Re: [EMAIL PROTECTED]: [IP] more on U.S. passports to receive RFID implants start

2005-10-31 Thread Eugen Leitl
On Sat, Oct 29, 2005 at 08:42:35PM -0400, Tyler Durden wrote:
 One thing to think about with respect to the RFID passports...
 
 Um, uh...surely once in a while the RFID tag is going to get corrupted or 
 something...right? I'd bet it ends up happening all the time. In those 
 cases they probably have to fall back upon the traditional passport usage 
 and inspection.

Actually, an RFID can be ridiculously reliable. It will also
depend on how much harassment a traveler will be exposed to, 
when travelling. Being barred from entry will definitely prove
sufficient deterrment.
 
 The only question is, what could (believably) damage the RFID?

Microwaving it will blow up the chip, and cause a scorched spot.
Severing the antenna would be enough for the chip to become mute.
Violetwanding or treating with a Tesla generator should destroy
all electronics quite reliably -- you always have to check, of
course.

Also, the ID is quite expensive, and a frequent traveller
will wind up with a considerable expense, and hassle.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Re: Multiple passports?

2005-10-31 Thread Eugen Leitl
On Sun, Oct 30, 2005 at 03:05:25AM +, Justin wrote:
 If I apply for a new one now, and then apply for a another one once the
 gov starts RFID-enabling them, will the first one be invalidated?  Or
 can I have two passports, the one without RFID to use, and the one with
 RFID to play with?

Here in Germany the current ID (sans smartcard/rfid/biometics) will
be valid until expiry date.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-28 Thread Eugen Leitl
On Thu, Oct 27, 2005 at 11:28:42PM -0400, R.A. Hettinga wrote:

 The cypherpunks list is about anything we want it to be. At this stage in
 the lifecycle (post-nuclear-armageddon-weeds-in-the-rubble), it's more
 about the crazy bastards who are still here than it is about just about
 anything else.

While I don't exactly know why the list died, I suspect it
was the fact that most list nodes offered a feed full of spam,
dropped dead quite frequently, and also overusing that needs 
killing thing (okay, it was funny for a while).

The list needs not to stay dead, with some finite effort on our
part (all of us) we can well resurrect it. If there's a real content
there's even no need from all those forwards, to just fake
a heartbeat.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-27 Thread Eugen Leitl
On Wed, Oct 26, 2005 at 08:41:48PM -0500, Shawn K. Quinn wrote:

 1) You have told your HR person what a bad idea it is to introduce a
 dependency on a proprietary file format, right?

Telling is useless. Are you in a sufficient position of power to make
them stop using it? I doubt it, because that person will be backed
both by your and her boss. Almost always.

It's never about merit, and not even money, but about predeployed
base and interoperability. In today's world, you minimize the surprise
on the opposite party's end if you stick with Redmondware. (Businessfolk
hate surprises, especially complicated, technical, boring surprises).
 
 2) OpenOffice can read Excel spreadsheets, and I would assume it can
 save the changes back to them as well.

OpenOffice  Co usually supports a subset of Word and Excel formats.
If you want to randomly annoy your coworkers, use OpenOffice to process
the documents in MS Office formats before passing them on, without
telling what you're doing. Much hilarity will ensue.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


[EMAIL PROTECTED]: Skype security evaluation]

2005-10-24 Thread Eugen Leitl
- Forwarded message from Steven M. Bellovin [EMAIL PROTECTED] -

From: Steven M. Bellovin [EMAIL PROTECTED]
Date: Sun, 23 Oct 2005 09:48:37 -0400
To: cryptography@metzdowd.com
Subject: Skype security evaluation
X-Mailer: exmh version 2.6.3 04/04/2003 with nmh-1.0.4

Skype has released an external security evaluation of its product; you 
can find it at 
http://www.skype.com/security/files/2005-031%20security%20evaluation.pdf
(Skype was also clueful enough to publish the PGP signature of the 
report, an excellent touch -- see 
http://www.skype.com/security/files/2005-031%20security%20evaluation.pdf.sig)
The author of the report, Tom Berson, has been in this business for many
years; I have a great deal of respect for him.

--Steven M. Bellovin, http://www.cs.columbia.edu/~smb



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Re: cypherpunks@minder.net closing on 11/1

2005-10-14 Thread Eugen Leitl
On Thu, Oct 13, 2005 at 04:49:00PM -0400, Brian Minder wrote:
 The minder.net CDR node will be shutting down on November 1, 2005.  This
 includes the cypherpunks-moderated list.  Please adjust your subscriptions
 accordingly.

Thanks Brian.

I'm suggesting [EMAIL PROTECTED] as an alternative node
to subscribe to. 

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


/. [How Chinese Evade Government's Web Controls]

2005-09-28 Thread Eugen Leitl

Link: http://slashdot.org/article.pl?sid=05/09/27/1235203
Posted by: CmdrTaco, on 2005-09-27 13:37:00

   [1]Carl Bialik from the WSJ writes China is moving to 'centralize all
   China-based Web news and opinion under a state regulator,' the Wall
   Street Journal reports, but determined citizens have found a way out
   of previous restrictions in what has become a cat-and-mouse game:
   '[2]Many Chinese Internet users, dismissing what they call government
   scare tactics, find ways around censorship. The government requires
   users of cybercafs to register with their state-issued ID cards on
   each visit, but some users avoid cybercaf registration by paying off
   owners. In response, the government has installed video cameras in
   some cafs and shut others. ... While certain words such as democracy
   are banned in online chat rooms, China's Web users sometimes transmit
   sensitive information as images, or simply speak in code, inserting
   special characters such as underscoring into typing.' Also noteworthy
   is that major portals seem to be cooperating with authorities'
   restrictions: 'Insiders who work for the big portal sites say they are
   already in regular contact with authorities about forbidden topics,
   such as the outlawed Falun Gong religious group, which their teams of
   Web editors pull off bulletin boards.'

References

   1. mailto:[EMAIL PROTECTED]
   2. 
http://online.wsj.com/public/article/0,,SB112777213097452525-zRQZ3S8IZkZDPMZNay0R6RUfXOw_20060926,00.html?mod=blogs

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


[EMAIL PROTECTED]: Re: Wikipedia Tor]

2005-09-28 Thread Eugen Leitl
- Forwarded message from Roger Dingledine [EMAIL PROTECTED] -

From: Roger Dingledine [EMAIL PROTECTED]
Date: Tue, 27 Sep 2005 15:54:38 -0400
To: [EMAIL PROTECTED]
Subject: Re: Wikipedia  Tor
User-Agent: Mutt/1.5.9i
Reply-To: [EMAIL PROTECTED]

On Tue, Sep 27, 2005 at 11:18:31AM -0400, Paul Syverson wrote:
 On Tue, Sep 27, 2005 at 10:27:58AM -0400, Matt Thorne wrote:
  everyone is so worried about it, but has any one ever been successfully been
  able to use tor to effectively spam anyone?
 
 No. Cf.
 http://tor.eff.org/faq-abuse.html#WhatAboutSpammers

To be fair, this answer is yes. People have used Tor to deface Wikipedia
pages, along with Slashdot pages, certain IRC networks, and so on. I
think that counts as spam at least in a broad sense.

 A potential for cooperation is the proposal below for authenticated
 access to Wikipedia through Tor. I will not speak to any particular
 design here, but if Wikipedia has a notion of clients trusted to post
 to Wikipedia, it should be possible to work with them to have an
 authentication server that controls access to Wikipedia through Tor.

As I understand it, Jimmy is hoping that we will develop and maintain
this notion. We would run both halves of the Tor network, and when they
complain about a user, we would cut that user out of the authenticated
side.

Jimmy and I talked about Tor-and-Wikipedia many months ago, and the
conclusion was that they (mediawiki) would be willing to try a variety of
technological solutions to see if they work (i.e. cut down on vandalism
and aren't too much of a burden to run). My favorite is to simply have
certain address classes where the block expires after 15 minutes or
so. Brandon Wiley proposed a similar idea but where the block timeout is
exponentially longer for repeated abuse, so services that are frequently
blocked will stay blocked longer. This is great. But somebody needs to
actually code it.

Wikipedia already needs this sort of thing because of AOL IPs -- they
have similar characteristics to Tor, in that a single IP produces lots
of behavior, some good some bad. The two differences as I understand
them are that AOL will cancel user accounts if you complain loudly enough
(but there's constant tension here because in plenty of cases AOL decides
not to cancel the account, so Wikipedia has to deal some other way like
temporarily blocking the IP), and that it's not clear enough to the
Wikipedia operators that there *are* good Tor users.

(One might argue that it's hard for Wikipedia to change their perception
and learn about any good Tor uses, firstly because good users will
blend in and nobody will notice, and secondly because they've prevented
them all from editing so there are no data points either way.)

So I've been content to wait and watch things progress. Perhaps we will
find a volunteer who wants to help hack the mediawiki codebase to be more
authentication-friendly (or have more powerful blocking config options).
Perhaps we'll find a volunteer to help build the blind-signature
pseudonymous authenticated identity management infrastructure that Nick
refers to. Perhaps the Wikimedia operators will increasingly get a sense
that Tor has something to offer besides vandalism. (I presume this thread
re-surfaced because Tor users and operators are periodically telling
Wikipedia that they don't like being blocked.) Maybe we will come to
the point eventually that it makes sense to do something different than
blocking the Tor IP addresses from editing Wikipedia. (Which, we should
all remember compared the Gentoo forum situation, is a great step above
blocking them from both reading and writing.)

It could be that we never reach that point. Certain services on the
Internet (like some IRC networks) that are really prone to abuse are
probably doing the right thing by blocking all Tor users (and all AOL
users, and all open proxies, and ...). And we want to keep Tor easy
to block, or we're really going to start getting the other communities
angry at us.

