 
 I don't think this is new - I'm pretty sure it was
 published about 6 or 7 years back as a technique.
 
 iang
 
 
 
 
 
 -
 Post your free ad now! Yahoo! Canada Personals
 



Re: Airport insanity

2004-10-21 Thread Sunder

I made no claims, you did, rather I asked you sarcastically to validate
your claims, after which you further assumed on top of other mistaken
assumptions, that I made claims countering yours, which I did not.

Perhaps you should examine your own words.

IMHO, you are a misguided armchair general who sees yourself as equal to 
those scumbags that have risen in power to lead or enslave nations since 
you seem to constantly say they should have done X, and not Y and are 
constantly seeking to go against with reality with W should be the case, 
not X even though W cannot happen while X does.  Yes, that is my 
unprofessional opinion.  And yet, while impotent to achive your views of 
reality, you insist on sharing it, as if anyone gives a rats ass.

It was entertaining, but it's getting old.


I doubt that it would be long before you'll be sporting a tin foil hat.


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Thu, 21 Oct 2004, James A. Donald wrote:

 --
 On 20 Oct 2004 at 21:27, Sunder wrote:
 
  I repeat:
 
  And you were there and kept an eye on each and every guard, 
  interrogator, and prisoner to make sure that the POW's 
  weren't tortured?
 
 We know torture did not occur, because lots of people have been 
 released who were and are extremely hostile to the US, and who 
 do not claim torture.
 
  And you were there and witnessed the attrocities that said 
  prisoners committed in order to be placed in Gitmo?
 
 Why do you assert that the US must be guilty unless it can be
 proven innocent by extraordinary evidence, but the detainees
 must be innocent unless they can be proven guilty by
 extraordinary evidence?
 
 Doubtless there are some innocents in Gautenamo - but the usual 
 reason they are there is for being foreigners in Afghanistan in 
 the middle of a war with no adequate explanation. 
 
 --digsig
  James A. Donald
  6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
  PwxWpHJKrzapMUAE8Xc1hvpY0CWDO780ZY/6zW7b
  4b9RBklMS97dzSSANw7jVcZlASDxbNnLMhwLptK+Z
 



Re: Airport insanity

2004-10-21 Thread Sunder
No you imbecile, I'm telling no one anything, other than you to get a 
clue.  Where did I tell people who are under attack to suck it up?

All I did was point out that you weren't there and therefore any comment 
you care to make about it is bound to be flawed.

Please find yourself a clue store and open your wallet - wide.

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Thu, 21 Oct 2004, James A. Donald wrote:

 --
 On 21 Oct 2004 at 10:26, Sunder wrote:
  IMHO, you are a misguided armchair general who sees yourself 
  as equal to those scumbags that have risen in power to lead 
  or enslave nations since you seem to constantly say they 
  should have done X, and not Y
 
 When people are under attack, you cannot tell them to suck it 
 up, which is what you are doing.  If we had no government, we 
 might well be doing pogroms against american muslims - and a 
 good thing to.
 
 War causes governments, and causes governments to gain power, 
 but the US government was not the aggressor in this war.   US 
 government meddling in the middle east was unwise and 
 unnecessary, but it did not provoke, nor does it justify, this 
 war.
 
 The intent of a large minority of muslims was to start a holy 
 war between the west and Islam, and the majority of muslims 
 lack the will or courage to stop them, or even criticize them. 
 That was not the intent of Americans, or the American 
 government.  They started it, they meant to start it. Americans
 tried to avoid it, some of them are still trying to avoid it. 
 All Americans are still trying to conduct the war on the
 smallest possible scale, against the smallest possible subset
 of Islam, disagreeing only on how small that subset can be. 
 
 --digsig
  James A. Donald
  6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
  YeXgmiDN23gKNejAXLPSgfGxzFPVqFa/9pEDbWNr
  41sYVdSvXQCEQniQVEIYWhWw2HjtvpvuHtQ0QXUaI
 



Re: Airport insanity

2004-10-20 Thread Sunder


On Tue, 19 Oct 2004, James A. Donald wrote:

 Here is my prescription for winning the war on terrorism
 
 We SHOULD rely on shock and awe, administered by men in white 
 coats far from the scene.

SNIP 

 The US government should expose and condemn these objectionable 
 practices, subvert moderately objectionable regimes, and 
 annihilate more objectionable regimes.  The pentagon should 
 deprive moderately objectionable regimes of economic resources, 
 by stealing their oil, destroying their water systems, and 
 cutting off their trade and population movements with the 
 outside world.
 
 Syria should suffer annihilation, Iran subversion, Sudan some 
 combination of annihilation and subversion, Saudi Arabia and 
 similar less objectionable regimes should suffer confiscation 
 of oil, destruction of water resources, and loss of contact 
 with the outside world. 

I see.  I'm sure that Dubbya has his own agenda filled with Shoulds, as
does Bin Ladin, as did Lenin, as did Hitler, as did Nero, as do you.  
Each saw (or see) their views as the way to Utopia.  Trouble is, which one
of you megalomaniacs is/was right?

Further to the point, reality is, and what clearly should and makes
sense to to you, clearly doesn't to another.  The only difference
between you and the others above is that you lack the power to bend
reality to your whims, and IMHO, that is a very good thing.  It is sad the
the above list contained megalomaniacs who did possess that power and used
it to cause great misery to others, and had to be removed from inflicting
their whims on the world at great expense.  Perhaps in a couple of weeks,
US Citizens will vote one of those out the list as he's already done
plenty of damage in the last four years, and save us another miserable 
four years.

So yes, perhaps, in the fine tradition of what should be instead of what
is, you, sir, should go fuck yourself.



--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-




Re: Airport insanity

2004-10-20 Thread Sunder
Re: Gitmo

And you were there and kept an eye on each and every guard, interrogator, 
and prisoner to make sure that the POW's weren't tortured?

Wow, you are good...  or phrased another way, what brand of crack are you 
smokin' 'cause the rest of us thin it's some really good shit and would 
like to have some too...

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Mon, 18 Oct 2004, James A. Donald wrote:

 I expected them to be KEPT in Guantanamo.
 
 Furthermore, they were not tortured, though they should have
 been. 



Re: Airport insanity

2004-10-20 Thread Sunder
I repeat:

And you were there and kept an eye on each and every guard, interrogator, 
and prisoner to make sure that the POW's weren't tortured?

And I add:

And you were there and witnessed the attrocities that said prisoners 
committed in order to be placed in Gitmo?

No? to both questions?  Then your comment is worthless.

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Wed, 20 Oct 2004, James A. Donald wrote:

 --
 On 20 Oct 2004 at 13:05, Sunder wrote:
  Re: Gitmo
 
  And you were there and kept an eye on each and every guard, 
  interrogator, and prisoner to make sure that the POW's 
  weren't tortured?
 
 Lots of murderous terrorists have been released from Guatanamo, 
 and in the nearly all cases the most serious of their 
 complaints make it sound like a beach resort, except for the 
 fact that they could not leave.
 
 A few have more serious complaints.  Either they are lying or, 
 those who say they were well treated apart from being held 
 captive are lying. It is hard to believe that people like 
 Slimane Hadj Abderrahmane (who after release announced his 
 intention to resume terrorist activities and that he would
 attempt to murder his hosts who lobbied to get him release) are
 lying to cover up torture by the US army.



Re: Airport insanity

2004-10-20 Thread Sunder
I repeat:

And you were there and kept an eye on each and every guard, interrogator, 
and prisoner to make sure that the POW's weren't tortured?

And I add:

And you were there and witnessed the attrocities that said prisoners 
committed in order to be placed in Gitmo?

No? to both questions?  Then your comment is worthless.

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Wed, 20 Oct 2004, James A. Donald wrote:

 --
 On 20 Oct 2004 at 13:05, Sunder wrote:
  Re: Gitmo
 
  And you were there and kept an eye on each and every guard, 
  interrogator, and prisoner to make sure that the POW's 
  weren't tortured?
 
 Lots of murderous terrorists have been released from Guatanamo, 
 and in the nearly all cases the most serious of their 
 complaints make it sound like a beach resort, except for the 
 fact that they could not leave.
 
 A few have more serious complaints.  Either they are lying or, 
 those who say they were well treated apart from being held 
 captive are lying. It is hard to believe that people like 
 Slimane Hadj Abderrahmane (who after release announced his 
 intention to resume terrorist activities and that he would
 attempt to murder his hosts who lobbied to get him release) are
 lying to cover up torture by the US army.



Re: Airport insanity

2004-10-20 Thread Sunder


On Tue, 19 Oct 2004, James A. Donald wrote:

 Here is my prescription for winning the war on terrorism
 
 We SHOULD rely on shock and awe, administered by men in white 
 coats far from the scene.

