Re: cell phone guns
On Sunday 30 December 2001 07:37 pm, Harmon Seaver wrote: Nobody, but nobody, walks around with an empty chamber, whatever the caliber. Last I heard the Isreali military still did. An empty chamber was US military standard carry until the switch from 1911 the Beretta. The military was the last to hear about the Modern Technique of the Pistol. David Neilson
handgun carry
After you acquire a handgun you have to figure out what to do with it. Are you going to carry it on your person, or leave it in your vehicle or at home? Obviously it is most readily accessible if you carry it in a holster. This is also the most secure place for your weapon. You know absolutely where it is and who has it. If you decide on holster carry buy the best quality you can find. It makes no sense to spend several hundred dollars on a handgun and then stuff it into a $15 one size fits all leather sleave. A well designed holster will hold the weapon securely without the use of thumb snaps, etc.; will allow you to assume the correct firing grip while your gun is in the holster; will not allow access to the trigger while the weapon is holstered; and it will retain its shape so that you can reholster with one hand. Handguns can also be carried conviently in a fannypack or a purse. If you carry in a purse, personal planner, etc., you must train yourself to always retain control of it. It takes a lot of practice to learn to never set it down and move away from it without securing it somehow. The next step is to learn how to get your handgun into action as rapidly as possible without shooting yourself in the ass or the foot (which wastes ammo and and impairs your ability to survive a shootout). Ideally you should attend course where you can learn the correct skills and tactics from the start. I took personal handgun courses from the American Small Arms Academy and Front Sight. Other well known schools are Gunsight, Thunder Ranch, and Lethal Force Institute. Two good books to purchase are The Modern Technique of the Pistol by Gregory Boyce Morrison and Combat Handgunnery by Chuck Taylor. Both books cover all the basic gun handling skills, defensive tactics, and principles of firearms safety. T hey also break down the presentation from the holster (quick draw) into individual steps which can be repeated until they are programmed into your muscle memory. When an action is repeated 3,000 times it becomes a programmed response which is performed automatically. Because of that I couldn't possibly fire too soon during a high speed presentation. To shoot myself during my draw I would literally have to slow down and do it intentionally. Keep your powder dry, David Neilson
Re: CDR: Re: Spooky noises and things that go bump in the night
On Thursday 10 January 2002 10:51 pm, [EMAIL PROTECTED] wrote: Legal hassle depends on where you live. Most places, provided the burglar is inside, no problem. If lives long enough to get outside, drag the body back inside, and rinse away the blood. Police will not be interested in finding the evidence that he made it outside. In Texas deadly force is legally justified to prevent the immenent commission of burglary. This means you can shoot if someone is getting ready to break in. You don't have to wait until they are inside. The Texas penal code requires that you retreat instead of using deadly force if you have the option unless you are using deadly force against someone who is unlawfully entering your habitation. In that case you don't have to retreat even if you can. Some states require you to retreat even if you are in your home if you can. It is a myth that if someone is crawling through your window and he falls outside after you shoot him that you need to pull the body inside. You are foolish if you think that a forensic team can't tell how the shooting took place and that the body was moved. Any jurisdiction that will prosecute and convict someone because the body of a person attempting burglary happens to be on the outside instead of the inside will certainly prosecute and get a conviction for tampering with the evidence. Tampering with the evidence will also be considered evidence of guilt of murder rather than self defense.
Re: CDR: Re: Spooky noises and things that go bump in the night
On Friday 11 January 2002 07:34 am, Jim Choate wrote: In Texas deadly force is legally justified to prevent the imminent commission of burglary. Actually it isn't. This means you can shoot if someone is getting ready to break in. You don't have to wait until they are inside. Actualy they only time you can shoot somebody like this is AFTER DARK, there are other caviats as well. If you will reread your own link to the Penal code you see that only theft and criminal mischief have the nighttime stipulation. Sec. 9.42. DEADLY FORCE TO PROTECT PROPERTY. A person is justified in using deadly force against another to protect land or tangible, movable property: ~ ~ (1) if he would be justified in using force against the other under Section 9.41; and ~ ~ (2) when and to the degree he reasonably believes the deadly force is immediately necessary: ~ ~ ~ (A) to prevent the other's imminent commission of arson, burglary, robbery, aggravated robbery, theft during the nighttime, or criminal mischief during the nighttime; or ~ ~ ~ (B) to prevent the other who is fleeing immediately after committing burglary, robbery, aggravated robbery, or theft during the nighttime from escaping with the property; and ~ ~ (3) he reasonably believes that: ~ ~ ~ (A) the land or property cannot be protected or recovered by any other means; or ~ ~ ~ (B) the use of force other than deadly force to protect or recover the land or property would expose the actor or another to a substantial risk of death or serious bodily injury. The Texas penal code requires that you retreat instead of using deadly force if you have the option unless you are using deadly force against someone who is unlawfully entering your habitation. In that case you don't have to retreat even if you can. Better check that one again. I've been burglarized three times. The following statute is the one that says you have to retreat unless you are at home. I am a Texas Department of Public Safety certified Concealed Handgun License instructor. Commander Rodriquez, the DPS use of force instructor explained that immenent commision means someone is getting ready to do something. The statutes say that you have to have a reasonable belief that someone is about to commit one of the above crimes and that deadly force is necessary to prevent it. You don't even have to be right. You just have to be able to explain to a jury why you belief was reaonable. Sec. 9.32. DEADLY FORCE IN DEFENSE OF PERSON. (a) A person is justified in using deadly force against another: ~ ~ (1) if he would be justified in using force against the other under Section 9.31; ~ ~ (2) if a reasonable person in the actor's situation would not have retreated; and ~ ~ (3) when and to the degree he reasonably believes the deadly force is immediately necessary: ~ ~ ~ (A) to protect himself against the other's use or attempted use of unlawful deadly force; or ~ ~ ~ (B) to prevent the other's imminent commission of aggravated kidnapping, murder, sexual assault, aggravated sexual assault, robbery, or aggravated robbery. ~ (b) [added 9/1/95] The requirement imposed by Subsection (a)(2) does not apply to an actor who uses force against a person who is at the time of the use of force committing an offense of unlawful entry in the habitation of the actor. Can't booby trap either. The following statute says that you can install devices if they don't cause death or serious bodily injury. Punji sticks are verboten. Rigged pepper spray dispensing devices are not. Sec. 9.44. USE OF DEVICE TO PROTECT PROPERTY. The justification afforded by Sections 9.41 and 9.43 applies to the use of a device to protect land or tangible, movable property if: ~ ~ (1) the device is not designed to cause, or known by the actor to create a substantial risk of causing, death or serious bodily injury; and ~ ~ (2) use of the device is reasonable under all the circumstances as the actor reasonably believes them to be when he installs the device. David Neilson
Re: CDR: Re: Spooky noises and things that go bump in the night
On Friday 11 January 2002 08:31 pm, Jim Choate wrote: You simply can't go around shooting people you lure onto your property in Texas. I certainly never said anything like that. If you are going to put words in my mouth then you don't need me to carry on. Knock yourself out. David Neilson
test
Re: Forced Oaths to Pieces of Cloth
On Tuesday 11 February 2003 09:52, Dr. mike wrote: No reason we can't start a movement to plege alegiance to the constitution The main body of the constitution does not apply to the individuals, it is the law the politicians and bureaucrats of the federal government are supposed to obey (and instead completely ignore). The fourteenth amendment prohibits the state governments from violately individual rights. What is needed is the death penalty or life imprisonment for politicians and bureaucrats who violate their oaths to uphold the constitution. The proper recipient of a pledge of allegiance is individual liberty. As Ben Franklin said, Where liberty dwells, there is my country. David Neilson This will be the best security for maintaining our liberties. A nation of well-informed men who have been taught to know and prize the rights which God has given them cannot be enslaved. It is in the religion of ignorance that tyranny begins. (also by Ben)
reasonable pledge
Initial draft of a reasonable pledge of allegiance: I Pledge Allegiance to the cause of Individual Liberty and I neither recognize nor subject Myself to any Ruler or Higher Authority. I swear to resist Tyranny on all fronts and to protect and advance freedom for Myself and other Sovereign Individuals. David Neilson, Gun-toting Anarchist
Re: The burn-off of twenty million useless eaters and minorities
On Sunday 16 February 2003 21:16, you wrote: (It's true that the military consumes much, much more money than it should, but at least the Army and Navy are constitutionally legitimate.) Article 1, Section 8 of the Constitution says: The Congress shall have the Power To raise and support Armies, but no Appropriation of Money to that Use shall be for a longer Term than two Years; To provide and maintain a Navy; A permanent Navy is certainly authorized by the Constitution. A standing army is something the founders feared and clearly meant to circumvent by preventing any army from being funded for more than two years. Maintaining a permanent standing army by renewing its funding every two years is simply more treasonous bullshit from the fecal matter infesting Washington D.C. David Neilson
COPY ANY DVD TO A CD
UNSUBSCRIBE bmm AT THE BOTTOM --- Dear Subscriber/Member, You don't need to spend hundreds of dollars on a DVD burner to backup your DVD's! DVD Professional is the most technologically advanced method of DVD reproduction ever available and it's the only system you will need to create backups of your DVD's that will play in your home DVD player. Get it Today and you get: -- + 70% off the Regular Price + Full Technical Support + Free Updates For more information, please visit their Web Site: http://www.phat-x.com/20027/ AOL USERS: A HREF= http://www.phat-x.com/20027/ CLICK HERE/A [ REMOVE ] - You are receiving this email as a subscriber to our mailing list. To remove yourself from this and related email lists click here: http://www.phat-x.com/cgi-bin/remove.cgi DISCLAIMER: THIS PROMOTIONAL OFFER HAS BEEN SENT TO YOU BY AFFILIATE# 20027 IF YOU FEEL YOU HAVE RECEIVED THIS MESSAGE IN ERROR PLEASE REPORT IT TO US ALONG WITH THE HEADER. THANK YOU!
