Re: Responding to orders which include a secrecy requirement

2003-09-02 Thread Tim May
On Sunday, August 31, 2003, at 06:16  PM, Steve Furlong wrote:

On Sunday 31 August 2003 19:20, James A. Donald wrote:

Talk is cheap. ...
Indeed, the one may be
connected to the other -- the absence of stoolies may well be
connected to the presence of hot talk.
Dunno. I'm not sure that mere talk of killing a librarian would 
dissuade
the potential stoolies. As you say, talk is cheap. Actions, reported
widely in the mass media, will grab people's attention.
You're being way too unimaginative, or literal, or something.

This is at the discussion stage, and probably will be followed-through 
by others (if at all). The too literal part comes from thinking that 
discussions here mean someone here is going to kill some librarians. 
The too unimaginative part comes from thinking that publicity about the 
idea will not itself have an effect.

The Mob doesn't actually have to kill too many stoolies for it to be 
widely known that ratting can be a very dangerous business.

Maybe Big Brother will create a Witness Relocation Program especially 
for librarians who turn state's evidence.

(But we will still find their families...bawaaahaaahaaa!)

--Tim May



Re: Responding to orders which include a secrecy requirement

2003-09-02 Thread Tim May
On Sunday, August 31, 2003, at 04:20  PM, James A. Donald wrote:

--
Tim May is the perfect example why vigilante justice is
generally considered to be a bad thing -- stupid assholes
like Tim May spout off  take action based on paranoia
instead of facts  principles of anarchy instead of justice
and innocent parties get hurt.
Talk is cheap.  Actions are done more carefully.   Tim implied
he would kill stoolies that shopped him to the police, not that
stoolies had shopped him to the police.  Indeed, the one may be
connected to the other -- the absence of stoolies may well be
connected to the presence of hot talk.
And there is nothing immoral in discussing the fact that actions may 
have consequences.

Take the work camps described in Solzhenitsyn's One Day in the Life of 
Ivan Denisovitch. (Or, of course, the Nazi extermination camps. Or the 
U.S. concentration camps in Gitmo.) The camp management clearly sought 
a docile, policeman inside, stoolie-oriented system where informers 
and capos (those who cooperate and act as de facto guards) see no 
reason NOT to be stoolies and capos.

But merely the threat that stoolies and capos will be found with their 
throats slit is often enough to deter such behaviors.

My point is that if librarians even think there is some small chance 
that someone they narc out to Big Brother will kill them or their 
families, such stoolie behavior may drop precipitously.

--Tim May
A human being should be able to change a diaper, plan an invasion, 
butcher a hog, conn a ship, design a building, write a sonnet, balance 
accounts, build a wall, set a bone, comfort the dying, take orders, 
give orders, cooperate, act alone, solve equations, analyze a new 
problem, pitch manure, program a computer, cook a tasty meal, fight 
efficiently, die gallantly. Specialization is for insects. --Robert A. 
Heinlein



Re: Responding to orders which include a secrecy requirement

2003-09-02 Thread An Metet
Tim May:
 If cops ask local neighborhood members to report any suspicious 
 activity, the folks know that any benefits they gain from acting as 
 informants tend to be a lot smaller than the danger of being beat up or 
 even killed by the Mafia.

 When the cost of acting as an informant is zero, no risk, more people 
 act as informants.

 I think restoring some risk to being a rat is a good thing.

Unbelievable.  The man who invented Blacknet, who has called for and
supported the idea of offshore data havens, now tries to control the flow
of information!  What the hell do you call people who rat you out about
your bad debts, if not informants?  The whole point of the cypherpunk
movement is to make it easier and less risky to spread information even
when there are those who want to suppress it.

This is just another example of May's hypocrisy and lack of critical
thinking abilities.  He's all for crypto anarchy until he realizes his
own ass is vulnerable.  Then he starts trying to think of ways to keep
people from exchanging information he doesn't like.

Here's a clue.  If and when crypto anarchy ever becomes a reality,
Tim May is going to be one of the first ones killed.  He's pissed off
too many people.  Once they can get retribution anonymously, his days
are numbered.



Re: Responding to orders which include a secrecy requirement

2003-09-02 Thread Steve Furlong
On Sunday 31 August 2003 19:20, James A. Donald wrote:

 Talk is cheap. ...
 Indeed, the one may be
 connected to the other -- the absence of stoolies may well be
 connected to the presence of hot talk.

Dunno. I'm not sure that mere talk of killing a librarian would dissuade 
the potential stoolies. As you say, talk is cheap. Actions, reported 
widely in the mass media, will grab people's attention.

On a related note, does anyone have a recommendation for a nice chianti?