SNIP 

 The US government should expose and condemn these objectionable 
 practices, subvert moderately objectionable regimes, and 
 annihilate more objectionable regimes.  The pentagon should 
 deprive moderately objectionable regimes of economic resources, 
 by stealing their oil, destroying their water systems, and 
 cutting off their trade and population movements with the 
 outside world.
 
 Syria should suffer annihilation, Iran subversion, Sudan some 
 combination of annihilation and subversion, Saudi Arabia and 
 similar less objectionable regimes should suffer confiscation 
 of oil, destruction of water resources, and loss of contact 
 with the outside world. 

I see.  I'm sure that Dubbya has his own agenda filled with Shoulds, as
does Bin Ladin, as did Lenin, as did Hitler, as did Nero, as do you.  
Each saw (or see) their views as the way to Utopia.  Trouble is, which one
of you megalomaniacs is/was right?

Further to the point, reality is, and what clearly should and makes
sense to to you, clearly doesn't to another.  The only difference
between you and the others above is that you lack the power to bend
reality to your whims, and IMHO, that is a very good thing.  It is sad the
the above list contained megalomaniacs who did possess that power and used
it to cause great misery to others, and had to be removed from inflicting
their whims on the world at great expense.  Perhaps in a couple of weeks,
US Citizens will vote one of those out the list as he's already done
plenty of damage in the last four years, and save us another miserable 
four years.

So yes, perhaps, in the fine tradition of what should be instead of what
is, you, sir, should go fuck yourself.



--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-




Re: Airport insanity

2004-10-20 Thread Sunder
Re: Gitmo

And you were there and kept an eye on each and every guard, interrogator, 
and prisoner to make sure that the POW's weren't tortured?

Wow, you are good...  or phrased another way, what brand of crack are you 
smokin' 'cause the rest of us thin it's some really good shit and would 
like to have some too...

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Mon, 18 Oct 2004, James A. Donald wrote:

 I expected them to be KEPT in Guantanamo.
 
 Furthermore, they were not tortured, though they should have
 been. 



RE: Airport insanity

2004-10-18 Thread Sunder
I think you need to read this remake of the First they came for the 
commies poem.  Short translation - whenever anyone's rights are being 
trampled upon, whether it affects you or not, you should protest.

Goes along with one of the unsaid credos about cypherpunks: I absolutely 
disagree with what she said, but I'll defend to the death her right to say 
it. which along with Cypherpunks write code fell quite short of its 
goal.


http://buffaloreport.com/021123rohde.html

Here I'll save you the trouble.

- - -

They came for the Muslims, and I didn't speak up...

By Stephen Rohde
 
(Author's Note:  The USA Patriot Act became law a little over one year 
ago.)
 
First they came for the Muslims, and I didn't speak up because I wasn't a  
Muslim.
 
Then they came for the immigrants, detaining them indefinitely solely on 
the certification of the attorney general, and I didn't speak up because I  
wasn't an immigrant.
 
Then they came to eavesdrop on suspects consulting with their attorneys, 
and I didn't speak up because I wasn't a suspect.
 
Then they came to prosecute noncitizens before secret military 
commissions, and I didn't speak up because I wasn't a noncitizen.
 
Then they came to enter homes and offices for unannounced sneak and peak  
searches, and I didn't speak up because I had nothing to hide.
 
Then they came to reinstate Cointelpro and resume the infiltration and  
surveillance of domestic religious and political groups, and I didn't 
speak up because I no longer participated in any groups.
 
Then they came to arrest American citizens and hold them indefinitely  
without any charges and without access to lawyers, and I didn't speak up 
because I would never be arrested.
 
Then they came to institute TIPS (Terrorism Information and Prevention  
System) recruiting citizens to spy on other citizens and I didn't speak up 
because I was afraid.
 
Then they came for anyone who objected to government policy because it 
only aided the terrorists and gave ammunition to America's enemies, and I 
didn't  speak up ... because I didn't speak up.
 
Then they came for me, and by that time, no one was left to speak up.

Forum Column (from the Daily Journal, 11/20/02). Stephen Rohde is an 
attorney. He edited American Words of Freedom and was was president of the 
American Civil Liberties Union of Southern California.


Does Rohde's text seem familiar? It should. He based it on one of the 
web's most widely-circulated texts about silence in the face of evil:

In Germany, the Nazis first came for the communists, and I didn't 
speak up because I wasn't a communist. Then they came for the Jews, and I 
didn't speak up because I wasn't a Jew. Then they came for the trade 
unionists, and I didn't speak up because I wasn't a trade unionist. Then 
they came for the Catholics, but I didn't speak up because I was a 
protestant. Then they came for me, and by that time there was no one left 
to speak for me.


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Mon, 18 Oct 2004, James A. Donald wrote:

 I know when it will happen.  It will happen when people 
 interested in anon ecash go on suicide missions.   :-)
 
 People who are, for the most part, not like us are trying to 
 kill people like us. Let us chuck all those people not-like-us 
 off those planes where most of the passengers are people like 
 us.  This really is not rocket science. 



Re: Airport insanity

2004-10-18 Thread Sunder
RTFGoogle?

Google revealed:

http://www.jubilee-newspaper.com/atf_last_operation.htm
http://www.constitution.org/okc/jdt03-01.htm
http://www.geoffmetcalf.com/qa/23076.html
http://www.lpsf.org/LPSF_Newsletters/nl_10_01.html
http://216.239.39.104/search?q=cache:vrlZD0TAzU8J:www.freerepublic.com/forum/a3ac7e1b57dbf.htm+ATF+paged+not+to+come+in+to+work+murrahhl=en
http://www.geocities.com/Heartland/7006/proof-of-coverup.html
http://www.uwsa.com/pipermail/uwsa/2001q2/006627.html

and so on.


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Mon, 18 Oct 2004, Justin wrote:

 On 2004-10-16T22:12:52-0400, Sunder wrote:
  There is still of course the matter of the unexploded bombs in that 
  building that were dug out, and that the ATF received a Don't come in to 
  work page on their beepers, and the seize and classification of all 
  surveilance video tapes from things like ATM's across the street.
 
 Sources?
 
 -- 
 The old must give way to the new, falsehood must become exposed by truth,
 and truth, though fought, always in the end prevails.  -- L. Ron Hubbard 
 



Re: Airport insanity

2004-10-18 Thread Sunder

There is still of course the matter of the unexploded bombs in that 
building that were dug out, and that the ATF received a Don't come in to 
work page on their beepers, and the seize and classification of all 
surveilance video tapes from things like ATM's across the street.


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Sat, 16 Oct 2004, James A. Donald wrote:

 Mc Veigh did not target innocents, and if he did target a plane 
 full of innocents, perhaps in order to kill one guilty man on 
 board, there is no way in hell he himself would be on that 
 plane. 



RE: Airport insanity

2004-10-18 Thread Sunder
I think you need to read this remake of the First they came for the 
commies poem.  Short translation - whenever anyone's rights are being 
trampled upon, whether it affects you or not, you should protest.

Goes along with one of the unsaid credos about cypherpunks: I absolutely 
disagree with what she said, but I'll defend to the death her right to say 
it. which along with Cypherpunks write code fell quite short of its 
goal.


http://buffaloreport.com/021123rohde.html

Here I'll save you the trouble.

- - -

They came for the Muslims, and I didn't speak up...

By Stephen Rohde
 
(Author's Note:  The USA Patriot Act became law a little over one year 
ago.)
 
First they came for the Muslims, and I didn't speak up because I wasn't a  
Muslim.
 
Then they came for the immigrants, detaining them indefinitely solely on 
the certification of the attorney general, and I didn't speak up because I  
wasn't an immigrant.
 
Then they came to eavesdrop on suspects consulting with their attorneys, 
and I didn't speak up because I wasn't a suspect.
 
Then they came to prosecute noncitizens before secret military 
commissions, and I didn't speak up because I wasn't a noncitizen.
 
Then they came to enter homes and offices for unannounced sneak and peak  
searches, and I didn't speak up because I had nothing to hide.
 
Then they came to reinstate Cointelpro and resume the infiltration and  
surveillance of domestic religious and political groups, and I didn't 
speak up because I no longer participated in any groups.
 
Then they came to arrest American citizens and hold them indefinitely  
without any charges and without access to lawyers, and I didn't speak up 
because I would never be arrested.
 
Then they came to institute TIPS (Terrorism Information and Prevention  
System) recruiting citizens to spy on other citizens and I didn't speak up 
because I was afraid.
 
Then they came for anyone who objected to government policy because it 
only aided the terrorists and gave ammunition to America's enemies, and I 
didn't  speak up ... because I didn't speak up.
 