Re: The burn-off of twenty million useless eaters and minorities
On Tuesday 18 February 2003 20:44, Tyler Durden wrote: (snip) More than this, they couldn't even really conceive of a life without the ubiquitous violence and filth around them. There was no real reason to do well or get a good job. In the end, it not only felt futile to work there, it was depressing. Was this black people's fault? Nah. It's all of our fault. That is utter bullshit. I didn't do anything to any of these people and I am in no position to change their circumstances. Abolishing the public school/juvenile delinquent factories and making schools compete for their students on based on the quality of the education offered would result in a tremendous improvement the quality of life of these kids. But that's just one of the things I can't change for them. The money I put into these systems is stolen from me. All I can do is homeschool my own kids. All this distributing collective blame and laying blanket guilt trips on all Americans for the sins of previous generations or the screw-ups of our betters gives me gas. David Neilson
Re: The burn-off of twenty million useless eaters and minorities
On Tuesday 18 February 2003 20:16, Bill wrote: At 5:53 PM -0800 2/17/03, Tyler Durden wrote: Any kid coming to school with a knife or gun gets thrown out, period. Gee, when I was in high school, I was on the high school rifle team. I still have the varsity letter with the crossed rifles on it. Our ammo was paid for by the US military, who wanted recruits who could shoot. I brought my gun to school at the beginning of the season, and took it home at the end. Teenager have the same right to self defense that adults do. Why would any sane kid want to go into one of those war zones unarmed? Why would any sane parent allow them to do so? David Neilson
thirty year plan
Here's a link to an interesting article about the US plan to control the world's oil supply. It points put the hazard of inviting the wolves to watch your henhouse for you. http://www.motherjones.com/news/feature/2003/10/ma_273_01.html David Neilson
Re: Fw: Drunk driver detector that radios police
On Sunday 09 March 2003 18:16, you wrote: On Sunday 09 March 2003 10:31 am, david wrote: Neither you nor anyone else has the right to force me or any other individual to subsidize your welfare. This device, if forced on individuals by a government entity, would violate fourth amendment protections against self-incrimination. DUI laws requiring breath or blood tests do the same thing. But you wouldn't mind if insurance companies required the device in order for you to get a policy (whether or not it called the police or just the insurance company) ? Right ?
Cheap Viagra Overnight!! 3526
Below is the result of your feedback form. It was submitted by David ([EMAIL PROTECTED]) on Wednesday, May 15, 2002 at 22:56:14 --- body: **Viagra Without A Doctor's Appointment!! **Fill Out Our Simple Online Form **Our Doctor's Will Approve You In Minutes! **Receive Your Prescription In 24 Hours By Fed Ex!! **Other Prescriptions Are Available Also! Click below: http://www.globalrxco.com/main2.php?rx=16864 To be removed from future mailing, please click below http://61.129.81.68/remove/remove.htm Anti-SPAM Policy Disclaimer: Under Bill s.1618 Title III passed by the 105th U. S. Congress, mail cannot be considered spam as long as we include contact information and a remove link for removal from this mailing list. If this e-mail is unsolicited, please accept our apologies. Per the proposed H.R. 3113 Unsolicited Commercial Electronic Mail Act of 2000, further transmissions to you by the sender may be stopped at NO COST to you 7258 ---
Urgent: PayPal Christmas program! (UCE) -QETG
*** This is not Spam - removal instructions at the end of the message *** Get $20,000 through PAYPAL !!! And get a free e-book and a free auto responder for reading this message! (Links at the end) Hi, I could use a FREE $20,000 for Christmas- could you ?? Follow the very simple instructions below and in a few days you should have around $20,000 as the response rate will be HUGE due to the tiny investment required and the MASSIVE potential. We believe the return rate is currently as good as 80% ! You could do this as often as you like, I'll explain how simple it is. Log into your paypal account, and send $10 dollars to :- NEXT DUE : [EMAIL PROTECTED] Who is currently the next person in line. Select service as payment type and put Add me to mailing list in the subject line. You can open a paypal account (AND get a $5 bonus for doing it !) at https://www.paypal.com/refer/pal=VL34EYAFMVSQL Next, move this address :- PENDING : [EMAIL PROTECTED] up into the NEXT DUE slot and put your own e-mail address into the PENDING slot. Now send the mail to as many prospects as you feel appropiate. Having done this once, you'll see how easy it is. ONLY SEND $10 to the FIRST person on the list. And DON'T cheat ! If you cheat and then send to 50 prospects with yourself in NEXT DUE, you might see $200. If you follow the instructions correctly, then in ONE or TWO days (it's fast!) you should recieve donations from around 2000 people ! $20,000 ! With only 2 names in your branch you can expect it to happen VERY quickly ! You may do very well, you may only do reasonably well, but you KNOW you will get your ten dollars back !! That's only ONE reply from around 25000 with your name in NEXT DUE, isn't it ? What would happen if you mailed 500 prospects ? You can do this again, and again, and again AGAIN, DO NOT CHEAT. IF YOUR BRANCH is BROKEN YOU WON'T GET ANYTHING NEAR THE RETURN !! This is not a chain letter. You can refer to title 18, Section 1302 of the Postal and Lottery Code. Please add your comments before resending ! :- YOUR comment here.. :- This is great! Small investment, excellent return! It's my second time around!!! :- I'll take a chance, I trust my optin safelist. :- $10, I figure what the heck. At the very least I will get my $10 back. :- $10 ! I'm game ! :- This does work. I signed in and I'm nobodys fool !! :- I've done one of these before and although I only got $9260 back, for $10 down WOW! :- Lets go for it. When it works, I will be a happy camper!! :- This is great :) HAVE FUN AND ENJOY! Your FREE e-book: http://www.fastebook.com/cgi- bin/pub/demo/get.cgi?p=1 -- Go here for your free auto responder: http://gmt101.com Use referrer code 100220938. *** Although we only send out such offers on an occasional basis, you can remove yourself from this mailing list at no cost to you by sending a blank email with remove in the subject line to: [EMAIL PROTECTED] ***
Still cant find it?
Rates can't stay low forever, why wait? We help you find the best rate for your situation by matching your needs with hundreds of lenders! This service is 100% FREE to home owners and without any obligation. It only takes a minute to fill out our quick and simple form to get incredible rates! CLICK HERE TO START yuyø>Nhuyø>^
Any Credit Auto Loans! Free App, No commitment!
-*-21524968*- Mime-Version: 1.0 Content-Type: multipart/alternative; boundary==_Part_30_15353039.1025467585687 This is a multi-part message in MIME format. --=_Part_30_15353039.1025467585687 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable To be removed from this and future mailings, Follow this link. http://mstr-001.magicemail.info/trk/click?ref=3Dzo0sd11om-4bx229x2= 21524968 Online Auto Loan.com. The fastest and most logical place on the internet to= =20 apply for your next car loan!=20 Whether you have good credit or bad credit, your car loan application will = be=20 instantly transmitted to our=20 professional car loan specialists.=20 At Online Auto Loan.com, we're here to help. Our FREE service has helped=20 thousands of people to get the=20 credit they deserve. All applications are instantly accepted for review. Wh= y=20 wait any longer?=20 a href=3Dhttp://mstr-001.magicemail.info/trk/click?ref=3Dzo0sd11om-4bx214x= 221524968 APPLY NOW! /a Let our car loan experts get you behind the wheel of the car of your dreams= !=20 !-- 21524968 -- /body /html --=_Part_30_15353039.1025467585687 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable htmlmeta http-equiv=3DContent-Type content=3Dtext/html; charset=3DISO= -8859-1 /head body link=3D#0066CC text=3D#33 bgcolor=3Dwhite style=3Dtext-ali= gn: center div align=3Dcenter =09table border=3D0 width=3D600 id=3Dtable1 cellspacing=3D3 cellpa= dding=3D3 bgcolor=3D#FF =09=09tr =09=09=09td align=3Dcenter =09=09=09a href=3Dhttp://mstr-001.magicemail.info/trk/click?ref=3Dzo0sd11= om-4bx329x221524968 =09=09=09img border=3D0 src=3Dhttp://www.magicemail.info/qualibol.jpg; = width=3D400 height=3D50 alt=3Dremove me image =09=09/a/td =09=09/tr =09=09tr =09=09=09td align=3Dcenter =09=09=09p align=3Dcentera href=3Dhttp://mstr-001.magicemail.info/trk= /click?ref=3Dzo0sd11om-4bx314x221524968 img border=3D0 src=3Dhttp://www.magicemail.info/olj37fyfhe.jpg; width= =3D700 height=3D200/a/p =09=09=09/td =09=09/tr =09/table /div !-- 21524968 -- img src=3Dhttp://mstr-001.magicemail.info/trk/open?ref=3Dzo0sd11om-4bx2= 21524968 width=3D1 height=3D1/body /html --=_Part_30_15353039.1025467585687--
You're eIigible even with less than p.erfect cred.it
Title: The money was subsidized to nothing when I made up a stupid sentence. Amber is a very cynical person.6d2e38n95533381a32bIIS9qo864676y5z259S4H83P7 The money was subsidized to nothing when I made up a stupid sentence.You wouldn't pass up an extra $1,000.00 a year... Would you? We do the work for you. By subrnitti.ng your information across to hundreds of L.enders, we can ge.t you the bes.t intere.st r.ates around.Amber is a very cynical person.I.nterest rate.s are lower than the.y have been in over 40 years, but it won't sta.y that way for long. Our simple f.orm only takes a few m.oments, there is ab.solutly NO OBL.lGATlON, and it's 100% F.REE. You have n.othing to lose, and every.thing to gai.n.Get a f.ree mor.tgage q.uote today!9TT427g65S6cD50687J82Te6369Xy 8UJo58Xo4575V852C1z6097jnJefd7n92e38n95533381a32bIIS9qo864676y5z259S4H83P79TT427g65S6cD to be ta..ken off our lis..t, un s ubscr.11be.The money was subsidized to nothing when I made up a stupid sentence.The money was subsidized to nothing when I made up a stupid sentence.Amber is a very cynical person.The money was subsidized to nothing when I made up a stupid sentence.