-- 
Steve FurlongComputer Condottiere   Have GNU, Will Travel

If someone is so fearful that, that they're going to start using
their weapons to protect their rights, makes me very nervous that
these people have these weapons at all!  -- Rep. Henry Waxman



[AntiSocial] Syracuse U tracks the Department of Homeland Security(fwd)

2003-09-02 Thread J.A. Terranson

Of interest to many here, I am sure.  Tim: hide your eyes...

-- 
Yours, 
J.A. Terranson
[EMAIL PROTECTED]

Every living thing dies alone.
Donnie Darko


--- FORWARDED MESSAGE ---

I don't know how many people have seen this already...


Interesting new data released Monday by Syracuse University on the
Dept. of Homeland Security. It includes employees by county for the
entire country:

http://trac.syr.edu/tracreports/tracdhs/030825/county_full.html

which, curiously, shows Boulder with zero full-time DHS employees but
San Miguel (Telluride) with 7!

It also includes this, from
http://trac.syr.edu/tracreports/tracdhs/aboutdata030825.html

TRACs direct experiences with the DHS in connection with the FOIA law
thus far have not been encouraging. Most of our FOIA requests to the
department, for example, have yet to be acted upon although -- given
the short time that has elapsed since our initial requests -- this may
not be entirely surprising. More disturbing is the fact that many of
public records that the Freedom of Information Act requires be posted
on the agencys web site are not yet available.

But there have been a number of additional specific incidents that
heighten our concern. In an attempt to telephone the departments
public affairs office in June, for example, TRAC was twice informed
that the direct-dial number of this office was not a matter of public
record. On a second occasion, after a FOIA officer in one of DHS
sub-agencies promised to fax TRAC a list identifying documents that
the FOIA specifically mandates be made public, the promise was
withdrawn. Then another DHS sub-agency informed TRAC it would not act
on our FOIA request -- an outcome flowing from its failure to classify
Syracuse University as qualifying as an educational ...institution
whose purpose is scholarly or scientific research. On yet another
occasion, a TRAC request for more timely information to update
material posted some months before on a sub-agencys public web site
was summarily refused.

They also track FBI and other govt ops...

-- Forwarded message --
Date: Thu, 28 Aug 2003 13:30:43 -0400 (EDT)
From: TRAC [EMAIL PROTECTED]
Subject: Department of Homeland Security (DHS)

TRAC's first special report on the DHS is now available. This report
provides comprehensive information about the staff of an agency which
now employs one out of every twelve full-time federal workers: where
they work, what they are paid, what they do and the agencies within
the department that employ them.  Analysis, maps, tables and graphs
are available.  Also presented are data documenting staff changes
between 9/11 and March 31, 2003.

For more information go to: http://trac.syr.edu/media

David Burnham and Susan B. Long, co-directors
Transactional Records Access Clearinghouse
Syracuse University
488 Newhouse II
Syracuse, NY  13244-2100
315-443-3563
[EMAIL PROTECTED]
http://trac.syr.edu





RE: DoS of spam blackhole lists

2003-09-02 Thread Andrew Thomas
John:
..
 a) admit that your stupid, self-appointed-netcop blacklists 
 and self-righteous spam projects are inherently flawed, and 
..
 Please spend your sophomore year working on something besides 
 self-appointed-spam-netcop-site-of-the-week.
..
..., and don't require 
 some asshole swooping in to save us with his miraculous spews 
 database.
..

I fail to see how the above is at all necessary in responding
to the statement.

Either a) an explanation, or b) a link to an explanation as to 
why you have these opinions would have been far more useful 
than the above troll.

 b) realize that the distributed method you suggest already 
 exists - it is called procmail(*).
Procmail serves no purpose by itself. It requires no small
amount of effort on the part of the administrator to utilise
for any type of systems implmentation, and thus administrators 
with limited time (common in smaller companies) will rather rely 
on (flawed) projects than self-initiated implementations.

 (*) or you could setup a dummy email account on all 
 web-published documents, and delete any email that arrives in 
 both mailboxes, or you could implement a challenge/response 
 mechanism for all new senders.  All three mechanisms 
 mentioned are distributed, independent

The above is useful information. Specifically, the recognition
of duplicate mail receipts is a concept that is new to me, though
that would require that both email addresses would receive an
equal amount of 'publicity' on newsgroups, mailing lists, etc
in order that they are both acquired by a potential spammer.

The latter idea I have heard before. If you have a preferred
implementation however, which one it is and why is information
that I would find useful.
  A.
--
Andrew G. Thomas
Hobbs  Associates Chartered Accountants (SA)
(o) +27-(0)21-683-0500
(f) +27-(0)21-683-0577
(m) +27-(0)83-318-4070 



Re: Terror Reading

2003-09-02 Thread Meyer Wolfsheim
On Sun, 31 Aug 2003, Anonymous wrote:

 Some librarians are probably now thinking they have a patriotic duty to
 see what people are reading and to report any suspicious behavior.
 Part of the intent of the Patriot Act and the Library Awareness Program
 was to bamboozle the nation's librarians into acting as the kind of
 ward watchers that were once so common in the Soviet Union (the
 babushkas who sat on each floor of apartment buildings and filed
 reports on the comings and goings of their flock).

