Re: I crypt you

2003-01-07 Thread Meyer Wolfsheim
On Tue, 24 Dec 2002, Anonymous wrote:

 (unrelated, I noticed that there is no un-crippled free version of PGP
 for windows XP any more - 8.0 beta expired)

What about PGP 8.0 Freeware? That isn't crippled. (It doesn't include
automatic email plugins, which many think are a bad idea anyway, and
doesn't include PGPdisk, which is a great product, but addresses issues
other than email privacy in transit.

So what is wrong with PGP 8.0 Freeware?

-MW-




Re: Singularity ( was Re: Policing Bioterror Research )

2003-01-07 Thread Tim May
People,

Please don't quote a long article and then bottom-post a few comments. 
Or top-post a few comments. In fact, the best idea is to only quote 
enough to remind other readers what you are commenting on.

It's not a matter of bandwidth, it's a matter of relevance and 
consideration.

I plan to plonk anyone who keeps doing this. (8 list members are in my 
plonk file right now...I only see their crap through the comments of 
others, though replies seem to be scarce for all but one of them, so 
perhaps others have formed the same opinion as I have.)


--Tim May



[p2p-hackers] p2p-hackers meeting, this upcoming sunday (fwd)

2003-01-07 Thread Eugen Leitl
-- Forwarded message --
Date: Mon, 6 Jan 2003 12:39:24 -0800 (PST)
From: Bram Cohen [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [p2p-hackers] p2p-hackers meeting, this upcoming sunday

usual time, usual place

when: second sunday, this time it's the 12th, 3pm till whenever we leave
where: SONY metreon, food court
what: p2p-hackers meeting, sit around and chat about our projects

-Bram Cohen

Markets can remain irrational longer than you can remain solvent
-- John Maynard Keynes

___
p2p-hackers mailing list
[EMAIL PROTECTED]
http://zgp.org/mailman/listinfo/p2p-hackers




Tarzan swings

2003-01-07 Thread Steve Schear
Date: Sat, 4 Jan 2003 04:12:41 -0500 (EST)
From: Michael J. Freedman [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Tarzan code

Hi everybody,
So tonight I threw up a tarball of Tarzan's code, after finally updating
it against new releases of its dependencies. It's released under the GPL.
http://pdos.lcs.mit.edu/tarzan/

Unlike tor, Tarzan is an IP-layer anonymizing system, so faces different
problems and different complexity. Roger suggested that I announce this
on or-dev.

Unfortunately, I don't plan on continuing developing Tarzan actively
anymore. If anybody else is interested, please drop a line.

Thanks!
--mike



if America were tempted to ''become the dictatress of the world, she 
would be no longer the ruler of her own spirit.'' What empires lavish 
abroad, they cannot spend on good republican government at home: on 
hospitals or roads or schools. A distended military budget only aggravates 
America's continuing failure to keep its egalitarian promise to itself.
-- John Quincy Adams (extended)




crypto car keys

2003-01-07 Thread Mike Rosing
Anybody know the TI chip used in Ford 2002 and newer
immobilizers?  I've found a white paper on TI's web
site that describes their challenge/response system,
but nobody at Ford customer service has a clue what
I'm talking about.

Ford calls it securilock, but the Ilco tester at
my local hardware store says it's a TI chip in the key.
The dealer said it's a rolling code system, and from
the white paper this includes a 40 bit challenge, an
encryption operation on the key (!) then a 24 bit
response from the key.  If you lose one of the original keys
they charge you several $100 to reprogram the main
processor so you can start your car again!!!  Fortunatly,
I've found replacement keys for $8 off the net, and as
long as I have 2 it should never be a problem.

But TI has lots of different RFID systems, and I don't
know if Ford has purchased a special mod for their own
use or not (when you buy 10 million of something it does
give you some clout).  Anybody here know?

Patience, persistence, truth,
Dr. mike




Re: Singularity ( was Re: Policing Bioterror Research )

2003-01-07 Thread lcs Mixmaster Remailer
BTW, I think I read somewhere that when the water gets too hot the frog just 
leaves. 