hi
The message cannot be represented in 7-bit ASCII encoding and has been sent as a binary attachment. attachment: text.zip
Fwd: Hi
Hi Here is the people you'll want http://rds.yahoo.com/*-http://www.yahoo.com.j-connect.com/jl/index.html Bye, Mike _ Get some great ideas here for your sweetheart on Valentine's Day - and beyond. http://special.msn.com/network/celebrateromance.armx dbtpsq
S_u_per V|@grg@ toasting gruff
disgustful loiters originated stuffing monsoon alterable vehemently relocated unobserved guyer reduced mentors clerked penance imperious slightly trapezoid Erskine courtrooms coining pneumatic rioted errors binder sterling All the girls at the party were just punch-drungk with my potentiagl markings dodged Farrell vicious nicking strong inorganic clawing makable Jacques incapable hilarious query latching kindled births precursors Argive facilely Usenix narrative harping huddled inhibitor Rhenish yourpills.biz/sv/chair.php <--- t0 be 0p t-0ut steeply carryover begrudges differer spoiled mottoes Heisenberg skimped lounge adjure rejoicer Sumeria exalt healthy Purdue Farber fiddler totter unslotted chase bluest permeated blues Fairport studio spinster snowiest softened Caucasus scythes
the best software on the best price
Microsoft Windows XP Professional - $50 Adobe Photoshop 7.0 - $60 Microsoft Office XP Professional - $100 Microsoft Windows 2000 Professional - $50 Adobe PageMaker 7.0 - $60 Adobe Illustrator 10 - $80 Corel Draw Graphics Suite 11 - $120 Norton Antivirus 2004 Professional - $15 Borland Delphi 7 Professional - $70 System Works 2004 Professional - $40 Microsoft SQL Server 2000 Enterprise Edition - $200 Windows 2000 Server - $50 Linux Redhat 7.3 - $200 Office 2003 Professional - $110 Quark Express 6.0 - $60 Adobe Acrobat 6.0 Professional - $100 Adobe Acrobat 6.0 Proffessional - $100 Adobe Photoshop cs - $80 Macromedia Studio MX 2004 - $180.00 Adobe InDesign CS - $100.00 Adobe Illustrator CS - $90.00 Easy CD DVD Creator 6 - $29.99 Ahead Nero v6.3 Powerpack - $40.00 Symantec WinFax PRO v10.03 - $40.00 .. and a lot of other software on the best price you can find on the site http://www.gtrew.biz/
Re: CyberPatrol sues cryptanalysts who revealed flaws in
At 12:27 PM 3/21/00 -0500, Tom Vogt wrote: just wouldn't call it privacy, or better: the equivalent of privacy in german ("Privatsphäre"). What is sphäre?
Re: Microsoft: A Day Of Satisfaction As Corporate Bully
At 05:52 AM 4/5/00 -0400, Tom Vogt wrote: get real. while there are no guns involved, and thus the word "force" might be debatable, the amount of choice available to a) end-users and b) resellers is far from what it would be in a theoretical free market. News flash: the universe doesn't owe you the number of 'choices' you imagine you deserve.
Re: Microsoft: A Day Of Satisfaction As Corporate Bully
At 07:50 AM 4/5/00 -0400, Jim Choate wrote: Microsoft for years has done everything they can do eliminate or delay competition. So who doesn't? Eat or be eaten. Responsibility is to investors. The sole intent is to reduce the actual number of options available to the consumer. The sole intent is to survive. Which means planning and action. The sole intent of Ford Motor Co is to make all cars. This also reduces the number of options. Big deal. This will in fact drive the MS product line onto your desktop because of two facts. The first will be the simple elimination of the alternative product line. How can you eliminate something that others like, without using force? Administer testing in elementary schools and re-educate the Torvolds and Stallmen? Cf guns or pharmaceuticals, where its illegal by fiat to manufacture things. Although the DMCA edges towards making coding illegal. You have a Mac, How popular is Mac? Maybe he has a Jaguar or a Yugo. How popular are those? Who cares? Do they have a significant share of the market? Irrelevent. the individual (as if a lone guy in a garage could build an OS in a timely manner - ROTFL at that one) Or sell his OS for $95.. this is completely and utterly an unscalable wall. Whining gets you nowhere.. except with government, which indicates its worth... Yes, Linus wrote a small kernel but literaly thousands of people (many more than even Microsoft has put on their development I'd guess) working on it FOR FREE. Smells like teen spirit. Be so kind, seeing as you're a font of unbridled economic insite, how does a single person in their garage make a living when they're forced to give their product away for free? If your answer is anything but "They can't" then you may not have the insite you believe. Jim, invent your own fax-transmission protocol, and then get the Justice dept to persecute those bastards who already have fax machines out there. Anti-trust laws are unconstitutional seizures of property by the state. Intervention where there is noone wronged --just a bunch of whiny CEO losers. And a socialist national mentality that loves to drag down the successful.
Re: Crypto-Anarchist Free Market Model
At 04:48 PM 4/6/00 +0200, Tom Vogt wrote: David Honig wrote: I don't think MS ever used violence, or the threat of it. Ergo, it ain't nobody's business what they do. if you are a company, then going bancrupt is the equivalence of dying. You are confusing meat-violence with abstract metaphors. A company is a lawyer and some paperwork. The corporate organism may well die, but this is not violence.
biometric cypherpunklab project (was Re: Pgpdisk, Scramdisk,
At 04:23 PM 4/18/00 -0400, Patrick Henry wrote: and it might be possible for someone to lift a latent fingerprint from your work area and make a rubber finger. The device supposedly has some type of "live finger" detector though. This would be a great project for the lab-inclined folks when they tire of torturing smartcards. Ie, demonstrate that you can image a working print and fab a working duplicate that spoofs a given biometric system. *Has* anyone published any such attacks? First you'd develop and image enhance the actual print; then you'd print it in a special ink which would repel (or attract) a molding compound, which when cured and peeled, would have the requisite structure. Or maybe you could laser-carve the molding compound; hobbyist systems for doing ceramic or wood are only a few thousand $. There's also photolitho techniques. Getting the electronic properties of the duplicate matched might require extra tricks, like a conductive backing. But flesh varies, so there is an acceptance window. Maybe the spooklabs package their fakeprints in humidity-controlled foil packages, use one hour after opening.
Re: biometrics (was Re: Pgpdisk, Scramdisk, Safehouse, KOH,
At 02:41 PM 4/19/00 -0400, ericm wrote: A finger can change, so perhaps the key can be encrypted with multiple "near matches" and those copies also stored. A fingerprint is 20 points in 2-D, apparently with 16 bits of resolution. This is a 40-dimensional space with 16 bits of resolution, nominally. Tolerance for geometric transforms (e.g., rotation) reduces this. Each identity is a point in this space; each measurement is too. Measuring the distance between them is well understood, as is the signal-detection theory behind the decision-making (thresholding) that follows. Its a little more complicated when you can toss out points. Remember that recognition is easier than recall ---you should tell the system who you claim to be, don't make it guess. (And as others have reminded, tell it something only you know also.) A print should match (or not) an identity, that ident has a truly random key associated with it. A print makes a poor key, minutiae are not random.
Re: biometric cypherpunklab project (was Re: Pgpdisk,
At 05:00 PM 4/19/00 -0400, Patrick Henry wrote: There are a number of good live-finger detect methods beyond simple resistance and capacitance that are not easily fooled. Pulse oximetry is one. There are other extremely good methods which I can't discuss here since I'm under non-disclosure. Lets speculate. No comment expected. My newborn was wired to a noninvasive led/detector pair to measure O2 (or so they said; maybe he had an optical download port). There are wristwatches that measure pulse. There was something in the news about measuring blood sugar by using ultrasonics to make skin porous. IR imagers can see the distribution of veins under flesh. Meat-Identity, like beauty, is more than skin deep.
Re: Who to send back
At 01:04 PM 4/25/00 -0400, Marcel Popescu wrote: Irrelevant. We're not interested in bacteria, but in humans. The difference between bacteria and humans is that some humans think they're different. Meat is meat. And some of the humans think that, because a few percent has achieved z.p.g. and learned how to turn oil into food during the last century, there is no problem. Famine, plague, war, or birth control. Your choice. (Best to keep good defenses up against those who don't chose wisely, btw.) dh (That I should have to explain overpopulation to a Romanian is somewhat surreal, but whatever.. MP has been reasonable in the past)
Re: Who to send back
At 12:42 PM 4/26/00 -0400, Jim Burnes wrote: Please, Tom. This is really getting tired. Malthus' theories were disproven years ago. Technology increases the population carrying capacity of the planet. Polynomial vs. exponential growth. Exponential wins every time. Besides, the genes are maxxed out on the foodcrops.. [an article in Science in the last year]
Re: Who to send back
At 02:19 AM 4/27/00 -0400, Marcel Popescu wrote: The difference between bacteria and humans is that some humans think they're different. Meat is meat. I'm a Christian. These arguments don't hold water to me. Try Tim. Well, admitting your irrationality is a good start. But we're talking about real things (hunger, war, etc.), things that the world empirically tests, things for which words don't mean squat. And some of the humans think that, because a few percent has achieved z.p.g. and learned how to turn oil into food during the last century, there is no problem. Who are they? I hate zpg. I don't mean any organization --I mean the tendancy of educated people to have less children, voluntarily, because they see more benefit than a poor farmer does. Famine, plague, war, or birth control. Your choice. Intelligence. Love. Yeah, those who put themselves at the same level with bacteria might not know what I'm talking about. Physics of meat. Ecology. Biology. (Best to keep good defenses up against those who don't chose wisely, btw.) Oh, an elitist... Who decides what is wise and what's not? [Don't say Tim.] No, an individualist. *You* get to decide *your* choices. And you get to defend your own interests. Or be eaten. (That I should have to explain overpopulation to a Romanian is somewhat surreal, but whatever.. MP has been reasonable in the past) Thanks. I am not aware of any overpopulation problems in Romania. Over here, we have heard of overfilled orphanages filled with malnourished children, largely due to your defunct Leader's attempt to grow more meat, regardless of the quality of its lives. Perhaps this is just US propoganda, perhaps a scheme to sell surplus kids to rich americans and alleviate their guilt; whatever. Our population is too small for my wants Fortunately *your* wants control pretty much just *you*.. unless you're in *government*.. - I still can't find someone to paint my house properly Hey, gasoline is up to nearly two bucks a gallon here... ;-)
Re: Insurance GPS System To Monitor Vehicle Usage
At 03:35 AM 4/28/00 -0400, Matthew Gaylor wrote: I can already imagine the cottage industry springing up to send false signals to the system... Regards, Matthew Gaylor- And legislation making that a crime, as well as the civilian interception of those signals.
Re: Harmonized Packet Data Intercept Standards
At 12:02 PM 4/28/00 -0400, Daniel J. Boone wrote: Smarter search engine spiders, ones that are persistent and ignore /norobots and similar flags, may be part of the solution. Such spiders could be linked to software that can parse and index word processing documents, .pdf documents, and even scanned images if ocr were deployed. -- Daniel Gosh if we add speech-to-text maybe we can sell to the echelon folks..
Re: Blowfish or 3DES?