In summary, I'm not too unhappy with the status quo for now. Tor needs
way more basic development / usability work still. In the absence of
actual volunteers-who-code on the side of Tor _or_ Wikipedia to resolve
the problem, I'm going to focus on continuing to make Tor better, so
down the road maybe we'll be able to see better answers.

--Roger

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


[EMAIL PROTECTED]: Wikipedia Tor]

2005-09-27 Thread Eugen Leitl
- Forwarded message from Arrakis Tor [EMAIL PROTECTED] -

From: Arrakis Tor [EMAIL PROTECTED]
Date: Tue, 27 Sep 2005 07:48:22 -0500
To: [EMAIL PROTECTED]
Subject: Wikipedia  Tor
Reply-To: [EMAIL PROTECTED]

This is a conversation with Jimmy Wales regarding how we can get
Wikipedia to let Tor get through.




 Anyone with a port 80 can vandalize your website.

Yes, but we notice that we can control a significant amount of vandalism
by blocking ip numbers which have proven to be particularly problematic.
 TOR servers are among the absolute worst.  And TOR operators don't seem
to care.

 We go to the trouble
 to  block  all  the  file  sharing clients, and often abused ports and
 protocols like IRC. Many of us typically block ports which do not have
 any  legitimate  reason for being used. If all it take is a port 80 to
 vandalize  the  wikipedia,  of which port 80 is a public service, then
 there  is  no point in discriminating against Tor users since every IP
 is an equal opportunity offender.

Equal *opportunity*, but we have very strong empirical evidence here.
TOR ip numbers are the worst offenders that we have seen.  People use
TOR specifically to hide their identity, specifically to vandalize
wikipedia.

 You say that tor is quite irresponsibly managed. How would you propose
 we manage tor servers differently?

Ban users who vandalize wikipedia.  That'd be a start.  Rate limit edits
at Wikipedia, that'd be good.  Write an extension to your software which
would help us to distinguish between trusted and newbie Tor clients.

I completely fail to comprehend why Tor server operators consistently
refuse to take responsibility for their crazed users.

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


[EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]]

2005-09-22 Thread Eugen Leitl
- Forwarded message from David Farber [EMAIL PROTECTED] -

From: David Farber [EMAIL PROTECTED]
Date: Thu, 22 Sep 2005 08:57:50 -0400
To: Ip Ip ip@v2.listbox.com
Subject: [IP] Request: Check your cell phone to see if it's always transmitting 
your location [priv]
X-Mailer: Apple Mail (2.734)
Reply-To: [EMAIL PROTECTED]



Begin forwarded message:

From: Declan McCullagh declan@well.com
Date: September 21, 2005 6:22:26 PM EDT
To: politech@politechbot.com
Subject: [Politech] Request: Check your cell phone to see if it's  
always transmitting your location [priv]


Related Politech message:
http://www.politechbot.com/p-05008.html
And a column I wrote on this a while ago:
http://news.com.com/2010-1071_3-5064829.html

-Declan

 Original Message 
Subject: Always-on location tracking in cellphones
Date: Wed, 21 Sep 2005 18:04:30 -0400
From: Richard M. Smith [EMAIL PROTECTED]
To: 'Declan McCullagh' declan@well.com

Hi Declan,

We have talked before about the FCC mandate which is requiring all U.S.
wireless carriers to provide location information to emergency operators
accurate to about 150 feet on all 911 calls as part of the Enhanced 911
program (http://www.fcc.gov/911/enhanced/).  To meet this FCC  
mandate, my
Verizon Wireless Treo 650 cellphone includes some kind of GPS tracking
technology.  The Treo also has an option to select if location  
information
is sent in to Verizon for all calls or only 911 calls.

I was a bit surprised to learn that my Treo defaults to always sending
location information.  After a bit of initial confusion, I got  
confirmation
from both Palm and Verizon Wireless that my observation about the  
default
was correct.  However, Verizon Wireless told me this is a mistake and  
going
forward, they plan to change the default to 911 calls only.

I'm curious now when other models of cellphones transmit location
information to carriers.  Can folks on Politech check their  
cellphones and
phone manuals to see what kind of controls there are over location
information and send me the results?  I'll also need the make and  
model of
the phone and the wireless carrier.

For my Treo phone, I found the location option under Phone  
Preferences in
the Options menu of the main phone screen.

Thanks,
Richard M. Smith
http://www.ComputerBytesMan.com



___
Politech mailing list
Archived at http://www.politechbot.com/
Moderated by Declan McCullagh (http://www.mccullagh.org/)


-
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


[EMAIL PROTECTED]: [IP] OT: Canada: Sweeping new surveillance bill to criminalize investigative journalism]

2005-09-22 Thread Eugen Leitl
 that there are certain things that are  
kind of
sacrosanct and that we wouldn't videotape, such as people changing their
clothes or going to the bathroom. But if it was a spousal domestic
investigation, for example, and somebody was having sex in the front  
seat of
a car, we would be videotaping it.

Mr. Joynt also argued that parents should be entitled to install a  
hidden
video camera in their kitchen, for example, if they are suspicious  
about how
a child-care giver is interacting with their helpless infant.

If they become suspicious about the quality or the level of that  
care, they
should be able to check it out and I don't think that employee's  
right to
privacy supercedes the right of the child to a safe environment, Mr.  
Joynt
said.



-
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Re: GPS Jammer Firm nearly ejected from Russian air show.

2005-09-22 Thread Eugen Leitl
On Thu, Sep 22, 2005 at 04:50:07PM +0200, Nomen Nescio wrote:

 GPS frequencies are fixed, so they can be interfered with.  Only in

Military receivers are somewhat hardened at least against terrestrial
jamming. It would be probably impossible to be immune to strong
airborne (balloons and drones) jammers.  

 these days of general technological incompetence, where intangible
 scientific principles have reverted to their ancient status as mystic,
 is the concept of RF interference newsworthy.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Re: [EMAIL PROTECTED]: [IP] Internet phone wiretapping (Psst! The FBI is Having

2005-09-09 Thread Eugen Leitl
On Fri, Sep 09, 2005 at 12:00:22AM -0700, James A. Donald wrote:
 --
 From: Ulex Europae [EMAIL PROTECTED]
  Okay, I've been in a hole in the ground for a few
  years. What happened to Tim May?
 
 Gone very quiet.  At the expiration party, he failed to
 recommend gas chambers.

Does anyone have a recent working email address? Does
[EMAIL PROTECTED] still work? I don't have a usenet reader
right now, and Google groups munges addresses.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


[EMAIL PROTECTED]: [IP] Radio jamming in New Orleans during rescue operations]

2005-09-09 Thread Eugen Leitl
- Forwarded message from David Farber [EMAIL PROTECTED] -

From: David Farber [EMAIL PROTECTED]
Date: Fri, 9 Sep 2005 08:25:43 -0400
To: Ip Ip ip@v2.listbox.com
Subject: [IP] Radio jamming in New Orleans during rescue operations
X-Mailer: Apple Mail (2.734)
Reply-To: [EMAIL PROTECTED]



Begin forwarded message:

From: Glenn S. Tenney CISSP CISM [EMAIL PROTECTED]
Date: September 8, 2005 3:24:45 PM EDT
To: [EMAIL PROTECTED]
Subject: Radio jamming in New Orleans during rescue operations


I saw this... For IP if you like:

http://www.waynemadsenreport.com/

September 2, 2005 -- Who is jamming communications in New Orleans? Ham
radio operators are reporting that communications in and around New
Orleans are being jammed. In addition, perplexed ham radio operators
who were enlisted by the Federal government in 911 are not being used
for hurricane Katrina Federal relief efforts. There is some
misinformation circulating on the web that the jamming is the result of
solar flares. Ham radio operators report that the flares are not the
source of the communications jamming.  If anyone at the National
Security Agency is aware of the source of the jamming, from direction
finding or satellite intelligence, please discretely contact me at
[EMAIL PROTECTED] (from a private or temporary email account).
In this case, the Bush administration cannot hide behind national
security and it is the duty of every patriotic American to report such
criminal activity to the press. Even though the information on the
jamming may be considered classified -- it is in the public interest to
disclose it. Also, the Federal Aviation Administration (FAA) is
reporting that no aircraft over New Orleans have been fired on over New
Orleans or anywhere else in the area. Are the reports of shots being
fired at aircraft an attempt by the Bush administration to purposely
delay the arrival of relief to the city's homeless and dying poor? The
neocons have turned New Orleans into Baghdad on the Mississipppi

New Orleans: Who is jamming communications and why?

UPDATE: We can now report that the jamming of New Orleans'
communications is emanating from a pirate radio station in the
Caribbean. The noise is continuous and it is jamming frequencies,
including emergency high frequency (HF) radios, in the New Orleans
area. The radio frequency jammers were heard last night, stopped for a
while, and are active again today. The Pentagon must locate the
positions of these transmitters and order the Air Force to bomb them
immediately.

However, we now have a new unconfirmed report that the culprit may be
the Pentagon itself. The emitter is an IF (Intermediate Frequency)
jammer that is operating south southwest of New Orleans on board a U.S.
Navy ship, according to an anonymous source. The jamming is
cross-spectrum and interfering with superheterodyne receiver
components, including the emergency radios being used in New Orleans
relief efforts. The jammed frequencies are:

72.0MHZ   (high end of Channel 4 WWL TV New Orleans)
45.0MHZ(fixed mobile)
10.245MHZ  (fixed mobile)
10.240 Mhz   (fixed mobile)
11.340 Mhz  (aeronautical mobile)
233 MHZ  (fixed mobile)
455 IF  (jammer)

A former DoD source says the U.S. Army uses a portable jammer, known
as WORLOCK, in Iraq and this jammer may be similar to the one that is
jamming the emergency frequencies.

UPDATE Sep. 3 -- A Vancouver, British Columbia Urban Search  Rescue
Team deployed to New Orleans reported that their satellite phones were
not working and they had to obtain other satellite phones to keep in
touch with their headquarters and other emergency agencies in British
Columbia.