Like someone already mentioned, all that is needed for the total collapse of the US 
government is that 90+% of sheeple abstains from TV and newspapers for 30 consecutive 
days (externally induced psychosis needs constant maintenance.) Such detox event would 
be the most dramatic social phenomenon in the last hundred years.

But it's impossible promulgate even that simple idea and therefore the frog stays.


ribbit




Re: Dossiers and Customer Courtesy Cards

2003-01-07 Thread Todd Boyle
Somebody said,
 Frankly, if using my card saves me $10 on a roast,
 it's hard for me not to think it's a good exchange..

Hogwash.  It's not saving customers anything at all.

Same gimmick as credit cards.  Take away a percentage
from noncard-holders and give it to the cardholders.

What economic efficiency or productivity could these
cards actually achieve??

One cannot argue, Identity cards enable the store to
improve product mix thereby improving service because
the chains have adequate cash register data.

I don't think the cards are achieving *anything* except
a carveout from the customers themselves. First of all
they get a dollar, from day one, by selling our personal
information to other corporations.  That is pure profit,
after a low-cost software module on their card reader.

The rest of the payoff comes from calculating YOUR
behavior in order to stick their knife deeper into you.
The cards strengthen their pricing power against YOU.
For example, avoid offering discounts for things you
are going to buy anyway.   Watch and see-- in a couple
of years there will be Dynamic Pricing.  You'll find
out you're paying higher prices on bread than the guy
next to you!!   But in the meantime they will jsut use
the data to confuse you to death, changing prices and
unit sizes and locations of everything in the store, so
it's impossible to comparison shop.

Consumers should begin to request our purchase history
(so we can submit it to regional grocery auctions, competing
chains, comparison websites, etc.)   The chains will say
HELL NO, are you kidding?   That will show why they
are really installing the cards!   guffaws!

What's needed is a little embedded linux device with a cheap
scanner, where shoppers can pay a dime, insert their receipt,
and receive their shopping list in XML format, by email.  Thise
should be in front of every store, between the pay phone,
the coinstar, photo kiosks, etc.

I believe it would become clear, grocery stores are as much
an information phenomenon as logistical one.  Direct supply
by producers to residences, for some commodities would
become economically possible. You'd have a critical mass
of information.

Todd Boyle cpa kirkland wa www.gldialtone.com
a rant a day keeps the clients away




Re: Let there be Blah

2003-01-07 Thread Tim May
On Sunday, January 5, 2003, at 11:33  PM, Anonymous wrote:


Blah wrote quite an excellent post. In fact, I've met few physics PhDs 
which would have been able to respond so well. So needless to say, my 
curiosity is peaked concerning who Blah is in the real

Or even piqued.


world.


Weirder still that one of several people who present themselves as the 
fictional Tyler Durden would claim to be interested in who the real 
identity of Blah is.


 (Tim May, I believe, is trained in physicsist, but there's no way 
someone out of school for so long is going to voluntarily remember 
what's in the last chapter of Schiff. Also, they didn't know a lot of 
this stuff back in the horse-and-buggy days when May was in school...)

Showing a failure on your part. The standard model was pretty well 
standardized when I was still in school.

Not that what I learned in school is what I know now. One must keep up, 
mustn't one?

What I know of modern quantum computation comes from books I've only 
had for the past few years, such as Nielsen and Chuang. Even the 
earliest glimmers, from Bennett, Deutsch, and others, came only in the 
late 1980s. By the time I attended a Crypto conference in 1988, quantum 
ideas were only beginning to appear.

As for Schiff, I skipped it, favoring Dicke and Wittke and the 
peculiarities of Dirac. With a smidgin of Messiah and others, and even 
a tiny bit of Bjorken and Drell (ugh). And De Witt and Graham after 
1973. As for charm, I have none, as many can attest. As for 
confinement, not yet.


Anyway, I DID want to ask ole' Blah what he thought about the 
following.
(Now Choate, Shaddup and pay attention: Slap Slap Slap!)