 The purpose of this is purely a show and indoctrination.

 1. No self-respecting terrorist would go to a fucking library to do
 terror reading (maybe there is something positive here - I think that
 we should get protected by pigs from extremely dumb terorists.)

The risk is not one terrorists have to fear. The biggest problem with
the librarian narc program is the same as most of these anti-terrorism
measures: completely innocent people are harassed, arrested, or placed
under suspicion.

You won't catch a terrorist learning to be evil at a library, but you
might wrongfully snare an innocent citizen who happens to have an interest
in bad books.

How long until this program is extended to include anyone checking out any
book that some part of the US law enforcement body deems bad? If you read
Pikhal, do you end up on a watch list?


-MW-



Re: Responding to orders which include a secrecy requirement

2003-09-02 Thread J.A. Terranson
I wasn't even going to answer the absurd hypothetical, but since it's now
in play...

On Mon, 1 Sep 2003, Sunder wrote:

 In that case, I would suspect the ISP itself would have incoming/outgoing
 feeds from other ISP's. 

Obviously, every ISP does.

 If that single moral objector ISP refuses to
 allow carnivores, the other, not quite as moral ISP's might be persuaded
 to allow it, in which case the fedZ get what they want, just one
 traceroute hop further up the chain.  Perhaps not all of them, but perhaps
 enough of them...  Duh!

Maybe I should have been clearer: the feds didn't show us at any of the small
guys (AFAIK), such as the regional or small nationals - they showed up at the
large multinationals (of which the one I work at was likely the smallest,
with a mere 48 countries of footprint).  They clearly understood that
sniffing my peering/transit pipes wasn't technically *possible* (yet) - what
they were interested in was sniffing my regional POPs, with [relatively] low
speed OC3/OC12 pipes.  To rephrase it: they were interested in *my*
customers, not the traffic from other companies (they had other field
officers at the other NSPs).

 
 That's the thing about the internet - your packets must travel through
 other ISP's (unless you're communicating with other nodes hosted by that
 single ISP which is unlikely).  

It's a lot more likely than you seem to realize.  The internet is a
collection of aggregation points (ISPs): get the individual aggregations, and
the rest is as visible as a reconstructed RAID5 stripe.

 From the fedZ point of view, you need not
 tap each and every single ISP.  You can tap upstream, and still get the
 data without tipping off the target, or his moral objector friends at her
 ISP.

This type of thing certainly goes on, but not in the vaccum cleaner world of
large pipes.  This is only technically feasible for targetted investigations.

 At some point every ISP goes through MCI, Sprint, and ATT, and don't
 forget the local (phone company) loops.

The loops are too far out on the edge to be useful for anyone but the loop
owner themselves, and there are *way* too many [ever changing] paths out of
any individual ASN - the aggregation point is where this kind of action
*must* happen.

 
 Assuming that such a moral objector ISP would exist,

As I noted: much to my amazement, many do exist.

 it would be foolish
 to assume that it would provide much of a measure of protection against
 tapping cleartext transmissions.
  Hence, encryption is important.  Want
 privacy and security?  It's up to you to provide it: encrypt.

Agrred.  Encryption, properly implemented and executed, is the only real path
to privacy.

 
-- 
Yours, 
J.A. Terranson
[EMAIL PROTECTED]

Every living thing dies alone.
Donnie Darko



Re: Responding to orders which include a secrecy requirement

2003-09-02 Thread Morlock Elloi
What Tim is (correctly) observing here is that a working challenge to the force
monopoly is a very effective way to modify behaviour.

Where Tim is wrong, though, is that he may have anything resembling a working
challenge.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: CDR: Re: Responding to orders which include a secrecy requirement

2003-09-02 Thread Justin
An Metet (2003-09-01 05:54Z) wrote:

 Here's a clue.  If and when crypto anarchy ever becomes a reality,
 Tim May is going to be one of the first ones killed.  He's pissed off
 too many people.  Once they can get retribution anonymously, his days
 are numbered.

Are we talking about the tendency of the general population to kill
anyone who pisses them off, or yours?

-- 
No man is clever enough to  Times are bad.  Children no longer
know all the evil he does.  obey their parents, and everyone
-Francois de la Rochefoucauld   is writing a book.  -Cicero



Philips CRYPTO1 stream cipher

2003-09-02 Thread Anonymous via the Cypherpunks Tonga Remailer
Does anyone have any source code or algos for Philips CRYPTO1 stream cipher
as used in their MIFARE products?