There is a report on a ham radio web site that jamming is adversely
affecting the New Orleans emergency net on 14.265 Mhz.

If a U.S. Navy ship is, in fact, jamming New Orleans communications,
the crew must immediately shut down the jammer and take action against
the Commanding Officer.

***

We have just learned from a journalist in Mobile that yesterday,
Sprint blocked all cell phone calls from the Gulf Coast region to
points north and west. Calls were permitted between Alabama,
Mississippi, and Florida but no calls could be made to Washington, New
York, or Los Angeles

September 5, 2005 ...
Meanwhile, the communications jamming in the New Orleans area  
continues. It is now being reported by  truck drivers on  
Interstate-10 as affecting the Citizens' Band (CB) frequencies.



-
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Re: [EMAIL PROTECTED]: [IP] Internet phone wiretapping (Psst! The FBI is Having Trouble on the Line, Aug. 15)]

2005-09-08 Thread Eugen Leitl
On Thu, Sep 08, 2005 at 05:31:32AM +0100, Dave Howe wrote:

   Don't really need one. the Skype concept of supernodes - users that relay
 conversations for other users - could be used just as simply, and is

What hinders Mallory from running most of supernodes?

 Starbucks-compatable. If the feds had to try and monitor traffic for every 
 VoIP
 user that could potentially be used as a relay (*and* prove that any outbound
 traffic from their target wasn't relayed traffic from another user) life would
 get much harder for them much faster.
   Plus of course some sort of assurance that skype's crypto isn't snakeoil :)

It is snake oil until proven otherwise.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Re: [EMAIL PROTECTED]: [IP] Internet phone wiretapping (Psst! The FBI is Having

2005-09-08 Thread Eugen Leitl
On Wed, Sep 07, 2005 at 10:16:31PM -0400, Ulex Europae wrote:
 Okay, I've been in a hole in the ground for a few years. What happened
 to Tim May?

http://groups.google.com/groups?q=start=0scoring=denc_author=8NH-JhofCMh-TnQo0KXFjppET7C1dSi2gjvQCgNblIvwKtcqeQhl=en;

Nobody of importance, just an Usenet troll.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Re: [EMAIL PROTECTED]: Re: Tor on USB]

2005-09-06 Thread Eugen Leitl
On Thu, Sep 01, 2005 at 07:44:36PM -0400, Tyler Durden wrote:

 In other words, if I go into a Starbucks with this thing, can my laptop or 
 whatever start acting like a temporary Tor node?

I don't see why not, you'd be just middleman.

If you want to wind up on this list 
http://serifos.eecs.harvard.edu:8000/cgi-bin/exit.pl
you'll have to submit your stats, and it will take a day or two.
 
 That's a very fascinating concept: A temporary, transient Tor network. Any 
 node on this network could cease to exist by the time someone tried to jam 
 large portions of it. Or at least, their attacks would have to be a hell of 
 a lot more flexible.

An ephemeral P2P traffic remixing system with high node density in address space
could bootstrap very quickly just from rendezvousing/scanning some random net
blocks.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Prosecutors: CIA agents left trail

2005-08-03 Thread Eugen Leitl
 said.

As long as you use public communication systems, there is no way you can avoid 
being tracked, he said.

Or, as Nativi put it: When you go on this kind of operation, you need to turn 
off your damn phone.

Yoram Schweitzer, a researcher for the Jaffee Center for Strategic Studies in 
Tel Aviv, said he wasn't surprised the operatives stayed in five-star hotels, 
which provide excellent cover for those posing as businessmen or businesswomen. 
But analysts did question whether using of credit cards was advisable.

Chris Aaron, a former editor of Jane's Intelligence Review magazine, said the 
team must have known that local cells phones put them at risk of being exposed.

A CIA team would have been aware of the Italian ability to log calls and track 
their location, so they clearly weren't worried about that, he said.

The CIA in Washington has declined to comment on the case.

Copyright 2005 The Associated Press. All rights reserved.This material may not 
be published, broadcast, rewritten, or redistributed.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out

2005-08-02 Thread Eugen Leitl
On Mon, Aug 01, 2005 at 05:12:38PM -0400, Dan McDonald wrote:

 I'm surprised that the target node has that much INBOUND bandwidth, quite
 frankly.

The node itself has only a Fast Ethernet port, but there's 
some 4 GBit available outside of the router.

I'm genuinely glad the node has been taken offline as soon
as the traffic started coming in in buckets, and I didn't
have to foot the entire bill (the whole incident only
cost me 20-30 GByte overall as far as I can tell).

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out

2005-08-02 Thread Eugen Leitl
On Mon, Aug 01, 2005 at 01:51:57PM -0400, Tyler Durden wrote:

 What?!! 300MB/s for a Tor node? OK, I'm a telecom guy and not a data guy 
 but that sounds suspiciously like someone loaded up an OC-3's worth of 
 traffic and then slammed your node. Ain't no hacker gonna do that. Any 
 indication the ostensible originating IP addresses are faked?

No, it looked like a vanilla DDoS. According to the hoster, I've only
seen a small piece of the log, which looked like this:

09:21:54.322650 IP 67.9.36.207  213.239.210.243: icmp
09:21:54.322776 IP 218.102.186.215  213.239.210.243: icmp
09:21:54.322895 IP 24.242.31.137  213.239.210.243: icmp
09:21:54.323017 IP 61.62.83.208  213.239.210.243: icmp
09:21:54.323140 IP 68.197.59.153  213.239.210.243: icmp
09:21:54.323263 IP 202.138.17.65  213.239.210.243: icmp
09:21:54.323375 IP 221.171.34.81  213.239.210.243: icmp 1376: echo
request seq 23306
09:21:54.323500 IP 150.199.172.221  213.239.210.243: icmp
09:21:54.323623 IP 62.150.154.191  213.239.210.243: icmp
09:21:54.323741 IP 221.231.54.152  213.239.210.243: icmp
09:21:54.323863 IP 222.241.149.165  213.239.210.243: icmp 1456: echo
request seq 24842
09:21:54.323984 IP 61.81.134.200  213.239.210.243: icmp
09:21:54.324105 IP 60.20.101.125  213.239.210.243: icmp
09:21:54.324227 IP 219.77.117.204  213.239.210.243: icmp
09:21:54.324229 IP 85.98.134.51  213.239.210.243: icmp
09:21:54.324355 IP 61.149.3.249  213.239.210.243: icmp
09:21:54.324475 IP 218.9.240.32  213.239.210.243: icmp 1456: echo
request seq 29962
09:21:54.324598 IP 24.115.79.52  213.239.210.243: icmp
09:21:54.324720 IP 12.217.75.61  213.239.210.243: icmp
09:21:54.324844 IP 202.161.4.210  213.239.210.243: icmp
09:21:54.324847 IP 139.4.150.122.14238  213.239.209.107.80: R
2598318330:2598318330(0) win 0
09:21:54.324973 IP 211.203.38.29  213.239.210.243: icmp
09:21:54.325101 IP 68.74.58.171  213.239.210.243: icmp
09:21:54.325240 IP 211.214.159.102  213.239.210.243: icmp
09:21:54.325341 IP 221.231.53.52  213.239.210.243: icmp
09:21:54.325465 IP 24.20.194.42  213.239.210.243: icmp

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out

2005-08-01 Thread Eugen Leitl
On Mon, Aug 01, 2005 at 10:54:26AM -0400, Tyler Durden wrote:

 Tor networks, anyone?

Caveat when running Tor on a production machine, I got DDoS'd
recently with some ~300 MBit/s. (Yes, my exit policy didn't
contain IRC).

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Department of Homeland Security Surveillance Truck

2005-07-28 Thread Eugen Leitl

http://eyeball-series.org/dhs-truck.htm

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


[dave@farber.net: [IP] CIA agents tracked through sloppy cellphone use.]

2005-06-28 Thread Eugen Leitl
- Forwarded message from David Farber [EMAIL PROTECTED] -

From: David Farber [EMAIL PROTECTED]
Date: Fri, 24 Jun 2005 18:29:13 -0400
To: Ip ip ip@v2.listbox.com
Subject: [IP] CIA agents tracked through sloppy cellphone use.
X-Mailer: Apple Mail (2.730)
Reply-To: [EMAIL PROTECTED]



Begin forwarded message:

From: Francesco Callari [EMAIL PROTECTED]
Date: June 24, 2005 4:43:12 PM EDT
To: Dave Farber [EMAIL PROTECTED]
Subject: [For IP, if you wish] CIA agents tracked through sloppy  
cellphone use.


Dr. Farber,

I thought the following may be of interest to IP readers.
 
---

Today's US news sources show several reports on Italian prosecutors
writing arrest warrants for 13 CIA agents in the kidnapping of a
Muslim preacher in Milan in 2003.

The Italian newspapers, however, provide some interesting technical
details on the investigation, which hinged on tracking their cellphones.
Excerpt translations follow.

[Repubblica, 6/24/2005]
Milan closes the inquiry - CIA, 12 agents face arrest.

[...] The CIA team bungled a lot, leaving clues everywhere. A group
of cell phones is in Via Guerzoni [where the kidnapping occurred]
around noon. The same cell phones moved toward Aviano Air Base shortly
thereafter. Calls from those cell phone were made to the
U.S. consulate and to numbers in Virginia. One of the same cell phones
was located in Cairo the day after. From the cell phones [the
investigators] tracked [...] the hotels in Milan where the team
members stayed and the car rental agency where the van used in the
operation was rented.

[...] In those days of February 2003 the American team in Milan showed
a surprising ignorance, or lack of care at least, in the use of their
cellphones. Using the words of one of our sources, they showed to
know less than one of our homegrown thieves. Apparently they
thought that replacing the phones' SIM cards was enough to prevent
successful tracking. Not so, the Americans apparently ignored the
unique hardware identifier of each GSM phone (the IMEI), which can
be tracked regardless of the SIM card and the phone carrier.