Then they came for me, and by that time, no one was left to speak up.

Forum Column (from the Daily Journal, 11/20/02). Stephen Rohde is an 
attorney. He edited American Words of Freedom and was was president of the 
American Civil Liberties Union of Southern California.


Does Rohde's text seem familiar? It should. He based it on one of the 
web's most widely-circulated texts about silence in the face of evil:

In Germany, the Nazis first came for the communists, and I didn't 
speak up because I wasn't a communist. Then they came for the Jews, and I 
didn't speak up because I wasn't a Jew. Then they came for the trade 
unionists, and I didn't speak up because I wasn't a trade unionist. Then 
they came for the Catholics, but I didn't speak up because I was a 
protestant. Then they came for me, and by that time there was no one left 
to speak for me.


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Mon, 18 Oct 2004, James A. Donald wrote:

 I know when it will happen.  It will happen when people 
 interested in anon ecash go on suicide missions.   :-)
 
 People who are, for the most part, not like us are trying to 
 kill people like us. Let us chuck all those people not-like-us 
 off those planes where most of the passengers are people like 
 us.  This really is not rocket science. 



Re: Airport insanity

2004-10-16 Thread Sunder

There is still of course the matter of the unexploded bombs in that 
building that were dug out, and that the ATF received a Don't come in to 
work page on their beepers, and the seize and classification of all 
surveilance video tapes from things like ATM's across the street.


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Sat, 16 Oct 2004, James A. Donald wrote:

 Mc Veigh did not target innocents, and if he did target a plane 
 full of innocents, perhaps in order to kill one guilty man on 
 board, there is no way in hell he himself would be on that 
 plane. 



Re: Congress Close to Establishing Rules for Driver's Licenses

2004-10-12 Thread Sunder

Right, just because your Passport or driver's license expired, doesn't 
mean that you got any younger and therefore shouldn't drink.

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Tue, 12 Oct 2004, Riad S. Wahby wrote:

 Tangentially, I was once told that, at least in Massachusetts liquor
 stores, even an _expired_ passport was useful identification.  Can
 anyone confirm that this is true other than at Sav-Mor Liquors?



cryptome.org down?

2004-10-12 Thread Sunder
DNS seems to resolve, but never get to the web server.


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Re: Congress Close to Establishing Rules for Driver's Licenses

2004-10-12 Thread Sunder

Right, just because your Passport or driver's license expired, doesn't 
mean that you got any younger and therefore shouldn't drink.

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Tue, 12 Oct 2004, Riad S. Wahby wrote:

 Tangentially, I was once told that, at least in Massachusetts liquor
 stores, even an _expired_ passport was useful identification.  Can
 anyone confirm that this is true other than at Sav-Mor Liquors?



cryptome.org down?

2004-10-12 Thread Sunder
DNS seems to resolve, but never get to the web server.


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Bush wins

2004-10-08 Thread Sunder


http://www.boingboing.net/images/wbay.jpg

http://www.boingboing.net/2004/10/07/tv_station_reports_t.html

Thursday, October 7, 2004
TV station reports that Bush has been elected President
WBAY TV in Green Bay, Wisconsin is running an AP article reporting that 
Bush has won the election, weeks before the election is to take place. 
(Click image for enlargement.

wbayAt this hour, President Bush has won re-election as president by a 
47 percent to 43 percent margin in the popular vote nationwide. Ralph 
Nader has 1 percent of the vote nationwide. That's with 51 percent of the 
precincts reporting

SNIP


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Most Disturbing Yet - Senate Wants Database Dragnet

2004-10-07 Thread Sunder
http://www.wired.com/news/privacy/0,1848,65242,00.html
http://www.wired.com/news/print/0,1294,65242,00.html

Senate Wants Database Dragnet 

By Ryan Singel  

02:00 AM Oct. 06, 2004 PT

The Senate could pass a bill as early as Wednesday evening that would let 
government counter-terrorist investigators instantly query a massive 
system of interconnected commercial and government databases that hold 
billions of records on Americans.

The proposed network is based on the Markle Foundation Task Force's 
December 2003 report, which envisioned a system that would allow FBI and 
CIA agents, as well as police officers and some companies, to quickly 
search intelligence, criminal and commercial databases. The proposal is so 
radical, the bill allocates $50 million just to fund the system's 
specifications and privacy policies. 

SNIP

To prevent abuses of the system, the Markle task force recommended 
anonymized technology, graduated levels of permission-based access and 
automated auditing software constantly hunting for abuses.

{Huh?  How would anonimized access PREVENT abuses?}

An appendix to the report went so far as to suggest that the system should 
identify known associates of the terrorist suspect, within 30 seconds, 
using shared addressees, records of phone calls to and from the suspect's 
phone, e-mails to and from the suspect's accounts, financial transactions, 
travel history and reservations, and common memberships in organizations, 
including (with appropriate safeguards) religious and expressive 
organizations.

SNIP



--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



RFID Driver's licenses for VA

2004-10-07 Thread Sunder
So the cops and RFID h4x0rZ can know your true name from a distance.  and 
since RFID tags, are what, $0.05 each, the terrorists and ID 
counterfitters will be able to make fake ones too... Whee!


http://www.wired.com/news/print/0,1294,65243,00.html

RFID Driver's Licenses Debated 
By Mark Baard

Story location: http://www.wired.com/news/privacy/0,1848,65243,00.html

09:50 AM Oct. 06, 2004 PT

Some federal and state government officials want to make state driver's 
licenses harder to counterfeit or steal, by adding computer chips that 
emit a radio signal bearing a license holder's unique, personal 
information.

In Virginia, where several of the 9/11 hijackers obtained driver's 
licenses, state legislators Wednesday will hear testimony about how radio 
frequency identification, or RFID, tags may prevent identity fraud and 
help thwart terrorists using falsified documents to move about the 
country.

Privacy advocates will argue that the radio tags will also make it easy 
for the government to spy on its citizens and exacerbate identity theft, 
one of the problems the technology is meant to relieve.

SNIP

Because information on RFID tags can be picked up from many feet away, 

SNIP

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Most Disturbing Yet - Senate Wants Database Dragnet

2004-10-07 Thread Sunder
http://www.wired.com/news/privacy/0,1848,65242,00.html
http://www.wired.com/news/print/0,1294,65242,00.html

Senate Wants Database Dragnet 

By Ryan Singel  

02:00 AM Oct. 06, 2004 PT

The Senate could pass a bill as early as Wednesday evening that would let 
government counter-terrorist investigators instantly query a massive 
system of interconnected commercial and government databases that hold 
billions of records on Americans.

The proposed network is based on the Markle Foundation Task Force's 
December 2003 report, which envisioned a system that would allow FBI and 
CIA agents, as well as police officers and some companies, to quickly 
search intelligence, criminal and commercial databases. The proposal is so 
radical, the bill allocates $50 million just to fund the system's 
specifications and privacy policies. 

SNIP

To prevent abuses of the system, the Markle task force recommended 
anonymized technology, graduated levels of permission-based access and 
automated auditing software constantly hunting for abuses.

{Huh?  How would anonimized access PREVENT abuses?}

An appendix to the report went so far as to suggest that the system should 
identify known associates of the terrorist suspect, within 30 seconds, 
using shared addressees, records of phone calls to and from the suspect's 
phone, e-mails to and from the suspect's accounts, financial transactions, 
travel history and reservations, and common memberships in organizations, 
including (with appropriate safeguards) religious and expressive 
organizations.

SNIP



--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Federal program to monitor everyone on the road

2004-10-01 Thread Sunder
http://www.boingboing.net/2004/10/01/federal_program_to_m.html

 Federal program to monitor everyone on the road

Interesting article about the Fed's plans to develop an all-knowing 
intelligent highway system.

Most people have probably never heard of the agency, called the 
Intelligent Transportation Systems Joint Program Office. And they haven't 
heard of its plans to add another dimension to our national road system, 
one that uses tracking and sensor technology to erase the lines between 
cars, the road and the government transportation management centers from 
which every aspect of transportation will be observed and managed.

For 13 years, a powerful group of car manufacturers, technology 
companies and government interests has fought to bring this system to 
life. They envision a future in which massive databases will track the 
comings and goings of everyone who travels by car or mass transit. The 
only way for people to evade the national transportation tracking system 
they're creating will be to travel on foot. Drive your car, and your every 
movement could be recorded and archived. The federal government will know 
the exact route you drove to work, how many times you braked along the 
way, the precise moment you arrived -- and that every other Tuesday you 
opt to ride the bus.


Link to actual story: http://charlotte.creativeloafing.com/news_cover.html

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Federal program to monitor everyone on the road

2004-10-01 Thread Sunder
http://www.boingboing.net/2004/10/01/federal_program_to_m.html

 Federal program to monitor everyone on the road

Interesting article about the Fed's plans to develop an all-knowing 
intelligent highway system.

