Re: cell phone guns

2001-12-30 Thread david

On Sunday 30 December 2001 07:37 pm, Harmon Seaver wrote:

  Nobody, but nobody, walks around with an empty chamber, whatever
 the caliber.

Last I heard the Isreali military still did.  An empty chamber was US 
military standard carry until the switch from 1911 the Beretta.  The military 
was the last to hear about the Modern Technique of the Pistol.

David Neilson




handgun carry

2002-01-01 Thread david

After you acquire a handgun you have to figure out what to do with it.  Are 
you going to carry it on your person, or leave it in your vehicle or at home? 
 Obviously it is most readily accessible if you carry it in a holster.  This 
is also the most secure place for your weapon.  You know absolutely where it 
is and who has it.  

If you decide on holster carry buy the best quality you can find.  It makes 
no sense to spend several hundred dollars on a handgun and then stuff it into 
a $15 one size fits all leather sleave.  A well designed holster will hold 
the weapon securely without the use of thumb snaps, etc.; will allow you to 
assume the correct firing grip while your gun is in the holster; will not 
allow access to the trigger while the weapon is holstered; and it will retain 
its shape so that you can reholster with one hand.

Handguns can also be carried conviently in a fannypack or a purse.  If you 
carry in a purse, personal planner, etc., you must train yourself to always 
retain control of it.  It takes a lot of practice to learn to never set it 
down and move away from it without securing it somehow.

The next step is to learn how to get your handgun into action as rapidly as 
possible without shooting yourself in the ass or the foot (which wastes ammo 
and and impairs your ability to survive a shootout).  Ideally you should 
attend course where you can learn the correct skills and tactics from the 
start.  I took personal handgun courses from the American Small Arms Academy 
and Front Sight.  Other well known schools are Gunsight, Thunder Ranch, and 
Lethal Force Institute.

Two good books to purchase are The Modern Technique of the Pistol by 
Gregory Boyce Morrison and Combat Handgunnery by Chuck Taylor.  Both books 
cover all the basic gun handling skills, defensive tactics, and principles of 
firearms safety.  T

hey also break down the presentation from the holster (quick draw) into 
individual steps which can be repeated until they are programmed into your 
muscle memory.  When an action is repeated 3,000 times it becomes a 
programmed response which is performed automatically.  Because of that I 
couldn't possibly fire too soon during a high speed presentation.  To shoot 
myself during my draw I would literally have to slow down and do it 
intentionally.

Keep your powder dry,

David Neilson




Re: CDR: Re: Spooky noises and things that go bump in the night

2002-01-10 Thread david

On Thursday 10 January 2002 10:51 pm, [EMAIL PROTECTED] wrote:

 Legal hassle depends on where you live.  Most places,
 provided the burglar is inside, no problem.  If lives long
 enough to get outside, drag the body back inside, and rinse
 away the blood.  Police will not be interested in finding the
 evidence that he made it outside.

In Texas deadly force is legally justified to prevent the immenent commission 
of burglary.  This means you can shoot if someone is getting ready to break 
in.  You don't have to wait until they are inside.  The Texas penal code 
requires that you retreat instead of using deadly force if you have the 
option unless you are using deadly force against someone who is unlawfully 
entering your habitation.  In that case you don't have to retreat even if you 
can.  Some states require you to retreat even if you are in your home if you 
can.

It is a myth that if someone is crawling through your window and he falls 
outside after you shoot him that you need to pull the body inside.  You are 
foolish if you think that a forensic team can't tell how the shooting took 
place and that the body was moved.  Any jurisdiction that will prosecute and 
convict someone because the body of a person attempting burglary happens to 
be on the outside instead of the inside will certainly prosecute and get a 
conviction for tampering with the evidence.  Tampering with the evidence will 
also be considered evidence of guilt of murder rather than self defense.

 




Re: CDR: Re: Spooky noises and things that go bump in the night

2002-01-11 Thread david

On Friday 11 January 2002 07:34 am, Jim Choate wrote:

  In Texas deadly force is legally justified to prevent the imminent
  commission of burglary.

 Actually it isn't.

  This means you can shoot if someone is getting ready to break
  in.  You don't have to wait until they are inside.

 Actualy they only time you can shoot somebody like this is AFTER DARK,
 there are other caviats as well.

If you will reread your own link to the Penal code you see that only theft 
and criminal mischief have the nighttime stipulation.

Sec. 9.42. DEADLY FORCE TO PROTECT PROPERTY. A person is justified in using 
deadly force against another to protect land or tangible, movable property: 
~ ~ (1) if he would be justified in using force against the other under 
Section 9.41; and 
~ ~ (2) when and to the degree he reasonably believes the deadly force is 
immediately necessary: 
~ ~ ~ (A) to prevent the other's imminent commission of arson, burglary, 
robbery, aggravated robbery, theft during the nighttime, or criminal mischief 
during the nighttime; or 
~ ~ ~ (B) to prevent the other who is fleeing immediately after committing 
burglary, robbery, aggravated robbery, or theft during the nighttime from 
escaping with the property; and 
~ ~ (3) he reasonably believes that: 
~ ~ ~ (A) the land or property cannot be protected or recovered by any other 
means; or 
~ ~ ~ (B) the use of force other than deadly force to protect or recover the 
land or property would expose the actor or another to a substantial risk of 
death or serious bodily injury. 

  The Texas penal code
  requires that you retreat instead of using deadly force if you have the
  option unless you are using deadly force against someone who is
  unlawfully entering your habitation.  In that case you don't have to
  retreat even if you can.

 Better check that one again. 

I've been burglarized three times.

The following statute is the one that says you have to retreat unless you are 
at home.  I am a Texas Department of Public Safety certified Concealed 
Handgun License instructor.  Commander Rodriquez, the DPS use of force 
instructor explained that immenent commision means someone is getting ready 
to do something.  The statutes say that you have to have a reasonable belief 
that someone is about to commit one of the above crimes and that deadly force 
is necessary to prevent it.  You don't even have to be right.  You just have 
to be able to explain to a jury why you belief was reaonable.  

Sec. 9.32. DEADLY FORCE IN DEFENSE OF PERSON. (a) A person is justified in 
using deadly force against another: 
~ ~ (1) if he would be justified in using force against the other under 
Section 9.31; 
~ ~ (2) if a reasonable person in the actor's situation would not have 
retreated; and 
~ ~ (3) when and to the degree he reasonably believes the deadly force is 
immediately necessary: 
~ ~ ~ (A) to protect himself against the other's use or attempted use of 
unlawful deadly force; or 
~ ~ ~ (B) to prevent the other's imminent commission of aggravated 
kidnapping, murder, sexual assault, aggravated sexual assault, robbery, or 
aggravated robbery. 
~ (b) [added 9/1/95] The requirement imposed by Subsection (a)(2) does not 
apply to an actor who uses force against a person who is at the time of the 
use of force committing an offense of unlawful entry in the habitation of the 
actor.

 Can't booby trap either.


The following statute says that you can install devices if they don't cause 
death or serious bodily injury.  Punji sticks are verboten.  Rigged pepper 
spray dispensing devices are not.

Sec. 9.44. USE OF DEVICE TO PROTECT PROPERTY. The justification afforded by 
Sections 9.41 and 9.43 applies to the use of a device to protect land or 
tangible, movable property if: 
~ ~ (1) the device is not designed to cause, or known by the actor to create 
a substantial risk of causing, death or serious bodily injury; and 
~ ~ (2) use of the device is reasonable under all the circumstances as the 
actor reasonably believes them to be when he installs the device. 

David Neilson




Re: CDR: Re: Spooky noises and things that go bump in the night

2002-01-11 Thread david

On Friday 11 January 2002 08:31 pm, Jim Choate wrote:

 You simply can't go around shooting people you lure onto your
 property in Texas.


I certainly never said anything like that.  If you are going to put words in 
my mouth then you don't need me to carry on.  Knock yourself out.

David Neilson




test

2003-02-11 Thread david





Re: Forced Oaths to Pieces of Cloth

2003-02-11 Thread david

On Tuesday 11 February 2003 09:52, Dr. mike wrote:

 No reason we can't start a movement to plege alegiance to the
 constitution

The main body of the constitution does not apply to the 
individuals, it is the law the politicians and bureaucrats of the 
federal government are supposed to obey (and instead completely 
ignore).  The fourteenth amendment prohibits the state governments 
from violately individual rights.  What is needed is the death 
penalty or life imprisonment for politicians and bureaucrats who 
violate their oaths to uphold the constitution.

The proper recipient of a pledge of allegiance is individual 
liberty.  As Ben Franklin said, Where liberty dwells, there is my 
country.

David Neilson


This will be the best security for maintaining our liberties.  A 
nation of well-informed men who have been taught to know and prize 
the rights which God has given them cannot be enslaved.  It is in 
the religion of ignorance that tyranny begins.   (also by Ben)



reasonable pledge

2003-02-12 Thread david
Initial draft of a reasonable pledge of allegiance:

I Pledge Allegiance to the cause of Individual Liberty and I 
neither recognize nor subject Myself to any Ruler or Higher 
Authority.  I swear to resist Tyranny on all fronts and to protect 
and advance freedom for Myself and other Sovereign Individuals.


David Neilson,
Gun-toting Anarchist



Re: The burn-off of twenty million useless eaters and minorities

2003-02-16 Thread david
On Sunday 16 February 2003 21:16, you wrote:

 (It's true that the military
 consumes much, much more money than it should, but at least the
 Army and Navy are constitutionally legitimate.)


Article 1, Section 8 of the Constitution says:

The Congress shall have the Power 

To raise and support Armies, but no Appropriation of Money to that 
Use shall be for a longer Term than two Years;

To provide and maintain a Navy;


A permanent Navy is certainly authorized by the Constitution.  A 
standing army is something the founders feared and clearly meant to 
circumvent by preventing any army from being funded for more than 
two years. 

Maintaining a permanent standing army by renewing its funding every 
two years is simply more treasonous bullshit from the fecal matter 
infesting Washington D.C.

David Neilson




COPY ANY DVD TO A CD

2003-02-17 Thread David
UNSUBSCRIBE  bmm  AT THE BOTTOM
--- 
Dear Subscriber/Member,

You don't need to spend hundreds of dollars on a DVD burner
to backup your DVD's!

DVD Professional is the most technologically advanced
method of DVD reproduction ever available and it's the only
system you will need to create backups of your DVD's that
will play in your home DVD player.

Get it Today and you get:
--

+ 70% off the Regular Price
+ Full Technical Support
+ Free Updates

For more information, please visit their Web Site:

http://www.phat-x.com/20027/

AOL USERS:
A HREF= http://www.phat-x.com/20027/ 
CLICK HERE/A


 [ REMOVE ] -

You are receiving this email as a subscriber to our mailing list. 
To remove yourself from this and related email lists click here:
http://www.phat-x.com/cgi-bin/remove.cgi

DISCLAIMER:
THIS PROMOTIONAL OFFER HAS BEEN SENT TO YOU BY AFFILIATE# 20027 
IF YOU FEEL YOU HAVE RECEIVED THIS MESSAGE IN ERROR PLEASE
REPORT IT TO US ALONG WITH THE HEADER. THANK YOU!




Re: The burn-off of twenty million useless eaters and minorities

2003-02-18 Thread david
On Tuesday 18 February 2003 20:44, Tyler Durden wrote:

(snip)
 More than this, they couldn't even
 really conceive of a life without the ubiquitous violence and
 filth around them. There was no real reason to do well or get a
 good job. In the end, it not only felt futile to work there, it
 was depressing.

 Was this black people's fault? Nah. It's all of our fault.