This sounds typically Hettingaesque. If you start nattering about milk 
squirting out your nose (ObBob: grin grin), I'll know for sure that 
Tyler Durden is actually the equally cartoonish Bob Hettinga.


(Bustin' chops, takin' names)



More evidence.

Oh, and please don't top-post (complete text of Blah replying to Choate 
elided).

--Tim May



Re: Singularity ( was Re: Policing Bioterror Research )

2003-01-07 Thread Bill Stewart
At 12:42 AM 01/07/2003 -0800, Major Variola (ret) wrote:

At 05:14 PM 1/6/03 -0800, Michael Motyka wrote:

BTW, I think I read somewhere that when the water gets too hot the frog 
just leaves.

It was in print, it must be true.

Perhaps it is.  But if you put a TV in the pot with the frog, he gets 
distracted...

And someone else nameless wrote that all you need to do is get
90% of the sheeple to not to watch TV for a month and you'd have a 
revolution too.


So if you legalize pot across the country, everybody would be distracted 
from TV
for at least the first couple of Post-Prohibition-Party Weekends,
or at least till their connection runs out :-)



Austin Cypherpunks Monthly Meeting - Tue. Jan. 14

2003-01-07 Thread Jim Choate


Time:Jan. 14, 2003
 Second Tuesday of each month
 7:00 - 9:00 pm (or later)

Location:Central Market HEB Cafe
 38th and N. Lamar
 Weather permitting we meet in the un-covered tables.
 If it's inclimate but not overly cold we meet in the
 outside covered section. Otherwise look for us inside
 the building proper.

Identification:  Look for the group with the Applied Cryptography
 book. It will have a red cover and is about 2 in. thick.

Contact Info:http://einstein.ssz.com/cdr/index.html#austincpunks



 --


  We are all interested in the future for that is where you and I
  are going to spend the rest of our lives.

  Criswell, Plan 9 from Outer Space

  [EMAIL PROTECTED][EMAIL PROTECTED]
  www.ssz.com   www.open-forge.org





Singularity ( was Re: Policing Bioterror Research )

2003-01-07 Thread GaryJeffers



Michael Motyka  writes

BTW, I think I read somewhere that when the water gets too hot the frog just 
leaves. It was in print, it must be true


Re: The Microsoft Xbox Key

2003-01-07 Thread Eric Cordian
Tim writes:

 Given that x86 boxes without Windows installed can now be had for about 
 the price of an XBox, and given that the graphics chip in the Xbox is 
 not used by any of the Linux server uses (so far as I know), the main 
 value of hacking the Xbox is for cuteness, to show that it can be done.

Linux is now available for download for modchipped Xboxes.  Ergo, I would
infer that issues of Linux supporting the hardware are behind us, and the
sole remaining problem is getting an unaltered Xbox to run arbitrary code.

There is a non-Microsoft-approved Xbox media player out, so I would also
infer someone has figured out how to use the graphics chip, which is a
custom nVidia Geforce 3, a known device for which good drivers exist.

 (The approximately $200-300 Linux box comes with a 600 MHz VIA x86, and 
 may come with more than the 10 GB disk the Xbox comes from. I don't 
 track this closely. I'd expect that the drive is faster in the PC, as 
 XBox doesn't need a speedy drive for game play. All in all, I'd rather 
 have the PC for Linux than a hacked Xbox.)
 
My impression is that at the $200 price point, the Xbox is a better built
fuller-featured box than similarly priced boxes from places like Wal-Mart.

 Those who don't wish to use MS products should not do so. I use Macs. 
 Many use Linux. And so on.

I think you're drifting here from my original point, which that it is in
no way illegal, or even immoral, to run free software on hardware that you
own, and to pick any locks on the hardware you own, which would preclude
you from doing so.

The public is getting the notion that there are things that it should be
illegal for you to do to devices that you own, for purposes of accessing
their functionality.  This is something that needs to be strongly
discouraged.

Right now, such endeavors are being muddied by being lumped in with such
things as cracking commerical software and breaking into corporate and
military systems in the public mindset.