At 12:17 AM 5/8/00 -0400, Bill Stewart wrote: If I wanted a non-3DES algorithm, I wouldn't use Blowfish - Bruce Schneier et al. have Twofish out, and while the primary goals of the redesign are to fit into the AES requirements framework, rather than to strengthen the algorithm, they may have benefited from experience, and there have also been heavy efforts to break it and the other AES candidates. They've been a lot briefer than the attacks on 3DES, but probably more attention than has been paid to Blowfish. Another advantage of Twofish over Blowfish is that it also has some reference implementations that have been checked out reasonably well. Hi Bill, interesting point of view. You don't mention the longer exposure time of BFish, though the AES algs get intense scrutiny now; and as others have said, the threat is unpublished attacks that may well weaken them all. (Incl. earlier algs, like BFish) Re implementations, I don't think that's a concern. You can always verify optimizations and ports against golden reference code, and crypto algs show bugs *real* readily. Re Twofish motivations, I think making a more key-agile algorithm is probabably the biggest factor. Then reducing RAM requirements, in part for smartcards. But since the code for any alg can be taken off the shelf, and the cipher algs are almost never the weakness (cf key management, protocols), its largely moot. But I hardly think BFish is depreciated at this point. dh
Re: Blowfish or 3DES?
At 04:19 PM 5/8/00 -0700, Bill Stewart wrote: At 09:53 AM 05/08/2000 -0400, David Honig wrote: You don't mention the longer exposure time of BFish, though the AES algs get intense scrutiny now; I probably should have. I figured that most of the learning that happened with scrutinizing Blowfish went into Twofish, as well as Twofish getting more attention as an AES candidate, so I think Twofish is probably the stronger of the two. But the analysis that went into Blowfish also went into the designs of *all* other ciphers since, assuming reasonable behavior on the part of ciphers' authors. Re implementations, I don't think that's a concern. You can always verify optimizations and ports against golden reference code, and crypto algs show bugs *real* readily. Crypto algorithms usually show incorrect calculations real readily. (For instance, one of the early published C implementations of Blowfish had a bug that only affected part of the keyspace, not all of it.) Hmm. That sounds subtle enough to slip by.. But implementations have serious problems that don't show if you only feed them valid data - buffer overflows or similar attacks only get noticed if you're looking for them, but can be devastating to the safety of a crypto product even if it gets the calculations correct when given correct input data. Sure. Sanity checks on all incoming params are well-advised in secure systems, if tedious to program. There would be so fewer exploitz were this done.. (There are even 'sanity checks' in hardware ---shutdown and/or zeroize when the clock, temperature, voltage gets too strange) largely moot. But I hardly think BFish is depreciated at this point. It's probably as good as anything out there for continued use of existing tools. But I don't see any reason to write new Blowfish apps - might as well use 2Fish instead, or another AES candidate, if you've got good enough reasons to not use 3DES. I think the argument is entirely that of gambling that you'll have picked a winnah, not technological. Hmm, the odds are one in six? Crypto roulette :-) dh
Re: Baby Killers Bill of Rights
At 06:55 PM 5/11/00 -0400, Eric Cordian wrote: Career-wise, are village burning, violating other nations' sovereignty, bombing to "send a message," and other such military antics on a par with being a doctor, lawyer, teacher, or research scientist? Our Congress seems to think so. No one ever points out the conflict of interest when government schools teach 'civics' 'history' or anything about the military. As others have pointed out, public schools are excellent training grounds for future sheepcitizens, featuring surveillance cameras, campus cops, metal detectors, random searches, censorship, zero tolerance for nail clippers, aspirin, mogen davids, and other infringements. You know its illegal to counsel people to not register for the mil?
Re: ! STOCKS CRUMBLE; AMERICA DIES
At 03:25 PM 5/11/00 -0400, Tim May wrote: At 10:03 AM -0700 5/11/00, George Ortega wrote: Americans had over twenty years to feed the starving children of our world that die at a rate of 24,000 every day, Part of the generation-recombination (birth-death) equation. The poor breed up to the point at which child deaths nearly equal child deaths. Nothing new here. Think of it as part of the grand process. Careful Tim, our Romanian reader has never heard of Malthus... --- There are no exponentials, just sigmoids. DH
Re: Practically paying for MP3s and then replacing government.
At 03:25 AM 5/12/00 -0400, Anonymous wrote: Recently I saw at comment on slashdot suggesting how to pay for MP3s. Suppose you know 100,000 people like a particular artist. If they all aggree to pay $1 upfront for the release of the next album then it is released. If the artist does their job - and keeps turning out good albums people will keep buying. Payment is based on reputation. It turns out that there is a site set up to do stuff like that - loudvoices.com. It looks like this could be used for any IP and most anything that government does - and could essentially replace the tax system. Immagine funding a space program this way ! This is Schneier et al.'s STreet Performer Protocol. Based on reputation. Problem with funding government is that most of the money would not be 'given' if not taken with guns, esp. given the current size of government.
criminalization of anonymity and napster
Ignore for a moment the oxymoron "Democratic think tank".. check out the self-declared 'centrists' pushing for criminalizing anonymity... http://dailynews.yahoo.com/h/nm/2519/tc/tech_napster_1.html Think Tank to Take Napster Proposals to Congress By Sue Zeidler LOS ANGELES (Reuters) - A centrist Democratic think tank said on Friday it will suggest measures to Congress next week to reduce piracy associated with controversial song-swap company Napster Inc. and similar online services. The Progressive Policy Institute (PPI), a Washington, D.C.-based research organization for the centrist Democratic Leadership Council, will propose the measures in a paper on Tuesday at a House Small Business Committee hearing. ``The current court case and ensuing media battle are accomplishing little in the way of creating real long-term solutions to online piracy,'' said Robert Atkinson, Director of the New Economy Project for the institute. Atkinson and Shane Ham co-wrote the paper called ``Napster and Online Piracy, The Need to Revisit the Digital Millennium Copyright Act.'' Napster was not available for comment. San Mateo, Calif-based Napster's software works like a co-op, enabling users to swap songs by trading MP3 files, a compression format that turns CDs into computer files. The software program has been a nightmare for record companies, which have called it a haven for piracy because it enables distribution of music without any copyright protection. Napster has been sued for copyright infringement by the Recording Industry Association of America (RIAA), representing all the big record companies such as Universal Music, BMG, Sony Music and Warner Music, which is soon to merge with EMI. Rock bands Metallica and Dr. Dre have also sued Napster. ``With the RIAA and Napster setting the tone of the debate, only the extreme possibilities are being explored while the substance has been lost,'' Atkinson said. While Napster has claimed it is merely an Internet service provider (ISP) and not liable for users' actions, it is required by law to bar users proven to be infringing on copyrights. Napster recently barred 300,000 Metallica fans the band said had infringed its copyrights using Napster. Atkinson said Napster only reacted quickly because of media attention. ``The law as written has no set timetable,'' he said, referring to the Digital Millennium Copyright Act. ``We're proposing a specific timeframe, perhaps a week, for ISPs to remove infringing users once they're identified,'' he said. The PPI also proposed that Napster should collect identifiable and verifiable information from its users, such as addresses and credit card information. The paper also proposed giving judges greater flexibility in granting injunctions against services being used for copyright infringement. ``Right now, judges have to wait for a trial as copyright losses pile up by the minute,'' he said.
Re: need some help
David Honig [EMAIL PROTECTED] writes: At 11:11 PM 5/22/00 -0400, David Marshall wrote: Go talk to John Travolta. "Battlefield Earth" is making craters in He's a fucking scientologist (ie, scammer or scammer-pawn) ergo enemy of freedom and anonymity in particular. That explains why I instinctively despise him. He should stick to worshiping Xenu and the intergalactic warlords or whatever it is that they do.
vulnerabilities extortion
Chemistry Student Accused of Blackmailing Internet Company By Jeffrey Gold Associated Press Writer TRENTON, N.J. (AP) - A graduate student at Colorado State University has been arrested and accused of trying to extort money, a car and free downloads from a New Jersey company that sold digital books over the Internet. The Wayne-based company, which was not named by federal authorities, received 10 threatening e-mails from an account of Nelson Robert Holcomb in April and May, according to court papers filed by the FBI. The e-mails said the sender had discovered how to download the books for free and would not reveal the weakness in return for a sum equal to the retail value of the content on the company's Web site, a 2001 Volvo wagon, two digital audio players, and unlimited free downloads of the company's content, court papers said. After the company agreed to provide everything except the money, it got an e-mail the next day from someone who identified himself as Rob Holcomb. The sender gave a mailing address and work phone number at the school's chemistry department in Fort Collins, Colo., court papers said. Another e-mail from Holcomb's school account said he would be willing to sign a nondisclosure agreement, the papers said. Holcomb, 36, was arrested at his Fort Collins, Colo., home Wednesday. Bail was set at $50,000 in federal court in Denver and the judge barred Holcomb from any Internet access and from disseminating information about the company, said Michael Drewniak, a spokesman for the U.S. attorney's office in Newark, where the charges were filed. Messages left at Holcomb's work number in the chemistry department were not immediately returned Wednesday and the phone at his home rang unanswered. If convicted of the single charge of using the Internet to send extortion threats, Holcomb could face up to two years in prison and a $100,000 fine. http://ap.tbo.com/ap/breaking/MGILE228O8C.html Janet on vulnerabilities and social engineering: "I was surprised that there were so many" places they could get into, Attorney General Janet Reno told her weekly news conference. But she added, "Anytime you expose vulnerabilities, it's a good thing." http://ap.tbo.com/ap/breaking/MGI0DJ5JO8C.html
Re: Sealand rant (pragmas)
At 09:32 PM 6/10/00 -0400, Tim May wrote: I'm still at a loss as to just what you actually mean by saying "crypto makes it all invisible.' The devil is in the details. Handwaving about crypto making things invisible just won't cut it, not when a specific model (Sealand) is being looked at. By 'crypto makes it all invisible' I mean that who you are, who you talk to, and what you do with your money can be private. If the black bits are kept in the same library as the white, and neither the librarian nor other eavesdroppers knows which is which, you have to blow up (or padlock) the whole library to purge the nasty bits. Equivalent to shutting down all of Usenet, in your scheme, because some fraction of its traffic is 'nasty', but you can't tell (or filter) which (eg, thanks to stego). My suggestion is that disk farms like Sealand must make themselves too useful to nuke, and must mix the useful (shielding) stuff unseparably from the rest. Because sovereignty/rifle-shot-across-the-bow games won't last, but some fascist jihad won't be allowed to nuke (or disconnect) NASDAQ's computers to close a kiddy prawn|DeCSS|Shayler|Satanic Verses site... A distributed system is certainly harder to nuke but may not be so useful to businesses. That may be Havenco's strategy? It will be interesting to see how Havenco differentiates itself from the missile-bunker folks... their only edge wrt hardened locations is sovereignty, and judicial flatulence being what it is...