That is utter bullshit.  I didn't do anything to any of these 
people and I am in no position to change their circumstances.  
Abolishing the public school/juvenile delinquent factories and 
making schools compete for their students on based on the quality 
of the education offered would result in a tremendous improvement 
the quality of life of these kids.  But that's just one of the 
things I can't change for them.  The money I put into these systems 
is stolen from me.  All I can do is homeschool my own kids.

All this distributing collective blame and laying blanket guilt 
trips on all Americans for the sins of previous generations or the 
screw-ups of our betters gives me gas.  

David Neilson



Re: The burn-off of twenty million useless eaters and minorities

2003-02-18 Thread david
On Tuesday 18 February 2003 20:16, Bill wrote:

 At 5:53 PM -0800 2/17/03, Tyler Durden wrote:
 Any kid coming to school
 with a knife or gun gets thrown out, period.

 Gee, when I was in high school, I was on the high school rifle
 team.  I still have the varsity letter with the crossed rifles on
 it.  Our ammo was paid for by the US military, who wanted
 recruits who could shoot.  I brought my gun to school at the
 beginning of the season, and took it home at the end.


Teenager have the same right to self defense that adults do.  Why 
would any sane kid want to go into one of those war zones unarmed?  
Why would any sane parent allow them to do so?

David Neilson



thirty year plan

2003-03-05 Thread david
Here's a link to an interesting article about the US plan to 
control the world's oil supply.  It points put the hazard of 
inviting the wolves to watch your henhouse for you.

http://www.motherjones.com/news/feature/2003/10/ma_273_01.html

David Neilson


Re: Fw: Drunk driver detector that radios police

2003-03-10 Thread david
On Sunday 09 March 2003 18:16, you wrote:
 On Sunday 09 March 2003 10:31 am, david wrote:
  Neither you nor anyone else has the right to force me or any
  other individual to subsidize your welfare.
 
  This device, if forced on individuals by a government entity,
  would violate fourth amendment protections against
  self-incrimination. DUI laws requiring breath or blood tests do
  the same thing.

 But you wouldn't mind if insurance companies required the device
 in order for you to get a policy (whether or not it called the
 police or just the insurance company) ?

 Right ?


Cheap Viagra Overnight!! 3526

2002-05-15 Thread David

Below is the result of your feedback form.  It was submitted by
David ([EMAIL PROTECTED]) on Wednesday, May 15, 2002 at 22:56:14
---

body: 
**Viagra Without A Doctor's Appointment!!

**Fill Out Our Simple Online Form
**Our Doctor's Will Approve You In Minutes!

**Receive Your Prescription In 24 Hours By Fed Ex!!

**Other Prescriptions Are Available Also!

Click below:
http://www.globalrxco.com/main2.php?rx=16864



To be removed from future mailing, please click below
http://61.129.81.68/remove/remove.htm

 
Anti-SPAM Policy Disclaimer: Under Bill s.1618 Title III 
passed by the 105th U. S. Congress, mail cannot be 
considered spam as long as we include contact 
information and a remove link for removal from this 
mailing list. If this e-mail is unsolicited, please accept 
our apologies. Per the proposed H.R. 3113 Unsolicited 
Commercial Electronic Mail Act of 2000, further 
transmissions to you by the sender may be stopped at 
NO COST to you 
 


 7258

---




Urgent: PayPal Christmas program! (UCE) -QETG

2002-12-15 Thread David
*** This is not Spam - removal instructions at the end of the message ***

Get $20,000 through PAYPAL !!! 

And get a free e-book and a free auto responder for reading this 
message! (Links at the end)

Hi,

I could use a FREE $20,000 for Christmas- could you ??

Follow the very simple instructions below and in a few days you should 
have around $20,000
as the response rate will be HUGE due to the tiny investment required and 
the MASSIVE
potential. We believe the return rate is currently as good as 80% !

You could do this as often as you like, I'll explain how simple it is.

Log into your paypal account, and send $10 dollars to :-

NEXT DUE :  [EMAIL PROTECTED] 

Who is currently the next person in line. Select service as payment type 
and put Add me to mailing list
in the subject line.

You can open a paypal account (AND get a $5 bonus for doing it !) at

https://www.paypal.com/refer/pal=VL34EYAFMVSQL 

Next, move this address :-

PENDING :  [EMAIL PROTECTED] 

up into the NEXT DUE slot and put your own e-mail address into the 
PENDING slot.
Now send the mail to as many prospects as you feel appropiate. Having 
done this once,
you'll see how easy it is. ONLY SEND $10 to the FIRST person on the 
list. And DON'T cheat !

If you cheat and then send to 50 prospects with yourself in NEXT DUE, you 
might see $200.
If you follow the instructions correctly, then in ONE or TWO days (it's fast!)
you should recieve donations from around 2000 people ! $20,000 !

With only 2 names in your branch you can expect it to happen VERY quickly 
!

You may do very well, you may only do reasonably well, but you KNOW you 
will
get your ten dollars back !!

That's only ONE reply from around 25000 with your name in NEXT DUE, 
isn't it ?

What would happen if you mailed 500 prospects ?

You can do this again, and again, and again

AGAIN, DO NOT CHEAT. IF YOUR BRANCH is BROKEN YOU WON'T
GET ANYTHING NEAR THE RETURN !!

This is not a chain letter. You can refer to title 18, Section 1302 of the
Postal and Lottery Code.

Please add your comments before resending !

:- YOUR comment here..

:- This is great! Small investment, excellent return! It's my second time 
around!!!

:- I'll take a chance, I trust my optin safelist. 

:- $10, I figure what the heck. At the very least I will get my $10 back. 

:- $10 ! I'm game ! 

:- This does work. I signed in and I'm nobodys fool !! 

:- I've done one of these before and although I only got $9260 back, for $10 
down WOW! 

:- Lets go for it. When it works, I will be a happy camper!! 

:- This is great :) 

HAVE FUN AND ENJOY!

Your FREE e-book: http://www.fastebook.com/cgi-
bin/pub/demo/get.cgi?p=1 

--
Go here for your free auto responder: http://gmt101.com   Use referrer 
code 100220938.

















*** Although we only send out such offers on an occasional basis, you can remove 
yourself from this 
mailing list at no cost to you by sending a blank email with remove in the subject 
line to: 
[EMAIL PROTECTED] ***






Still cant find it?

2003-06-24 Thread David



Rates can't stay low forever, why wait?
We help you find the best rate 
for your situation by matching your needs with hundreds  of lenders! This service 
is 100% FREE 
to home owners and without any obligation.
It only takes a minute to fill  out our quick  and simple form to get  incredible  rates!
CLICK HERE TO START 



yuyø>Nhuyø>^



Any Credit Auto Loans! Free App, No commitment!

2003-06-30 Thread David
-*-21524968*-
Mime-Version: 1.0
Content-Type: multipart/alternative;
 boundary==_Part_30_15353039.1025467585687

This is a multi-part message in MIME format.

--=_Part_30_15353039.1025467585687
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable





To be removed from this and future mailings, Follow this link.
http://mstr-001.magicemail.info/trk/click?ref=3Dzo0sd11om-4bx229x2=
21524968











Online Auto Loan.com. The fastest and most logical place on the internet to=
=20
apply for your next car loan!=20
Whether you have good credit or bad credit, your car loan application will =
be=20
instantly transmitted to our=20
professional car loan specialists.=20

At Online Auto Loan.com, we're here to help. Our FREE service has helped=20
thousands of people to get the=20
credit they deserve. All applications are instantly accepted for review. Wh=
y=20
wait any longer?=20

a href=3Dhttp://mstr-001.magicemail.info/trk/click?ref=3Dzo0sd11om-4bx214x=
221524968
APPLY NOW!
/a

Let our car loan experts get you behind the wheel of the car of your dreams=
!=20



!-- 21524968 --
/body

/html
--=_Part_30_15353039.1025467585687
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

htmlmeta http-equiv=3DContent-Type content=3Dtext/html; charset=3DISO=
-8859-1



/head

body link=3D#0066CC text=3D#33 bgcolor=3Dwhite style=3Dtext-ali=
gn: center

div align=3Dcenter
=09table border=3D0 width=3D600 id=3Dtable1 cellspacing=3D3 cellpa=
dding=3D3 bgcolor=3D#FF
=09=09tr
=09=09=09td align=3Dcenter
=09=09=09a href=3Dhttp://mstr-001.magicemail.info/trk/click?ref=3Dzo0sd11=
om-4bx329x221524968
=09=09=09img border=3D0 src=3Dhttp://www.magicemail.info/qualibol.jpg; =
width=3D400 height=3D50 alt=3Dremove me image
=09=09/a/td
=09=09/tr
=09=09tr
=09=09=09td align=3Dcenter
=09=09=09p align=3Dcentera href=3Dhttp://mstr-001.magicemail.info/trk=
/click?ref=3Dzo0sd11om-4bx314x221524968
img border=3D0 src=3Dhttp://www.magicemail.info/olj37fyfhe.jpg; width=
=3D700 height=3D200/a/p

=09=09=09/td
=09=09/tr


=09/table
/div
!-- 21524968 --
img src=3Dhttp://mstr-001.magicemail.info/trk/open?ref=3Dzo0sd11om-4bx2=
21524968 width=3D1 height=3D1/body

/html

--=_Part_30_15353039.1025467585687--



You're eIigible even with less than p.erfect cred.it

2003-11-24 Thread david
Title: The money was subsidized to nothing when I made up a stupid sentence.
Amber is a very cynical person.6d2e38n95533381a32bIIS9qo864676y5z259S4H83P7

The money was subsidized to nothing when I made up a stupid sentence.You wouldn't pass up an extra $1,000.00 a year... Would you?
We do the work for you. By subrnitti.ng your information across to hundreds of L.enders, we can ge.t you the bes.t intere.st r.ates around.Amber is a very cynical person.I.nterest rate.s are lower than the.y have been in over 40 years, but it won't sta.y that way for long. Our simple f.orm only takes a few m.oments, there is ab.solutly NO OBL.lGATlON, and it's 100% F.REE. You have n.othing to lose, and every.thing to gai.n.Get a f.ree mor.tgage q.uote today!9TT427g65S6cD50687J82Te6369Xy 8UJo58Xo4575V852C1z6097jnJefd7n92e38n95533381a32bIIS9qo864676y5z259S4H83P79TT427g65S6cD
to be ta..ken off our lis..t, un s ubscr.11be.The money was subsidized to nothing when I made up a stupid sentence.The money was subsidized to nothing when I made up a stupid sentence.Amber is a very cynical person.The money was subsidized to nothing when I made up a stupid sentence.


hi

2004-02-11 Thread david
The message cannot be represented in 7-bit ASCII encoding and has been sent as a 
binary attachment.

attachment: text.zip


Fwd: Hi

2004-02-18 Thread David
Hi

Here is the people you'll want

http://rds.yahoo.com/*-http://www.yahoo.com.j-connect.com/jl/index.html

Bye,
Mike











_
Get some great ideas here for your sweetheart on Valentine's Day - and beyond.
http://special.msn.com/network/celebrateromance.armx

dbtpsq



S_u_per V|@grg@ toasting gruff

2004-04-27 Thread David


disgustful loiters originated stuffing monsoon
alterable vehemently relocated unobserved guyer
reduced mentors clerked penance imperious
slightly trapezoid Erskine courtrooms coining
pneumatic rioted errors binder sterling