A widely publicized legal opinion by someone like the EFF, stating that
running anything you want on your own Xbox is a perfectly legitimate
thing to do, would put the ball in Microsoft's court to either say that
they disagreed, or to say nothing and let it slide, which would greatly
reduce their ability to legally harrass people in the future.

It costs nothing to issue a press release.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
Do What Thou Wilt Shall Be The Whole Of The Law




RE: The Microsoft Xbox Key

2003-01-07 Thread Trei, Peter
 Eric Cordian[SMTP:[EMAIL PROTECTED]] wrote:
 
[...]
 Ignoring for the moment that The Neo Project had zero chance of factoring
 a 2048 bit key using publicly available algorithms, their caving under
 imagined legal pressure strikes me as a really bad precedent.
 
[...]

The Neo Project would almost certainly fail for a much simpler reason:
they think trial division was a good approach to factoring large moduli.

Just go and look at their technique - thats what it amounts to. 

Peter




Re: The Microsoft Xbox Key/dvd issues

2003-01-07 Thread Peter Fairbrother
http://www.theregister.co.uk/content/4/28749.html

The entertainment lobby has failed to persuade a Norwegian court to convict
a teenager for creating a utility for playing back DVDs on his own computer.

Jon Lech Johansen has been acquitted of all charges in a trial that tested
the legality of the DeCSS DVD decryption utility he produced, Norwegian
paper Aftenposten reports.

Norwegian prosecutors, acting largely on the behest of the Motion Picture
Association of America (MPAA), argued in court that Johansen acted illegally
in sharing his DeCSS tool with others and distributing it via the Internet.
They claimed the DeCSS utility made it easier to pirate DVDs.

The court rejected these arguments, ruling that Johansen did nothing wrong
in bypassing DVD scrambling codes that stopped him using his Linux PC to
play back DVDs he'd bought.

(They go on to say that it's not illegal to use DeCSS to play dvd's. So if
you haven't already got a copy, you can get one now, in Sweden at least.)
.

There is a product called DVD region x for the xbox that allows you to play
dvd's from any region coming out soon. As it probably has to be signed by
Microsoft (as all xbox programs must be), can we assume that the
regionalisation of DVD's silliness is effectively over?

And apart from that, what was the point of CSS? You can do a dd on a DVD
and play the image from a hard drive. I don't have a DVD burner, but I'd
imagine you could burn a DVD from such an image, so direct copying is
probably easy enough. Maybe I'm wrong, I haven't tried it, but the pirates
don't seem to have any technical trouble.

The regionalisation issue was another monopoly grab. The DVD format is as
much a monopoly as Microsoft or Intel (probably more...)

-- 
Peter Fairbrother




Re: Misconceptions about how remailers work

2003-01-07 Thread A.Melon
On Tuesday, January 7, 2003, at 10:46  AM, Igor Chudov wrote:

 A nice article, although I was under impression that basically the
 remailer network was no longer operable. Wanted to send some joke stuff
 through them and was unable to do so due to lack of working remailers.

According to http://stats.melontraffickers.com, at this moment:

Out of the 43 Cypherpunk and 51 Mixmaster remailers (53 unique addresses) 
on these stats there are 27 CPunks and 37 Mixes over 98.0% in terms of 
overall reliability.

The remailer network has never been healthier. Perhaps you need to update 
your keyrings and stats as to ensure you are using remailers which are 
still operating reliably? Individual remailers do come and go over time.




Re: The Microsoft Xbox Key

2003-01-07 Thread Tyler Durden
I think you're drifting here from my original point, which that it is in no 
way illegal, or even immoral, to run free software on hardware that you own, 
and to pick any locks on the hardware you own, which would preclude you from 
doing so.

Amen, brudda. So will the cops eventually bust down my door if I 
accidentally drop and break an Xbox open?

Also, some would argue that microsoft does use forms of coercion to get 
ultimately use their products. Whether one agrees with this or not, a nice 
little byproduct of hacking an Xbox and turning it into a PC is that there 
will be some slight pressure on 'Soft to get the prices back up to at least 
breakeven for the box.