Most people have probably never heard of the agency, called the 
Intelligent Transportation Systems Joint Program Office. And they haven't 
heard of its plans to add another dimension to our national road system, 
one that uses tracking and sensor technology to erase the lines between 
cars, the road and the government transportation management centers from 
which every aspect of transportation will be observed and managed.

For 13 years, a powerful group of car manufacturers, technology 
companies and government interests has fought to bring this system to 
life. They envision a future in which massive databases will track the 
comings and goings of everyone who travels by car or mass transit. The 
only way for people to evade the national transportation tracking system 
they're creating will be to travel on foot. Drive your car, and your every 
movement could be recorded and archived. The federal government will know 
the exact route you drove to work, how many times you braked along the 
way, the precise moment you arrived -- and that every other Tuesday you 
opt to ride the bus.


Link to actual story: http://charlotte.creativeloafing.com/news_cover.html

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



How to fuck with airports - a 1 step guide for (Redmond) terrorists.

2004-09-28 Thread Sunder
Q: How do you cause an 800-plane pile-up at a major airport?
A: Replace working Unix systems with Microsoft Windows 2000!

Details: http://www.techworld.com/opsys/news/index.cfm?NewsID=2275


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



How to fuck with airports - a 1 step guide for (Redmond) terrorists.

2004-09-28 Thread Sunder
Q: How do you cause an 800-plane pile-up at a major airport?
A: Replace working Unix systems with Microsoft Windows 2000!

Details: http://www.techworld.com/opsys/news/index.cfm?NewsID=2275


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



stegedetect - looks like we need better mice

2004-09-07 Thread Sunder
http://freshmeat.net/projects/stegdetect/?branch_id=52957release_id=172055

http://www.outguess.org/detection.php

Steganography Detection with Stegdetect
Stegdetect is an automated tool for detecting steganographic content in 
images. It is capable of detecting several different steganographic 
methods to embed hidden information in JPEG images. Currently, the 
detectable schemes are

* jsteg,
* jphide (unix and windows),
* invisible secrets,
* outguess 01.3b,
* F5 (header analysis),
* appendX and camouflage.

Stegbreak is used to launch dictionary attacks against JSteg-Shell, JPHide 
and OutGuess 0.13b.

Stegdetect and Stegbreak have been developed by Niels Provos. 


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Re: Maths holy grail could bring disaster for internet

2004-09-07 Thread Sunder
Forgive my ignorance, but would other PK schemes that don't rely on prime
numbers such as Elliptic Curve be affected?

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Tue, 7 Sep 2004, Matt Crawford wrote:

 On Sep 6, 2004, at 21:52, R. A. Hettinga wrote:
 
 This would be a good thing.  Because to rebuild the infrastructure 
 based on symmetric crypto would bring the trusted third party 
 (currently the CA) out of the shadows and into the light.



stegedetect - looks like we need better mice

2004-09-07 Thread Sunder
http://freshmeat.net/projects/stegdetect/?branch_id=52957release_id=172055

http://www.outguess.org/detection.php

Steganography Detection with Stegdetect
Stegdetect is an automated tool for detecting steganographic content in 
images. It is capable of detecting several different steganographic 
methods to embed hidden information in JPEG images. Currently, the 
detectable schemes are

* jsteg,
* jphide (unix and windows),
* invisible secrets,
* outguess 01.3b,
* F5 (header analysis),
* appendX and camouflage.

Stegbreak is used to launch dictionary attacks against JSteg-Shell, JPHide 
and OutGuess 0.13b.

Stegdetect and Stegbreak have been developed by Niels Provos. 


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Re: Maths holy grail could bring disaster for internet

2004-09-07 Thread Sunder
Forgive my ignorance, but would other PK schemes that don't rely on prime
numbers such as Elliptic Curve be affected?

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Tue, 7 Sep 2004, Matt Crawford wrote:

 On Sep 6, 2004, at 21:52, R. A. Hettinga wrote:
 
 This would be a good thing.  Because to rebuild the infrastructure 
 based on symmetric crypto would bring the trusted third party 
 (currently the CA) out of the shadows and into the light.



RE: stegedetect Variola's Suitcase

2004-09-07 Thread Sunder

The answer to that question depends on some leg work which involves 
converting the source code to stegetect into hardware and seeing how fast 
that hardware runs, then multiplying by X where X is how many of the chips 
you can afford to build.

I'd image that it's a lot faster to have some hw that gives you a yea/nay 
on each JPG, than to say, attempt to crack DES.

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Tue, 7 Sep 2004, Tyler Durden wrote:

 So here's the 'obvious' question:
 
 How fast can dedicated hardware run if it were a dedicated Stegedetect 
 processor?
 
 In other words, how easy would it be for NSA, et al to scan 'every' photo on 
 the internet for Stego traces? (And then, every photo being emailed?)
 
 And then, how fast can someone write a worm that will make every photo 
 stored on a harddrive look like it's been stegoed?



Re: The cages on the Hudson, AKA Little Guantanamo (fwd)

2004-09-02 Thread Sunder
Um, don't know what you've been smoking but:

a. there is no we, except individuals with the freedom to chose their
own actions. 

b. cops have guns. 

c. some cops have armor and semi (or full?) automatics along with the
non-lethal weaponry. 

d. non-cops don't and aren't allowed to carry the same weaponry. (Unless
your version of we includes some arsenal and has been watching lots of
A-Team reruns, I doubt that there's not much the cops can't do and mostly
get away with it.)

Yeah, Not totally. Just like Red China isn't a total totalitarian state,
and it allowed the students at Tienamen Sq to demonstrate.  We're not too
far away from that, except these cops don't (yet?) have tanks and as far
as has been reported in the media, haven't murdered anyone in the
protests, and that the arrested have been let out a few days later rather
than tortured.


It's certainly inching towards totalitarianism and away from the right of
the people peaceably to assemble, and to petition the government for a
redress (not, there's nothing in that text about protest pens, open your
bag searches, show me your ID, or protest permits.)


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Wed, 1 Sep 2004, Tyler Durden wrote:

 Not totally. That cop on a scooter rightfully got the crap kicked out of him 
 for mowing down demonstrators.
 
 They can gain local, temporary control but if we take to the streets en 
 masse then there's not much they can do, and they know it.



Re: The cages on the Hudson, AKA Little Guantanamo (fwd)

2004-09-01 Thread Sunder
Wheee!  NYC==Police State for the last week for those of you living under 
rocks...

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

-- Forwarded message --
Date: Wed, 1 Sep 2004 15:26:13 -0400
From: Edward Potter
To: grimmwerks
Cc: wwwac [EMAIL PROTECTED]
Subject: Re: [wwwac] Yes, it's relevent!  The cages on the Hudson,
 AKA Little Guantanamo

He's out.

You can't get near the place today. I tell people what happened and 
they can't believe it. I would not have believed it either, except I 
was there for 11 hours. Then another 15 hours downtown. Excellent first 
hand account here:
http://nyc.indymedia.org/newswire/display/107675/index.php

If I had not been arrested, I would not have known anything like this 
was going on. 1000- 2000 people, in barb-wire cages, at this very 
moment on the Hudson River. No joke. Totally surrounded by police.

ACLU lawyers, Reporters, everyone being denied access. Just starting to 
hit the media.

-ed

On Sep 1, 2004, at 2:57 PM, grimmwerks wrote:

 I read the same thing - and the guy with the bike is STILL there? And 
 held
 on what grounds?   Has any pics surfaced yet?


 On 9/1/04 2:51 PM, Edward Potter [EMAIL PROTECTED] wrote:

 I cross posted this to the Politics list, just getting so little media
 coverage, and yes, I met a few Java Programmers there, plus the guy
 that has the bike that writes messages by WifI got nailed by the 
 police
 too (writing America Home of the Free) ... so I guess hopefully the
 word gets out.
 ---

 Does anyone on this list know there are now up to 2000 people
 imprisoned in barb-wire cages on the Hudson River that don't know what
 their charges are, have not had any rights read to them and are being
 denied any access to any legal representation?

 I was there, it was real. It would blow your mind. YOU HAVE NEVER SEEN
 ANYTHING LIKE IT IN AMERICA BEFORE.