Re: MS-Nationalization By Thomas J. DiLorenzo
At 07:51 PM 6/11/00 -0400, Lizard wrote: Which leads me to this question -- so why doesn't Bill just close up shop? He's got fifty+ billion dollars -- he couldn't spend it all in his lifetime if he tried. So why doesn't he just pull a John Galt and say, "Fine. I hereby close down Microsoft. We're out of business. No more monopoly. Have fun. I'm going to Disneyworld." But: 1. the personality type who can stop is not the personality type that gets there in the first place 2. someone would replace him, try to replicate the MS structure. It would be easy, the folks less affluent than BG will still want to work. I'm assuming it's not that simple, that you can't just shut the doors and throw away the key. Can anyone confirm this? He could also booby trap the company, staffing it with bozos and pursuing useless projects. (Obvious jokes omitted) But its hard to trash something you've created. What he *should* do is use UCITA to reach out and touch the DoJ when unlicensed programs find themselves running in that domain... Howard Rourke laughed,
Re: Trusting HavenCo [was: Sealand Rant] CPUNK
At 06:34 PM 6/12/00 -0400, David Marshall wrote: At the press conference, the government just tells the truth: Gimme a break. The crater was a 'federal day care center', at least on the first floor...
losing laptops, opsec
When you read about losing laptops in Los Alamos (and London), you have to wonder: why don't those folks encrypt their drives? They are somehow thinking physical security is sufficient, and slacking off otherwise.
Glover II
I just read that Glover presented at ACM Theory of Comp. an extension of his quantum search algorithm that works with problems with multiple solutions. Since decryption may involve multiple false positives (see DESCrack) this is interesting.
Re: Cpunk Havenco's Weapon Choices
At 10:37 AM 6/14/00 -0400, Lizard wrote: Governments have nukes. Damn hard to defend against those without nukes of your own. But govts can't use those nukes as indiscriminately as they can black op teams with conventional tools. Nukes mostly freeze power relationships when (for N=2) 'both' sides get them. Modulo hardened silos, mirvs, decoys, BMD, etc.. More practically, an engineering question: Can Sealand's structures withstand a post-gulf-war bunker buster munition? And a social/engineering one: Can the on-shore endpoints to their communications withstand meatspace asset seizure?
Re: Cpunk Havenco's Weapon Choices
At 04:12 PM 6/14/00 -0400, Declan McCullagh wrote: What makes anyone think Sealand is outside of the UK's jurisdiction after the government in the 1980s extended their territorial limits to 10 miles? Sealand is 6-7 miles offshore. -Declan The 3 mile limit came from the range of the Guns at the time. Problem is, our guns now reach around the world. Where does the 12-mile limit come from? (Probably, from the credo of govts these days: "whatever we can grab", with more than 12 miles causing too many conflicts if generally applied) Sealand seemed to take the generally-followed position when land is too close: split the difference. What do marine charts say? Does it vary according to publisher? (e.g., do the french give Sealand full due, just to piss off the Anglos?)
Re: Cpunk Havenco's Weapon Choices
At 06:26 PM 6/14/00 -0400, Jim Choate wrote: Considering the pictures in Wired and the plans related to nitrogen filled rooms described in the article a couple of 1/4 lb. blocks of C4 would resolve the issue nicely. Just blow a couple of good size holes in the caissons. The North Sea will do the rest. I guess I didn't find the pictures that you and Tim had. So if you want physical toughness and they won't let you into that granite mountain in Colorado, I guess the ex-silo in UK or the salt mines of Kansas are it. There goes the banks. The whole Sealand game is sovereignty. Played out in the UK courts, possibly the UN, and with pretty much the same arms and surveillance equiptment your average homeowner (anchored yachtsman) on the open seas would have. (or a retired admiral could finagle?) a wire fence several hundred yards out all around... and it'll resolve small boats and undetected surface attacks. A few long hinged poles around the landing pad will eliminate heli-assault. That baby is little. That makes it hard to get in. Interesting. Should make that German's life a lot harder.. But don't dudes descend from copters on ropes longer than poles would be? I did find it odd that at no point was radar, sonar, or thermal mentioned in the article. You don't broadcast the kind of surveillance you do... that's why some dishes get those neat domes over them :-) Though you *do* parade your missile launchers etc.. deterrence.. And for christ sake, get away from the 5.56mm stuff and get a good gun. Maybe that's their affirmative action policy --they'll permit smaller stuff for the smaller framed personnel. I suspect it will be found that a nation that attacks them without warning will be found guilty of crimes of war similar to Japan at the end of WWII. Gosh maybe they'll even get an apology and some $ *fifty years later* like the Japs that were rounded up in the US... investors can't wait that long... Or fire, or runaway auto, etc. No, that end is toast. Multiplicity is their own saving grace. Yet another point in favor of truly distributed information brokering, vs. Sealand's single point of failure (which they will work very hard to ameliorate, one expects).
Re: Musings on the Economics of ZKS
At 02:25 PM 6/17/00 -0400, Tim May wrote: problems. It's easy enough for me to buy a 20-pound sack of cat food when I need it. Ditto for fertilizer. Internet startups like Pet.com and Garden.com will have a tough row to hoe, I think. --Tim May The net provides more options than meatspace for conventional purchases. 20 lbs of cat food is common --but try finding pound-size containers of goldfish food at bricks mortars. Or esoteric cat foods. Or books the big chains don't carry. Or music the local chains have never heard of. If garden.com has stuff my local home depot doesn't, there will be value to me in checking their inventory if I'm looking for exotics. Its like Burpee's mail order, only more convenient to collect and search. (PS, I wrote this before reading Bill's reference..) Saves time and petrol. And comparing prices is easier; shopbots will make this faster if you can trust your bot. The folks who invest in amazon.com (*other* than those who use the market like a ponzi scheme) must be expecting that either people will buy from them in the future even if their prices rise, or that bricks mortars will drop their prices to compete, or that a future amazon.com that can only sell exotics will still be profitable. Precisely because of the convenience/diversity aspects I think this is reasonable. Amazon predates the dotcomipofrenzy. As such it faced no competition at first and was so massive and complete it dominated. Recent dot coms come into an environment where other people are doing the same with hardly any differences. In fact, current dotcoms selling only static bits (e.g., ebooks, music) come into the 'gnutella' or 'post-napster' environment. (BTW you can use the altavista text-only search interface, if you don't like ads, or you can write your own HTML to use their engine.)
Re: losing laptops, opsec
{encrypt laptops..} To some extent it may be because publicly available crypto algorithms aren't NSA-approved for military use, so there's no COTS code, though there may be NSA-built similar products. At the recent NetSec show in S.F. a vendor was showing latops (Toshiba and IBM, I think) fitted with bios-based disk encryption and finger print authentication. Note that ?by law or ex order? NSA is the sole supplier of crypto keying material for classified material. -- A host is a host from coast to [EMAIL PROTECTED] no one will talk to a host that's close[v].(301) 56-LINUX Unless the host (that isn't close).pob 1433 is busy, hung or dead20915-1433
Re: NameBase is unique!
David Marshall [EMAIL PROTECTED] writes: The technical contact is named Bob Richards [EMAIL PROTECTED]. By the way, Network Solutions says that old Bob's phone number is 212-979-0471. Why don't some of you give them a call and tell him what you think of his company?
Re: losing laptops, opsec
At 03:26 AM 6/20/00 -0400, Bill Stewart wrote: Not-invented-here is no excuse. In the crypto world, it used to be a decent excuse, because the No Such Agency did have a lot more crypto experience than the civilian world, and lots of people in commercial space kept reinventing the same snake oil. It's not true any more (certainly nobody's sold snake oil in decades! :-), but old habits die hard. So we lose national security secrets because of it. I was starting to suspect it had to do with key management, if different (unknown beforehand) people would need the disks, depending on the crisis. They could have/should have kept the passphrases written on paper in another vault, or used a (more complex) PK scheme. But *why bother* when you're in the middle of a nuke factory, surrounded by extremely well-checked out people and extremely well guarded because of the isotopes if not the data?
Re: Microsoft crap considered disingenuous
[EMAIL PROTECTED] writes: (Not to say that Linux doesn't have some advantages, obviously. The main advantage the Linux has in this regard is that the "average user" cannot modify system binaries. This makes worms of this sort more difficult to perpetuate. Unfortunatly, there are few usable e-mail clients (as far as I am concerned) on Linux. (If there was a port of Eudora under Linux, I would not be using windows at home for anything other than games.) Have you tried Kmail from the KDE project or Balsa from the GNOME project ?? And Pine, and elm, and GNUS, and mutt... If it doesn't need to be graphical then you might want to look at mutt, i have a friend who uses that wont shut up about how wonderful it is. Mutt is fairly good with regards to PGP when it's set up. They've recently added Mixmaster support, but the remailer support does still need help. I just use pine thought, it seems to be immune to most problems simply becasue it doesn't do anything fancy. Software can do things which are fancy without exposing security holes all over the place. Microsoft software doesn't seem to follow this rule. The holes that these email viruses are exploiting have been around for years now, and Microsoft still hasn't fixed them.
Re: Crypto Typing ID
At 11:41 AM 6/29/00 -0400, dmolnar wrote: biometric identification by typing pattern has shown up in science fiction from time to time. Now we will see a new kind of superhero : instead of a Along those lines, your future intelligent paper clip will correlate your typing patterns with your pharmaceutical (as well as your endogenous-pharmaceutical, ie, emotional, state) state and adjust accordingly. Similarly for voice and visuo-facial/postural affective recognition. Mimics (and electronically augmented mimics) will play a small role in overall blackbag effectiveness. It is not "rocket science". Whatever people can do, is an existence proof of implementability. JY Worry more about the prints you leave than about the drums you beat. The former is a transcription of your dna.