[Corriere della Sera, 6/24]
Milan' prosecutors: jail the CIA agents.

[Lots of details on the investigation results, including $120,000
of U.S. taxpayer's money spent by CIA team members to reside in 5
luxury hotels, plus a note about two couples of team members
that took a vacation in romantic hotels in Valmalenco and along the
Poet's Gulf after the kidnapping.  The interesting bit involving
cellphones is toward the end:]

All the cellphones were irregular, since the registered owners were
fake names, non-existing corporations and even innocent Milan women
and a Rumenian bricklayer. However, the CIA operatives showed their
own U.S. passports to register themselves in a total of 23 hotels and 4
rental car companies, and the phones could be placed in the same
locations at the same times. The police tracked the photocopies of the
passports, and determined that they were genuine documents, even
though probably using showing cover names.





-
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Re: [jrandom@i2p.net: [i2p] weekly status notes [jun 21]]

2005-06-22 Thread Eugen Leitl
On Wed, Jun 22, 2005 at 12:00:47PM -0400, Tyler Durden wrote:
 Any idea how much it would cost? How much time is involved? (My constraint 
 is the latter and not so much the former.)

Debian setup is easiest, put
deb http://mirror.noreply.org/pub/tor experimental-sarge main
into your /etc/apt/sources.list and you can install tor via apt-get update
and apt-get install tor

You might want to touch /etc/tor/torrc to reflect your exit policies (my colo
blocks port 6667), and bandwidth capping (I cap at 80 KB, which leaves me
with some 10-15 GBytes traffic/day).

ExitPolicy reject 0.0.0.0/8,reject 169.254.0.0/16,reject 127.0.0.0/8, reject
192.168.0.0/16,reject 10.0.0.0/8,reject 172.16.0.0/12
ExitPolicy accept *:20-22,accept *:53,accept *:79-81,accept *:110,accept
*:143,accept *:389,accept *:443,accept *:636,accept *:706,accept *:873,accept
*:993,accept *:995
ExitPolicy reject *:1214,reject *:4661-4666,reject *:6346-6347,reject
*:6419,reject *:6667,reject *:6881-6889
ExitPolicy accept *:1024-65535,reject *:*

BandwidthRate 80 KB


-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


[perry@piermont.com: US DoJ wants ISPs to be forced to log their customers activities]

2005-06-17 Thread Eugen Leitl

EU is pushing for the same; global harmonization of legisation, and of
course then mutual peering of connection info (though it's a lot of data) is
probably coming.

- Forwarded message from Perry E. Metzger [EMAIL PROTECTED] -

From: Perry E. Metzger [EMAIL PROTECTED]
Date: Fri, 17 Jun 2005 11:20:39 -0400
To: cryptography@metzdowd.com
Subject: US DoJ wants ISPs to be forced to log their customers activities


Quoting:

   The U.S. Department of Justice is quietly shopping around the
   explosive idea of requiring Internet service providers to retain
   records of their customers' online activities.

http://news.com.com/Your+ISP+as+Net+watchdog/2100-1028_3-5748649.html

-- 
Perry E. Metzger[EMAIL PROTECTED]

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Re: /. [Intel Adds DRM to New Chips]

2005-05-31 Thread Eugen Leitl
On Sat, May 28, 2005 at 11:26:28PM -0400, Tyler Durden wrote:

 (Continued)
 Contrary to expectations, however, sales of the chip have been suprisingly 
 low, with zero interest shown by major PC manufacturers. One major PC 
 industry executive, who wished to remain anonymous sated: There are 100s 
 of millions of people trading files every day throughout the globe. I'm 
 going to start using this chip and give up that market because...?

What actually seems to be happening is that chipset DRM is being deployed 
silently,
though not on a wide scale yet, and but for game consoles in a facultative
version. Of course, such dormant DRM can be activated with subsequent software
upgrades (watch the sneaky software-DRM games Cupertino plays).

The billion dollar question is: will users let themselves lock in into the
DRM prison, just because of a dangling premium content carrot, and the I
gots your IP, my lawyers 0wnZ0r Ur 455 litigation stick?

We're going to see soon, as HDTV on BluRayCo is going to be that experiment.
The next-generation signal lanes to display devices are encrypted, so there's
only the analog hole left to the naive user.

Online activation of software is already quite widespread, so it seems
customers are willing to accept restriction to ownership and use.

 OK, Gov officials will eventually start trying to introduce laws mandating 
 such technologies be used, but by then it's going to come down to a battle 
 of lobbies: The Entertainment industry vs Telecom+PCs++Software. Which can 
 pump dollars into Senatorial hands faster?

The entertainment industry has an order of magnitude less funds, but seems to
spend them far more efficiently. Also, the Far East market is increasingly
supplying itself, so Hollywood has less and less angle there. Let US and EU
get the crippleware, while the rest of the world gets swamped with plaintext
pirated copies (a single break is enough).

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


/. [Dissidents Seeking Anonymous Web Solutions?]

2005-05-16 Thread Eugen Leitl

Link: http://slashdot.org/article.pl?sid=05/05/13/0250226
Posted by: Cliff, on 2005-05-13 19:38:00

   from the browsing-without-regard-for-politics dept.
   [1]DocMurphy asks: I'm working with some dissidents who are looking
   for ways to use the Internet from within repressive regimes. Many have
   in-home Internet access, but think it too risky to participate in
   pro-freedom activities on home PCs. Internet cafés are also available,
   but although fairly anonymous, every machine may be infected with
   keystroke loggers that give governments access to and knowledge of
   'banned' sites. Dissidents not only want to remain anonymous
   themselves, but also wish to not compromise the sites they access. Any
   suggestions for products/procedures/systems out there making anonymous
   access  publishing a reality under repressive regime run Internet
   access?

References

   1. mailto:[EMAIL PROTECTED]

- End forwarded message -


signature.asc
Description: Digital signature


Re: [Politech] Passport RFID tracking: a between-the-lines read [priv] (fwd from declan@well.com)

2005-05-10 Thread Eugen Leitl
On Mon, May 09, 2005 at 12:13:18PM -0700, cypherpunk wrote:

 And of course there is Eugen* Leitl, who mindlessly forwards far and
 wide everything that enters his mailbox. I don't know whether we

Consider me bitten by Choate. It's totally incurable.

 should be annoyed or relieved that he fails to exercise the slightest
 editorial effort by adding his own thoughts, if he has any, to the
 material he passes around.

I don't need the list. Goddamn heise has more cypherpunk content than the
list. Tim May's tired trolls have more cypherpunk content than the list.

I'm trying to keep it going by keeping a steady trickle of relevant info but
I'm honestly wondering if it's worth the effort.

If you think I'm going to add editing effort, thus cutting some 10 minutes out 
of
my already busy day you're out of your fucking mind.

If you want high quality content, post it yourself.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


signature.asc
Description: Digital signature


Re: [silk] Google Targeted ads - gmail (fwd from rishab@dxm.org)

2005-04-01 Thread Eugen Leitl
On Fri, Apr 01, 2005 at 10:17:46AM -0800, Sarad AV wrote:
 hi,
 
 Maybe it was just a bot parsing the contents of the
 mail. Cannot say for sure. Reading every ones g-mail
 doesn't appear to be practical.

Did you miss the part where Google unofficially admitted storing queries for
good? Given their attidude, and storage, they're storing *anything* they
can. 

Everyone is using Google. Not just for searching; Orkut and Google local,
News, AdWords, Gmail, what have you. 

You don't have to run it, you can just read over their shoulders to get a
really detailed profile on any user. Or subpoena stuff on some selected
users.
 
Now here's your one stop shop for evil. A position for Google minister for
propaganda is about to be posted, so I hear. 

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpTzz47mlvB8.pgp
Description: PGP signature


Re: [p2p-hackers] good-bye, Mnet, and good luck. I'm going commercial! plus my last design doc (fwd from zooko@zooko.com)

2005-03-13 Thread Eugen Leitl
On Wed, Mar 09, 2005 at 10:06:45PM -0800, Steve Schear wrote:

 I worked with Bram and Zooko at Mojo Nation (where both BT and Mnet got 
 their respective genesis) and was frankly surprised when the MPAA was so 
 easily able to target and put out of commission BT's trackers.  The 

Why? BT is designed with zero privacy in mind.

 exposure of the trackers was a prominent topic of MN planning discussions 
 and its odd that precautions, like distributing the tracker functions into 
 clients or hiding them inside a TOR-like proxy network weren't taken 

You can post BT links on a P2P network.

 earlier.


-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpYTRGso4T7m.pgp
Description: PGP signature


Re: [p2p-hackers] good-bye, Mnet, and good luck. I'm going commercial! plus my last design doc (fwd from zooko@zooko.com)

2005-03-13 Thread Eugen Leitl
On Thu, Mar 10, 2005 at 10:48:12PM -0800, Steve Schear wrote:

 Why? BT is designed with zero privacy in mind.
 
 And this was a profound error, IMHO.  One of the epiphanies from my work at 

It was a deliberate decision on Bram Cohen's part. BT is a very useful medium
to deliver software updates, movies und most for what there are currently
broadcast media for.

If you want to be invisible to lawyers, you have to use something else.

(Or at least run BT on a large zombie cloud, so you have plausible
deniability).

 MN was that a secrecy-oriented proxy network development and successful 
 deployment needed to precede P2P file sharing if such networks were to 
 survive determined technical and legal challenges.  End users often care 

If a network has been declared illegal, and you're a part of that network,
and somebody receives packets from you which are part of IP-protected binary
blob, and your ISP rats on you, your ass is grass with the right kind of IP 
nazi legislation.

Obvously, the only way to prevent that from happening is not be part of that
network, not make your ISP rat on you -- or, much better, do not let that
legislation happen at all. 