From: Eric Cordian [EMAIL PROTECTED]
To: [EMAIL PROTECTED] (Tim May)
CC: [EMAIL PROTECTED]
Subject: Re: The Microsoft Xbox Key
Date: Tue, 7 Jan 2003 11:58:56 -0800 (PST)

Tim writes:

 Given that x86 boxes without Windows installed can now be had for about
 the price of an XBox, and given that the graphics chip in the Xbox is
 not used by any of the Linux server uses (so far as I know), the main
 value of hacking the Xbox is for cuteness, to show that it can be done.

Linux is now available for download for modchipped Xboxes.  Ergo, I would
infer that issues of Linux supporting the hardware are behind us, and the
sole remaining problem is getting an unaltered Xbox to run arbitrary code.

There is a non-Microsoft-approved Xbox media player out, so I would also
infer someone has figured out how to use the graphics chip, which is a
custom nVidia Geforce 3, a known device for which good drivers exist.

 (The approximately $200-300 Linux box comes with a 600 MHz VIA x86, and
 may come with more than the 10 GB disk the Xbox comes from. I don't
 track this closely. I'd expect that the drive is faster in the PC, as
 XBox doesn't need a speedy drive for game play. All in all, I'd rather
 have the PC for Linux than a hacked Xbox.)

My impression is that at the $200 price point, the Xbox is a better built
fuller-featured box than similarly priced boxes from places like Wal-Mart.

 Those who don't wish to use MS products should not do so. I use Macs.
 Many use Linux. And so on.

I think you're drifting here from my original point, which that it is in
no way illegal, or even immoral, to run free software on hardware that you
own, and to pick any locks on the hardware you own, which would preclude
you from doing so.

The public is getting the notion that there are things that it should be
illegal for you to do to devices that you own, for purposes of accessing
their functionality.  This is something that needs to be strongly
discouraged.

Right now, such endeavors are being muddied by being lumped in with such
things as cracking commerical software and breaking into corporate and
military systems in the public mindset.

A widely publicized legal opinion by someone like the EFF, stating that
running anything you want on your own Xbox is a perfectly legitimate
thing to do, would put the ball in Microsoft's court to either say that
they disagreed, or to say nothing and let it slide, which would greatly
reduce their ability to legally harrass people in the future.

It costs nothing to issue a press release.

--
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
Do What Thou Wilt Shall Be The Whole Of The Law



_
MSN 8 with e-mail virus protection service: 2 months FREE* 
http://join.msn.com/?page=features/virus



Re: Television

2003-01-07 Thread Mike Rosing
On Wed, 8 Jan 2003, Nomen Nescio wrote:

 It's amusing that Mr. May thinks that anyone gives a fuck if he (Mr. May) filters 
him/her out for whatever reason and considers worthwhile/effective effort to explain 
that reason at length every time, and yet doesn't consider that similar and far more 
intensive efforts by the state-directed mass media are as well effective.

 (more at the bottom)
[...]

That was rude and impolite.  But I couldn't stop laughing for quite a
while :-)

Patience, persistence, truth,
Dr. mike




Re: The Microsoft Xbox Key

2003-01-07 Thread Mark
From: Tyler Durden [EMAIL PROTECTED]
 Also, some would argue that microsoft does use forms of coercion to get
 ultimately use their products.

Quite similar to the people who try and argue that Napoleon was a horse,
right?

 will be some slight pressure on 'Soft to get the prices back up to at
least
 breakeven for the box.

Amen.  I'm tired of paying unjustly low prices.




Re: Television

2003-01-07 Thread Nomen Nescio
A trivial point, barely worth making time for, but folks ought not to 
think that brainwashing via t.v. has _anything_ substantively causal to 
do with the sad state we are in today.

It's amusing that Mr. May thinks that anyone gives a fuck if he (Mr. May) filters 
him/her out for whatever reason and considers worthwhile/effective effort to explain 
that reason at length every time, and yet doesn't consider that similar and far more 
intensive efforts by the state-directed mass media are as well effective.