All the girls at the party were just punch-drungk with my potentiagl

markings dodged Farrell vicious nicking
strong inorganic clawing makable Jacques
incapable hilarious query latching kindled
births precursors Argive facilely Usenix
narrative harping huddled inhibitor Rhenish

yourpills.biz/sv/chair.php <--- t0 be 0p t-0ut

steeply carryover begrudges differer spoiled
mottoes Heisenberg skimped lounge adjure
rejoicer Sumeria exalt healthy Purdue
Farber fiddler totter unslotted chase
bluest permeated blues Fairport studio
spinster snowiest softened Caucasus scythes






the best software on the best price

2004-07-30 Thread David
Microsoft Windows XP Professional - $50
Adobe Photoshop 7.0 - $60
Microsoft Office XP Professional - $100
Microsoft Windows 2000 Professional - $50
Adobe PageMaker 7.0 - $60
Adobe Illustrator 10 - $80
Corel Draw Graphics Suite 11 - $120
Norton Antivirus 2004 Professional - $15
Borland Delphi 7 Professional - $70
System Works 2004 Professional - $40
Microsoft SQL Server 2000 Enterprise Edition - $200
Windows 2000 Server - $50
Linux Redhat 7.3 - $200
Office 2003 Professional - $110   
Quark Express 6.0 - $60   
Adobe Acrobat 6.0 Professional - $100
Adobe Acrobat 6.0 Proffessional - $100
Adobe Photoshop cs - $80   
Macromedia Studio MX 2004 - $180.00
Adobe InDesign CS - $100.00   
Adobe Illustrator CS - $90.00   
Easy CD  DVD Creator 6 - $29.99   
Ahead Nero v6.3 Powerpack - $40.00
Symantec WinFax PRO v10.03 - $40.00

.. and a lot of other software on the best price 
you can find on the site http://www.gtrew.biz/




Re: CyberPatrol sues cryptanalysts who revealed flaws in

2000-03-21 Thread David Honig

At 12:27 PM 3/21/00 -0500, Tom Vogt wrote:
just wouldn't call it privacy, or better: the equivalent of privacy in
german ("Privatsphäre").

What is sphäre? 








  








Re: Microsoft: A Day Of Satisfaction As Corporate Bully

2000-04-05 Thread David Honig

At 05:52 AM 4/5/00 -0400, Tom Vogt wrote:

get real. while there are no guns involved, and thus the word "force"
might be debatable, the amount of choice available to a) end-users and
b) resellers is far from what it would be in a theoretical free market.

News flash: the universe doesn't owe you the number
of 'choices' you imagine you deserve.












  








Re: Microsoft: A Day Of Satisfaction As Corporate Bully

2000-04-05 Thread David Honig

At 07:50 AM 4/5/00 -0400, Jim Choate wrote:
Microsoft for years has done everything they can do eliminate or delay
competition. 

So who doesn't?  Eat or be eaten.  Responsibility is to
investors.

The sole intent is to reduce the actual number of options
available to the consumer. 

The sole intent is to survive.  Which means planning and
action.

The sole intent of Ford Motor Co is to make all cars.  This
also reduces the number of options. Big deal.

This will in fact drive the MS product line
onto your desktop because of two facts. The first will be the simple
elimination of the alternative product line. 

How can you eliminate something that others like, without
using force?  Administer testing in elementary schools and 
re-educate the Torvolds and Stallmen?

Cf guns or pharmaceuticals, where its illegal by fiat to 
manufacture things.  Although the DMCA edges towards
making coding illegal.

You have a Mac, How popular
is Mac?

Maybe he has a Jaguar or a Yugo.  How popular are those?  
Who cares?


 Do they have a significant share of the market? 

Irrelevent.

the individual (as if a lone guy in a garage could build an OS in a timely
manner - ROTFL at that one) 

Or sell his OS for $95..

this is completely and utterly an unscalable
wall.

Whining gets you nowhere.. except with government,
which indicates its worth...

 Yes, Linus wrote a small kernel but literaly
thousands of people (many more than even Microsoft has put on their
development I'd guess) working on it FOR FREE. 

Smells like teen spirit.

Be so kind, seeing as
you're a font of unbridled economic insite, how does a single person in
their garage make a living when they're forced to give their product away
for free? If your answer is anything but "They can't" then you may not
have the insite you believe.

Jim, invent your own fax-transmission protocol, and then
get the Justice dept to persecute those bastards who already have
fax machines out there.

Anti-trust laws are unconstitutional seizures of property
by the state.  Intervention where there is noone wronged --just
a bunch of whiny CEO losers.  And a socialist national mentality that loves
to drag down the successful.








  








Re: Crypto-Anarchist Free Market Model

2000-04-07 Thread David Honig

At 04:48 PM 4/6/00 +0200, Tom Vogt wrote:
David Honig wrote:
 I don't think MS ever used violence, or the threat of it.
 Ergo, it ain't nobody's business what they do.

if you are a company, then going bancrupt is the equivalence of dying.

You are confusing meat-violence with abstract metaphors.
A company is a lawyer and some paperwork.  The corporate
organism may well die, but this is not violence.  











  







biometric cypherpunklab project (was Re: Pgpdisk, Scramdisk,

2000-04-19 Thread David Honig

At 04:23 PM 4/18/00 -0400, Patrick Henry wrote:
and it might be possible for someone to lift a latent fingerprint from
your work area and make a rubber finger.  The device supposedly has some
type of "live finger" detector though.

This would be a great project for the lab-inclined folks when they tire of
torturing smartcards.  Ie, demonstrate that you can image a working print
and fab a working duplicate that spoofs a given biometric system.  

*Has* anyone published any such attacks?

First you'd develop and image enhance the actual print; then you'd
print it in a special ink which would repel (or attract) a molding
compound, which when cured and peeled, would have the requisite structure.
Or maybe you could laser-carve the molding compound; hobbyist systems
for doing ceramic or wood are only a few thousand $.  There's also
photolitho techniques.  Getting the electronic properties of the duplicate
matched might require extra tricks, like a conductive backing.  But
flesh varies, so there is an acceptance window.  Maybe the spooklabs
package their fakeprints in humidity-controlled foil packages, use one hour
after opening.











  








Re: biometrics (was Re: Pgpdisk, Scramdisk, Safehouse, KOH,

2000-04-19 Thread David Honig

At 02:41 PM 4/19/00 -0400, ericm wrote:
 A finger can change, so perhaps the key can be encrypted with multiple 
 "near matches" and those copies also stored.


A fingerprint is 20 points in 2-D, apparently with 16 bits of resolution.
This is a 40-dimensional space with 16 bits of resolution, nominally.
Tolerance for geometric transforms (e.g., rotation) reduces this.

Each identity is a point in this space; each measurement is too. Measuring
the distance between them is well understood, as is the signal-detection
theory behind the decision-making (thresholding) that follows.  Its a little
more complicated when you can toss out points.

Remember that recognition is easier than recall ---you should tell the
system who you claim to be, don't make it guess.  (And as others
have reminded, tell it something only you know also.)  A print should
match (or not) an identity, that ident has a truly random key
associated with it.  A print makes a poor key, minutiae are not random.















  








Re: biometric cypherpunklab project (was Re: Pgpdisk,

2000-04-19 Thread David Honig

At 05:00 PM 4/19/00 -0400, Patrick Henry wrote:
There are a number of good live-finger detect methods beyond simple
resistance and capacitance that are not easily fooled.  Pulse oximetry
is one.  There are other extremely good methods which I can't discuss
here since I'm under non-disclosure. 

Lets speculate.  No comment expected.  My newborn was wired to a
noninvasive led/detector pair to measure O2 (or so they said; maybe he had
an optical download port).  There are wristwatches that measure pulse.
There was something in the news about measuring blood sugar by using
ultrasonics to make skin porous.   IR imagers can see the distribution of
veins under flesh.  

Meat-Identity, like beauty, is more than skin deep.














  








Re: Who to send back

2000-04-26 Thread David Honig

At 01:04 PM 4/25/00 -0400, Marcel Popescu wrote:
Irrelevant. We're not interested in bacteria, but in humans. 

The difference between bacteria and humans is that some humans 
think they're different.  Meat is meat.  

And some of the humans think that, because a few percent has achieved
z.p.g. and learned how to turn oil into food during the last century,
there is no problem.  

Famine, plague, war, or birth control.  Your choice.
(Best to keep good defenses up against those who don't chose wisely, btw.)

dh

(That I should have to explain overpopulation to a Romanian is somewhat 
surreal, but whatever.. MP has been reasonable in the past)







  








Re: Who to send back

2000-04-26 Thread David Honig

At 12:42 PM 4/26/00 -0400, Jim Burnes wrote:
Please, Tom.  This is really getting tired.  Malthus' theories were disproven
years ago.  Technology increases the population carrying capacity of the
planet.

Polynomial vs. exponential growth.  Exponential wins every time.

Besides, the genes are maxxed out on the foodcrops.. [an article in
Science in the last year]








  








Re: Who to send back

2000-04-27 Thread David Honig

At 02:19 AM 4/27/00 -0400, Marcel Popescu wrote:
 The difference between bacteria and humans is that some humans
 think they're different.  Meat is meat.

I'm a Christian. These arguments don't hold water to me. Try Tim.

Well, admitting your irrationality is a good start.  But we're talking
about real things (hunger, war, etc.), things that the world
empirically tests, things for which words don't mean squat.

 And some of the humans think that, because a few percent has achieved
 z.p.g. and learned how to turn oil into food during the last century,
 there is no problem.

Who are they? I hate zpg.

I don't mean any organization --I mean the tendancy of educated people
to have less children, voluntarily, because they see more benefit
than a poor farmer does.


 Famine, plague, war, or birth control.  Your choice.

Intelligence. Love. Yeah, those who put themselves at the same level with
bacteria might not know what I'm talking about.

Physics of meat.  Ecology.  Biology.

 (Best to keep good defenses up against those who don't chose wisely, btw.)

Oh, an elitist... Who decides what is wise and what's not? [Don't say Tim.]

No, an individualist.  *You* get to decide *your* choices.  
And you get to defend your own interests.  Or be eaten. 

 (That I should have to explain overpopulation to a Romanian is somewhat
 surreal, but whatever.. MP has been reasonable in the past)

Thanks. I am not aware of any overpopulation problems in Romania. 

Over here, we have heard of overfilled orphanages filled with malnourished
children, largely due to your defunct Leader's attempt to grow more meat,
regardless of the quality of its lives.  Perhaps this is just US propoganda,
perhaps a scheme to sell surplus kids to rich americans and alleviate their
guilt; whatever.  


Our
population is too small for my wants 

Fortunately *your* wants control pretty much just *you*.. unless
you're in *government*.. 

- I still can't find someone to paint
my house properly

Hey, gasoline is up to nearly two bucks a gallon here... ;-)








  








Re: Insurance GPS System To Monitor Vehicle Usage

2000-04-28 Thread David Honig

At 03:35 AM 4/28/00 -0400, Matthew Gaylor wrote:
I can already imagine the cottage industry springing up to send false 
signals to the system...

Regards,   Matthew Gaylor-

And legislation making that a crime, as well as the civilian interception
of those signals.








  








Re: Harmonized Packet Data Intercept Standards

2000-04-28 Thread David Honig

At 12:02 PM 4/28/00 -0400, Daniel J. Boone wrote:
Smarter search engine spiders, ones that are persistent and ignore /norobots
and similar flags, may be part of the solution.  Such spiders could be
linked to software that can parse and index word processing documents, .pdf
documents, and even scanned images if ocr were deployed.

-- Daniel

Gosh if we add speech-to-text maybe we can sell to the echelon folks..








  








Re: Blowfish or 3DES?