Re: Responding to orders which include a secrecy requirement

2003-09-02 Thread Sunder
In that case, I would suspect the ISP itself would have incoming/outgoing
feeds from other ISP's.  If that single moral objector ISP refuses to
allow carnivores, the other, not quite as moral ISP's might be persuaded
to allow it, in which case the fedZ get what they want, just one
traceroute hop further up the chain.  Perhaps not all of them, but perhaps
enough of them...  Duh!

That's the thing about the internet - your packets must travel through
other ISP's (unless you're communicating with other nodes hosted by that
single ISP which is unlikely).  From the fedZ point of view, you need not
tap each and every single ISP.  You can tap upstream, and still get the
data without tipping off the target, or his moral objector friends at her
ISP.

At some point every ISP goes through MCI, Sprint, and ATT, and don't
forget the local (phone company) loops.

Assuming that such a moral objector ISP would exist, it would be foolish
to assume that it would provide much of a measure of protection against
tapping cleartext transmissions.  Hence, encryption is important.  Want
privacy and security?  It's up to you to provide it: encrypt.


--Kaos-Keraunos-Kybernetos---
 + ^ + :25Kliters anthrax, 38K liters botulinum toxin, 500 tons of   /|\
  \|/  :sarin, mustard and VX gas, mobile bio-weapons labs, nukular /\|/\
--*--:weapons.. Reasons for war on Iraq - GWB 2003-01-28 speech.  \/|\/
  /|\  :Found to date: 0.  Cost of war: $800,000,000,000 USD.\|/
 + v + :   The look on Sadam's face - priceless!   
[EMAIL PROTECTED] http://www.sunder.net 

On Sun, 31 Aug 2003, Steve Schear wrote:

 Well maybe.  What if a US ISP is incorporated with all foreign residents 
 and no local employees (only trusted local contractors).  No one to serve 
 legal notice upon.  ISP is housed in a standalone building which is owned 
 outright (no landlord to serve).  Site is monitored 24/7 via Internet and 
 satellite links with remote controlled self-destruct devices (which to be 
 effective must be capable of destroying the entire building).



Re: Responding to orders which include a secrecy requirement

2003-09-02 Thread Major Variola (ret)
At 12:02 PM 8/31/03 -0700, Tim May wrote:
He said: An ISP is free to say anyone requesting a tap is required to

pay a fee, just as any ISP is free to say that it will handle
installation of special Carnivore equipment for a certain fee.

A customer of the ISP is certainly _not_ the one requesting a tap. And
he is certainly not the one installing Carnivore equipment.

If you rent your house, and the renters cause you to get billed
for something they do, you can certainly pass on the cost to
the renter.  If you get a ticket in a rented car, you (not the
car owner) reimburse the owner.  If your ISP gets a lot
of complaints about your usage, they *could* pass on the
cost to you.  An ISP could regard its court-ordered hassles
(or other hassles, eg attacks launched from your node) as your fault.



RE: DoS of spam blackhole lists

2003-09-02 Thread Major Variola (ret)
At 11:03 AM 9/1/03 +0200, Andrew Thomas wrote:
 b) realize that the distributed method you suggest already
 exists - it is called procmail(*).
Procmail serves no purpose by itself. It requires no small
amount of effort on the part of the administrator to utilise
for any type of systems implmentation, and thus administrators
with limited time (common in smaller companies) will rather rely
on (flawed) projects than self-initiated implementations.

The overworked small netadmin will simply use someone else's
scripts.  Not hard.

 (*) or you could setup a dummy email account on all

The above is useful information. Specifically, the recognition
of duplicate mail receipts is a concept that is new to me, though

You're behind then.  Putting harvest this and get blocked
email bait is common practice, eg on websites with addresses.

I don't suppose you've ever heard of fake streets in maps
(cartographic watermarks) to detect copying?



Re: Responding to orders which include a secrecy requirement

2003-09-02 Thread Major Variola (ret)
At 01:54 AM 9/1/03 -0400, An Metet wrote:
Here's a clue.  If and when crypto anarchy ever becomes a reality,
Tim May is going to be one of the first ones killed.  He's pissed off
too many people.  Once they can get retribution anonymously, his days
are numbered.

What, exactly, has Tim done that wrongs others?

Publishing bits doesn't matter.  Change the channel.

Coercion (under threat of violence) matters.

Sticks and stones.



Re: Responding to orders which include a secrecy requirement

2003-09-02 Thread Major Variola (ret)
At 08:06 PM 8/31/03 -0700, Tim May wrote:

The Mob doesn't actually have to kill too many stoolies for it to be
widely known that ratting can be a very dangerous business.


Ask David Kelly.  Or his associates.  Reputation is a tool.