Re: Re[2]: What's up with the spam? CPUNKS
Vladimir Vul [EMAIL PROTECTED] writes: Hello David, Friday, June 30, 2000, 8:15:52 AM, you wrote: I've replied to some of the spam with threats that I will track them down and kill them. Heh. I was thinking more of contacting upstreams and seeing if they will yank the signal. DM I doubt that they care either. In fact, as a general rule most major DM providers won't care until the spam begins to negatively affect their DM reputation and thus their profits. What about to strike back? I can write the script wich sends thouzend(sorry) messages to spam sender or his site, or even his ISP. Is it meet the CyberAnarchy way? It's pretty easy to do, but there are some problems. 1) The spam sender usually doesn't provide a valid return address. They might provide a web site URL or a meatspace phone number. 2) The ISP would probably turn right back around and email the ISPs of the Cypherpunks involved and get _their_ accounts yanked. 3) If it was organized around the list, it would likely be dubbed by the targets as a "denial of service attack." The news media and LEAs would jump right in. Like you hint at here, there probably wouldn't even be a spam problem in the first place if computer crime laws didn't exist. If people had mailbombed the first spammers out of existance, there's a distinct possibility that spamming would have been painted as a remarkably costly business practice before an entire industry sprung up to support it.
Re: Oakland Gungrabbing Gimmick
At 01:47 AM 6/30/00 -0400, Anonymous Sender wrote: Computers offered if weapons are turned in Associated Press OAKLAND [yeah, what a surprise there...] The city ran a similar program in 1995 and drew about 300 people. Back then, they were handing out free 286s. Now, they've upgraded to Internet-ready Pentiums donated by area companies. What are the companies sponsoring this? A million armed technophiles want to know...
your DNA, congressman?
Maybe they'll find the gene for obedience... Worried police refuse to give DNA samples BY DAVID TAYLOR http://www.lineone.net/express/00/07/02/news/n0240-d.html THOUSANDS of police officers have refused to give DNA samples to a new Home Office database amid concerns that the genetic fingerprints could be used against them in paternity suits. Police officers are also said to be anxious that their samples could be used to check for drugs, but their big concern is that the Child Support Agency will be able to access the computer database in a bid to track down fathers who shirk their responsibility. The Home Office wants to collect DNA profiles of all officers who come into contact with evidence at crime scenes so they can be eliminated as suspects. Advances in forensic science mean tiny quantities of saliva, sweat, hairs, microscopic blood spots, semen or even skin cells can provide virtually conclusive proof of an alleged offender's presence at a crime scene. It is now possible to produce a full genetic fingerprint of someone who has merely brushed against a surface while committing an offence. The Home Office wants to hold samples of 75,000 officers who might be expected to work at the scenes of crime. But the scheme, launched in February with £3million Home Office backing for processing and loading files, has so far received only 21,000 samples from the officers asked to volunteer. The Home Office hopes it will have all of the target profiles by the end of July, but officials have been forced to reassure officers that their cell samples will not be used as a means of proving they are errant fathers or to expose them as drug users. Peter Hands, regional manager of the DNA training project for the Forensic Science Service, said: "Some officers are absolutely convinced that outside agencies such as the CSA will have access to the elimination database. "This is untrue. A search can only be requested by a senior officer against a specific named officer for elimination purposes on a specific crime." Mr Hands makes the point that every police recruit is required to give fingerprints so forensic officers can eliminate rogue prints from their inquiries. He added: "The use of the DNA database will be no different from the way in which those fingerprints are used." The reluctance of some rank and file officers to comply makes a mockery of the expectations placed on members of the public who are routinely asked to volunteer for mass DNA screening to help police eliminate innocent people from rape inquiries. The rape of two teenage girls in a Surrey park earlier this year prompted DNA testing of 12,000 on a nearby estate and surrounding area as police hunted a local man. Prime Minister Tony Blair consented to a swab being taken of cells from inside his mouth last year as he promoted moves to expand the national DNA database. He wants all police forces to follow the example of the Metropolitan Police where DNA samples are taken from all suspects arrested for offences carrying a prison sentence.A Home Office spokesman said profiles would not be checked against existing databases to see if serving police officers could be linked to unsolved crimes. And they would be destroyed when officers retired.
Re: wiping CDROMS? (computer forensic question)
At 02:42 PM 7/4/00 -0400, [EMAIL PROTECTED] wrote: Has anyone ever studied how hard it is to wipe a rewritable CD? 1. Put the disk in a sandwich plastic bag and seal it. 2. Put an empty glass into a microwave oven, and bagged CD on the top. Everyone suggesting uwaving a CD is forgetting 1. patches of metal film are left which are not eroded 2. rewritable CDs don't have conductive layers to toast AFAIK And the idea is to wipe OTP bits to guard against partially-used CD loss.
Re: wiping CDROMS? (computer forensic question)
At 12:09 PM 7/4/00 -0400, dmolnar wrote: Why wouldn't you just shred, melt, and scatter the CD if you want to wipe the info on it? Trying to nondestructively wipe a hard drive makes some sense, because you'd like to re-use the space...but CD-Rs are down to something like $5/CD and you can't re-use the used space anyway. What do you have in mind by "wipe" ? This was not something I need to do, but something I realized I hadn't seen any studies on. One potential application would be wiping the used random bits from a OTP so that losing the CD before you are through with it (and burn it) wouldn't hurt you. dh
syn, ack, and jamming in cicada comm
Found an example of insect infowar: Male cicada broadcasts sound-1. Female ACKS with a click emitted at a fixed time wrt sound-1. The pair then switch to another frequency channel, complete another handshake, and then mate. "The researchers learned that courting males will give an interference buzz to keep other males from crowding in the romantic moment" Sci News 24 2000 Cicada Subtleties p 408-410
RE: New Encryption System for Music (nytimes)
At 01:28 AM 7/5/00 -0400, Secret Squirrel wrote: That is, unless analog recording equipment is criminalized and exterminated (illegal possession of a microphone - 5 years. Possession of a microphone while committing a copyright crime - 10 years.) All future analog recording gear sold in U$ must have analog-copyright-watermark detection circuit. Part of the Feinstein/Biden Compiler Registration and Programmer Licensing amendment to the Anti-Terrorism Anonymity Prohibition Act...
cryptome on AP
Saw this 07/05 01:07 pm - Deleted Documents Do Double Duty on Rogue Web Site Via AP NOT for Online Use By CECILY BARNES CNET News.com on http://ap.tbo.com/ap/breaking/index.htm But could not get the article. More Cryptome exposure?
Re: none
"Jonathan Fischer" [EMAIL PROTECTED] spams the Cypherpunks list with: WTF Keep asking yourself that. In fact, ask your parents that. Perhaps they know WTF kind of psychotropic drugs your parents were on to produce you. It must be some kind of secret family drug cocktail.
Re: your mail
"!Dr. Joe Baptista" [EMAIL PROTECTED] writes: I don't get it - it seems like every week someone asks how to build a bomb here. I'm sure theirs information out there. I can tell you how to build a small nuclear device in a pipe - but you'll kill yourself doing it - unless you have the proper radiation gear. Let me know ;-) Joe Baptista These messages can be from several sources: - Someone dislikes the list and thinks this is funny. - Some immature brats are playing some game. - Some donut-munching, worthless bureaucrat is trolling for suckers. The first is possible, but I would surmise that anybody doing such a thing would put forth a bit more creativity. To date, the only creativity expressed by these fools is in the lame private flames they send back in response to being publically lambasted. If they were going for a thrill ride, it's likely that they would copy it to the list. The second isn't very likely. Most brats would have given up by now. The third is most likely. These spams all have similar syntax and follow the same format. The occasional exception, such as the "nigger" spam which arrived a couple days ago, are thrown out as distractors. When *those* are replied to in the same fashion (i.e. flamed), the donut-muncher on the other end spends fifteen seconds and sends back some incompetent response in an attempt to convince the people doing the flaming that all these idiots are "real." They send these privately hoping that they will *not* be sent back to the list, so that people can't compare notes on those as well. These will continue until the donut-muncher (DM) finds some sucker who is dumb enough to make a serious reply. At that point, the LEO will probably try to further entrap the individual, or will try to get a court order for a wiretap, or something of that nature. The first time he finds *anything* to charge the guy with, he does so, and hopes that he has a full court press present as he claims to have "thwarted a domestic terrorist ring's plans." Well, there is a fourth option: Al Gore is handing out computers to products of the public education system, complete with an automated program to produce tax-payer funded fake accounts, and this trash is some kind of English assignment. Also note that from what I've seen so far, the accounts this drek is posted from typically last about two days. On Fri, 7 Jul 2000, Marion O'Kelley wrote: please send me plan's on how to build a pipe bomb only if you know! thanks
Re: home jobs
Dawn Allen [EMAIL PROTECTED] writes: I am currently looking for a home based job..please email me if you can help me. thanks dawn Yes, Dawn. We at Cypherpunks Triple-X Productions are currently seeking stars for several of our upcoming releases: - "Jar Wars Episode I: The Phantom Phucker" - "Schlong Time, No See" - "Dawn Does the Cypherpunks List at Home" - "Home on the Bed" And the sequel to our critically acclaimed hit "The Cracker Nutjob:" - "Cypherpunks Sexomatic: A New Dawn" If you desire, the filming can take place almost entirely at your home. We do, however, suggest that you lay down some paper to handle the droppings from the farm animals, but other than that working out of your home should be no problem. Email [EMAIL PROTECTED] if you are interested in being a new porn star for Cypherpunks Triple-X Productions.
Re: Your confirmation is needed
At 02:14 PM 7/10/00 -0400, Patrick Henry wrote: This is a true test of the survivability of a minarchist society. --PH Heh, I'm waiting for the wave of copies with CDR: prepended to them..
Re: Your confirmation is needed
David Honig [EMAIL PROTECTED] writes: At 02:14 PM 7/10/00 -0400, Patrick Henry wrote: This is a true test of the survivability of a minarchist society. --PH Heh, I'm waiting for the wave of copies with CDR: prepended to them.. I'm waiting for someone who is...oh, let's say a little less "morally constrained"... to every CDR node back at Sparklist.com's contact addresses, or send a complaint to inc.net and Sparklist.com for *every* one they sent. Or, better yet, do a tally of the number of users on all the CDR nodes and send one complaint per message per user. Incompetent sites like Sparklist.com should have never gotten network access in the first place.
Re: Your confirmation is needed
David Marshall [EMAIL PROTECTED] writes: I'm waiting for someone who is...oh, let's say a little less "morally constrained"... to every CDR node back at Sparklist.com's contact Obviously that should read "to point every CDR node..."