If it does happen, freedom becomes illegal. 

 little about what 'under the hood' of their P2P app only that they can get 
 the content conveniently and they are not subjected to annoyances like spy 
 or adware.
 
  exposure of the trackers was a prominent topic of MN planning discussions
  and its odd that precautions, like distributing the tracker functions 
 into
  clients or hiding them inside a TOR-like proxy network weren't taken
 
 You can post BT links on a P2P network.
 
 But trackers must still be widely accessible by the general population of 
 BT users and can you offer the content or obtain it without likely 
 identification?

Web pages have static addresses in DNS. Search on P2P in dynamic IP is much
more ephemeral, and requires ISPs to keep track of (customer IPv4 time_period)
tuples long enough so that their logs can be subpoenaed.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpiQZGVFVAjY.pgp
Description: PGP signature


Re: Handheld Licence Plate Scanner/OCR/Lookup

2005-03-07 Thread Eugen Leitl
On Fri, Mar 04, 2005 at 02:03:23PM -0800, Bill Stewart wrote:

 Bootfinder, made by G2 Systems in Alexandria VA,
 is a combination of a handheld digital camera,

Germany has recently deployed a Toll Collect system which has license plate OCR 
mounted
on many points (hundreds to thousands) over highways. It reads all license 
plates (missing out some 5% or so currently), supposedly discarding
everything but the truck's. Currently.

It is sufficient to create movement profiles of individual vehicles with a
rather good resolution (but then, mobile phones are even more useful for
that).

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpbYlSA8jXIW.pgp
Description: PGP signature


Re: palm beach HIV

2005-02-22 Thread Eugen Leitl
On Mon, Feb 21, 2005 at 04:17:43PM -0500, Damian Gerow wrote:
 Thus spake Eugen Leitl ([EMAIL PROTECTED]) [21/02/05 16:07]:
 :  Calling Tim May!  Calling Tim May!
 : 
 : You rang?
 : 
 : 
 http://groups-beta.google.com/groups?q=start=0scoring=denc_author=8NH-JhoA
 : AAAfCMh-TnQo0KXFjppET7C1dSi2gjvQCgNblIvwKtcqeQ
 
 For those who hate word wrap...
 
 
 http://groups-beta.google.com/groups?q=start=0scoring=denc_author=8NH-JhofCMh-TnQo0KXFjppET7C1dSi2gjvQCgNblIvwKtcqeQ;

Funny, wrapped again! 
 
 /pet peeve

Yes, complain to the Al-Q. node maintainer. The same code which strips my
digital signatures also wrap the lines.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpfkmSaLAPup.pgp
Description: PGP signature


Re: palm beach HIV

2005-02-22 Thread Eugen Leitl
On Mon, Feb 21, 2005 at 08:25:47PM +, Justin wrote:

 Calling Tim May!  Calling Tim May!

You rang?

http://groups-beta.google.com/groups?q=start=0scoring=denc_author=8NH-JhofCMh-TnQo0KXFjppET7C1dSi2gjvQCgNblIvwKtcqeQ;

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpgd3MNBo7Cd.pgp
Description: PGP signature


Re: SHA1 broken?

2005-02-22 Thread Eugen Leitl
On Sat, Feb 19, 2005 at 03:53:53PM +, Dave Howe wrote:

 I wasn't aware that FPGA technology had improved that much if any - feel 
 free to correct my misapprehension in that area though :)

FPGAs are too slow (and too expensive), if you want lots of SHA-1 performance,
use a crypto processor (or lots of forthcoming C5J mini-ITX boards), or an
ASIC.

Assuming, fast SHA-1 computation is the basis for the attack -- we do not
know that.

While looking, came across

http://www.ietf.org/proceedings/02jul/slides/saag-1.pdf

We really DO NOT need SHA-256 for Message Authentication, mid-2002.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpiyYiZfRHUC.pgp
Description: PGP signature


Re: MIME stripping

2005-02-22 Thread Eugen Leitl

Weird. I won't sign this message.

On Mon, Feb 21, 2005 at 10:57:37PM +, Justin wrote:
 On 2005-02-21T22:40:03+0100, Eugen Leitl wrote:
  Yes, complain to the Al-Q. node maintainer. The same code which strips my
  digital signatures also wrap the lines.
 
 Really?
 
 http://groups-beta.google.com/groups?q=start=0scoring=denc_author=8NH-JhofCMh-TnQo0KXFjppET7C1dSi2gjvQCgNblIvwKtcqeQ;
 
 http://groups-beta.google.com/groups?q=start=0scoring=denc_author=8NH-JhofCMh-TnQo0KXFjppET7C1dSi2gjvQCgNblIvwKtcqeQ;
 
 -- 
 Certainly there is no hunting like the hunting of man, and those who
 have hunted armed men long enough and liked it, never really care for
 anything else thereafter.   --Hemingway, Esquire, April 1936
 
 [demime 1.01d removed an attachment of type application/pgp-signature]
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net



Re: palm beach HIV

2005-02-22 Thread Eugen Leitl
On Mon, Feb 21, 2005 at 05:40:13PM -0500, Damian Gerow wrote:
 Thus spake Eugen Leitl ([EMAIL PROTECTED]) [21/02/05 16:57]:
 :  For those who hate word wrap...
 : 
 : 
 : 
 http://groups-beta.google.com/groups?q=start=0scoring=denc_author=8NH-Jho
 : fCMh-TnQo0KXFjppET7C1dSi2gjvQCgNblIvwKtcqeQ
 : 
 : Funny, wrapped again!
 
 Not for me.  Neither when I sent it nor when I received it.  Your client,
 perhaps?

No, Mutt doesn't wrap earls.
 
 :  /pet peeve
 : 
 : Yes, complain to the Al-Q. node maintainer. The same code which strips my
 : digital signatures also wrap the lines.
 
 Funny.  Doesn't wrap mine.

You don't sign. It used to be much worse, would completely reformat the
messages. Wrapped earls I can live with.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpOmksHR9bcp.pgp
Description: PGP signature


Re: MIME stripping

2005-02-22 Thread Eugen Leitl

This message is signed.

On Mon, Feb 21, 2005 at 10:57:37PM +, Justin wrote:
 On 2005-02-21T22:40:03+0100, Eugen Leitl wrote:
  Yes, complain to the Al-Q. node maintainer. The same code which strips my
  digital signatures also wrap the lines.
 
 Really?
 
 http://groups-beta.google.com/groups?q=start=0scoring=denc_author=8NH-JhofCMh-TnQo0KXFjppET7C1dSi2gjvQCgNblIvwKtcqeQ;
 
 http://groups-beta.google.com/groups?q=start=0scoring=denc_author=8NH-JhofCMh-TnQo0KXFjppET7C1dSi2gjvQCgNblIvwKtcqeQ;
 
 -- 
 Certainly there is no hunting like the hunting of man, and those who
 have hunted armed men long enough and liked it, never really care for
 anything else thereafter.   --Hemingway, Esquire, April 1936
 
 [demime 1.01d removed an attachment of type application/pgp-signature]
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpii0nVdcs7r.pgp
Description: PGP signature


Re: palm beach HIV

2005-02-22 Thread Eugen Leitl
On Tue, Feb 22, 2005 at 12:25:23PM -0500, Tyler Durden wrote:

 Sheeit...I'm starting to think May was no longer all that interested in the 
 Crypto stuff...seems he really just wanted to rant and terrify the 
 clueless...

I don't know why he's into Usenet trolling these days. I suspect there's a
lot of disgust of where things cypherpunkly now stand. Sense of betrayal,
etc.

Don't do we all, if we look into which a shithole the net has degenerated
these days?

Ever noticed that everybody interesting has left years ago? This is true for
about every great list.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpbUAXnpa8Og.pgp
Description: PGP signature


Re: What is a cypherpunk?

2005-02-09 Thread Eugen Leitl
On Wed, Feb 09, 2005 at 09:09:56AM -0800, James A. Donald wrote:

 There is nothing stopping you from writing your own operating
 system, so Linus did.

Yes. Corporate lawyers descending upon your ass, because you -- allegedly --
are in violation of some IP somewhere. See you in court.
 
 If, however, you decline to pay taxes, men with guns will
 attack you.

If you ignore a kkkorporate cease  desist, men with guns will get you, too.
Eventually. Corporations can play the system, whether they hire bandits, or
use the legal system, or buy a politician to pass a law.
 
 That is the difference between private power and government
 power.

There is no difference. Both are coercive. Some of the rules are good for
you, some are good for the larger assembly of agents, some are broken on
arrival.

We need smarter agents. 

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpua4Q2lFRed.pgp
Description: PGP signature


Re: Dell to Add Security Chip to PCs

2005-02-07 Thread Eugen Leitl
On Sat, Feb 05, 2005 at 01:19:46AM +, Justin wrote:

  If I film off a HDTV screen with a HDTV camera (or just do single-frame
  with a good professional camera) will the flag be preserved?
 
 I don't think so, I think the flag is in the bitstream and doesn't
 affect visual output at all.  You still run into significant quality

I know; that was a rhetorical question.

 loss trying to get around it that way.

I doubt the quality loss would be perceivable. What you'll get will be
persistent artifacts which would allow source fingerprinting via digital
forensics.
 
 The point is that HDTV is a popular consumer technology, and the MPAA
 and TV networks alone managed to hijack it.

I have yet to see a single HDTV movie/broadcast, and I understand most TV
sets can't display anything beyond 800x600.

DVD started with a copy protection, too.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgp4aWbLkVGr5.pgp
Description: PGP signature


Re: Dell to Add Security Chip to PCs

2005-02-07 Thread Eugen Leitl
On Fri, Feb 04, 2005 at 08:21:47PM +, Justin wrote:

 They managed with the HTDV broadcast flag mandate.

If I film off a HDTV screen with a HDTV camera (or just do single-frame with
a good professional camera) will the flag be preserved?