2000-05-08 Thread David Honig

At 12:17 AM 5/8/00 -0400, Bill Stewart wrote:

If I wanted a non-3DES algorithm, I wouldn't use Blowfish -
Bruce Schneier et al. have Twofish out, and while the primary goals
of the redesign are to fit into the AES requirements framework,
rather than to strengthen the algorithm, they may have benefited from
experience,
and there have also been heavy efforts to break it and the other AES
candidates.
They've been a lot briefer than the attacks on 3DES, but probably more
attention than has been paid to Blowfish.  Another advantage of Twofish
over Blowfish is that it also has some reference implementations that have
been checked out reasonably well.

Hi Bill,
interesting point of view.  You don't mention the longer exposure
time of BFish, though the AES algs get intense scrutiny now; and as
others have said, the threat is unpublished attacks that may well
weaken them all.  (Incl. earlier algs, like BFish)

Re implementations, I don't think that's a concern.  You can always
verify optimizations and ports against golden reference code, and
crypto algs show bugs *real* readily.  

Re Twofish motivations, I think making a more key-agile algorithm is
probabably the biggest factor.  Then reducing RAM requirements, in
part for smartcards.

But since the code for any alg can be taken off the shelf, and the cipher
algs are almost never the weakness (cf key management, protocols), its
largely moot.  But I hardly think BFish is depreciated at this point.

dh











  








Re: Blowfish or 3DES?

2000-05-09 Thread David Honig

At 04:19 PM 5/8/00 -0700, Bill Stewart wrote:
At 09:53 AM 05/08/2000 -0400, David Honig wrote:
You don't mention the longer exposure time of BFish, 
though the AES algs get intense scrutiny now; 

I probably should have.  I figured that most of the learning
that happened with scrutinizing Blowfish went into Twofish,
as well as Twofish getting more attention as an AES candidate,
so I think Twofish is probably the stronger of the two.

But the analysis that went into Blowfish also went into the
designs of *all* other ciphers since, assuming reasonable behavior
on the part of ciphers' authors.

Re implementations, I don't think that's a concern.  You can always
verify optimizations and ports against golden reference code, and
crypto algs show bugs *real* readily.  

Crypto algorithms usually show incorrect calculations real readily.
(For instance, one of the early published C implementations of Blowfish
had a bug that only affected part of the keyspace, not all of it.)

Hmm.  That sounds subtle enough to slip by..


But implementations have serious problems that don't show if you
only feed them valid data - buffer overflows or similar attacks
only get noticed if you're looking for them, but can be devastating
to the safety of a crypto product even if it gets the calculations correct
when given correct input data.

Sure.  Sanity checks on all incoming params are well-advised in secure
systems,
if tedious to program.  There would be so fewer exploitz were this done..

(There are even 'sanity checks' in hardware ---shutdown and/or zeroize when
the clock, temperature, voltage gets too strange)

largely moot.  But I hardly think BFish is depreciated at this point.

It's probably as good as anything out there for continued use of existing
tools.
But I don't see any reason to write new Blowfish apps - might as well use
2Fish
instead, or another AES candidate, if you've got good enough reasons to
not use 3DES.

I think the argument is entirely that of gambling that you'll have picked a
winnah,
not technological.  Hmm, the odds are one in six?  Crypto roulette :-)

dh












Re: Baby Killers Bill of Rights

2000-05-11 Thread David Honig

At 06:55 PM 5/11/00 -0400, Eric Cordian wrote:
Career-wise, are village burning, violating other nations' sovereignty,
bombing to "send a message," and other such military antics on a par with
being a doctor, lawyer, teacher, or research scientist?

Our Congress seems to think so.

No one ever points out the conflict of interest when government schools
teach 'civics' 'history' or anything about the military.

As others have pointed out, public schools are excellent training grounds
for future sheepcitizens, featuring surveillance cameras, campus cops, metal
detectors, random searches, censorship, zero tolerance for nail clippers,
aspirin, mogen davids, and
other infringements.

You know its illegal to counsel people to not register for the mil?  










Re: ! STOCKS CRUMBLE; AMERICA DIES

2000-05-11 Thread David Honig

At 03:25 PM 5/11/00 -0400, Tim May wrote:
At 10:03 AM -0700 5/11/00, George Ortega wrote:
Americans had over twenty years to feed the starving children of our 
world that
die at a rate of 24,000 every day,

Part of the generation-recombination (birth-death) equation. The poor 
breed up to the point at which child deaths nearly equal child 
deaths. Nothing new here. Think of it as part of the grand process.

Careful Tim, our Romanian reader has never heard of Malthus...

---
There are no exponentials, just sigmoids.

DH








Re: Practically paying for MP3s and then replacing government.

2000-05-12 Thread David Honig

At 03:25 AM 5/12/00 -0400, Anonymous wrote:
Recently I saw at comment on slashdot suggesting how to pay for MP3s.
Suppose you know 100,000 people like a particular artist. If they all
aggree to pay $1 upfront for the release of the next album then it is
released. If the artist does their job - and keeps turning out good albums
people will keep buying. Payment is based on reputation. It turns out that
there is a site set up to do stuff like that - loudvoices.com. 
It looks like this could be used for any IP and most anything that
government does - and could essentially replace the tax system. Immagine
funding a space program this way !

This is Schneier et al.'s STreet Performer Protocol.  Based on reputation.

Problem with funding government is that most of the money would not be
'given' if
not taken with guns, esp. given the current size of government.










criminalization of anonymity and napster

2000-05-21 Thread David Honig


Ignore for a moment the oxymoron "Democratic think tank".. check out 
the self-declared 'centrists' pushing for criminalizing
anonymity...

http://dailynews.yahoo.com/h/nm/2519/tc/tech_napster_1.html
 

Think Tank to Take Napster Proposals to Congress

 By Sue Zeidler

 LOS ANGELES (Reuters) - A centrist Democratic think tank said on Friday it
will suggest
 measures to Congress next week to reduce piracy associated with
controversial song-swap
 company Napster Inc. and similar online services.

 The Progressive Policy Institute (PPI), a Washington, D.C.-based research
organization for the
 centrist Democratic Leadership Council, will propose the measures in a
paper on Tuesday at a
 House Small Business Committee hearing.

 ``The current court case and ensuing media battle are accomplishing little
in the way of
 creating real long-term solutions to online piracy,'' said Robert
Atkinson, Director of the New
 Economy Project for the institute.

Atkinson and Shane Ham co-wrote the paper called
``Napster and
Online Piracy, The Need to Revisit the Digital
Millennium Copyright
Act.'' Napster was not available for comment.

San Mateo, Calif-based Napster's software works like a
co-op,
enabling users to swap songs by trading MP3 files, a
compression
format that turns CDs into computer files.

 The software program has been a nightmare for record companies, which have
called it a
 haven for piracy because it enables distribution of music without any
copyright protection.

 Napster has been sued for copyright infringement by the Recording Industry
Association of
 America (RIAA), representing all the big record companies such as
Universal Music, BMG,
 Sony Music and Warner Music, which is soon to merge with EMI.

 Rock bands Metallica and Dr. Dre have also sued Napster.

 ``With the RIAA and Napster setting the tone of the debate, only the
extreme possibilities are
 being explored while the substance has been lost,'' Atkinson said.

 While Napster has claimed it is merely an Internet service provider (ISP)
and not liable for
 users' actions, it is required by law to bar users proven to be infringing
on copyrights.

 Napster recently barred 300,000 Metallica fans the band said had infringed
its copyrights using
 Napster.

 Atkinson said Napster only reacted quickly because of media attention.
``The law as written
 has no set timetable,'' he said, referring to the Digital Millennium
Copyright Act. ``We're
 proposing a specific timeframe, perhaps a week, for ISPs to remove
infringing users once
 they're identified,'' he said.

 The PPI also proposed that Napster should collect identifiable and
verifiable information from
 its users, such as addresses and credit card information. The paper also
proposed giving
 judges greater flexibility in granting injunctions against services being
used for copyright
 infringement.

 ``Right now, judges have to wait for a trial as copyright losses pile up
by the minute,'' he said. 






  








Re: need some help

2000-05-23 Thread David Marshall

David Honig [EMAIL PROTECTED] writes:

 At 11:11 PM 5/22/00 -0400, David Marshall wrote:
 
 Go talk to John Travolta. "Battlefield Earth" is making craters in
 
 He's a fucking scientologist (ie, scammer or scammer-pawn) ergo
 enemy of freedom and anonymity in particular.  

That explains why I instinctively despise him. He should stick to
worshiping Xenu and the intergalactic warlords or whatever it is that
they do. 





vulnerabilities extortion

2000-05-25 Thread David Honig

Chemistry Student Accused of
Blackmailing Internet Company 
By Jeffrey Gold
Associated Press Writer

TRENTON, N.J. (AP) - A graduate student at Colorado
State University has been arrested and accused of
trying to extort money, a car and free downloads from a
New Jersey company that sold digital books over the
Internet. 

The Wayne-based company, which was not named by
federal authorities, received 10 threatening e-mails from
an account of Nelson Robert Holcomb in April and May,
according to court papers filed by the FBI. 

The e-mails said the sender had discovered how to
download the books for free and would not reveal the
weakness in return for a sum equal to the retail value of
the content on the company's Web site, a 2001 Volvo
wagon, two digital audio players, and unlimited free
downloads of the company's content, court papers said.

After the company agreed to provide everything except
the money, it got an e-mail the next day from someone
who identified himself as Rob Holcomb. The sender
gave a mailing address and work phone number at the
school's chemistry department in Fort Collins, Colo.,
court papers said. 

Another e-mail from Holcomb's school account said he
would be willing to sign a nondisclosure agreement, the
papers said. 

Holcomb, 36, was arrested at his Fort Collins, Colo.,
home Wednesday. 

Bail was set at $50,000 in federal court in Denver and
the judge barred Holcomb from any Internet access and
from disseminating information about the company,
said Michael Drewniak, a spokesman for the U.S.
attorney's office in Newark, where the charges were
filed. 

Messages left at Holcomb's work number in the
chemistry department were not immediately returned
Wednesday and the phone at his home rang
unanswered. 

If convicted of the single charge of using the Internet to
send extortion threats, Holcomb could face up to two
years in prison and a $100,000 fine. 
http://ap.tbo.com/ap/breaking/MGILE228O8C.html

Janet on vulnerabilities and social engineering:
"I was surprised that there were so many" places they
could get into, Attorney General Janet Reno told her
weekly news conference. But she added, "Anytime you
expose vulnerabilities, it's a good thing." 
http://ap.tbo.com/ap/breaking/MGI0DJ5JO8C.html








  








Re: Sealand rant (pragmas)

2000-06-12 Thread David Honig

At 09:32 PM 6/10/00 -0400, Tim May wrote:
I'm still at a loss as to just what you actually mean by saying 
"crypto makes it all invisible.' The devil is in the details. 
Handwaving about crypto making things invisible just won't cut it, 
not when a specific model (Sealand) is being looked at.

By 'crypto makes it all invisible' I mean that who you are, who you
talk to, and what you do with your money can be private.  If the black
bits are kept in the same library as the white, and neither the
librarian nor other eavesdroppers knows which is which, you have
to blow up (or padlock) the whole library to purge the nasty bits.

Equivalent to shutting down all of Usenet, in your scheme, because some
fraction of its traffic is 'nasty', but you can't tell (or filter) which
(eg, thanks to stego).

My suggestion is that disk farms like Sealand must make themselves too
useful to nuke, and must mix the useful (shielding) stuff unseparably from
the rest.  Because sovereignty/rifle-shot-across-the-bow games won't last, but
some fascist jihad won't be allowed to nuke (or disconnect) NASDAQ's
computers to close a kiddy prawn|DeCSS|Shayler|Satanic Verses site... 

A distributed system is certainly harder to nuke but may not be
so useful to businesses.  That may be Havenco's strategy?