 Or as the police call it:  Little Guantanamo  

 Keep up with the news here:
 http://nyc.indymedia.org






##  The World Wide Web Artists' Consortium  -  http://www.wwwac.org/  ##
##  To Unsubscribe, send email to: [EMAIL PROTECTED]  ##





Re: The cages on the Hudson, AKA Little Guantanamo (fwd)

2004-09-01 Thread Sunder
Um, don't know what you've been smoking but:

a. there is no we, except individuals with the freedom to chose their
own actions. 

b. cops have guns. 

c. some cops have armor and semi (or full?) automatics along with the
non-lethal weaponry. 

d. non-cops don't and aren't allowed to carry the same weaponry. (Unless
your version of we includes some arsenal and has been watching lots of
A-Team reruns, I doubt that there's not much the cops can't do and mostly
get away with it.)

Yeah, Not totally. Just like Red China isn't a total totalitarian state,
and it allowed the students at Tienamen Sq to demonstrate.  We're not too
far away from that, except these cops don't (yet?) have tanks and as far
as has been reported in the media, haven't murdered anyone in the
protests, and that the arrested have been let out a few days later rather
than tortured.


It's certainly inching towards totalitarianism and away from the right of
the people peaceably to assemble, and to petition the government for a
redress (not, there's nothing in that text about protest pens, open your
bag searches, show me your ID, or protest permits.)


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Wed, 1 Sep 2004, Tyler Durden wrote:

 Not totally. That cop on a scooter rightfully got the crap kicked out of him 
 for mowing down demonstrators.
 
 They can gain local, temporary control but if we take to the streets en 
 masse then there's not much they can do, and they know it.



Re: The cages on the Hudson, AKA Little Guantanamo (fwd)

2004-09-01 Thread Sunder
Wheee!  NYC==Police State for the last week for those of you living under 
rocks...

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

-- Forwarded message --
Date: Wed, 1 Sep 2004 15:26:13 -0400
From: Edward Potter
To: grimmwerks
Cc: wwwac [EMAIL PROTECTED]
Subject: Re: [wwwac] Yes, it's relevent!  The cages on the Hudson,
 AKA Little Guantanamo

He's out.

You can't get near the place today. I tell people what happened and 
they can't believe it. I would not have believed it either, except I 
was there for 11 hours. Then another 15 hours downtown. Excellent first 
hand account here:
http://nyc.indymedia.org/newswire/display/107675/index.php

If I had not been arrested, I would not have known anything like this 
was going on. 1000- 2000 people, in barb-wire cages, at this very 
moment on the Hudson River. No joke. Totally surrounded by police.

ACLU lawyers, Reporters, everyone being denied access. Just starting to 
hit the media.

-ed

On Sep 1, 2004, at 2:57 PM, grimmwerks wrote:

 I read the same thing - and the guy with the bike is STILL there? And 
 held
 on what grounds?   Has any pics surfaced yet?


 On 9/1/04 2:51 PM, Edward Potter [EMAIL PROTECTED] wrote:

 I cross posted this to the Politics list, just getting so little media
 coverage, and yes, I met a few Java Programmers there, plus the guy
 that has the bike that writes messages by WifI got nailed by the 
 police
 too (writing America Home of the Free) ... so I guess hopefully the
 word gets out.
 ---

 Does anyone on this list know there are now up to 2000 people
 imprisoned in barb-wire cages on the Hudson River that don't know what
 their charges are, have not had any rights read to them and are being
 denied any access to any legal representation?

 I was there, it was real. It would blow your mind. YOU HAVE NEVER SEEN
 ANYTHING LIKE IT IN AMERICA BEFORE.

 Or as the police call it:  Little Guantanamo  

 Keep up with the news here:
 http://nyc.indymedia.org






##  The World Wide Web Artists' Consortium  -  http://www.wwwac.org/  ##
##  To Unsubscribe, send email to: [EMAIL PROTECTED]  ##





Backdoor found in Diebold Voting Tabulators

2004-08-31 Thread Sunder
Oops! Is that a cat exiting the bag?


http://www.blackboxvoting.org/?q=node/view/78


Issue: Manipulation technique found in the Diebold central tabulator -- 
1,000 of these systems are in place, and they count up to two million 
votes at a time.

By entering a 2-digit code in a hidden location, a second set of votes is 
created. This set of votes can be changed, so that it no longer matches 
the correct votes. The voting system will then read the totals from the 
bogus vote set. It takes only seconds to change the votes, and to date not 
a single location in the U.S. has implemented security measures to fully 
mitigate the risks. 

SNIP


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Re: Backdoor found in Diebold Voting Tabulators

2004-08-31 Thread Sunder
 allotted. 
Though the demonstration takes only 3 minutes, the panel refused to allow 
it and would not look. They did, however, meet privately with Diebold 
afterwards, without informing the public or issuing any report of what 
transpired.

On Aug. 18, 2004, Harris and Stephenson, together with computer security 
expert Dr. Hugh Thompson, and former King County Elections Supervisor 
Julie Anne Kempf, met with members of the California Voting Systems Panel 
and the California Secretary of State's office to demonstrate the double 
set of books. The officials declined to allow a camera crew from 60 
Minutes to film or attend.

The Secretary of State's office halted the meeting, called in the general 
counsel for their office, and a defense attorney from the California 
Attorney General's office. They refused to allow Black Box Voting to 
videotape its own demonstration. They prohibited any audiotape and 
specified that no notes of the meeting could be requested in public 
records requests.

The undersecretary of state, Mark Kyle, left the meeting early, and one 
voting panel member, John Mott Smith, appeared to sleep through the 
presentation.

On Aug. 23, 2004, CBC TV came to California and filmed the demonstration.

On Aug 30 and 31, Harris and Stephenson will be in New York City to 
demonstrate the double set of books for any public official and any TV 
crews who wish to see it.

On Sept. 1, another event is planned in New York City, and on Sept. 21, 
Harris and Stephenson intend to demonstrate the problem for members and 
congress and the press in Washington D.C.

Diebold has known of the problem, or should have known, because it did a 
cease and desist on the web site when Harris originally reported the 
problem in 2003. On Aug. 11, 2004, Harris also offered to show the problem 
to Marvin Singleton, Diebold's damage control expert, and to other Diebold 
execs. They refused to look.

Why don't people want to look? Suppose you are formally informed that the 
gas tank tends to explode on the car you are telling people to use. If you 
KNOW about it, but do nothing, you are liable.

LET US HOLD DIEBOLD, AND OUR PUBLIC OFFICIALS, ACCOUNTABLE.

1) Let there be no one who can say I didn't know.

2) Let there be no election jurisdiction using GEMS that fails to 
implement all of the proper corrective procedures, this fall, to mitigate 
risk. 


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Tue, 31 Aug 2004 [EMAIL PROTECTED] wrote:

 Quoting Eric Murray [EMAIL PROTECTED]:
 
  On Tue, Aug 31, 2004 at 11:30:35AM -0400, Sunder wrote:
   Oops! Is that a cat exiting the bag?
   
   
   http://www.blackboxvoting.org/?q=node/view/78
  
  
  Apparently so.  Going to www.blackboxvoting.org now just gives:
 
 Don't break out the tinfoil hats yet. Maybe they exceeded their
 bandwidth because that link was spread around.
 



Re: Backdoor found in Diebold Voting Tabulators

2004-08-31 Thread Sunder
 allotted. 
Though the demonstration takes only 3 minutes, the panel refused to allow 
it and would not look. They did, however, meet privately with Diebold 
afterwards, without informing the public or issuing any report of what 
transpired.

On Aug. 18, 2004, Harris and Stephenson, together with computer security 
expert Dr. Hugh Thompson, and former King County Elections Supervisor 
Julie Anne Kempf, met with members of the California Voting Systems Panel 
and the California Secretary of State's office to demonstrate the double 
set of books. The officials declined to allow a camera crew from 60 
Minutes to film or attend.

The Secretary of State's office halted the meeting, called in the general 
counsel for their office, and a defense attorney from the California 
Attorney General's office. They refused to allow Black Box Voting to 
videotape its own demonstration. They prohibited any audiotape and 
specified that no notes of the meeting could be requested in public 
records requests.

The undersecretary of state, Mark Kyle, left the meeting early, and one 
voting panel member, John Mott Smith, appeared to sleep through the 
presentation.

On Aug. 23, 2004, CBC TV came to California and filmed the demonstration.

On Aug 30 and 31, Harris and Stephenson will be in New York City to 
demonstrate the double set of books for any public official and any TV 
crews who wish to see it.

On Sept. 1, another event is planned in New York City, and on Sept. 21, 
Harris and Stephenson intend to demonstrate the problem for members and 
congress and the press in Washington D.C.

Diebold has known of the problem, or should have known, because it did a 
cease and desist on the web site when Harris originally reported the 
problem in 2003. On Aug. 11, 2004, Harris also offered to show the problem 
to Marvin Singleton, Diebold's damage control expert, and to other Diebold 
execs. They refused to look.