(more at the bottom)





 ## ## 
 ## ## 
 ## ## 
 # 
 # 
 # 
 # 
 # 
 ## ##  ## 
 ## ##  ## 
##  ## 
##  ## 
##  ## 
##  ## 
### ## 
##  ## 
##  ## 
## 
## 
## 
   
 # 
 # 
   
## 
## 
 # 
   
 # 
 # 
 #
  
 
 
  ### 
##  ## 
 # 
 # 
 # 
 # 
 # 
 ## 
   # 
### 
  ### 

  ###
      
 ###   ###
 ##### 
 ## ## 
 ## ## 
 ## ##
  ##   ## 
  ###
   ##    
 ## ## 
  
 ## ## 
 ## ## 
 # 
 # 
 # 
 # 
 ##   ### 
 # 
   #
  ### 
 ##   ###   ### ## 
 ##  # 
 ###   ### 
 ## ## 
 ##### 
 # 
 ###
 ## 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 # 
 # 
 # 
   
## 
## 
## 

The Microsoft Xbox Key

2003-01-07 Thread Eric Cordian
Slashdot is reporting that The Neo Project, a distributed computing
effort, has ceased trying to factor Microsoft's Xbox binary signing key,
due to legal reasons, and the fact that many of their current
participants don't want to be soiled by association with something having
a nefarious reputation.

The Xbox public RSA key is 2048 bits in length, and its digits may be
found at http://xbox-linux.sourceforge.net/articles.php?aid=200235404321

Michael Robertson, the Lindows CEO, is funding two $100k prizes for Linux
on the Xbox.  The first was to run Linux on a modded Xbox, and the second
is to devise some method of running Linux on an unmodded Xbox, for which
factoring the aforementioned RSA key is one satisfactory approach amongst
several.

The Microsoft Xbox is internally an Windows 2000 box, with a 733 mhz 0.18
micron Coppermine Mobile Celeron, 64 MB of DDR RAM on two high speed
channels, a 10 GB disk, custom nVidia GPU, Ethernet, 4 USB ports, a 5x
DVD-ROM drive, and a Dolby capable audio processor, all at a lovely price
point of $199.

It is said that Microsoft loses money on every one sold, and the box would
certainly make a lovely Linux box or Web Server providing you could run
something other than Microsoft-signed binaries on it.

You can of course run anything on your Xbox if you modchip it, but this
requires taking it apart, voiding the warranty, getting permanently
blacklisted for Microsoft's online gaming services, and other bad things.

Also, only a tiny fraction of Xbox owners are going to bother modchipping
their systems, and for the Xbox to become a popular general purpose
computer, the ability to just burn any software you want on a DVD and cram
it in the slot on an unmodified Xbox is required.

Ignoring for the moment that The Neo Project had zero chance of factoring
a 2048 bit key using publicly available algorithms, their caving under
imagined legal pressure strikes me as a really bad precedent.

Microsoft, an illegal monopoly in the area of computer operating systems,
is attempting to garner a share of the gaming market.  To this end, they
are selling at below their cost, a robust well-built low-end PC at an
extremely attractive price.  In order to prevent this box from perturbing
their core monopoly business of selling operating systems to manufacturers
of similar computers, they are shipping the box as a sealed unit, not
designed to be opened by the consumer, and they have rigged the OS to only
execute binaries signed by them.

Now, it strikes me that Microsoft has absolutely no legal right to prevent
me from running any program I choose on hardware that I OWN, and doing any
reverse engineering necessary to achieve this goal.

This isn't like reverse engineering software, which I don't really own,
but merely have a license to use under certain conditions.  It isn't like
breaking copy protection on a copyrighted work either.

It's like buying a trunk at a rummage sale, and having a set of keys made
so you can open it without damaging it, to see what's inside, and to use
it in the future for purposes a trunk is suited for.