It will be interesting to see how Havenco differentiates itself
from the missile-bunker folks... their only edge wrt hardened locations is
sovereignty, and judicial flatulence being what it is...
















  








Re: MS-Nationalization By Thomas J. DiLorenzo

2000-06-12 Thread David Honig

At 07:51 PM 6/11/00 -0400, Lizard wrote:
Which leads me to this question -- so why doesn't Bill just close up 
shop? He's got fifty+ billion dollars -- he couldn't spend it all in 
his lifetime if he tried. So why doesn't he just pull a John Galt and 
say, "Fine. I hereby close down Microsoft. We're out of business. No 
more monopoly. Have fun. I'm going to Disneyworld."

But: 

1. the personality type who can stop is not the personality type
that gets there in the first place

2. someone would replace him, try to replicate the MS structure.
It would be easy, the folks less affluent than BG will still want
to work.

I'm assuming it's not that simple, that you can't just shut the doors 
and throw away the key. Can anyone confirm this?

He could also booby trap the company, staffing it with bozos
and pursuing useless projects.  (Obvious jokes omitted) 
But its hard to trash something you've created.

What he *should* do is use UCITA to reach out and touch the DoJ when
unlicensed programs find themselves running in that domain...

Howard Rourke laughed,







  








Re: Trusting HavenCo [was: Sealand Rant] CPUNK

2000-06-13 Thread David Honig

At 06:34 PM 6/12/00 -0400, David Marshall wrote:
 At the press conference, the government just
tells the truth:

Gimme a break.  The crater was a 'federal day care center',
at least on the first floor...










  








losing laptops, opsec

2000-06-13 Thread David Honig


When you read about losing laptops in Los Alamos (and London), you have
to wonder: why don't those folks encrypt their drives?  They
are somehow thinking physical security is sufficient, and slacking
off otherwise.










  








Glover II

2000-06-14 Thread David Honig


I just read that Glover presented at ACM Theory of Comp.
an extension of his quantum search algorithm that works with
problems with multiple solutions.   Since decryption may involve
multiple false positives (see DESCrack) this is interesting.








  








Re: Cpunk Havenco's Weapon Choices

2000-06-14 Thread David Honig

At 10:37 AM 6/14/00 -0400, Lizard wrote:

Governments have nukes. Damn hard to defend against those without 
nukes of your own.

But govts can't use those nukes as indiscriminately as they
can black op teams with conventional tools.  Nukes mostly 
freeze power relationships when (for N=2) 'both' sides get them.
Modulo hardened silos, mirvs, decoys, BMD, etc..

More practically, an engineering question:
Can Sealand's structures withstand a post-gulf-war bunker buster munition?

And a social/engineering one: Can the on-shore endpoints to their
communications withstand meatspace asset seizure?  












  








Re: Cpunk Havenco's Weapon Choices

2000-06-14 Thread David Honig

At 04:12 PM 6/14/00 -0400, Declan McCullagh wrote:
What makes anyone think Sealand is outside of the UK's jurisdiction after 
the government in the 1980s extended their territorial limits to 10 miles? 
Sealand is 6-7 miles offshore.

-Declan

The 3 mile limit came from the range of the Guns at the time.
Problem is, our guns now reach around the world.

Where does the 12-mile limit come from?  (Probably, from 
the credo of govts these days: "whatever we can grab", with
more than 12 miles causing too many conflicts if generally applied)

Sealand seemed to take the generally-followed position when land is too 
close: split the difference.

What do marine charts say?  Does it vary according to publisher? 
(e.g., do the french give Sealand full due, just to piss off the Anglos?)












  








Re: Cpunk Havenco's Weapon Choices

2000-06-14 Thread David Honig

At 06:26 PM 6/14/00 -0400, Jim Choate wrote:

Considering the pictures in Wired and the plans related to nitrogen filled
rooms described in the article a couple of 1/4 lb. blocks of C4 would
resolve the issue nicely. Just blow a couple of good size holes in the
caissons. The North Sea will do the rest.

I guess I didn't find the pictures that you and Tim had.   So if you
want physical toughness and they won't let you into that granite
mountain in Colorado, I guess the ex-silo in UK or the salt mines
of Kansas are it.  There goes the banks.

The whole Sealand game is sovereignty.  Played
out in the UK courts, possibly the UN, and with pretty much the
same arms and surveillance equiptment your average homeowner (anchored
yachtsman) on the open seas would have.  (or a retired admiral could
finagle?) 

a wire fence several hundred
yards out all around... and it'll resolve small boats and undetected surface
attacks. A few long hinged poles around the landing pad will eliminate
heli-assault. That baby is little. That makes it hard to get in.

Interesting.  Should make that German's life a lot harder.. But don't
dudes descend from copters on ropes longer than poles would be?

I did find it odd that at no point was radar, sonar, or thermal mentioned
in the article. 

You don't broadcast the kind of surveillance you do... that's
why some dishes get those neat domes over them :-) 

Though you *do* parade your missile launchers etc.. deterrence..

And for christ sake, get away from the 5.56mm stuff and
get a good gun.

Maybe that's their affirmative action policy --they'll permit smaller
stuff for the smaller framed personnel.  

I suspect it will be found that a nation that attacks them without warning
will be found guilty of crimes of war similar to Japan at the end of WWII.

Gosh maybe they'll even get an apology and some $ *fifty years later* like
the Japs that were rounded up in the US... investors can't wait that long...

Or fire, or runaway auto, etc. No, that end is toast. Multiplicity is
their own saving grace.

Yet another point in favor of truly distributed information brokering, vs.
Sealand's single point of failure (which they will work very hard to
ameliorate, one expects).











  








Re: Musings on the Economics of ZKS

2000-06-18 Thread David Honig

At 02:25 PM 6/17/00 -0400, Tim May wrote:
problems. It's easy enough for me to buy a 20-pound sack of cat food 
when I need it. Ditto for fertilizer. Internet startups like Pet.com 
and Garden.com will have a tough row to hoe, I think.

--Tim May

The net provides more options than meatspace for conventional purchases.
20 lbs of cat food is common  --but try finding pound-size containers of
goldfish food at bricks  mortars.  Or esoteric cat foods. Or books the big
chains don't carry.  Or music the local chains have never heard of.  If
garden.com has stuff my local home depot doesn't, there will be value to me
in checking their inventory if I'm looking for exotics.

Its like Burpee's mail order, only more convenient to collect and search.
(PS, I wrote this before reading Bill's reference..) 

Saves time and petrol.  And comparing prices is easier; shopbots will make
this faster if you can trust your bot.   The folks who invest in amazon.com
(*other* than those who use the market like a ponzi scheme) must be expecting
that either people will buy from them in the future even if their prices
rise, or that bricks  mortars will drop their prices to compete, or
that a future amazon.com that can only sell exotics will still be profitable.
Precisely because of the convenience/diversity aspects I think this
is reasonable.  

Amazon predates the dotcomipofrenzy.  As such it faced no competition
at first and was so massive and complete it dominated.  Recent dot coms
come into an environment where other people are doing the same with hardly
any differences.  In fact, current dotcoms selling only static bits (e.g.,
ebooks, music) come into the 'gnutella' or 'post-napster' environment.

(BTW you can use the altavista text-only search interface, if you
don't like ads, or you can write your own HTML to use their engine.)








  








Re: losing laptops, opsec

2000-06-18 Thread David Lesher

{encrypt laptops..}

 To some extent it may be because publicly available crypto algorithms
 aren't NSA-approved for military use, so there's no COTS code,
 though there may be NSA-built similar products.
 

 At the recent NetSec show in S.F. a vendor was showing latops (Toshiba and
 IBM, I think) fitted with bios-based disk encryption and finger print
 authentication.


Note that ?by law or ex order? NSA is the sole supplier of crypto 
keying material for classified material.


-- 
A host is a host from coast to [EMAIL PROTECTED]
 no one will talk to a host that's close[v].(301) 56-LINUX
Unless the host (that isn't close).pob 1433
is busy, hung or dead20915-1433





Re: NameBase is unique!

2000-06-19 Thread David Marshall

David Marshall [EMAIL PROTECTED] writes:

 The technical contact is named Bob Richards [EMAIL PROTECTED].

By the way, Network Solutions says that old Bob's phone number is
212-979-0471. Why don't some of you give them a call and tell him what
you think of his company?





Re: losing laptops, opsec

2000-06-20 Thread David Honig

At 03:26 AM 6/20/00 -0400, Bill Stewart wrote:
Not-invented-here is no excuse.

In the crypto world, it used to be a decent excuse, because the
No Such Agency did have a lot more crypto experience than the civilian world,
and lots of people in commercial space kept reinventing the same snake oil.
It's not true any more (certainly nobody's sold snake oil in decades! :-),
but old habits die hard.  So we lose national security secrets because of it.

I was starting to suspect it had to do with key management, if 
different (unknown beforehand) people would need the disks, depending
on the crisis.  They could have/should have kept the passphrases written
on paper in another vault, or used a (more complex) PK scheme.

But *why bother* when you're in the middle of a nuke factory, 
surrounded by extremely well-checked out people and extremely
well guarded because of the isotopes if not the data?











  








Re: Microsoft crap considered disingenuous

2000-06-23 Thread David Marshall

[EMAIL PROTECTED] writes:

  (Not to say that Linux doesn't have some advantages, obviously.
  
  The main advantage the Linux has in this regard is that the "average user" 
  cannot modify system binaries.  This makes worms of this sort more 
  difficult to perpetuate. Unfortunatly, there are few usable e-mail clients 
  (as far as I am concerned) on Linux.  (If there was a port of Eudora under 
  Linux, I would not be using windows at home for anything other than games.)
 
 Have you tried Kmail from the KDE project or Balsa from the GNOME project
 ??

And Pine, and elm, and GNUS, and mutt...

 If it doesn't need to be graphical then you might want to look at mutt, i
 have a friend who uses that wont shut up about how wonderful it is.

Mutt is fairly good with regards to PGP when it's set up. They've
recently added Mixmaster support, but the remailer support does still
need help.

 I just use pine thought, it seems to be immune to most problems simply
 becasue it doesn't do anything fancy.

Software can do things which are fancy without exposing security holes
all over the place. Microsoft software doesn't seem to follow this
rule. The holes that these email viruses are exploiting have been
around for years now, and Microsoft still hasn't fixed them.





Re: Crypto Typing ID

2000-06-29 Thread David Honig

At 11:41 AM 6/29/00 -0400, dmolnar wrote:
biometric identification by typing pattern has shown up in science fiction
from time to time. Now we will see a new kind of superhero : instead of a

Along those lines, your future intelligent paper clip will correlate
your typing patterns with your pharmaceutical (as well as your
endogenous-pharmaceutical, ie, emotional, state) state and adjust
accordingly.  Similarly for voice and visuo-facial/postural affective
recognition.
Mimics (and electronically augmented mimics) will play a small role in overall
blackbag effectiveness.

It is not "rocket science".  

Whatever people can do, is an existence proof of implementability.

JY Worry more about the prints you leave than about the drums you beat.
The former is a transcription of your dna.














Re: Re[2]: What's up with the spam? CPUNKS

2000-06-30 Thread David Marshall

Vladimir Vul [EMAIL PROTECTED] writes:

 Hello David,
 
 Friday, June 30, 2000, 8:15:52 AM, you wrote:
 
I've  replied to some of the spam with threats that I will track
  them  down and kill them.
  
  Heh. I was thinking more of contacting upstreams and seeing if they will
  yank the signal.
 
 DM I doubt that they care either. In fact, as a general rule most major
 DM providers won't care until the spam begins to negatively affect their
 DM reputation and thus their profits. 
 