Watermarks will, but that's the next mass genocide by IP nazis.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgppAYQ2XiCC8.pgp
Description: PGP signature


Re: [s-t] bright lights, big computers digest #1

2005-02-04 Thread Eugen Leitl
[from somelist]

 Subject: Re: [s-t] The return of Das Blinkenlight 
 Date: Mon, 31 Jan 2005 19:00:49 -0500
 
 In the early 90's I was a product manager for a (now-defunct) company
 that made LAN hubs-- this was when a 10Base-T port would cost you a couple
 
 
 This reminded me of a story from a few years ago.
 
 Apparently a lot of modem manufacturers tied the activity light on
 the modem directly to the circuit which modulated the sound.
 
 Then someone realized that with a telescope, and and optical
 transister, one could read that datastream as if hooked to the modem
 directly.
 
 And astonishing numbers of businesses had their modem pools facing
 windows, because the blinkenlights looked impressive.

http://applied-math.org/optical_tempest.pdf

Not just modems.  Some Cisco routers, even at megabit rates.  2002
publication, although the research was over the previous couple of
years.

And (for instance) the Paradyne Infolock 2811-11 DES encryptor, which
has an LED on the plaintext data.

How we laughed.

The paper also covers using LEDs (such as keyboard LEDs) as covert
data channels.  And yes, it cites Cryptonomicon.

I'm not sure whether this was more or less cool than Marcus Kuhn's
work on reconstructing CRT displays from reflected light, by reverse
convolution with the impulse-response curves of the various phosphors.
Both papers are fantastic reads, very accessible, very stimulating.

http://www.cl.cam.ac.uk/~mgk25/ieee02-optical.pdf

Nick B

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpFHmleewRBU.pgp
Description: PGP signature


Re: Dell to Add Security Chip to PCs

2005-02-03 Thread Eugen Leitl
On Wed, Feb 02, 2005 at 05:30:33PM +0100, Erwann ABALEA wrote:

 Please stop relaying FUD. You have full control over your PC, even if this

Please stop relaying pro-DRM pabulum. The only reason for Nagscab is
restricting the user's rights to his own files.

Of course there are other reasons for having crypto compartments in your
machine, but the reason Dell/IBM is rolling them out is not that.

 one is equiped with a TCPA chip. See the TCPA chip as a hardware security
 module integrated into your PC. An API exists to use it, and one if the
 functions of this API is 'take ownership', which has the effect of
 erasing it and regenerating new internal keys.

Really? How interesting. Please tell us more.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpNWd5zynCg5.pgp
Description: PGP signature


Re: Researchers Combat Terrorists by Rooting Out Hidden Messages

2005-02-02 Thread Eugen Leitl
On Tue, Feb 01, 2005 at 11:21:31PM -0800, Steve Schear wrote:
 At 02:07 PM 2/1/2005, Tyler Durden wrote:
 
 Counter-stego detection.
 
 Seems to me a main tool will be a 2-D Fourier analysis...Stego will 
 certainly have a certain thumbprint, depending on the algorithm. Are 

Stego doesn't need to have a detectable (as telling apart from noise)
signature. If you show me how you test for stego I can show you a way to
package content that will pass that test. The problem space is similiar to
build good digital watermarks.

The difficulty is constructing a realistic-looking noise for a given set of
digital sources. Given that the tests take crunch, this will be limited to
forensics. (And one would wonder why the turdorrists smart enough to use
steganography wouldn't use really good cryptographic file systems).

And any idiot knows successful terrorists don't use crypto.

 there certain images that can hide stego more effectively? IN other words, 
 these images should have a lot of spectral energy in the same frequency 
 bands where Stego would normally show.
 
 Images that ideal for hiding secret messages using stego are those that by 
 default contain stego with no particular hidden content.  A sort of Crowds 
 approach to stego.

If you have noise in the signal, can you substitute that noise with your
payload easily, or is it better to use synthetic low-noise signals, and add
your suitably encoded payload to it?

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpGwDIdZ6SpC.pgp
Description: PGP signature


Re: Dell to Add Security Chip to PCs

2005-02-02 Thread Eugen Leitl
On Wed, Feb 02, 2005 at 12:45:58PM -0500, Steve Thompson wrote:

 Well we all know that having complete control over one's own
 computer is far too dangerous.  Obviously, it would be best if
 computers, operating systems, and application software had 
 proprietary back-doors that would enable the secret police to
 arbitrarily monitor the all goes on in the suspicious and dark
 recesses of memory and the CPU.

If there's nasty Nagscab living on your motherboard, you might as well use it
for something constructive:

http://www.linuxjournal.com/article/6633
 
(Of course the stuff might contain undocumented features, so only a fool
would rely it to conform to specs, all the time).

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpGWG1YRbs5v.pgp
Description: PGP signature


Safeway Club Card Leads to Bogus Arson Arrest

2005-01-31 Thread Eugen Leitl

Link: http://slashdot.org/article.pl?sid=05/01/29/030223
Posted by: michael, on 2005-01-29 11:03:00

   from the if-you're-innocent-you-have-nothing-to-fear dept.
   [1]Richard M. Smith writes Tukwila, Washington firefighter, Philip
   Scott Lyons found out the hard way that supermarket loyalty cards come
   with a huge price. Lyons was arrested last August and charged with
   attempted arson. Police alleged at the time that Lyons tried to set
   fire to his own house while his wife and children were inside.
   According to [2]KOMO-TV and the Seattle Times, a major piece of
   evidence used against Lyons in his arrest [3]was the record of his
   supermarket purchases that he made with his Safeway Club Card. Police
   investigators had discovered that his Club Card was used to buy fire
   starters of the same type used in the arson attempt. For Lyons, the
   story did have a [4]happy ending. All charges were dropped against him
   in January 2005 because another person stepped forward saying he or
   she set the fire and not Lyons.


References

   1. http://www.ComputerBytesMan.com/
   2. http://www.komotv.com/stories/32785.htm
   3. http://seattletimes.nwsource.com/html/localnews/2002055245_arson06m.html
   4. http://heraldnet.com/stories/05/01/28/100loc_arson001.cfm

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgps4QEw1Famx.pgp
Description: PGP signature


Re: MPAA files new film-swapping suits

2005-01-28 Thread Eugen Leitl
On Fri, Jan 28, 2005 at 10:16:44AM -0500, Tyler Durden wrote:

 That's an interesting point. They seem to be attacking at precisely the 
 correct rate to forcibly evolve P2P systems to be completely invulnerable 
 to such efforts.

Not really. The P2P assm^H^H^H^H architects are reissuing new systems with
holes patched reactively. There's no reason for a P2P system designed in 1996
to be water-tight to any threat model of 2010. (Strangely enough, they had
IP nazis and lawyers back then, too).
 
 Hum. Perhaps Tim May works for MPAA? Nah... he wasn't THAT bright, was he?

I think he was primarily one thing: frustrated. It's hard to see the idiots
win, year after year.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgptka0VZTih7.pgp
Description: PGP signature


Terrorists don't let terrorists use Skype

2005-01-27 Thread Eugen Leitl

From: Adam Shostack [EMAIL PROTECTED]
Date: Tue, 11 Jan 2005 10:48:12 -0500
To: David Wagner [EMAIL PROTECTED]
Cc: cryptography@metzdowd.com
Subject: Re: Simson Garfinkel analyses Skype - Open Society Institute
From [EMAIL PROTECTED]  Thu Jan 27 01:04:39
2005
User-Agent: Mutt/1.4.2i

On Mon, Jan 10, 2005 at 08:33:41PM -0800, David Wagner wrote:
| In article [EMAIL PROTECTED] you write:
| Voice Over Internet Protocol and Skype Security
| Simson L. Garfinkel
|
http://www.soros.org/initiatives/information/articles_publications/articles/security_20050107/OSI_Skype5.pdf
|
| Is Skype secure?
|
| The answer appears to be, no one knows.  The report accurately reports
| that because the security mechanisms in Skype are secret, it is impossible
| to analyze meaningfully its security.  Most of the discussion of the
| potential risks and questions seems quite good to me.
|
| But in one or two places the report says things like A conversation on
| Skype is vastly more private than a traditional analog or ISDN telephone
| and Skype is more secure than today's VoIP systems.  I don't see any
| basis for statements like this.  Unfortunately, I guess these sorts of
| statements have to be viewed as blind guesswork.  Those claims probably
| should have been omitted from the report, in my opinion -- there is
| really no evidence either way.  Fortunately, these statements are the
| exception and only appear in one or two places in the report.

The basis for these statements is what the other systems don't do.  My
Vonage VOIP phone has exactly zero security.  It uses the SIP-TLS
port, without encryption.  It doesn't encrypt anything.  So, its easy
to be more secure than that.  So, while it may be bad cryptography, it
is still better than the alternatives.  Unfortunately.

Adam


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


- Forwarded message from Peter Gutmann [EMAIL PROTECTED] -

From: [EMAIL PROTECTED] (Peter Gutmann)
Date: Wed, 12 Jan 2005 05:00:29 +1300
To: [EMAIL PROTECTED]
Cc: cryptography@metzdowd.com
Subject: Re: Simson Garfinkel analyses Skype - Open Society Institute

David Wagner [EMAIL PROTECTED] writes:

Is Skype secure?

The answer appears to be, no one knows.  

There have been other posts about this in the past, even though they use known
algorithms the way they use them is completely homebrew and horribly insecure:
Raw, unpadded RSA, no message authentication, no key verification, no replay
protection, etc etc etc.  It's pretty much a textbook example of the problems
covered in the writeup I did on security issues in homebrew VPNs last year.

(Having said that, the P2P portion of Skype is quite nice, it's just the
 security area that's lacking.  Since the developers are P2P people, that's
 somewhat understandable).

Peter.


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpNicinrrcp8.pgp
Description: PGP signature


Ronald McDonald's SS

2005-01-24 Thread Eugen Leitl
against political allies. It sounds like there's an angle here of, 'Let's
get around having any oversight by having the military do something that
normally the [CIA] does, and not tell anybody.' That immediately raises all
kinds of red flags for me. Why aren't they telling us?