Re: Terror Reading

2003-09-02 Thread Tim May
On Monday, September 1, 2003, at 12:03  PM, Meyer Wolfsheim wrote:
The risk is not one terrorists have to fear. The biggest problem with
the librarian narc program is the same as most of these anti-terrorism
measures: completely innocent people are harassed, arrested, or placed
under suspicion.
You won't catch a terrorist learning to be evil at a library, but you
might wrongfully snare an innocent citizen who happens to have an 
interest
in bad books.

How long until this program is extended to include anyone checking out 
any
book that some part of the US law enforcement body deems bad? If you 
read
Pikhal, do you end up on a watch list?
The chilling effect is that libraries will get the message and remove 
seditious and questionable books.

I'm not spending much time in public libraries, favoring the UCSC 
Science Library, but I'll bet that after 9/11 a lot of the old stand-by 
books on rocketry, explosives, hydroponic gardening, etc. were removed 
by helpful librarians. (A lot meaning at least 5% of the libraries 
doing at least some removal of books. In some states, if not in large 
cities.)

Librarians are our first defense against terrorism!

Ignorance is strength.

--Thought Criminal

We are at war with Oceania. We have always been at war with Oceania.
We are at war with Eurasia. We have always been at war with Eurasia.
We are at war with Iraq. We have always been at war with Iraq.
We are at war with France. We have always been at war with France.


Re: DoS of spam blackhole lists

2003-09-02 Thread Roy M. Silvernail
On Monday 01 September 2003 05:03, Andrew Thomas wrote:

 The above is useful information. Specifically, the recognition
 of duplicate mail receipts is a concept that is new to me, though
 that would require that both email addresses would receive an
 equal amount of 'publicity' on newsgroups, mailing lists, etc
 in order that they are both acquired by a potential spammer.

That 'publicity' may be easier to come by than you think.  I migrated to my 
present domain from a much older one just 4 months ago.  Now, a quick check 
of my spam folder shows that fully 5% of the received spam is directed to the 
new domain address.  Considering that the old domain had a 7-year history, 
I'd say the harvest bots are working harder than one might otherwise think.



Re: CDR: [AntiSocial] Syracuse U tracks the Department of Homeland Security (fwd)

2003-09-02 Thread Justin
J.A. Terranson (2003-09-01 04:33Z) wrote:

 which, curiously, shows Boulder with zero full-time DHS employees but
 San Miguel (Telluride) with 7!

That must be where all the terrorists ski.

-- 
No man is clever enough to  Times are bad.  Children no longer
know all the evil he does.  obey their parents, and everyone
-Francois de la Rochefoucauld   is writing a book.  -Cicero



Re: Responding to orders which include a secrecy requirement

2003-09-02 Thread Sunder
Indeed.  Despite all of Tim's rage, we're still just rats in a cage, and
despite Tim's urging of necklacing ISP owners, or other foam at the mouth
arm-chair solutions, Occam's razor still supplies the better, and cleaner
solutions:

If your MTA has it, turn on the START TLS option.  If it doesn't, either
compile it in, or get a new MTA for your server.  Also add GPG/PGP, and
hard drive encryption, to both your client and the server.

(Since the discussion is about ISP's, we can assume that you own the
server either hosted by or fed by your ISP - if you don't - i.e. you're on
a dial-up PPP, you're at the ISP's mercy anyway, and the ISP can
read/forge your mail unless you PGP every piece of email.)

Don't have secure IMAP/POP capabilities?  Use ssh as a secure tunnel to
transport IMAP/POP/SMTP from the client into the server.  Even when your
client lives on the same network segment as the server.  If you don't
realize why this is useful, get clued in as quickly as you can.

Of course, as usual, this discussion will next focus on physical security
(hint for the above paragraph for those in need of a clue), then detecting
black bag operations, with the usual Read the Fucking Archives coming
from the usual source(s).

And you know what?  This indeed has already been dealt with, so yes, by
all means, Read the fucking archives does apply.  So go and read the
fucking archives - all of you.  That's your homework.  Do it!  There will
be a quiz tomorrow!  Be sure to bring your #2 pencils!  :)


--Kaos-Keraunos-Kybernetos---
 + ^ + :25Kliters anthrax, 38K liters botulinum toxin, 500 tons of   /|\
  \|/  :sarin, mustard and VX gas, mobile bio-weapons labs, nukular /\|/\
--*--:weapons.. Reasons for war on Iraq - GWB 2003-01-28 speech.  \/|\/
  /|\  :Found to date: 0.  Cost of war: $800,000,000,000 USD.\|/
 + v + :   The look on Sadam's face - priceless!   
[EMAIL PROTECTED] http://www.sunder.net 

On Sat, 30 Aug 2003, Eric Murray wrote:

 This is a problem that's better solved with crypto.



Re: domestic terrorism, fat lazy amerikans ducks

2003-09-02 Thread ken
I'm keeping this one. It's tendng to the condition of poetry.