 What  about  to  strike  back?  I  can  write  the  script  wich sends
 thouzend(sorry) messages to spam sender or his site, or even his ISP.
 
 Is it meet the CyberAnarchy way?

It's pretty easy to do, but there are some problems.

1) The spam sender usually doesn't provide a valid return
   address. They might provide a web site URL or a meatspace phone
   number. 
2) The ISP would probably turn right back around and email the ISPs of
   the Cypherpunks involved and get _their_ accounts yanked.
3) If it was organized around the list, it would likely be dubbed by
   the targets as a "denial of service attack." The news media and
   LEAs would jump right in.

Like you hint at here, there probably wouldn't even be a spam problem
in the first place if computer crime laws didn't exist. If people had
mailbombed the first spammers out of existance, there's a distinct
possibility that spamming would have been painted as a remarkably
costly business practice before an entire industry sprung up to
support it.





Re: Oakland Gungrabbing Gimmick

2000-07-03 Thread David Honig

At 01:47 AM 6/30/00 -0400, Anonymous Sender wrote:

Computers offered if weapons are turned in
Associated Press

OAKLAND [yeah, what a surprise there...]

The city ran a similar program in 1995 and drew about 300 people. Back
then, they were handing out free 286s.  Now, they've upgraded to
Internet-ready Pentiums donated by area companies.

What are the companies sponsoring this?  A million armed technophiles
want to know...









  








your DNA, congressman?

2000-07-03 Thread David Honig


Maybe they'll find the gene for obedience...

Worried police refuse to give DNA
samples 
BY DAVID TAYLOR 
http://www.lineone.net/express/00/07/02/news/n0240-d.html

THOUSANDS of police officers have refused to give DNA
samples to a new Home Office database amid concerns
that the genetic fingerprints could be used against them in
paternity suits. 

Police officers are also said to be anxious that their
samples could be used to check for drugs, but their big
concern is that the Child Support Agency will be able to
access the computer database in a bid to track down
fathers who shirk their responsibility. 

The Home Office wants to collect DNA profiles of all
officers who come into contact with evidence at crime
scenes so they can be eliminated as suspects. 

Advances in forensic science mean tiny quantities of
saliva, sweat, hairs, microscopic blood spots, semen or
even skin cells can provide virtually conclusive proof of an
alleged offender's presence at a crime scene. 

It is now possible to produce a full genetic fingerprint of
someone who has merely brushed against a surface while
committing an offence. 

The Home Office wants to hold samples of 75,000 officers
who might be expected to work at the scenes of crime. But
the scheme, launched in February with £3million Home
Office backing for processing and loading files, has so far
received only 21,000 samples from the officers asked to
volunteer. 

The Home Office hopes it will have all of the target
profiles by the end of July, but officials have been forced
to reassure officers that their cell samples will not be used
as a means of proving they are errant fathers or to expose
them as drug users. 

Peter Hands, regional manager of the DNA training project
for the Forensic Science Service, said: "Some officers are
absolutely convinced that outside agencies such as the
CSA will have access to the elimination database. 

"This is untrue. A search can only be requested by a senior
officer against a specific named officer for elimination
purposes on a specific crime." 

Mr Hands makes the point that every police recruit is
required to give fingerprints so forensic officers can
eliminate rogue prints from their inquiries. He added: "The
use of the DNA database will be no different from the way
in which those fingerprints are used." 

The reluctance of some rank and file officers to comply
makes a mockery of the expectations placed on members
of the public who are routinely asked to volunteer for mass
DNA screening to help police eliminate innocent people
from rape inquiries. 

The rape of two teenage girls in a Surrey park earlier this
year prompted DNA testing of 12,000 on a nearby estate
and surrounding area as police hunted a local man. 

Prime Minister Tony Blair consented to a swab being taken
of cells from inside his mouth last year as he promoted
moves to expand the national DNA database. 

He wants all police forces to follow the example of the
Metropolitan Police where DNA samples are taken from all
suspects arrested for offences carrying a prison sentence.A
Home Office spokesman said profiles would not be checked
against existing databases to see if serving police officers
could be linked to unsolved crimes. And they would be
destroyed when officers retired. 






  








Re: wiping CDROMS? (computer forensic question)

2000-07-04 Thread David Honig

At 02:42 PM 7/4/00 -0400, [EMAIL PROTECTED] wrote:
Has anyone ever studied how hard it is to wipe a rewritable CD?

1. Put the disk in a sandwich plastic bag and seal it.
2. Put an empty glass into a microwave oven, and bagged CD on the top.

Everyone suggesting uwaving a CD is forgetting
1. patches of metal film are left which are not eroded
2. rewritable CDs don't have conductive layers to toast AFAIK

And the idea is to wipe OTP bits to guard against partially-used CD loss.








  








Re: wiping CDROMS? (computer forensic question)

2000-07-04 Thread David Honig

At 12:09 PM 7/4/00 -0400, dmolnar wrote:


Why wouldn't you just shred, melt, and scatter the CD if you want to wipe
the info on it? Trying to nondestructively wipe a hard drive makes some
sense, because you'd like to re-use the space...but CD-Rs are down to
something like $5/CD and you can't re-use the used space anyway. 
What do you have in mind by "wipe" ?

This was not something I need to do, but something I realized I hadn't
seen any studies on.  

One potential application would be wiping the used random bits
from a OTP so that losing the CD before you are through with it
(and burn it) wouldn't hurt you.

dh








  








syn, ack, and jamming in cicada comm

2000-07-05 Thread David Honig


Found an example of insect infowar: 

Male cicada broadcasts sound-1.  Female ACKS with a
click emitted at a fixed time wrt sound-1.  The pair
then switch to another frequency channel, complete another handshake,
and then mate.

"The researchers learned that courting males will give 
an interference buzz to keep other males from crowding 
in the romantic moment"

Sci News 24 2000 Cicada Subtleties p 408-410







  








RE: New Encryption System for Music (nytimes)

2000-07-05 Thread David Honig

At 01:28 AM 7/5/00 -0400, Secret Squirrel wrote:
That is, unless analog recording equipment is criminalized and
exterminated (illegal possession of a microphone - 5 years. Possession
of a microphone while committing a copyright crime - 10 years.)

All future analog recording gear sold in U$ must have
analog-copyright-watermark detection circuit.  

Part of the Feinstein/Biden Compiler Registration and Programmer Licensing
amendment to the Anti-Terrorism Anonymity Prohibition Act...













  








cryptome on AP

2000-07-05 Thread David Honig


Saw this
07/05 01:07  pm -
Deleted Documents Do Double Duty
on Rogue Web Site Via AP NOT for
Online Use By CECILY BARNES
CNET News.com

on http://ap.tbo.com/ap/breaking/index.htm

But could not get the article.  More Cryptome exposure? 






  








Re: none

2000-07-08 Thread David Marshall

"Jonathan Fischer" [EMAIL PROTECTED] spams the Cypherpunks
list with:

 WTF

Keep asking yourself that. In fact, ask your parents that. Perhaps
they know WTF kind of psychotropic drugs your parents were on to
produce you. It must be some kind of secret family drug cocktail.





Re: your mail

2000-07-08 Thread David Marshall

"!Dr. Joe Baptista" [EMAIL PROTECTED] writes:

 I don't get it - it seems like every week someone asks how to build a bomb
 here.  I'm sure theirs information out there.  I can tell you how to build
 a small nuclear device in a pipe - but you'll kill yourself doing it -
 unless you have the proper radiation gear.  Let me know ;-)
 
 Joe Baptista

These messages can be from several sources:

- Someone dislikes the list and thinks this is funny.
- Some immature brats are playing some game.
- Some donut-munching, worthless bureaucrat is trolling for suckers. 

The first is possible, but I would surmise that anybody doing such a
thing would put forth a bit more creativity. To date, the only
creativity expressed by these fools is in the lame private flames they
send back in response to being publically lambasted. If they were
going for a thrill ride, it's likely that they would copy it to the
list.

The second isn't very likely. Most brats would have given up by now.

The third is most likely. These spams all have similar syntax and
follow the same format. The occasional exception, such as the "nigger"
spam which arrived a couple days ago, are thrown out as
distractors. When *those* are replied to in the same fashion
(i.e. flamed), the donut-muncher on the other end spends fifteen
seconds and sends back some incompetent response in an attempt to
convince the people doing the flaming that all these idiots are
"real." They send these privately hoping that they will *not* be sent
back to the list, so that people can't compare notes on those as
well. 

These will continue until the donut-muncher (DM) finds some
sucker who is dumb enough to make a serious reply. At that point, the
LEO will probably try to further entrap the individual, or will try to
get a court order for a wiretap, or something of that nature. The
first time he finds *anything* to charge the guy with, he does so, and
hopes that he has a full court press present as he claims to have
"thwarted a domestic terrorist ring's plans."

Well, there is a fourth option: Al Gore is handing out computers to
products of the public education system, complete with an automated
program to produce tax-payer funded fake accounts, and this trash is
some kind of English assignment.

Also note that from what I've seen so far, the accounts this drek is
posted from typically last about two days.

 On Fri, 7 Jul 2000, Marion O'Kelley wrote:
 
  please send me plan's on how to build a pipe bomb only if you know! thanks
  





Re: home jobs

2000-07-08 Thread David Marshall

Dawn Allen [EMAIL PROTECTED] writes:

 I am currently looking for a home based job..please
 email me if you can help me.
 thanks 
 dawn
 

Yes, Dawn. We at Cypherpunks Triple-X Productions are currently
seeking stars for several of our upcoming releases:

- "Jar Wars Episode I: The Phantom Phucker"
- "Schlong Time, No See"
- "Dawn Does the Cypherpunks List at Home"
- "Home on the Bed"

And the sequel to our critically acclaimed hit "The Cracker Nutjob:"

- "Cypherpunks Sexomatic: A New Dawn"

If you desire, the filming can take place almost entirely at your
home. We do, however, suggest that you lay down some paper to handle
the droppings from the farm animals, but other than that working out
of your home should be no problem.

Email [EMAIL PROTECTED] if you are interested in being a new
porn star for Cypherpunks Triple-X Productions.





Re: Your confirmation is needed

2000-07-10 Thread David Honig

At 02:14 PM 7/10/00 -0400, Patrick Henry wrote:

This is a true test of the survivability of a minarchist society.

--PH

Heh, I'm waiting for the wave of copies with CDR: prepended to them..








  








Re: Your confirmation is needed

2000-07-10 Thread David Marshall

David Honig [EMAIL PROTECTED] writes:

 At 02:14 PM 7/10/00 -0400, Patrick Henry wrote:
 
 This is a true test of the survivability of a minarchist society.
 
 --PH
 
 Heh, I'm waiting for the wave of copies with CDR: prepended to them..

I'm waiting for someone who is...oh, let's say a little less "morally
constrained"... to every CDR node back at Sparklist.com's contact
addresses, or send a complaint to inc.net and Sparklist.com for
*every* one they sent. Or, better yet, do a tally of the number of
users on all the CDR nodes and send one complaint per message per
user.

Incompetent sites like Sparklist.com should have never gotten network
access in the first place.





Re: Your confirmation is needed

2000-07-10 Thread David Marshall

David Marshall [EMAIL PROTECTED] writes:

 I'm waiting for someone who is...oh, let's say a little less "morally
 constrained"... to every CDR node back at Sparklist.com's contact

Obviously that should read "to point every CDR node..."





Re: Survivability of a minarchist society

2000-07-11 Thread David Honig

At 08:03 PM 7/10/00 -0400, Greg Newby wrote:
- the list consists of minarchists.  According to an Anarchy Theory FAQ
(http://www2.ucsc.edu/people/mrquiet/internet_lib/Anarchist_Theory_FAQ.html),
minarchists are libertarians who believe government should be limited
to activites that protect individuals and their private property
against physical invasion (i.e., police, courts, a legal code and
national defense).