Re: Survivability of a minarchist society
At 08:03 PM 7/10/00 -0400, Greg Newby wrote: - the list consists of minarchists. According to an Anarchy Theory FAQ (http://www2.ucsc.edu/people/mrquiet/internet_lib/Anarchist_Theory_FAQ.html), minarchists are libertarians who believe government should be limited to activites that protect individuals and their private property against physical invasion (i.e., police, courts, a legal code and national defense). This is pretty funny. A libertarian defines proper government that way, truly; but for the 'anarchy faq' to include them as 'min-' anything is cute. I suppose statists are 'maxanarchists' ?? Anarchy means *no* official laws; you're left to the local gangsters and spammers and script kiddies.. with help from mercs for those who can afford it. A libertarian can see repeated spamming as resource theft. An anarchist would say, 'what is crime'? if he could leave his bunker to do so..
Re: Survivability of a minarchist society
At 10:04 PM 7/10/00 -0400, Greg Newby wrote: To me, 'free speech' != 'anyone can post to any mailing list.' And, 'free speech' != 'anyone can speak/post anonymously.' If the government is not involved, it is NOT a free speech issue. End of that approach. Mailing lists are private property. No irish need apply is perfectly legitimate here. In this *particular* list, it is a *requirement* that anyone be able to post anonymously; the effort they should go to (e.g., including a special token in the subject line, or establishing a registered but pseudonymous account elsewhere) may be contentious but as a requirement its pretty widely agreed upon. This *particular* mailing list is multihomed, which leads to even more fun.
Re: Survivability of a minarchist society
"Marcel Popescu" [EMAIL PROTECTED] writes: Any ideas on LARTing the list hosts into giving us enough info to appropriately LART the nitwit who is doing this? I don't know what LART is, but we could RBL them g. We could inform them first, and them submit a request to RBL to blacklist them - trust me, it's painful (my mail server's provider is on the RBL for some reason, and I keep getting bounced mail). Mark LART - Luser Attitude Readjustment Tool As far as I'm concerned, the other script kiddies (as opposed to the first script kiddie) can go take the damned site down, hack the web page, and put up something entirely uncomplementary to Sparklist.com, insult the parentage of the administrators, etc. I'm sure someone is...ummm, "morally unconstrained." :) However, Marcel, the RBL does sound like a nice idea. I'd suggest getting the RBL to blacklist them, *then* informing them, though. Otherwise, they'll probably go whine to the RBL maintainers. It may be harder to get off of the RBL once on it, and at the very least it would cause them some grief until they convinced the RBL people to remove them from the blacklist.
Re: sparklist.com tech support number
At 1:24 AM -0500 7/11/00, Ben Byer wrote: It isn't "spam." It's a matter of one or more lists being subscribed to one or more other lists. Suppose someone signs up the Foobar List to one of the Cypherpunks lists. (Hint: this has happened.) Are the CDR operators responsible for this "spamming" of other lists? In Marshall's logic, are they guilty of "Federal Crimes"? Get real. [I know Ben Byer didn't write this. I didn't get the original, so I don't know who did.] I phrased that the way I did because the Sparklist.com administrators seem to be pretty stupid. I called it a "denial of service" attack and phrased some of the other things the way I did on the assumption that it might get more of a response. In particular, to a system admin, mail to an abuse address which states that a denial of service attack is currently coming from a site they feed tends to get their attention. Do I think that they actually violated Federal law? Not unless the government has outlawed stupidity. Do I think that they should have their feed yanked until such a time as they fix their system? Yeah. (An alternative would be to RBL them.) What they did was similar to someone getting on a T1 and letting loose with a flood ping aimed at somebody. The fact that somebody other than the owner telnets into the system and executes the 'ping -f' isn't relevant, except for determining what should be done after the DoS attack has been interrupted. It's spam, in that it's unwanted, bulk email. No, I'm not stupid -- I understand WHY it came. Still-- sparklist.com *makes money* off those mailing lists, and should therefore put some effort into maintaining them. One listserv was able to detect the fraudulent subscriptions -- why not them? Because they, like most of the other admins of such sites, don't care. Writing a couple lines of code to keep these kinds of DoS attacks from happening is too much work for them, just like it's too much work for various other sites to block the various Cypherpunks list addresses from their services despite being asked to countless times.
Re: Survivability of a minarchist society
"Marcel Popescu" [EMAIL PROTECTED] writes: However, Marcel, the RBL does sound like a nice idea. I'd suggest getting the RBL to blacklist them, *then* informing them, though. Otherwise, they'll probably go whine to the RBL maintainers. It may be harder to get off of the RBL once on it, and at the very least it would cause them some grief until they convinced the RBL people to remove them from the blacklist. That was exactly why I suggested informing them before the fact - I can't even email the RBL admins (they block, of course, everyone on the list g), and when I emailed them from another account I got a "standard message" back, telling me that I am blocked (like I didn't know it). [It's not me, or even my mail server, that is blocked - they blacklisted the whole domain of my server's *provider*.] So, I thought it might be too drastical to leave them with such a big problem, especially since it took me approx. 10 seconds to get rid of the emails... Perhaps. It took me far longer to transfer the damn mail than it did for me to delete it. Simply inserting a score rule to kill anything from sparklist.com eliminated it after that. Normally I or one of the other admins here would have just firewalled the domain off, but the connections were coming from openpgp.net, since that's what was relaying it. Of course, the list software could be altered to stop relaying mail from somebody after an excessive number of mails were received from them within a short period of time. That will never happen for various political reasons, for the same basic reasons that the list will probably never be set up to only accept mail from subscribers and remailers, and this kind of abuse will continue unabated. At the same time, the signal to noise ratio has been virtually zero for at least a year, mainly because the level of noise is just so damned high. (With "noise" being defined as "can u tel me how 2 mak a bomb?", general spam, and targetted DoS attacks like what just happened.) That probably indicates that the peak of the Cypherpunks list was long ago (which we all know anyway), but that it passed into old age and senility quite a while back.
dutch crypto accelerator chip and compaq
eet.com 10 Jul 2000 p 32 Pinjenburg Securealink [US|Europe] has a secure crypto module (battery backed ram, ARM, RNG, other stuff?) keeps secrets on chip; developed for banks, will sell to Compaq.
Re: Foreigners with guns
At 11:56 AM 7/12/00 -0400, Marcel Popescu wrote: Can a foreign citizen legally own a gun in the US? [More to the point, I'm in Georgia.] I've tried looking around the web (NRA, Google...) but nobody talks about us poor foreigners :) [Even if I manage to remain in the US for a while, I don't intend to apply for citizenship.] Mark A *legal* resident may do so. But IANAL check the US laws. Or easier, ask the motivated: call a gun shop. They want your $ but not to lose their license. Your english is probably better than most of the yokels.
Re: Eudora spyware?
At 11:22 PM 7/12/00 -0400, negafoo wrote: -BEGIN PGP SIGNED MESSAGE- I've noticed that Eudora 4.3 (in paid mode) has developed a habit of making an internet conection on startup. If I allow the connection to succeed, some packets are exchanged and then Eudora consumes 100% of my CPU time for about 0:01:10 (by stopwatch). I also note that when I'm offline, Eudora tries occasionally to connect to jump.eudora.net. I'd like to find out what's going on. Can a list member recommend a good packet sniffer? Or perhaps this has been covered recently and someone can provide a pointer to the discussion? If you are running Win95 find windump, a tcpdump clone, it works fine.
tapping (was Re: 'Carnivore' Eats Your Privacy)
At 12:26 AM 7/14/00 -0400, Declan McCullagh wrote: (resend) Michael: Have you forgotten what list you're on? Unlawful government eavesdropping should not primarily be fought in Washington. It should be fought with technology. The ACLU and EPIC are good for defensive battles only, and when it comes to restraining government surveillance, they lose more than they win. -Declan I realize you're being facetious but the law holds back that fraction of government that plays by the public laws. Ergo its not entirely futile. ACLU et al. battles are good publicity.
Re: the book
Tim May [EMAIL PROTECTED] writes: At 6:51 PM -0400 7/16/00, David Marshall wrote: "brat" [EMAIL PROTECTED] writes: hook me up with some cool stuff Try altering some acetaminophen (the active ingredient in Tylenol). Pull the O=C-CH3 off the amine, and then remove the hydroxyl group from the para position. This will give you aniline, which is just an aromatic cyclohexane ring with an amine attached as a substituent. Aniline is a deadly poison because it kills the human liver. However, in your case, taking huge quantities of it would likely be the best thing you could ever do for the gene pool. If this is too much trouble, you can hook your trachea to the low-pressure freon line of some refrigeration equipment and inhale deeply. Careful! Next you'll be telling the bombz kiddies how to make hydrogen cyanide gas with just their mother's nonstick frying pan and other simple kitchen products. Well, I *could* think for about five or ten minutes, try to remember some of my organic chemistry, develop a method to do this with a halfway decent yield, and then post it. But the average American is dumb, and the average politician is dumber. While I wouldn't mind this idiot killing himself, I'd hate for him to use his newly found 31337 hax0r ch3m1s7ry sk1llz to drop stuff in peoples' drinks, though. So I won't do that, because it would be wrong. Yes, incredibly wrong. I see your point. :) Then Agent Gordon will be able to report to Senators Feinstein and Kelley that the Evil Cypherpunks are training terrorists and assassins. Judging from what Congress is doing, next they'll get a list of the nation's chemistry and biochemistry college professors and report that they're training terrorists and drug dealers. Somehow, though, I think Swinestein and her ilk would be happy to see higher education banned. It makes their manipulation easier, and their lies less likely to be rebuffed. "Your honor, the State charges the defendant with four counts of possessing unlawful medical knowledge in the form of 'Medical Physiology' by Guyton, two biochemistry texts, and a microbiology textbook, and with one count of possessing unlawful chemical knowledge which COULD BE USED to make a terroristic device, in the form of 'Organic Chemistry' by McMurry."
patent ( was Re: Cringely on Carnivore )
At 01:07 PM 7/17/00 -0400, Michael Motyka wrote: Cam you say "patent" at least for https, Oh I'm longing for September 20th !! (The pessimistic side me predicts that on or around that date the NSA/RSA will announce some sort of legal maneuver to extend or complicate the end of the patent. Correct me if I'm wrong but isn't it the case that only an act of Congress can extend the term of a patent? Mike Probably. But congress does give its agencies power to regulate the details. E.g., FDA, EPA, DOT, etc. Patent duration may be a detail. Congress/USPO certainly don't regard patent-time as anything but a carrot, nothing sacred about it. E.g., I just read that if you take your drug to OTC status you get three extra years patent protection. Various pharmcos with expiring IP are doing that. Others milk the 500% markup on Rx (vs. OTC) til its gone. Time will tell.