Why don't people want to look? Suppose you are formally informed that the 
gas tank tends to explode on the car you are telling people to use. If you 
KNOW about it, but do nothing, you are liable.

LET US HOLD DIEBOLD, AND OUR PUBLIC OFFICIALS, ACCOUNTABLE.

1) Let there be no one who can say I didn't know.

2) Let there be no election jurisdiction using GEMS that fails to 
implement all of the proper corrective procedures, this fall, to mitigate 
risk. 


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Tue, 31 Aug 2004 [EMAIL PROTECTED] wrote:

 Quoting Eric Murray [EMAIL PROTECTED]:
 
  On Tue, Aug 31, 2004 at 11:30:35AM -0400, Sunder wrote:
   Oops! Is that a cat exiting the bag?
   
   
   http://www.blackboxvoting.org/?q=node/view/78
  
  
  Apparently so.  Going to www.blackboxvoting.org now just gives:
 
 Don't break out the tinfoil hats yet. Maybe they exceeded their
 bandwidth because that link was spread around.
 



Re: JYA in NYT

2004-08-29 Thread Sunder

Let's dissect this mother.

On Sun, 29 Aug 2004, Nomen Nescio wrote:

 http://nytimes.com/2004/08/29/nyregion/29pipeline.html
 
 August 29, 2004
 Mapping Natural Gas Lines: Advise the Public, Tip Off the Terrorists
 By IAN URBINA
 
 John Young says he is an agent for change, hoping to point out places
 where the government needs to bolster national security. Since 1996,
 he has been posting documents on his Web site, ranging from detailed
 maps of nuclear storage facilities in New Mexico to aerial
 photographs of police preparations for the Republican National
 Convention. He has never attracted much attention from the
 authorities, and what he does is fully legal.

So where's the beef then?
 
 But last month, Mr. Young, a 68-year-old architect originally from
 Odessa, Tex., began publishing maps and pictures of natural gas
 pipelines in New York City on his site (www.cryptome.org). One
 photograph was of a large sign in Midtown Manhattan warning about the
 presence of a major gas main, a sign that had been meant to prevent
 deadly accidents. Within a week, the company that owns the pipeline
 took the sign down.

Yeah, those were pictures taken from public locations, I'd assume, right?  
No different than taking a picture of the Statue of Liberty or of the 
moon.
 
 They posted the signs because they thought someone might
 accidentally blow the pipeline up,'' Mr. Young said. Now, they're
 taking them down because they think someone might intentionally blow
 it up.''

Sounds like a lose lose situation to me.
 
 For Mr. Young - and for a range of experts across the country - the
 strange and unnoticed little episode in Manhattan underscores one of
 the great tensions of the post-9/11 world: how to balance the desire
 for secrecy with decisions on what is best for public safety.

So there, you go, Mr. Young has become an expert.  What's the problem?
 
 Few issues highlight that tension better than the topic of natural
 gas.

Or perhaps flatulence?

 Private industry and local governments have spent much of the last
 several decades trying to make natural gas pipelines safer by
 publicizing where they are. Natural gas, highly explosive and
 transported in pipes underneath unknowing residents or uncharted
 along waterways, has been the cause of scores of lethal accidents -
 fiery explosions caused by misdirected backhoes or wayward boat
 anchors.

There you go.  They've made their bed, now they can't complain when 
someone points at it and says Uh, look at that!
 
 But recent concerns have pushed in the opposite direction.
 Increasingly, gas companies have been clearing their Web sites of
 pipeline maps previously used by contractors before excavating.
 Almost all nautical charts once indicated where gas pipes run. Fewer
 do now.

So, we're back to someone accidentally dropping anchor in the wrong place 
and boom...  can't have it both ways boys.
 
 Federal regulations require companies to make these lines as obvious
 as possible and educate the public about where they are,'' said Kelly

So John was simply helping the companies follow Federal Regulations.

 Swan, a spokesman for Williams, the company that owns the pipe
 supplying Manhattan. But local laws indicate that we were allowed to
 get rid of that particular sign, and after the recent publicity about
 it, we did.''

Oops, too much publicity, couldn't handle the spin control.

...

 
 Natural gas arrives in New York City through six so-called city
 gates, reached after traveling thousands of miles in pipes running
 from deposits deep beneath southeastern Texas and Sable Island, off
 the east coast of Nova Scotia. Here it enters a local grid of smaller
 pipes owned by Consolidated Edison in Manhattan, the Bronx and
 portions of Queens, and owned by Keyspan in the rest of the city. The
 gas is used for heating, cooking, and increasingly for fuel in city
 power plants.

And now the author of this article is feeding the terrorists vital intel - 
or following Federal regulations?  
 
 But natural gas is also at risk of sabotage.

So is water, so is air, so is everything.  Hell, if the CIA thought they 
could implant a transmitter in a cat and set the cat loose in a park where 
Soviets, Commies, and Spies (Oh My!) might talk, what's to stop the 
terrorists from doing the same style of thing?

 
 This tactic actually comes from our own playbook,'' said Thomas C.
 Reed, the former secretary of the Air Force under President Gerald R.
 Ford and the author of At the Abyss: An Insider's History of the
 Cold War.'' In 1982, the C.I.A. hacked into the software that
 controlled Soviet natural gas pipelines, causing vital pumps,
 turbines and valves to go haywire, he explained. The result, Mr. Reed
 said, was the largest nonnuclear explosion and fire ever seen from
 space and a major blow to Soviet sales of natural gas to Western
 Europe.
 
 The tactic was a stroke of genius,'' he said.

Sure, why didn't he also say that flying 747's into high buildings were a 
stroke 

Wired: Attacking the 4th Estate

2004-08-25 Thread Sunder

http://www.wired.com/news/politics/0,1283,64680,00.html?tw=wn_tophead_6

or, the HTML crap free version:

http://www.wired.com/news/print/0,1294,64680,00.html



Attacking the Fourth Estate 

By Adam L. Penenberg  |   Also by this reporter Page 1 of 2 next 

02:00 AM Aug. 25, 2004 PT

John Ashcroft and the Department of Justice must be stopped.

There, I've said it. Of course, now I half expect federal agents to drag 
me off to prison for violating the No One Dare Question the Government 
While We Are Engaged in the War Against Terror Act. (Duration: perhaps 
forever.) 

Sure, you say, no such act exists. But Ashcroft himself once testified 
that bellyaching over what he called phantoms of lost liberty only 
serves to aid terrorists and give ammunition to America's enemies. And 
recently FBI agents attempted to intimidate political activists by 
visiting them at their homes to warn about causing trouble at the upcoming 
Republican convention.

More to the point, under Justice Department guidelines, Ashcroft must 
approve any subpoena of a journalist, so how do you explain the rash of 
subpoenas that Special Prosecutor Patrick J. Fitzgerald, the U.S. attorney 
from Chicago, has doled out to Time magazine, The New York Times, The 
Washington Post and NBC? Already one reporter -- Matthew Cooper from Time 
-- has been held in contempt by a federal judge for refusing to appear 
before the grand jury that Fitzgerald convened to investigate which Bush 
administration senior official(s) leaked a covert spy's identity to 
columnist Robert Novak. 

SNIP


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



RE: Another John Young Sighting

2004-08-25 Thread Sunder
All Hail Cthulhu!  Why worship the lesser evil?  
Vote for Cthulhu!   Why vote for the lesser evil?


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Wed, 25 Aug 2004, kawaii ryuko wrote:

  Hail Eris.
  
 
 All hail Discordia!



Reason on Gilmore VS Ashcroft

2004-08-25 Thread Sunder
http://www.reason.com/links/links082404.shtml


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Re: Digital camera fingerprinting...

2004-08-25 Thread Sunder

Yes, your holiness, but how much of that will survive jpeg compression,
photshop (or GIMP) cleanups, and shrinking down to lower resolutions, and 
insertion of stego?

Or what about those disposable digital cameras that are hackable?  
Perhaps there should be a cypherpunks pool to swap disposable digital 
cameras?

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Wed, 25 Aug 2004, Major Variola (ret) wrote:

 Very relevant, traffic analysis and fingerprinting (intentional or not)
 are
 always tasty subjects.  One question for the court would be, how many
 *other* cameras have column 67 disabled?   One of every thousand?
 And how many thousand cameras were sold?
 
 Pope Major Variola (ret)



Wired: Attacking the 4th Estate

2004-08-25 Thread Sunder

http://www.wired.com/news/politics/0,1283,64680,00.html?tw=wn_tophead_6

or, the HTML crap free version:

http://www.wired.com/news/print/0,1294,64680,00.html



Attacking the Fourth Estate 

By Adam L. Penenberg  |   Also by this reporter Page 1 of 2 next 

02:00 AM Aug. 25, 2004 PT

John Ashcroft and the Department of Justice must be stopped.