John Young wrote:

[...]

Commies, now there's a diversion fabricated in the propaganda 
mills by ideological word-toolers of capitalists and socialists, 
heeding the marketplace rule 1: concoct a worse evil to send 
the pack howling at phantasms while draining their savings, cutting
back their jobs, sending their sons off to slaughter pens, or, to put 
it more vulgarly, the free hand of the market lifting wallets and
crushnig lives while the media-mesmerized yokels stare bug-eyed 
shitless at angels and devils paraded from pulpits to chickenhawk
feeding lots.
[...]



Re: JAP back doored

2003-09-02 Thread ken
This piece of political PR was sent to a mailing list intended for 
internal reporting of computer problems at a university, so was 
obviously automatically grabbed. Maybe someone sold them a list of 
ac.uk addresses.

Dr Sean Gabb wrote:
 2nd September 2003

 Dear Educator,

 We are writing to ask whether you would like to receive
 the future publications of the Libertarian Alliance by email.

 The Libertarian Alliance is the UK's premier radical
 libertarian group.
[...snip...]

 Yours sincerely,
 Dr. Chris R. Tame
 Director  The Libertarian Alliance
I'd have thought Gabb  Tame (if it is them  not some spoof) were 
sussed enough to realise that spamming just makes you look like a 
prat.

Ken Brown



Look who's spamming now. [was falsely Re: JAP back doored]

2003-09-02 Thread ken
Whoops - apologies for stupid posting here caused by /me/ being a 
prat with my mail program.

Though the message body it isn't entirely off-topic here - the 
subject line is quite unrelated to it. Mea culpa.

Ken

ken wrote:
This piece of political PR was sent to a mailing list intended for 
internal reporting of computer problems at a university, so was 
obviously automatically grabbed. Maybe someone sold them a list of ac.uk 
addresses.

Dr Sean Gabb wrote:
  2nd September 2003
 
  Dear Educator,
 
  We are writing to ask whether you would like to receive
  the future publications of the Libertarian Alliance by email.
 
  The Libertarian Alliance is the UK's premier radical
  libertarian group.
[...snip...]

  Yours sincerely,
  Dr. Chris R. Tame
  Director  The Libertarian Alliance
I'd have thought Gabb  Tame (if it is them  not some spoof) were 
sussed enough to realise that spamming just makes you look like a prat.

Ken Brown



Searching for uncopyable key made of sparkles in plastic

2003-09-02 Thread Peter Wayner
Several months ago, I read about someone who was making a key that 
was difficult if not impossible to copy. They mixed sparkly things 
into a plastic resin and let them set. A camera would take a picture 
of the object and pass the location of the sparkly parts through a 
hash function to produce the numerical key represented by this hunk 
of plastic. That numerical value would unlock documents.

This was thought to be very difficult to copy because the sparkly 
items were arranged at random. Arranging all of the sparkly parts in 
the right sequence and position was thought to be beyond the limits 
of precision for humans.

Can anyone give me a reference to this paper/project?

Thanks!

-Peter



Re: Needed a WiFi FidoNet

2003-09-02 Thread Cubic Dog
Steve Schear wrote:
It would seems that the means may soon be at hand for using WiFi, or 
WiFi-like, equipment to create ad hoc, meshed, non-commercial networks. 
The means are at hand, have been at hand for quite a few years
in the form of packet radio, and now of course, as you say, wi-fi.
Folks an I used to pipedream about a xtra-net or hyper-net that was
completely non-commercial, completely censor-free shadow internet
running on top of the internet. The idea being to tunnel IPv6 over
IPv4 over packet radio and the occasional real internet where
wireless networks can't span. Running a distributed hack of
named and a shared trust base of nic records. This would use
the unallocated IP space. In order to host a node you had
to relay for all all nodes. In order to participate, you
had to actually be familiar with and utilise netiquette.
Not a big deal, Linux and FreeBSD make it all completely
possible. But like many utopian visions, not too likely.


Re: Searching for uncopyable key made of sparkles in plastic

2003-09-02 Thread Thomas Shaddack
On Tue, 2 Sep 2003, Peter Wayner wrote:

 Can anyone give me a reference to this paper/project?

Is it the MIT project with a laser and glass balls in epoxide resin?

http://slashdot.org/articles/02/09/20/1217221.shtml?tid=172
http://www.nature.com/nsu/020916/020916-15.html



Re: JAP back doored

2003-09-02 Thread Steve Schear
http://www.heise.de/newsticker/data/jk-02.09.03-005/

German police have searched and seized the rooms (dorm?) of one of the JAP 
developers.  They were on the look for data that was logged throughout the 
period when JAP had to log specific traffic.  The JAP-people say that the 
seizure was not conform with German law. They suggest that the police was 
afraid that they wouldn't  gain the right to use this data before a normal 
court. So they stole it to make things clear.  And since the JAP team did 
cooperate with them the previous time they now have the logs to get seized.