The enumeration by Myers of emerging target countries for clandestine
intelligence work illustrates the breadth of the Pentagon's new concept. All
those named, save Somalia, have allied themselves with the United States --
if unevenly -- against al Qaeda and its jihadist allies.

A high-ranking official with direct responsibility for the initiative,
declining to speak on the record about espionage in friendly nations, said
the Defense Department sometimes has to work undetected inside a country
that we're not at war with, if you will, a country that maybe has ungoverned
spaces, or a country that is tacitly allowing some kind of threatening
activity to go on.

Assistant Secretary of Defense Thomas O'Connell, who oversees special
operations policy, said Rumsfeld has discarded the hide-bound way of
thinking and risk-averse mentalities of previous Pentagon officials under
every president since Gerald R. Ford.

Many of the restrictions imposed on the Defense Department were imposed by
tradition, by legislation, and by interpretations of various leaders and
legal advisors, O'Connell said in a written reply to follow-up questions.
The interpretations take on the force of law and may preclude activities
that are legal. In my view, many of the authorities inherent to [the Defense
Department] . . . were winnowed away over the years.

After reversing the restrictions, Boykin said, Rumsfeld's next question was,
'Okay, do I have the capability?' And the answer was, 'No you don't have the
capability. . . . And then it became a matter of, 'I want to build a
capability to be able to do this.' 

Known by several names since its inception as Project Icon on April 25, 2002,
the Strategic Support Branch is an arm of the DIA's nine-year-old Defense
Human Intelligence Service, which until now has concentrated on managing
military attachés assigned openly to U.S. embassies around the world.

Rumsfeld's initiatives are not connected to previously reported negotiations
between the Defense Department and the CIA over control of paramilitary
operations, such as the capture of individuals or the destruction of
facilities.

According to written guidelines made available to The Post, the Defense
Department has decided that it will coordinate its human intelligence
missions with the CIA but will not, as in the past, await consent. It also
reserves the right to bypass the agency's Langley headquarters, consulting
CIA officers in the field instead. The Pentagon will deem a mission
coordinated after giving 72 hours' notice to the CIA.

Four people with firsthand knowledge said defense personnel have already
begun operating under non-official cover overseas, using false names and
nationalities. Those missions, and others contemplated in the Pentagon, skirt
the line between clandestine and covert operations. Under U.S. law,
clandestine refers to actions that are meant to be undetected, and covert
refers to those for which the U.S. government denies its responsibility.
Covert action is subject to stricter legal requirements, including a written
finding of necessity by the president and prompt notification of senior
leaders of both parties in the House and Senate.

O'Connell, asked whether the Pentagon foresees greater involvement in covert
action, said that remains to be determined. He added: A better answer yet
might be, depends upon the situation. But no one I know of is raising their
hand and saying at DOD, 'We want control of covert operations.' 

One scenario in which Pentagon operatives might play a role, O'Connell said,
is this: A hostile country close to our borders suddenly changes leadership.
. . . We would want to make sure the successor is not hostile.

Researcher Rob Thomason contributed to this report.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpQiTRRgv8jT.pgp
Description: PGP signature


OpenVPN

2005-01-20 Thread Eugen Leitl

If you haven't checked it out yet, you should. Really easy to set up (two 
Windows
XP machines through a NAT on DSL, ping ~50 ms, preshared key, single port open; 
right now). 
Looking forward to see how C3-accelerated AES (OpenSSL next stable will support 
it out of the box) will do, across multiple platforms.

Le IPsec c'est mort, vive le OpenVPN.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpj4YzslDNi2.pgp
Description: PGP signature


Re: Scientific American on Quantum Encryption

2005-01-20 Thread Eugen Leitl
On Thu, Jan 20, 2005 at 10:47:38AM -0500, Trei, Peter wrote:

 I've actually seen these devices in operation. The thing
 that impressed me most was that the path need not be a
 single fiber from end to end - you can maintain quantum 
 state across a switchable fiber junction. This means 

Very impressive. If they manage to keep the entanglement all the way up to
LEO by line of sight it would be even more impressive 
(anyone thinks this can be done at all?)

 you are no longer limited to a single pair of boxes talking to 
 each other.

What makes it very important is early beginnings of practical quantum
computing. Will photonics and spintronics in solid state at RT play well with
each other? Will error correction scale to large qubit register sizes? Will
the algorithm space be large and rich enough to be practical? All very
interesting questions Scientific American fails to raise.
 
 True, the SciAm article doesn't address a lot of issues,
 but the fact remains that this technology is interesting
 and important.

I agree that this technology is interesting and important, but not for what
it claims to be used for. Quantum encryption right now is a tool to milk the
gullible, and hence very much crypto snake oil.

For these distances one-time pads by trusted couriers would seem so much more
practical and so much cheaper.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpIzevOdZDJw.pgp
Description: PGP signature


Carnivore No More

2005-01-16 Thread Eugen Leitl

Link: http://slashdot.org/article.pl?sid=05/01/15/1424207
Posted by: CowboyNeal, on 2005-01-15 15:03:00

   from the calling-it-quits dept.
   [1]wikinerd writes FBI has [2]retired the controversial Carnivore
   software, strongly criticized by privacy advocates for its email
   capturing abilities. However, it is believed that unspecified
   commercial surveillance tools are employed now. What does that mean
   for Internet users' privacy?

   [3]Click Here 

References

   1. http://portal.wikinerds.org/
   2. http://www.securityfocus.com/news/10307
   3. 
http://ads.osdn.com/?ad_id=5671alloc_id=12342site_id=1request_id=5016758op=clickpage=%2farticle%2epl

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpAYW0DN2lDH.pgp
Description: PGP signature


Re: Tasers for Cops Not You

2005-01-09 Thread Eugen Leitl
On Sat, Jan 08, 2005 at 03:55:33PM -0600, Shawn K. Quinn wrote:
 On Sat, 2005-01-08 at 13:20 -0800, John Young wrote:
  Here are photos of the Taser in manufacture, sale, training,
  promo, and accidental misfire:
  
  
  http://cryptome.org/taser-eyeball.htm
 
 This came up 404 as of a few minutes ago.

The correct URL is http://cryptome.org/taser/taser-eyeball.htm

 
 -- 
 Shawn K. Quinn [EMAIL PROTECTED]
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpASVOW0y4Cb.pgp
Description: PGP signature


Google Exposes Web Surveillance Cams

2005-01-09 Thread Eugen Leitl

Link: http://slashdot.org/article.pl?sid=05/01/09/1411242
Posted by: CmdrTaco, on 2005-01-09 15:00:00

   from the pick-a-password-people dept.
   An anonymous reader writes Blogs and message forums buzzed this week
   with the discovery that a pair of simple Google searches permits
   [1]access to well over 1,000 unprotected surveillance cameras around
   the world - apparently without their owners' knowledge. Apparently
   many of the cams are even aimable. Oops!

   [2]Click Here 

References

   1. http://www.theregister.co.uk/2005/01/08/web_surveillance_cams_open_to_all/
   2. 
http://ads.osdn.com/?ad_id=5717alloc_id=12468site_id=1request_id=231150op=clickpage=%2farticle%2epl

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgprzkB9noxTs.pgp
Description: PGP signature


Re: Banks Test ID Device for Online Security

2005-01-06 Thread Eugen Leitl
On Wed, Jan 05, 2005 at 02:43:00PM -0300, Mads Rasmussen wrote:

 Here in Brazil it's common to ask for a new pin for every transaction

Ditto in Germany, when PIN/TAN method is used. There's also HBCI-based banking, 
which
either uses keys living in filesystems, or smartcards -- this one doesn't
need TANs.

Gnucash and aqmoney/aqmoney2 can do HBCI, even with some smartcards.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpJ1kjse2XhX.pgp
Description: PGP signature


Re: An interesting thread...Hacking Bluetooth

2004-12-22 Thread Eugen Leitl
On Wed, Dec 22, 2004 at 02:13:52PM -0500, Tyler Durden wrote:

 Here4s another myth: you cannot hack bluetooth from a distance of more 
 than 40 metres. Not true. My technical partner Felix can crack it at over 
 half a kilometre. Which is why he enjoys driving around so much in areas 

The official record right now is 1.74 km:

http://www.heise.de/newsticker/meldung/49907
http://trifinite.org/trifinite_stuff_bluebug.html#news

No doubt you can do much better with a large dish, and good alignment, as
well as a clear line of sight.

 where we know British, American, Israeli or Russian ops are living or 
 working. The great thing about many German cities is that most affordable 
 residences are within metres of the street anyway.
 
 Any comments?

Bluetooth attacks aren't exactly new. No idea what else that tinfoil-hatted
person is spouting.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgp08WpW435PH.pgp
Description: PGP signature


Re: Coffee, Tea, or Should We Feel Your Pregnant Wife's Breasts Before Throwing You in a Cell at the Airport and Then Lying About Why We Put You There?

2004-12-21 Thread Eugen Leitl
On Tue, Dec 21, 2004 at 11:57:08AM -0600, Shawn K. Quinn wrote:

 If you *need* to get to Hawaii, Puerto Rico, etc., driving, riding
 Greyhound, or riding Amtrak are NOT OPTIONS.

Emigration is always an option, though. Quite a few have done that already.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpoiBVBIQ9G9.pgp
Description: PGP signature


Re: Gait advances in emerging biometrics

2004-12-18 Thread Eugen Leitl
On Thu, Dec 16, 2004 at 06:46:51PM -0800, Major Variola (ret) wrote:

 Very nice quote.
 
 Can I get an insurance policy on you, with me as beneficiary?

Heh. Your tinfoil hat factor is way higher than mine. 

(Also, politics isn't about people on the Net. It's about people marching in the
streets).