There, I've said it. Of course, now I half expect federal agents to drag 
me off to prison for violating the No One Dare Question the Government 
While We Are Engaged in the War Against Terror Act. (Duration: perhaps 
forever.) 

Sure, you say, no such act exists. But Ashcroft himself once testified 
that bellyaching over what he called phantoms of lost liberty only 
serves to aid terrorists and give ammunition to America's enemies. And 
recently FBI agents attempted to intimidate political activists by 
visiting them at their homes to warn about causing trouble at the upcoming 
Republican convention.

More to the point, under Justice Department guidelines, Ashcroft must 
approve any subpoena of a journalist, so how do you explain the rash of 
subpoenas that Special Prosecutor Patrick J. Fitzgerald, the U.S. attorney 
from Chicago, has doled out to Time magazine, The New York Times, The 
Washington Post and NBC? Already one reporter -- Matthew Cooper from Time 
-- has been held in contempt by a federal judge for refusing to appear 
before the grand jury that Fitzgerald convened to investigate which Bush 
administration senior official(s) leaked a covert spy's identity to 
columnist Robert Novak. 

SNIP


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



RE: Another John Young Sighting

2004-08-25 Thread Sunder
All Hail Cthulhu!  Why worship the lesser evil?  
Vote for Cthulhu!   Why vote for the lesser evil?


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Wed, 25 Aug 2004, kawaii ryuko wrote:

  Hail Eris.
  
 
 All hail Discordia!



Reason on Gilmore VS Ashcroft

2004-08-25 Thread Sunder
http://www.reason.com/links/links082404.shtml


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Re: Digital camera fingerprinting...

2004-08-25 Thread Sunder

Yes, your holiness, but how much of that will survive jpeg compression,
photshop (or GIMP) cleanups, and shrinking down to lower resolutions, and 
insertion of stego?

Or what about those disposable digital cameras that are hackable?  
Perhaps there should be a cypherpunks pool to swap disposable digital 
cameras?

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Wed, 25 Aug 2004, Major Variola (ret) wrote:

 Very relevant, traffic analysis and fingerprinting (intentional or not)
 are
 always tasty subjects.  One question for the court would be, how many
 *other* cameras have column 67 disabled?   One of every thousand?
 And how many thousand cameras were sold?
 
 Pope Major Variola (ret)



T. Kennedy == Terrorist says TSA

2004-08-20 Thread Sunder
http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2004/08/20/MNGQ28BM1O1.DTL

Washington -- Sen. Edward Ted Kennedy said Thursday that he was stopped 
and questioned at airports on the East Coast five times in March because 
his name appeared on the government's secret no-fly list.

SNIP

That a clerical error could lend one of the most powerful people in 
Washington to the list -- it makes one wonder just how many others who are 
not terrorists are on the list, said Reggie Shuford, a senior ACLU 
counsel. Someone of Sen. Kennedy's stature can simply call a friend to 
have his name removed, but a regular American citizen does not have that 
ability. He had to call three times himself.

SNIP

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



T. Kennedy == Terrorist says TSA

2004-08-20 Thread Sunder
http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2004/08/20/MNGQ28BM1O1.DTL

Washington -- Sen. Edward Ted Kennedy said Thursday that he was stopped 
and questioned at airports on the East Coast five times in March because 
his name appeared on the government's secret no-fly list.

SNIP

That a clerical error could lend one of the most powerful people in 
Washington to the list -- it makes one wonder just how many others who are 
not terrorists are on the list, said Reggie Shuford, a senior ACLU 
counsel. Someone of Sen. Kennedy's stature can simply call a friend to 
have his name removed, but a regular American citizen does not have that 
ability. He had to call three times himself.

SNIP

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Excerpts from Rudy Rucker's new Book

2004-08-19 Thread Sunder
From Rudy Rucker's new book: The Lifebox, the Seashell and the Soul.

(The interesting bits to which Tim fantasizes to.)


As seen on:

http://www.boingboing.net/text/guestbar.html

SNIP

Rant at Start of Chapter on Society

I write this book during a dark time. America.s government is in the hands 
of criminals and morons.

I.d like to break through to a radically different way of talking about 
society, to throw a bucket of ice-water in the face of the sleep-walking 
sheep who think that history is about presidents and kings.

A baby filling a diaper is infinitely more significant than a congress 
placing a movement on the floor.

SNIP


Twin Towers

Facts: The twin towers fell. The terrorists were Saudis. Bush invaded 
Iraq.

.Ah,. someone might say, .if nobody wanted to fight, we.d be invaded. Look 
at the twin towers. The world.s not safe... And I would submit that the 
administration.s reaction to the twin towers was exactly the wrong one. 
Instead of jumping into the repetitive tit-for-tat class two 
Israelis-versus-Palestinians mode, the government should have gone class 
four. What would make men kill themselves while destroying a part of our 
lovely New York City? What system produced them? Isn.t there a way to get 
in and jolt it in some totally unexpected way, something more original 
than rocket fire vs. car bombs?

Emigration

Before virtually every American presidential election, I.ve heard people 
say, .If so and so wins, I.m leaving the country.. But they never do. The 
only time my friends eve remigrated was during the Viet Nam war, a time 
when the hive mind was undertaking the wholesale slaughter of a 
generation. But most of the time, for most of us, things aren.t bad enough 
to make emigration seem reasonable.

If the election is stolen again in Fall, 2004, the answer could be armed 
revolution, not emigration. If the Bush faction tries to retain power, a 
significant number of people may feel compelled to go to D.C. and fight in 
the streets until the tyrant is deposed. However long it takes, however 
dearly it costs. Would it be worth it?

Hopefully he'll lose the election by too great a margin to fudge. But for 
that to happen, we have to vote. The popular vote margin matters, if not 
in the electoral college, then in the hearts and minds of our oppressed 
populace. If the margin were big enough, the house of cards could 
collapse.

SNIP

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Excerpts from Rudy Rucker's new Book

2004-08-19 Thread Sunder
From Rudy Rucker's new book: The Lifebox, the Seashell and the Soul.

(The interesting bits to which Tim fantasizes to.)


As seen on:

http://www.boingboing.net/text/guestbar.html

SNIP

Rant at Start of Chapter on Society

I write this book during a dark time. America.s government is in the hands 
of criminals and morons.

I.d like to break through to a radically different way of talking about 
society, to throw a bucket of ice-water in the face of the sleep-walking 
sheep who think that history is about presidents and kings.

A baby filling a diaper is infinitely more significant than a congress 
placing a movement on the floor.

SNIP


Twin Towers

Facts: The twin towers fell. The terrorists were Saudis. Bush invaded 
Iraq.

.Ah,. someone might say, .if nobody wanted to fight, we.d be invaded. Look 
at the twin towers. The world.s not safe... And I would submit that the 
administration.s reaction to the twin towers was exactly the wrong one. 
Instead of jumping into the repetitive tit-for-tat class two 
Israelis-versus-Palestinians mode, the government should have gone class 
four. What would make men kill themselves while destroying a part of our 
lovely New York City? What system produced them? Isn.t there a way to get 
in and jolt it in some totally unexpected way, something more original 
than rocket fire vs. car bombs?

Emigration

Before virtually every American presidential election, I.ve heard people 
say, .If so and so wins, I.m leaving the country.. But they never do. The 
only time my friends eve remigrated was during the Viet Nam war, a time 
when the hive mind was undertaking the wholesale slaughter of a 
generation. But most of the time, for most of us, things aren.t bad enough 
to make emigration seem reasonable.

If the election is stolen again in Fall, 2004, the answer could be armed 
revolution, not emigration. If the Bush faction tries to retain power, a 
significant number of people may feel compelled to go to D.C. and fight in 
the streets until the tyrant is deposed. However long it takes, however 
dearly it costs. Would it be worth it?

Hopefully he'll lose the election by too great a margin to fudge. But for 
that to happen, we have to vote. The popular vote margin matters, if not 
in the electoral college, then in the hearts and minds of our oppressed 
populace. If the margin were big enough, the house of cards could 
collapse.

SNIP

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Gilmore VS Ashcroft opens today

2004-08-16 Thread Sunder
http://www.papersplease.org/gilmore/

In this corner we have John Gilmore. He's a 49 year-old philanthropist who 
lives in San Francisco, California. Through a lot of hard work (and a 
little luck), John made his fortune as a programmer and entrepreneur in 
the software industry. Whereas most people in his position would have 
moved to a tropical island and lived a life of luxury, John chose to use 
his fortune to protect and defend the US Constitution. 

He's challenging the unconstitutionally evil stench of the Asscruftinator!