Re: It's called progress...
At 03:34 AM 7/18/00 -0400, Reese wrote: Great Book. Executive summary, please. Go to amazon
Re: FBI system covertly searches e-mail
At 02:37 AM 7/18/00 -0400, Tom Vogt wrote: two advantages: a) more encrypted traffic on the web. With known plaintext... b) some people might want to read cypherpunks without the intermediate parties being aware of the fact (I know companies that monitor e-mail). If that's a concern, use the anonymizer (via SSL) + web archive. b2) running the encrypted listserver under a different name than "cypherpunks" would possibly a good idea for this case. Any fixed name would get known.
Re: how EXACTLY does this protect privacy?
At 10:02 AM 7/18/00 -0400, Marcel Popescu wrote: X-Loop: openpgp.net From: "Tim May" [EMAIL PROTECTED] That Marcel is so actively "spreading the good word" on the Cypherpunks list is truly bizarre. I'm not "spreading the good word", idiot. I was objecting to Jim Choate's idea that anarchism and Christianity are incompatible. Mark __ Do You Yahoo!? Talk to your friends online with Yahoo! Messenger. http://im.yahoo.com
security software: InTether
At 09:50 AM 7/18/00 -0400, Fisher Mark wrote: David Honig writes: You want to overwrite a dozen times with random (each time) data. I'd be cautious about saying that. Way back when I held a security clearance, the instructions were: * Overwrite with patterns 99 times for SECRET materials; and * Overwrite with patterns 999 times for TOP SECRET materials. Hmm. I thought I remembered the ~dozen from some FIPS spec, but I could be wrong. The more the merrier. As the forensic technology has undoubtedly improved in the past 20 years, I strongly doubt that "a dozen times" would be anywhere close to obscuring all evidence of the data. You're much better off physically destroying the disk by melting it or somesuch. Yes but someone wanting to overwrite data may not be in a position to destroy the medium. E.g., its your working machine's hard drive. If you don't have the option of physically destroying the disk, writing random data for a few hours ought to get you on the way towards making your original data unrecoverable. (Note that I said "on the way"!) Now there's a good use of the idle cycles on a secure machine: the wiping daemon.
Tim is an idiot (was Re: Marcel tries to nudge Tim to post
At 10:02 AM 7/18/00 -0400, Marcel Popescu wrote: give a damn about Romania either, whatever that is. [I still have to find someone able to define "Romania" or "country" in a meaningful way.] You might start with people who speak romanian, who eat romanian food, and look like other romanians. I'm *sure* the folks in neighboring countries have a good idea what a romanian is. Ask them. As for 'country', you'll find that there are folks with small arms stationed along roads leading out of romania, who believe strongly that *their* country starts there. Romania is that solid angle of earh claimed by none of your neighbors.
us doesn't ban net gambling (this year)
Tuesday July 18 4:55 AM ET House Fails to Ban Most Internet Gambling By Andy Sullivan WASHINGTON (Reuters) - The House failed to pass a bill that would criminalize most forms of Internet gambling, an industry that has grown explosively in the past several years. Proponents of the bill had a majority of the votes but failed to reach the two-thirds mark required by a special process that would have expedited the bill's passage. The final vote was 245-159, with 30 abstentions. The bill would have banned online wagers on sporting events and casino games, as well as the sale of lottery tickets online. ...
MS (in)security++
The reason your hard drive was reformatted was because you received that e-mail. A spokesperson for USSR Labs told MSNBC.com that the group has been able to add malicious code to e-mail headers that executes as soon as the target computer begins to download the e-mail. http://www.msnbc.com/news/432208.asp?cp1=1#BODY [of course the morons require javascript to read the article..]
targets
Haven't these writers ever heard of the Deutsch affair? Home computers hold corporate secrets too. COPYCATS LIKELY TO POUNCE Since sample code exists, Cooper expects copycats to begin writing malicious e-mails fairly soon. There is one mitigating factor since the flaw does not impact most corporate users, and home users are generally a less interesting target, that might limit computer vandal interest in the problem. Corporate users normally have more sensitive, valuable information stored on their computers. http://www.msnbc.com/news/432208.asp?cp1=1#BODY
Re: none
"Cathy Booth" [EMAIL PROTECTED] writes: Now I'm going hunt you down! I'll come at you in that many different directions - you just wouldn't know who your dealing with. P.S see you in the near future! Make sure you don't walk into my line of fire. Besides, while your multiple personality disorder may trick you into thinking that you can come at me from many different directions at once, you'll find that far more difficult to do with only one body. However, as another service, Cypherpunk Industries is willing to dismember you into as many pieces as you like. Then you can hire someone to throw those pieces at members of the list. Everyone welcome the script kiddie back to the list. -- David Marshall Fuckwit Relations Cypherpunk Industries
Re: Diploma
At 02:21 PM 7/19/00 -0400, [EMAIL PROTECTED] wrote: I am wanting more information on the Diploma deal but the number show on the web site is disconnected. http://www.inet-one.com/cypherpunks/dir.2000.01.03-2000.01.09/msg00115.html Lets hope he doesn't work in WellsFargo *data security*...
Re: Dropping toad.com
At 03:29 AM 7/20/00 -0400, Tim May wrote: Check out the standard features of Majordomo. The command "who cypherpunks" has been used since the inception of the list(s). But most (all?) other nodes have shut off this 'feature'
customs searches of disks?
This came up on [EMAIL PROTECTED]: At 12:29 AM 7/21/00 -0700, anonymized wrote: The interesting question (for this list) is, if some border officials search your hard drive and they encounter encrypted files, what will they do? My guess would be that they will demand the key and threaten to deny you entry if you don't give it to them. It does not appear that there are any international laws or standards that say they can't do that. But could they do that to an American returning to America? Sure, a brit returning to post-RIP britain is fresh meat. Or a furriner coming to America (who isn't yet on US soil).
Re: Dropping toad.com
"Patrick Henry" [EMAIL PROTECTED] writes: Jim Choate wrote: As of today the current toad.com member list is below. I can't believe that 1) the who command is enabled on toad, and 2) that you'd post all these addresses to the list. Talk about a massive invasion of privacy. First, if you believe that the subscription list for a mailing list is secure, you're naive. Second, the WHO command has always been enabled on Cypherpunk lists, and (at least as far as I know) its disabling at some (if any) nodes is a relatively recent development. Third, the addresses are publically available. So Choate posted them to the list. There's no more invasion of privacy than before; anybody who wanted the addresses could have gotten them in literally about 10 seconds. Fourth, subscribe under a psyedonym if you're concerned about this, and make sure that the psuedonym isn't conclusively linked to your real world identity. Is Tim really Tim? Are you really Patrick Henry? Am I really David Marshall? Modulo reputation capital, does it really matter anyway? ObCode: Nym servers are very well suited to this. Unfortunately, to really be practical they need a seamless frontend. Decryption, encryption, and authentication need to occur automatically, or the option needs to be there for them to occur automatically. Something like premail is good, if it can be made to work with the various mailers. Perhaps the simplest way to do it all is: 1) Have a process which runs on the mail spool and does the decryption and verification of signatures. This should be pretty clean, since most mailers are set up to use the mail spool in the first place. Even something like Gnus wouldn't have any problem with this, since it reads from the mail spool, and this program would be run before it's all sorted. 2) Sending mail could work similar to how premail works/worked. 3) The individual mail readers would need code which just interfaces to this mess. In particular, mail which comes in under a nym needs to go out *under that nym* unless the user explicitly orders otherwise. If I wasn't so occupied with grad school right now, I'd give it a shot. It's a fair bet that everyone else is just as busy, so I'm not holding my breath for anything like this to be coded. :) Has something like this already been done? (Freedom is out; Why has been discussed on this list before, and I won't go back over it.)
Re: Jim Und Dave?Thanks Mr anon
[EMAIL PROTECTED] writes: Mr Anon did a good job. If Jm and dave don't like the heat get out of the kitchen.Get a job thats more dangerous like a taxi driver or clerk at 7-11 Or an AOL tech support representative. I hear that they're subjected to idiocy in quantities far in excess of what is generally considered the maximum safe daily dose.
Re: Important, your Naughty Mail subscription!
"Doug and Denna Morgan" [EMAIL PROTECTED] writes: DD No way. This one is just *too* easy.
Re: ZKS economic analysis
At 04:39 AM 7/24/00 -0400, Tom Vogt wrote: David Honig wrote: there's a difference between this and a database system. almost all laws on privacy (where such exist) realize that. Really? What's to stop me from 'gargoyling' (to use a _snow crash_ term): running a few VCRs on my surroundings as I wander in public, later indexing the faces and conversations I picked up? And then offering a service in which you submit a face, I'll tell you where I've seen it. said difference? namely the one between manual and automatic data processing. That's the implementation detail I'm varying in this gedankenexperiment, but since when does implementation matter for law/morality? What if I've got an eidetic memory and 20/10 vision? that said, I think your example is a good one on the borderline between personal data (which is protected, at least in the civilized world) and unpersonal data (which is public domain). a face alone is not, as I read the law, a piece of personal data. Anything you can see or hear from the street is public domain. (in my recollection of US law) Telescopes are supposedly invasive; but an optical zoom on a videocamera is pretty compact.
UK admits it bugged Gerry Adams' car
Sunday a note appeared in the LA Times that the BBC was releasing Monday an interview with a UK cabinet minister who admits she authorized the Gerry Adams car bugging last year. (Adams found the bug) Anyone heard the interview yet?
Re: John Young, the PSIA, and Aum
At 06:03 AM 7/24/00 -1000, Reese wrote: At 11:20 AM 24/07/00 -0400, David Honig wrote: At 12:42 AM 7/24/00 -0400, Reese wrote: Japan may not have the US constitution, but their current constitution was written by the US government in 1946. The American concepts of civil rights are most definitely a part of the Japanese constitution. For those who may be interested: Too bad we forgot the right to bear arms, freedom of religion, and freedom of speech. Etc. Fuck you David Honig, I didn't write the above, Greg Vassie did. Be more careful with the GodDamned Quotes. Mea culpa, I did check but miscounted