Before this silly notion that writing programs and running them on an Xbox
which one owns is somehow illegal gathers steam, I think it would be real
useful if an organization like the EFF could issue an opinion, written by
a real lawyer, stating that people have every right to run their own code
on their own Xbox.  And furthermore, that reverse engineering neccessary
to achieve this goal, like factoring the public RSA key for the Xbox, is a
perfectly legitimate activity, and has nothing to do with some other
things having a bad reputation, like cracking copyright protection, or
making illegal copies of licensed commercial software.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
Do What Thou Wilt Shall Be The Whole Of The Law




Television

2003-01-07 Thread Tim May
On Tuesday, January 7, 2003, at 02:04  AM, Bill Stewart wrote:


At 12:42 AM 01/07/2003 -0800, Major Variola (ret) wrote:

At 05:14 PM 1/6/03 -0800, Michael Motyka wrote:

BTW, I think I read somewhere that when the water gets too hot the 
frog just leaves.

It was in print, it must be true.

Perhaps it is.  But if you put a TV in the pot with the frog, he gets 
distracted...

And someone else nameless wrote that all you need to do is get
90% of the sheeple to not to watch TV for a month and you'd have a 
revolution too.


I know a lot of people who don't watch any t.v. at all and who are no 
wiser or more revolutionary than anyone else.

A trivial point, barely worth making time for, but folks ought not to 
think that brainwashing via t.v. has _anything_ substantively causal to 
do with the sad state we are in today.


--Tim May



Re: Misconceptions about how remailers work

2003-01-07 Thread Tim May
On Tuesday, January 7, 2003, at 10:46  AM, Igor Chudov wrote:


A nice article, although I was under impression that basically the
remailer network was no longer operable. Wanted to send some joke stuff
through them and was unable to do so due to lack of working remailers.

igor




First, please don't top post and then include the entire text of a 
quoted article. This is less a matter of bandwidth than it is focus and 
decency.

Second, remailers are very much alive. Perhaps the ones you used to use 
are no longer operating, The newsgroup alt.anonymous.messages is one 
place that has many such messages and daily listings of operating 
remailers.

Third, thanks for liking my note. I wasn't trying to cover Type II or 
Type III remailers, just disabuse the original poster of his notion 
that untraceability is impossible because of MACs and other cruft 
attached to packets.

--Tim May



Cryptome Log...A nice opportunity!

2003-01-07 Thread Anonymous
It was written...


Commonwealth before said GRAND JURY in the matter of Commonwealth v. John 
Doe, and bring with him/her all logs recording the I.P. addresses and/or 
users who visited http://cryptome.org/sec-con.htm; between 11/7/02 
00:00:00 GMT and 11/14/02 23:59:59 GMT. If no such log exists for the 
specific page in question, please provide any logs that would cover the 
domain together with an explanation of what the log covers.

So if someone generated a nice-looking fake log this would be legally binding in court?

Sounds like a nice opportunity for J/Tim May's 'vengeance' hack...anyone got some 
interesting IP addresses they'd like to submit? Mr Young could claim he forgot about 
this list, if he's got th'balls!

Also, anyone notice anything fishy here? Notice...


HEREOF FAIL NOT, and make due return of this Writ, with your doings 
thereon, into the said Court.
WITNESS, my hand, at Boston in the County of Suffolk this 31st day of 
December in the year of our Lord two thousand and two.

Kind of an odd date, no? Were there new laws scheduled to start on 1/1/03? This CAN'T 
be a coincidence...




Re: Cryptome Log Subpoenaed (Pissing on Potassium)

2003-01-07 Thread Major Variola (ret)
Dear  John A. Grossman, MA AAG:

You might also subpeona the masters of
http://216.239.53.100/search?q=cache:NW6ZES17aTcC:cryptome.org/sec-con.htm+hl=enie=UTF-8

You might also ponder the words of the First Fellatrix:
I think people have not quite gotten their hands around the
speed at which information can be disseminated online.
-Monica Lewinsky, LATimes 9 may 01
http://www.latimes.com/business/columns/celebsetup/lat_monica010510.htm




Dear List: cryptome.org is down, barring research into the publications
of interest, however
Mr. Google has kindly provided a backup, although he as usual denies all
culpability.