I'll bet the logs weren't encrypted.  Fools.

steve

Anarchy may not be a better form of government, but it's better than no 
government at all.  



Re: Searching for uncopyable key made of sparkles in plastic

2003-09-02 Thread R. A. Hettinga
--- begin forwarded text


Status:  U
Date: Tue, 2 Sep 2003 15:59:05 -0400
Subject: Re: Searching for uncopyable key made of sparkles in plastic
Cc: [EMAIL PROTECTED], [EMAIL PROTECTED]
To: R. A. Hettinga [EMAIL PROTECTED]
From: Ravi Pappu [EMAIL PROTECTED]


Peter,

That paper was the result of my dissertation.

The reference is

Physical-One Way Functions
R. Pappu, B. Recht, J. Taylor, N. Gershenfeld
Science, vol. 297, pp. 2026-2030, 20 September 2002

The actual paper is available from
http://web.media.mit.edu/~pappu/htm/publications.htm

The current issue of RSA's Cryptobytes has a more
detailed article.

http://www.rsasecurity.com/rsalabs/cryptobytes/

Best,

Ravi

-
Ravi Pappu
[EMAIL PROTECTED] / off: +1.617.758.4136 / fax: +1.707.215.0156
ThingMagic LLC, One Broadway 14th Floor, Cambridge, MA 02142. USA.
http://www.thingmagic.com

Please note new mobile phone #: 617-642-6681
-

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Responding to orders which include a secrecy requirement

2003-09-02 Thread Tyler Durden
Tim May is the perfect example why vigilante justice is
generally considered to be a bad thing -- stupid assholes
like Tim May spout off  take action based on paranoia
instead of facts  principles of anarchy instead of justice
and innocent parties get hurt.
Well, on one hand taking justice into one's own hands opens the doors to 
pretty much anything anybody can think of that ticks them off.

On the other hand, there are clearly times and societies where such an 
approach is warranted. The usual exmples have already been given. These 
examples seem to have at their intersection a time where the government (and 
the powers that be) are themselves immune from legal consequence and above 
the law, while 'enforcing' laws that are innately evil. Such a society has 
pretty much boiled down to might makes right, and such a government is a 
government in name only.

The question then becomes, when do we know when we've entered such a time? 
More specifically, have we in the US entered such a time? And if we have 
not, does it not at least appear that we might, soon? If the answer to 
either of these questions is yes, then Tim May's suggestion is not a matter 
of if, but when. If the Koran becomes outlawed but a librarian rats on a 
Muslim trying to access the Koran online, then is this not much different 
from the Nazi days? Of course, we believe that the librarian is trying to 
do the right thing. But do you really think that enthusiastic Hitler 
followers believed they were evil?

No, Tim May's statement is not scary because he's suggesting anarchy. It's 
scary because sometime in the near future it may actually be a reasonable 
response. (Well, I dont agree with the 'killing the kids' thing.) If Mike 
Hawash can be grabbed off the streets without any acknowledgement by the 
Feds and then go to prison for NOT fighting against the US (but clearly 
thinking about it), then we are in deep trouble.

-TD






From: Tim May [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: Responding to orders which include a secrecy requirement
Date: Sun, 31 Aug 2003 18:01:52 -0700
On Sunday, August 31, 2003, at 04:20  PM, James A. Donald wrote:

--
Tim May is the perfect example why vigilante justice is
generally considered to be a bad thing -- stupid assholes
like Tim May spout off  take action based on paranoia
instead of facts  principles of anarchy instead of justice
and innocent parties get hurt.
Talk is cheap.  Actions are done more carefully.   Tim implied
he would kill stoolies that shopped him to the police, not that
stoolies had shopped him to the police.  Indeed, the one may be
connected to the other -- the absence of stoolies may well be
connected to the presence of hot talk.
And there is nothing immoral in discussing the fact that actions may have 
consequences.

Take the work camps described in Solzhenitsyn's One Day in the Life of 
Ivan Denisovitch. (Or, of course, the Nazi extermination camps. Or the 
U.S. concentration camps in Gitmo.) The camp management clearly sought a 
docile, policeman inside, stoolie-oriented system where informers and 
capos (those who cooperate and act as de facto guards) see no reason NOT 
to be stoolies and capos.

But merely the threat that stoolies and capos will be found with their 
throats slit is often enough to deter such behaviors.

My point is that if librarians even think there is some small chance that 
someone they narc out to Big Brother will kill them or their families, such 
stoolie behavior may drop precipitously.