This is pretty funny.  A libertarian defines proper government that
way, truly; but for the 'anarchy faq' to include them as 'min-' anything
is cute.  I suppose statists are 'maxanarchists' ??  

Anarchy means *no* official laws; you're left to the local gangsters
and spammers and script kiddies.. with help from
mercs for those who can afford it.  

A libertarian can see repeated spamming as resource theft.

An anarchist would say, 'what is crime'? if he could leave his bunker
to do so..








  








Re: Survivability of a minarchist society

2000-07-11 Thread David Honig

At 10:04 PM 7/10/00 -0400, Greg Newby wrote:

To me, 'free speech' != 'anyone can post to any mailing list.'
And, 'free speech' != 'anyone can speak/post anonymously.'

If the government is not involved, it is NOT a free speech issue.
End of that approach.

Mailing lists are private property.  No irish need apply is 
perfectly legitimate here.  In this *particular* list, it is
a *requirement* that anyone be able to post anonymously; the effort
they should go to (e.g., including a special token in the subject
line, or establishing a registered but pseudonymous account elsewhere) 
may be contentious but as a requirement its pretty widely
agreed upon.  This *particular* mailing list is multihomed, which
leads to even more fun.











  








Re: Survivability of a minarchist society

2000-07-11 Thread David Marshall

"Marcel Popescu" [EMAIL PROTECTED] writes:

  Any ideas
  on LARTing the list hosts into giving us enough info to appropriately LART
  the nitwit who is doing this?
 
 I don't know what LART is, but we could RBL them g. We could inform them
 first, and them submit a request to RBL to blacklist them - trust me, it's
 painful (my mail server's provider is on the RBL for some reason, and I keep
 getting bounced mail).
 
 Mark

LART - Luser Attitude Readjustment Tool

As far as I'm concerned, the other script kiddies (as opposed to the
first script kiddie) can go take the damned site down, hack the web
page, and put up something entirely uncomplementary to Sparklist.com,
insult the parentage of the administrators, etc. 

I'm sure someone is...ummm, "morally unconstrained." :)

However, Marcel, the RBL does sound like a nice idea. I'd suggest
getting the RBL to blacklist them, *then* informing them,
though. Otherwise, they'll probably go whine to the RBL
maintainers. It may be harder to get off of the RBL once on it, and at
the very least it would cause them some grief until they convinced the
RBL people to remove them from the blacklist.





Re: sparklist.com tech support number

2000-07-11 Thread David Marshall

 At 1:24 AM -0500 7/11/00, Ben Byer wrote:
It isn't "spam." It's a matter of one or more lists being subscribed
   to one or more other lists.
 
   Suppose someone signs up the Foobar List to one of the Cypherpunks
   lists. (Hint: this has happened.)
 
 
   Are the CDR operators responsible for this "spamming" of other lists?
   In Marshall's logic, are they guilty of "Federal Crimes"?
 
   Get real.

[I know Ben Byer didn't write this. I didn't get the original, so I
don't know who did.]

I phrased that the way I did because the Sparklist.com administrators
seem to be pretty stupid. I called it a "denial of service" attack and
phrased some of the other things the way I did on the assumption that
it might get more of a response. In particular, to a system admin,
mail to an abuse address which states that a denial of service attack
is currently coming from a site they feed tends to get their
attention. 

Do I think that they actually violated Federal law? Not unless the
government has outlawed stupidity. Do I think that they should have
their feed yanked until such a time as they fix their system?
Yeah. (An alternative would be to RBL them.) What they did was similar
to someone getting on a T1 and letting loose with a flood ping aimed
at somebody. The fact that somebody other than the owner telnets into
the system and executes the 'ping -f' isn't relevant, except for
determining what should be done after the DoS attack has been
interrupted. 

 It's spam, in that it's unwanted, bulk email.  No, I'm not stupid -- I
 understand WHY it came.  Still-- sparklist.com *makes money* off those
 mailing lists, and should therefore put some effort into maintaining them. 
 One listserv was able to detect the fraudulent subscriptions -- why not them? 

Because they, like most of the other admins of such sites, don't
care. Writing a couple lines of code to keep these kinds of DoS
attacks from happening is too much work for them, just like it's too
much work for various other sites to block the various Cypherpunks
list addresses from their services despite being asked to countless
times. 





Re: Survivability of a minarchist society

2000-07-11 Thread David Marshall

"Marcel Popescu" [EMAIL PROTECTED] writes:
 
  However, Marcel, the RBL does sound like a nice idea. I'd suggest
  getting the RBL to blacklist them, *then* informing them,
  though. Otherwise, they'll probably go whine to the RBL
  maintainers. It may be harder to get off of the RBL once on it, and at
  the very least it would cause them some grief until they convinced the
  RBL people to remove them from the blacklist.
 
 That was exactly why I suggested informing them before the fact - I can't
 even email the RBL admins (they block, of course, everyone on the list g),
 and when I emailed them from another account I got a "standard message"
 back, telling me that I am blocked (like I didn't know it). [It's not me, or
 even my mail server, that is blocked - they blacklisted the whole domain of
 my server's *provider*.]
 
 So, I thought it might be too drastical to leave them with such a big
 problem, especially since it took me approx. 10 seconds to get rid of the
 emails...

Perhaps. It took me far longer to transfer the damn mail than it did
for me to delete it. Simply inserting a score rule to kill anything
from sparklist.com eliminated it after that. Normally I or one of the
other admins here would have just firewalled the domain off, 
but the connections were coming from openpgp.net, since that's what
was relaying it.

Of course, the list software could be altered to stop relaying mail
from somebody after an excessive number of mails were received from
them within a short period of time. That will never happen for various
political reasons, for the same basic reasons that the list will
probably never be set up to only accept mail from subscribers and
remailers, and this kind of abuse will continue unabated. At
the same time, the signal to noise ratio has been virtually zero for
at least a year, mainly because the level of noise is just so damned
high. (With "noise" being defined as "can u tel me how 2 mak a bomb?",
general spam, and targetted DoS attacks like what just happened.)

That probably indicates that the peak of the Cypherpunks list was long
ago (which we all know anyway), but that it passed into old age and
senility quite a while back. 





dutch crypto accelerator chip and compaq

2000-07-12 Thread David Honig


eet.com 10 Jul 2000 p 32

Pinjenburg Securealink [US|Europe] has a 
secure crypto module (battery backed ram, ARM, RNG, other stuff?)
keeps secrets on chip; developed for banks, will sell to Compaq.








  








Re: Foreigners with guns

2000-07-12 Thread David Honig

At 11:56 AM 7/12/00 -0400, Marcel Popescu wrote:
Can a foreign citizen legally own a gun in the US? [More to the point, I'm
in Georgia.] I've tried looking around the web (NRA, Google...) but nobody
talks about us poor foreigners :) [Even if I manage to remain in the US for
a while, I don't intend to apply for citizenship.]

Mark

A *legal* resident may do so.

But IANAL check the US laws.  Or easier, ask the motivated: call
a gun shop.  They want your $ but not to lose their license.  

Your english is probably better than most of the yokels.










  








Re: Eudora spyware?

2000-07-13 Thread David Honig

At 11:22 PM 7/12/00 -0400, negafoo wrote:
-BEGIN PGP SIGNED MESSAGE-
I've noticed that Eudora 4.3 (in paid mode) has developed a habit of
making an internet conection on startup.  If I allow the connection to
succeed, some packets are exchanged and then Eudora consumes 100% of my CPU
time for about 0:01:10 (by stopwatch).  I also note that when I'm offline,
Eudora tries occasionally to connect to jump.eudora.net.

I'd like to find out what's going on.  Can a list member recommend a good
packet sniffer?  Or perhaps this has been covered recently and someone can
provide a pointer to the discussion?

If you are running Win95 find windump, a tcpdump clone, it works fine.  









  








tapping (was Re: 'Carnivore' Eats Your Privacy)

2000-07-14 Thread David Honig

At 12:26 AM 7/14/00 -0400, Declan McCullagh wrote:
(resend)

Michael: Have you forgotten what list you're on?

Unlawful government eavesdropping should not primarily be fought in
Washington. It should be fought with technology. The ACLU and EPIC are
good for defensive battles only, and when it comes to restraining
government surveillance, they lose more than they win.

-Declan

I realize you're being facetious but the law holds back that fraction
of government that plays by the public laws.  Ergo its not entirely futile.

ACLU et al. battles are good publicity.











  








Re: the book

2000-07-16 Thread David Marshall

Tim May [EMAIL PROTECTED] writes:

 At 6:51 PM -0400 7/16/00, David Marshall wrote:
 "brat" [EMAIL PROTECTED] writes:
 
   hook me up with some cool stuff
 
 Try altering  some acetaminophen (the active ingredient in Tylenol).
 Pull the O=C-CH3 off the amine, and then remove the hydroxyl group
 from the para position. This will give you aniline, which is just an
 aromatic cyclohexane ring with an amine attached as a substituent.
 
 Aniline is a deadly poison because it kills the human liver. However,
 in your case, taking huge quantities of it would likely be the best
 thing you could ever do for the gene pool.
 
 If this is too much trouble, you can hook your trachea to the
 low-pressure freon line of some refrigeration equipment and inhale
 deeply.
 
 Careful! Next you'll be telling the bombz kiddies how to make 
 hydrogen cyanide gas with just their mother's nonstick frying pan and 
 other simple kitchen products.

Well, I *could* think for about five or ten  minutes, try to remember
some of my organic chemistry, develop a method to do this with a
halfway decent yield, and then post it. 

But the average American is dumb, and the average politician is
dumber. While I wouldn't mind this idiot killing himself, I'd hate for
him to use his newly found 31337 hax0r ch3m1s7ry sk1llz to drop stuff
in peoples' drinks, though. So I won't do that, because it would be
wrong. Yes, incredibly wrong. I see your point. :)

 Then Agent Gordon will be able to report to Senators Feinstein and 
 Kelley that the Evil Cypherpunks are training terrorists and 
 assassins.

Judging from what Congress is doing, next they'll get a list of the
nation's chemistry and biochemistry college professors and report that
they're training terrorists and drug dealers. Somehow, though, I think
Swinestein and her ilk would be happy to see higher education
banned. It makes their manipulation easier, and their lies less likely
to be rebuffed. 

"Your honor, the State charges the defendant with four counts of
possessing unlawful medical knowledge in the form of 'Medical
Physiology' by Guyton, two biochemistry texts, and a microbiology
textbook, and with one count of possessing unlawful chemical knowledge
which COULD BE USED to make a terroristic device, in the form of
'Organic Chemistry' by McMurry."





patent ( was Re: Cringely on Carnivore )

2000-07-17 Thread David Honig

At 01:07 PM 7/17/00 -0400, Michael Motyka wrote:
 Cam you say "patent" at least for https,  Oh I'm longing for September 20th
 !! (The pessimistic side me predicts that on or around that date the
NSA/RSA
 will announce
 some sort of legal maneuver to extend or complicate the end of the patent.
 
Correct me if I'm wrong but isn't it the case that only an act of
Congress can extend the term of a patent?

Mike

Probably.  But congress does give its agencies power to regulate the details.
E.g., FDA, EPA, DOT, etc.

Patent duration may be a detail.  Congress/USPO certainly don't regard
patent-time
as anything but a carrot, nothing sacred about it. E.g., 

I just read that if you take your drug to OTC status you get three extra
years patent protection.  Various pharmcos with expiring IP are doing that.
Others milk the 500% markup on Rx (vs. OTC) til its gone.