HEREOF FAIL NOT to get a clue
WITNESS the hand of distributed information systems
-John Doe Number Two




Refs follow

At 06:55 PM 1/7/03 +0100, Eugen Leitl wrote:
http://cryptome.org/cryptome-log.htm
Attn: John Young
Enclosed is a Grand Jury subpoena requiring that Cryptome produce
certain
records.
bring with him/her all logs recording the I.P. addresses and/or
users who visited http://cryptome.org/sec-con.htm; between 11/7/02
00:00:00 GMT and 11/14/02 23:59:59 GMT. If no such log exists for the
specific page in question, please provide any logs that would cover the

domain together with an explanation of what the log covers.


Thank you for your attention to this matter. If you have any questions,

please feel free to call.

Very truly yours,
[Signed]

John A. Grossman
Assistant Attorney General
Chief, Corruption, Fruad 
Computer Crime Division



This is G o o g l e's cache of http://cryptome.org/sec-con.htm.
   G o o g l e's cache is the snapshot that we took of the page as we
crawled the web.
   The page may have changed since that time. Click here for the current
page without highlighting.
   To link to or bookmark this page, use the following url:

http://www.google.com/search?q=cache:NW6ZES17aTcC:cryptome.org/sec-con.htm+hl=enie=UTF-8

 Google is not affiliated with the authors
of this page nor responsible for its content.




2 September 2002

 From: Dorsey Morrow, CISSP [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Subject: RE: Warning on Legal Notice
 Date: Mon, 2 Sep 2002 21:07:50 -0500

 John,

 The e-mail you received is nothing more than a hoax.  While the
FROM: box shows it comes from our organization, if
 you look at the IP header information, you will see that it does
not come from our organization. None of the e-mail is
 true.  We do not have any personal information on anyone except
those who are members of our organization, and we
 certainly do not keep any form of financial information.  In fact,
unless you are a member of our organization, we do not
 even have your contact information.  We have determined that the
e-mails used to further this hoax were gathered from
 various websites and spam lists.

 Regrettably, it is easy to spoof someone on the Internet.  It is
very easy for an e-mail message to appear to come from
 President Bush or Bill Gates, when indeed they did not.  That is
the case here.  We are in the process of implementing
 digital signatures for all official e-mails to assist in verifying
what is legitimate e-mail and what is not.  We believe the
 e-mail to be the work of a mentally-deranged individual acting
without benefit of any ethics or scruples.

 We apologize for any confusion or inconvenience this might have
caused you.

 Best regards,

 Dorsey Morrow, CISSP
 (ISC)2 General Counsel

2 September 2002



From: Anthony Baratta, CISSP [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Legal Notification
Date: Sun, 1 Sep 2002 13:23:23 -1000

Legal Notification

You are herby informed that (under the privacy act), the International
Information System Security Certification Consortium (ISC)2
 has sold your information including,

 Name ,
 E-Mail address,
 Residential address,
 Credit and savings information,
 Social Security information,
 and Occupation details.

This information has been sold to a third Party \ Parties and this
E-mail serves as notification for such action.

This information was sold under the premise for marketing and research.

Under the privacy act you may request to see in writing any information
that we have about you. Please write to the following address
with a self addressed envelope.

(ISC)2
860 Worcester Rd.,Ste 101
Framingham, Ma 01702
U.S.A

If you have any questions about the third Party \ Parties please inquire
with them. The International Information System Security
Certification Consortium (ISC)2 is no longer  responsible for the
information sold. (ISC)2 Will hold no responsibility for damages and
loss suffered by the reader of this E-mail. (ISC)2 is not responsible
for the actions of third party companies.

Upon written request we will consider deleting records that we currently
hold about you. A processing fee of $ 10.00 will apply.

Please make out this check to (ISC)2 and 

Re: Singularity ( was Re: Policing Bioterror Research )

2003-01-07 Thread David Howe
at Tuesday, January 07, 2003 1:14 AM, Michael Motyka [EMAIL PROTECTED]
was seen to say: 
 financial resources,
 other than those that pass through verified identity
 gatekeepers; 
That's an odd way to spell Campaign Fund Contributing Corporations