Who will win?  Place your bets, place your bets, the courtroom showdown
begins today:

http://www.boingboing.net/2004/08/16/john_gilmore_vs_ashc.html

Ding!



--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Gilmore VS Ashcroft opens today

2004-08-16 Thread Sunder
http://www.papersplease.org/gilmore/

In this corner we have John Gilmore. He's a 49 year-old philanthropist who 
lives in San Francisco, California. Through a lot of hard work (and a 
little luck), John made his fortune as a programmer and entrepreneur in 
the software industry. Whereas most people in his position would have 
moved to a tropical island and lived a life of luxury, John chose to use 
his fortune to protect and defend the US Constitution. 

He's challenging the unconstitutionally evil stench of the Asscruftinator!

Who will win?  Place your bets, place your bets, the courtroom showdown
begins today:

http://www.boingboing.net/2004/08/16/john_gilmore_vs_ashc.html

Ding!



--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Sunder
On Fri, 13 Aug 2004, Morlock Elloi wrote:

 The purpose would be that they do not figure out that you are using some
 security program, so they don't suspect that noise in the file or look for
 stego, right?
 
 The last time I checked the total number of PDA programs ever offered to public
 in some way was around 10,000 (5,000 ? 100,000 ? Same thing.) That can be
 trivially checked for. Any custom-compiled executable will stand out as a sore
 thumb.

How? Not if you get something like a Sharp Zaurus and compile your own
environment.  Hey, I want to get as much performance out of this shitty
little ARM chip as I can.

 You will suffer considerably less bodily damage inducing you to spit the
 passphrase than to produce the source and the complier.

What makes you think they'll have enough of a clue as to how to read the 
files off your PDA without booting it in the first place?  99% of these 
dorks use very expensive automated hardware tools that do nothing more 
than dd your data to their device, then run a scanner on it which looks 
for well known jpg's of kiddie porn.  

If you're suspected of something really big, or you're middle eastern,
then you need to worry about PDA forensics.  Otherwise, you're just
another geek with a case of megalomania thinking you're important enough 
for the FedZ to give a shit about you.
 
 Just use the fucking PGP. It's good for your genitals.

And PGP won't stand out because ?


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Sunder
On Fri, 13 Aug 2004, Morlock Elloi wrote:

 The purpose would be that they do not figure out that you are using some
 security program, so they don't suspect that noise in the file or look for
 stego, right?
 
 The last time I checked the total number of PDA programs ever offered to public
 in some way was around 10,000 (5,000 ? 100,000 ? Same thing.) That can be
 trivially checked for. Any custom-compiled executable will stand out as a sore
 thumb.

How? Not if you get something like a Sharp Zaurus and compile your own
environment.  Hey, I want to get as much performance out of this shitty
little ARM chip as I can.

 You will suffer considerably less bodily damage inducing you to spit the
 passphrase than to produce the source and the complier.

What makes you think they'll have enough of a clue as to how to read the 
files off your PDA without booting it in the first place?  99% of these 
dorks use very expensive automated hardware tools that do nothing more 
than dd your data to their device, then run a scanner on it which looks 
for well known jpg's of kiddie porn.  

If you're suspected of something really big, or you're middle eastern,
then you need to worry about PDA forensics.  Otherwise, you're just
another geek with a case of megalomania thinking you're important enough 
for the FedZ to give a shit about you.
 
 Just use the fucking PGP. It's good for your genitals.

And PGP won't stand out because ?


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Sunder
Right, in which case GPG (or any other decent crypto system) is just fine,
or you wouldn't be looking for stego'ing it inside of binaries in the
first place.

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Fri, 13 Aug 2004, Thomas Shaddack wrote:

 In the world of industrial espionage and divorce lawyers, the FedZ aren't 
 the only threat model.



Re: A Billion for Bin Laden

2004-08-12 Thread Sunder
Yeah, about as brilliant as a turd.  Didn't they recently call Al-Qaeda's 
network a hydra?  correct me if I don't recall my Ancient Greek myths, but 
when you cut off one head on the hydra, two more grow back, so are we to 
assume that future heads that grow back will carry such bounties?

A billion here, a billion there, and pretty soon you're talking real 
money.

I guess they do realize that these guys are idologists and the allmighty 
dollar is anathema to them, so they have to raise the bounty in order to 
get someone to betray him...   Never discount greed, no matter how 
ideological someone may be, at some ridiculous sum, someone somewhere will 
rat him out... perhaps just before the elections.

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Wed, 11 Aug 2004, Major Variola (ret) wrote:

 This is brilliant, worthy of being called channelling Tim M.  As it
 relies entirely on free association and the rational marketplace.
 Nevermind
 that the reward is stolen from the sheeple.
 
 What the DC future-corpses don't grok is that the Sheik's network
 is not financially or career motivated, unlike themselves.
 And xianity (or even amerikan patriotism which sometimes
 substitutes) is too neutered to counter it.



Re: A Billion for Bin Laden

2004-08-12 Thread Sunder
Yeah, about as brilliant as a turd.  Didn't they recently call Al-Qaeda's 
network a hydra?  correct me if I don't recall my Ancient Greek myths, but 
when you cut off one head on the hydra, two more grow back, so are we to 
assume that future heads that grow back will carry such bounties?

A billion here, a billion there, and pretty soon you're talking real 
money.

I guess they do realize that these guys are idologists and the allmighty 
dollar is anathema to them, so they have to raise the bounty in order to 
get someone to betray him...   Never discount greed, no matter how 
ideological someone may be, at some ridiculous sum, someone somewhere will 
rat him out... perhaps just before the elections.

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Wed, 11 Aug 2004, Major Variola (ret) wrote:

 This is brilliant, worthy of being called channelling Tim M.  As it
 relies entirely on free association and the rational marketplace.
 Nevermind
 that the reward is stolen from the sheeple.
 
 What the DC future-corpses don't grok is that the Sheik's network
 is not financially or career motivated, unlike themselves.
 And xianity (or even amerikan patriotism which sometimes
 substitutes) is too neutered to counter it.



2+2=5 and mention of cryptome

2004-08-12 Thread Sunder

Original URL: 
http://www.theregister.co.uk/2004/08/11/al_q_geek_us_overthrow_plot/

Al-Qaeda computer geek nearly overthrew US
By Thomas C Greene (thomas.greene at theregister.co.uk)
Published Wednesday 11th August 2004 16:45 GMT

Update A White House with a clear determination to draw paranoid 
conclusions from ambiguous data has finally gone over the top. It has now 
implied that the al-Qaeda computer geek arrested last month in Pakistan 
was involved in a plot to destabilize the USA around election time.

Two and two is five

As we reported here 
(http://www.theregister.co.uk/2004/08/03/us_terror_alert_political_football) 
and here 
(http://www.theregister.co.uk/2004/08/02/al_qaeda_cyber_terror_panic), 
so-called al-Qaeda computer expert Muhammad Naeem Noor Khan, a 
Pakistani, was arrested on 13 July in possession of detailed but rather 
old surveillance documents related to major financial institutions in New 
York, Newark, and Washington.

Since that time, other intelligence has led the US security apparatus to 
imagine that a plot to attack the USA might be in the works. (No doubt 
there are scores of plots in the works, but we digress.) Therefore, last 
week, the ever-paranoid Bush Administration decided that Khan's building 
surveillance documents, and the hints of imminent danger, had to be 
connected. Indeed, if al Qaeda is to strike at all, it is most likely to 
strike the targets mentioned in Khan's documents, as opposed to thousands 
of others, the Bushies reasoned.

New York, Newark and Washington were immediately put on high alert, at 
great expense, and to the inconvenience of millions of residents.

SNIP

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Re: maybe he would cash himself in? (Re: A Billion for Bin Laden)

2004-08-12 Thread Sunder

Nah, if Bush already had him in a hole somewhere to produce him just in 
time for the elections, he'd collect the billion for himself as his 
personal reward.

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Thu, 12 Aug 2004, Dave Howe wrote:

 of course someone *really* cynical might think they already had him, but 
 needed to spring a billion towards shrub's reelection campaign



stealth tempest wallpaper

2004-08-09 Thread Sunder
http://www.newscientist.com/news/print.jsp?id=ns6240
or http://www.newscientist.com/news/news.jsp?id=ns6240lpos=home3


Stealth wallpaper keeps company secrets safe
 
10:00 08 August 04
 
Special Report from New Scientist Print Edition. Subscribe and get 4 free 
issues.
 

A type of wallpaper that prevents Wi-Fi signals escaping from a building 
without blocking mobile phone signals has been developed by a British 
defence contractor. The technology is designed to stop outsiders gaining 
access to a secure network by using Wi-Fi networks casually set up by 
workers at the office. 

SNIP


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



  1   2   3   4   5   >