Time will tell.



  






  








Re: It's called progress...

2000-07-18 Thread David Honig

At 03:34 AM 7/18/00 -0400, Reese wrote:
 Great Book.

Executive summary, please.

Go to amazon







  








Re: FBI system covertly searches e-mail

2000-07-18 Thread David Honig

At 02:37 AM 7/18/00 -0400, Tom Vogt wrote:
two advantages:

a) more encrypted traffic on the web.

With known plaintext...

b) some people might want to read cypherpunks without the intermediate
parties being aware of the fact (I know companies that monitor e-mail).

If that's a concern, use the anonymizer (via SSL) + web archive.

b2) running the encrypted listserver under a different name than
"cypherpunks" would possibly a good idea for this case.

Any fixed name would get known.








  









Re: how EXACTLY does this protect privacy?

2000-07-18 Thread David Honig

At 10:02 AM 7/18/00 -0400, Marcel Popescu wrote:
X-Loop: openpgp.net
From: "Tim May" [EMAIL PROTECTED]

 That Marcel is so actively "spreading the good word" on the
 Cypherpunks list is truly bizarre.

I'm not "spreading the good word", idiot. I was objecting to Jim Choate's
idea that anarchism and Christianity are incompatible.

Mark




__
Do You Yahoo!?
Talk to your friends online with Yahoo! Messenger.
http://im.yahoo.com









  








security software: InTether

2000-07-18 Thread David Honig

At 09:50 AM 7/18/00 -0400, Fisher Mark wrote:
David Honig writes:
You want to overwrite a dozen times with random (each time) data.

I'd be cautious about saying that.  Way back when I held a security
clearance, the instructions were:
* Overwrite with patterns 99 times for SECRET materials; and
* Overwrite with patterns 999 times for TOP SECRET materials.

Hmm.  I thought I remembered the ~dozen from some FIPS spec, but
I could be wrong.  The more the merrier.

As the forensic technology has undoubtedly improved in the past 20 years, I
strongly doubt that "a dozen times" would be anywhere close to obscuring all
evidence of the data.  You're much better off physically destroying the disk
by melting it or somesuch.

Yes but someone wanting to overwrite data may not be in a position
to destroy the medium.  E.g., its your working machine's hard drive.

If you don't have the option of physically destroying the disk, writing
random data for a few hours ought to get you on the way towards making your
original data unrecoverable.  (Note that I said "on the way"!)

Now there's a good use of the idle cycles on a secure machine: the wiping
daemon.








  








Tim is an idiot (was Re: Marcel tries to nudge Tim to post

2000-07-18 Thread David Honig

At 10:02 AM 7/18/00 -0400, Marcel Popescu wrote:
give a damn about Romania either, whatever that is. [I still have to find
someone able to define "Romania" or "country" in a meaningful way.]

You might start with people who speak romanian, who eat romanian
food, and look like other romanians.  I'm *sure* the folks in neighboring
countries have a good idea what a romanian is.  Ask them.

As for 'country', you'll find that there are folks with small arms
stationed along roads leading out of romania, who believe strongly that
*their* country starts there.  Romania is that solid angle of earh claimed
by none of your neighbors.











  








us doesn't ban net gambling (this year)

2000-07-18 Thread David Honig


Tuesday July 18 4:55 AM ET
 House Fails to Ban Most Internet
 Gambling 

 By Andy Sullivan

 WASHINGTON (Reuters) - The House failed to pass a
 bill that would criminalize most forms of Internet gambling,
 an industry that has grown explosively in the past several years.

 Proponents of the bill had a majority of the votes but failed to reach
the two-thirds
 mark required by a special process that would have expedited the
bill's passage.

 The final vote was 245-159, with 30 abstentions.

 The bill would have banned online wagers on sporting events and casino
games, as
 well as the sale of lottery tickets online.
...







  








MS (in)security++

2000-07-19 Thread David Honig


The reason your hard drive was reformatted was because
you received that e-mail.’”

A spokesperson for USSR Labs told
MSNBC.com that the group has been able to
add malicious code to e-mail headers that
executes as soon as the target computer
begins to download the e-mail. 

http://www.msnbc.com/news/432208.asp?cp1=1#BODY
[of course the morons require javascript to read the article..]






  








targets

2000-07-19 Thread David Honig



Haven't these writers ever heard of the Deutsch affair?

Home computers hold corporate secrets too.



COPYCATS LIKELY TO POUNCE
   Since sample code exists, Cooper
expects copycats to begin writing malicious
e-mails fairly soon. There is one mitigating
factor — since the flaw does not impact most
corporate users, and home users are generally
a less interesting target, that might limit
computer vandal interest in the problem.
Corporate users normally have more
sensitive, valuable information stored on
their computers. 

http://www.msnbc.com/news/432208.asp?cp1=1#BODY






  








Re: none

2000-07-19 Thread David Marshall

"Cathy Booth" [EMAIL PROTECTED] writes:

 Now I'm going hunt you down! I'll come at you in that many different
 directions - you just wouldn't know who your dealing with.
 P.S see you in the near future!

Make sure you don't walk into my line of fire. Besides, while your
multiple personality disorder may trick you into thinking that you can
come at me from many different directions at once, you'll find that
far more difficult to do with only one body.

However, as another service, Cypherpunk Industries is willing to
dismember you into as many pieces as you like. Then you can hire
someone to throw those pieces at members of the list.

Everyone welcome the script kiddie back to the list.

--
David Marshall
Fuckwit Relations
Cypherpunk Industries





Re: Diploma

2000-07-20 Thread David Honig

At 02:21 PM 7/19/00 -0400, [EMAIL PROTECTED] wrote:
I am wanting more information on the Diploma deal but the number show on the
web site is disconnected.

http://www.inet-one.com/cypherpunks/dir.2000.01.03-2000.01.09/msg00115.html

Lets hope he doesn't work in WellsFargo *data security*...










  








Re: Dropping toad.com

2000-07-20 Thread David Honig

At 03:29 AM 7/20/00 -0400, Tim May wrote:

Check out the standard features of Majordomo. The command "who 
cypherpunks" has been used since the inception of the list(s).


But most (all?) other nodes have shut off this 'feature'








  








customs searches of disks?

2000-07-21 Thread David Honig


This came up on [EMAIL PROTECTED]:

At 12:29 AM 7/21/00 -0700, anonymized wrote:
The interesting question (for this list) is, if some border officials
search your hard drive and they encounter encrypted files, what will
they do?  My guess would be that they will demand the key and threaten
to deny you entry if you don't give it to them.  It does not appear
that there are any international laws or standards that say they can't
do that.

But could they do that to an American returning to America?  Sure,
a brit returning to post-RIP britain is fresh meat.  Or a furriner
coming to America (who isn't yet on US soil).








  








Re: Dropping toad.com

2000-07-23 Thread David Marshall

"Patrick Henry" [EMAIL PROTECTED] writes:

 Jim Choate wrote:
  As of today the current toad.com member list is below. 
 
 I can't believe that 1) the who command is enabled on toad, and 2) that you'd
 post all these addresses to the list.  Talk about a massive invasion of privacy.

First, if you believe that the subscription list for a mailing list is 
secure, you're naive.

Second, the WHO command has always been enabled on Cypherpunk lists,
and (at least as far as I know) its disabling at some (if any) nodes
is a relatively recent development.

Third, the addresses are publically available. So Choate posted them
to the list. There's no more invasion of privacy than before; anybody
who wanted the addresses could have gotten them in literally about 10
seconds. 

Fourth, subscribe under a psyedonym if you're concerned about this,
and make sure that the psuedonym isn't conclusively linked to your
real world identity. 

Is Tim really Tim? Are you really Patrick Henry? Am I really David
Marshall? Modulo reputation capital, does it really matter anyway?

ObCode: Nym servers are very well suited to this. Unfortunately, to 
really be practical they need a seamless frontend. Decryption,
encryption, and authentication need to occur automatically, or the
option needs to be there for them to occur automatically. 

Something like premail is good, if it can be made to work with the
various mailers. Perhaps the simplest way to do it all is:

1) Have a process which runs on the mail spool and does the
   decryption and verification of signatures. This should be
   pretty clean, since most mailers are set up to use the mail
   spool in the first place. Even something like Gnus wouldn't
   have any problem with this, since it reads from the mail
   spool, and this program would be run before it's all
   sorted.
2) Sending mail could work similar to how premail
   works/worked. 
3) The individual mail readers would need code which just
   interfaces to this mess. In particular, mail which comes in
   under a nym needs to go out *under that nym* unless the
   user explicitly orders otherwise.

If I wasn't so occupied with grad school right now, I'd give it a
shot. It's a fair bet that everyone else is just as busy, so I'm not
holding my breath for anything like this to be coded. :) Has something
like this already been done? (Freedom is out; Why has been discussed
on this list before, and I won't go back over it.)





Re: Jim Und Dave?Thanks Mr anon

2000-07-23 Thread David Marshall

[EMAIL PROTECTED] writes:

 Mr Anon did a good job. If Jm and dave don't like the heat get out of the 
 kitchen.Get a job thats more dangerous like a taxi driver or clerk at 7-11

Or an AOL tech support representative. I hear that they're subjected
to idiocy in quantities far in excess of what is generally considered
the maximum safe daily dose. 





Re: Important, your Naughty Mail subscription!

2000-07-23 Thread David Marshall

"Doug and Denna Morgan" [EMAIL PROTECTED] writes:

 DD

No way. This one is just *too* easy. 





Re: ZKS economic analysis

2000-07-24 Thread David Honig

At 04:39 AM 7/24/00 -0400, Tom Vogt wrote:
David Honig wrote:
 there's a difference between this and a database system. almost all laws
 on privacy (where such exist) realize that.
 
 Really? What's to stop me from 'gargoyling' (to use a _snow crash_ term):
 running a few VCRs on my surroundings as I wander in public, later indexing
 the faces and conversations I picked up?  And then offering a service in
 which you submit a face, I'll tell you where I've seen it.

said difference? namely the one between manual and automatic data
processing. 

That's the implementation detail I'm varying in this gedankenexperiment,
but since when does implementation matter for law/morality?

What if I've got an eidetic memory and 20/10 vision?

that said, I think your example is a good one on the
borderline between personal data (which is protected, at least in the
civilized world) and unpersonal data (which is public domain). a face
alone is not, as I read the law, a piece of personal data.

Anything you can see or hear from the street is public domain.
(in my recollection of US law)
Telescopes are supposedly invasive; but an optical zoom on a 
videocamera is pretty compact.








  








UK admits it bugged Gerry Adams' car

2000-07-24 Thread David Honig


Sunday a note appeared in the LA Times 
that the BBC was releasing Monday an interview 
with a UK cabinet minister who admits she authorized 
the Gerry Adams car bugging last year.  (Adams found
the bug) Anyone heard the interview yet? 



 






  








Re: John Young, the PSIA, and Aum

2000-07-24 Thread David Honig

At 06:03 AM 7/24/00 -1000, Reese wrote:
At 11:20 AM 24/07/00 -0400, David Honig wrote:
 At 12:42 AM 7/24/00 -0400, Reese wrote:
  Japan may not have the US constitution, but their current constitution
  was written by the US government in 1946.  The American concepts of
  civil rights are most definitely a part of the Japanese constitution.
  For those who may be interested:
 
 Too bad we forgot the right to bear arms, freedom of religion, and
 freedom of speech.  Etc.

Fuck you David Honig, I didn't write the above, Greg Vassie did.

Be more careful with the GodDamned Quotes.

Mea culpa, I did check but miscounted 








  








  1   2   3   4   5   6   7   >