--Tim May
A human being should be able to change a diaper, plan an invasion, butcher 
a hog, conn a ship, design a building, write a sonnet, balance accounts, 
build a wall, set a bone, comfort the dying, take orders, give orders, 
cooperate, act alone, solve equations, analyze a new problem, pitch manure, 
program a computer, cook a tasty meal, fight efficiently, die gallantly. 
Specialization is for insects. --Robert A. Heinlein
_
Help protect your PC: Get a free online virus scan at McAfee.com. 
http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963



Re: Terror Reading

2003-09-02 Thread Eric Cordian
Tim wrote:

 Even the owner of my ISP is narcing me out.

 Read what he wrote recently to a Net.Nazi who wanted my speech limited:

 I'm sorry that Tim is being a bother again. He has a long history of
 being obnoxious and threatening. So far, he has not broken any laws. We 
 have talked to the authorities about him on numerous occasions. They 
 have chosen to watch but not act.  Please feel free to notify me if he 
 does anything that is beyond rude and actually violates any laws and I 
 will immediately inform the authorities.

 Thank You
 Don Frederickson  (co-owner and CEO of got.net, Santa Cruz)

Every police state is enabled by the actions of thousands of little peons
(like Don Frederickson here), who insert themselves into things that are
none of their business, in order that they may feel that they are
important in the new scheme of things.

Indeed, baggage screeners, librarians, and operators of small mom and pop
ISPs do more damage to individual freedom than the uniformed jackboots do.

I am reminded of that scene in Roman Polanski's movie in which the hero
staggers out of the apartment where he has been hiding, and is pursued out
the building by a middle-aged woman screaming - Stop him, He's a Jew!

Replace suspected Jew by Terrorist, Child Molester, Drug Dealer, or Money
Launderer, and you basically have the current climate for neighbor on
neighbor snooping here in AmeriKKKa.

Indeed, the hallmark of the Neocon climate of fear we current live under
is the successful exportation of the technology of critic silencing
formerly found only in areas such as Holocaust Promotion or the Sex Abuse
Agenda to every facet of our everyday lives.

The new rule for personal political speech seems to be - Don't tip your
hand until you have the firepower to defend yourself.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
Do What Thou Wilt Shall Be The Whole Of The Law



Re: Terror Reading

2003-09-02 Thread Harmon Seaver
On Mon, Sep 01, 2003 at 12:03:00PM -0700, Meyer Wolfsheim wrote:
 On Sun, 31 Aug 2003, Anonymous wrote:
 
  Some librarians are probably now thinking they have a patriotic duty to
  see what people are reading and to report any suspicious behavior.

   First of all, the entire library community is outraged at being put in this
position, and, in fact, the American Library Assoc. is suing Asskruft and the
fedzis over it. Secondly, I personally know a great many librarians, holding an
MLIS myself and having worked in several libraries, and all the librarians I
know are very pissed about this and have no interest in cooperating if at all
possible. 


  Part of the intent of the Patriot Act and the Library Awareness Program
  was to bamboozle the nation's librarians into acting as the kind of
  ward watchers that were once so common in the Soviet Union (the
  babushkas who sat on each floor of apartment buildings and filed
  reports on the comings and goings of their flock).
 
  The purpose of this is purely a show and indoctrination.
 
  1. No self-respecting terrorist would go to a fucking library to do
  terror reading (maybe there is something positive here - I think that
  we should get protected by pigs from extremely dumb terorists.)
 
 The risk is not one terrorists have to fear. The biggest problem with
 the librarian narc program is the same as most of these anti-terrorism
 measures: completely innocent people are harassed, arrested, or placed
 under suspicion.
 

   So far I only know of one instance of the pigs coming to a library and
demanding info on a patron. And it wasn't the fedzis, it was the local pigs and
they weren't after a terrorist, they were after some poor souls library records
because they suspected him of something to do with drugs. And I'll bet you that
the vast majority of pig demands on libraries are in the same vein. 
   This one was on the web:

The Virginia Public Library received a request for patron records from the
Deputy Sheriff. The staff member informed the officer he would need to talk to
the Director. Director Nancy Maxwell stated that she would check with the city
attorney. When he could not be located in time, she contacted ALS and was
advised to give them the information requested since it was accompanied by a
court order.

http://www.arrowhead.lib.mn.us/compass/minutes/august02.html


 You won't catch a terrorist learning to be evil at a library, but you
 might wrongfully snare an innocent citizen who happens to have an interest
 in bad books.
 
 How long until this program is extended to include anyone checking out any
 book that some part of the US law enforcement body deems bad? If you read
 Pikhal, do you end up on a watch list?


Yup. That's their main interest. Fuck terrorists -- the pigs are only
interested if there is something to steal at the bust, like drugs or money, or
there might be property to grab. Just try and get them to do anything about
regular crime like enforcing disturbing the peace or drunk and disorderly. So,
of course, that's what they are using the unpatriot act for. 


-- 
Harmon Seaver   
CyberShamanix
http://www.cybershamanix.com