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpcMwitXycxD.pgp
Description: PGP signature


Re: Gait advances in emerging biometrics

2004-12-16 Thread Eugen Leitl
On Wed, Dec 15, 2004 at 07:58:27PM -0800, Major Variola (ret) wrote:

 Look up Johansson, et al.  Point light displays.  Yes you can tell
 sex, age, etc., from the ratios of rotational axes, etc, but a stone
 in the shoe is a bitch.

Isolated biometrics are nigh to useless. But integrated, they become
increasingly more and more difficult to fool. Some of it is cheap, too.
There are phase-evaluating 2d integrated sensors which have a depth of up to
7 m, which are very cheap in principle. Mounted in a gate, this will give you
face/ear/head geometry. Calculating a fingerprint from a topology map is
something any embedded can do. With IR/NIR you'll get a skin pigmentation
map. 

Teraherz will give you body geometry. Olfactorics will give you volatile MHC
fragments, and thus a hash of your immune diversity (and your current
perfume). Add gait recognition, and you've got a real rich telebiometrics
signature.

Anyone who owns that infrastructure is even more dangerous than who 0wns the
voting machines. The perfect enabler to establish a totalitarian control
system.
 
 All faith is in drivers' licenses, a total joke, I got gummies on your
 'prints, all your time-derivatives are mine.
 
 But grant$ are good, and flavor$ of DARPA be bitchin.

Absolutely. It's like owning a mint for grant money.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpS2DE63LApa.pgp
Description: PGP signature


Re: Mixmaster is dead, long live wardriving

2004-12-13 Thread Eugen Leitl
On Sat, Dec 11, 2004 at 08:17:32AM -0600, Riad S. Wahby wrote:

 This seems like a peculiarity of your location.  Here in Austin almost
 all of downtown is covered by free wireless.

I wonder how much of it is deliberate. I run my AP open for any passerby, and
expect similiar in return when I pass through their area.

Speaking of wireless, I'm very impressed with LinkSys WRT54GS alternative
firmware advances. It's only a question of time before robust ad hoc meshes
are available by simply reflashing your AP with alternative firmware.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpupIzHVBEmo.pgp
Description: PGP signature


Re: punkly current events

2004-12-13 Thread Eugen Leitl
On Sat, Dec 11, 2004 at 06:39:13AM -0800, Major Variola (ret) wrote:

 I agree, with the additional constraint that mix functionality piggyback
 with a more popular feature.  Most folks won't install even the most
 benign, easy to use mixer; but include a mix server in a jazzy
 IM or next-gen napster program, and you get deployed.

The major advantage of massive rollout is speedy traffic remixing on the
local loop, which requires a high occupation density in address space.

The advantages are ~realtime, reliable traffic remixing.

Can you use UDP broadcast on cable or xDSL? 

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpnCct154nke.pgp
Description: PGP signature


Re: punkly current events

2004-12-11 Thread Eugen Leitl
On Fri, Dec 10, 2004 at 06:53:26AM -0800, Major Variola (ret) wrote:
 
 Name a place which is not subject to US juridiction?   Ok, Iran, N Kr,

Most places outside US which are not banana republics. I'm living in one.

 until
 we pull a regime change (tm) on them.  Yeah, they have a lot of 'net
 bandwidth, right.
 
 And if extradition isn't happening fast enough, we'll send a DEA
 agent or snatch-und-grab specops to kidnap them.

What, all this to shut down a remop? Could as well reprogram one of these
aging ICBMs...
 
 Hegemony isn't just for breakfast anymore.  If you think you're not
 under Bush's boot, you just haven't pissed him off enough, yet.

Which threat model? Individual remop, a country, a bloc?

Last time I looked US deficit was well on the way to turn thalers into
Soviet-era paper. It is somewhat hard to posture as a world hegemon if
everybody knows you're only operating because every significant investor is
propping you up, since running danger of losing their entire investment (in
for a penny...).

If it's going to give, it's going to be a landslide. Of course, then the
entire house of cards is going to crash down, which would suck. It could even
bring down the tigers/dragons, though they probably have enough own momentum
by now.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpu8T86VQjty.pgp
Description: PGP signature


Re: punkly current events

2004-12-11 Thread Eugen Leitl
On Thu, Dec 09, 2004 at 06:33:09PM -0800, Major Variola (ret) wrote:
 Someone should have commented here, so I will, that some judges (earning
 hanging) basically said that anonymity is not a right.  This
 in the context of mask-wearing in public.  If the Klan doesn't have
 a right to wear pillowcases what makes you think mixmaster will
 survive?

Because nodes are not geographically constrained to US jurisdiction?

If mixter won't survive, it's due to spammers, and malware spreaders.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpyFCnk2cDda.pgp
Description: PGP signature


Re: punkly current events

2004-12-11 Thread Eugen Leitl
On Fri, Dec 10, 2004 at 06:01:25AM -0500, Gabriel Rocha wrote:

 The latter statement my well be true, I don't use the network, nor know
 the ratios of good/bad traffic. But I am very curious to find out what

I don't have data either. I'm guessing the bad traffic part is 95-98%.
(I'm extrapolating from absence, as the only responses to the abuse address
were people harassed by idiots).

 would be considered geographically safe jurisdictions in this sense.
 Not just today, but given the general trend, where would you see such a
 jurisdition being found in a year or five or ten?

While there is a distinct trend in NA, EU and elsewhere to try to snoop, and
to control, it's not obvious the development is permanent, and irreversible.
P2P traffic in general is increasing, and trivial remixing and encryption is
becoming more and more widespread (arrr!). Spam and malware traffic also 
increases the noise level. You could claim your machine was infected with
mixmaster malware, or something.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpi8stvkmwpi.pgp
Description: PGP signature


Re: Word Of the Subgenius...

2004-12-08 Thread Eugen Leitl
On Wed, Dec 08, 2004 at 09:17:30AM -0500, John Kelsey wrote:

 Maybe, maybe not.  The thing I always find interesting and annoying about Tim 
 May's posts is that he's sometimes making really clearly thought out, 
 intelligent points, and other times spewing out nonsense so crazy you can't 
 believe it's coming from the same person.  It's also clear he's often yanking 
 peoples' chains, often by saying the most offensive thing he can think of.  
 But once in awhile, even amidst the crazy rantings about useless eaters and 
 ovens, he'll toss out something that shows some deep, coherent thought about 
 some issue in a new and fascinating direction. 

There was no doubt he was trolling. I never figured out the precise reason,
though. Attempted suicide by cop? Free speech illustration? You tell me.
Neither is sufficient interesting. 

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpCFRdiVkcdX.pgp
Description: PGP signature


Tin Foil Passports?

2004-11-29 Thread Eugen Leitl
Link: http://slashdot.org/article.pl?sid=04/11/27/0026222
Posted by: michael, on 2004-11-27 05:05:00

   from the joke's-on-you dept.
   Daedala writes The debate over [1]contactless chips with biometric
   information in passports continues. Vendors have been chosen for
   testing in the [2]U.S. and [3]Australia. [4]Privacy advocates are
   still arguing about the measure, as are [5]security reporters and
   [6]bloggers. The [7]specs themselves are interesting, to say the
   least. The EETimes says that [8]in interoperability tests, the
   potential chips could be read from 30 feet away. However, both they
   and the New York Times have published [9]articles reporting vendors'
   low-cost solution: '[I]incorporate a layer of metal foil into the
   cover of the passport so it could be read only when opened.' Don't
   they know that the whole tinfoil hat thing is supposed to be a joke?

   IFRAME: [10]pos6

References

   1. http://yro.slashdot.org/article.pl?sid=04/08/22/0040202tid=158
   2. http://www.eetimes.com/showArticle.jhtml?articleID=52200157
   3. http://www.eetimes.com/showArticle.jhtml?articleID=51200486
   4. http://www.privacyinternational.org/article.shtml?cmd%5B347%5D=x-347-60594
   5. 
http://www.businessweek.com/bwdaily/dnflash/nov2004/nf2004115_1663_db016.htm
   6. http://hasbrouck.org/blog/archives/000434.html
   7. http://www.icao.int/mrtd/download/technical.cfm
   8. http://www.eetimes.com/showArticle.jhtml?articleID=45400010
   9. 
http://www.nytimes.com/2004/11/26/politics/26passport.html?hpex=1101531600en=6e6254bd574cba42ei=5094partner=homepage
  10. 
http://ads.osdn.com/?ad_id=5819alloc_id=12652site_id=1request_id=4960775

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpmcfNmzJsOG.pgp
Description: PGP signature


Re: Patriot Insurance

2004-11-29 Thread Eugen Leitl

Can we please get out of the regional fixation? The cypherpunks list isn't
about the US, US pissant wars, and similiar boring backwater shit.

It's too bad this list is dying a death of a thousand paper cuts inflicted by
moronic posts, as so many others had. I haven't used a
.procmailrc in a couple years, perhaps we can postpone this with a little
collective effort.

On Thu, Nov 25, 2004 at 01:38:58PM +, Will Morton wrote:
US Patriot Financial (USPF) exists to help Americans, who risk 
 their lives making this world a better place, obtain life insurance.   
 This includes resident aliens.
Whether you are a soldier deploying overseas, a DOD contractor 
 helping to rebuild war torn countries,  a missionary volunteering to 
 help the most needy, or a business man or woman traveling the globe to 
 support our economy we can help.
Using  our extensive network of life insurance carriers, we are able 
 to provide protection to those whose service leads them into some of the 
 world's most dangerous places.   This includes US citizens living abroad.
 
http://www.uspfinancial.com/
 
How long have soldiers deployed in war-zones been able to get life 
 insurance?  Would love to see their actuarial process...
 
W
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpz7Ad4UpKbq.pgp
Description: PGP signature


Re: Why Americans Hate Democrats-A Dialogue

2004-11-07 Thread Eugen Leitl
On Sat, Nov 06, 2004 at 09:31:24AM -0800, James Donald wrote:

 I routinely call people like you nazi-commies.

How novel and interesting.

Cut the rhetoric, get on with the program. Cypherpunks write code.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpRySwSekh7f.pgp
Description: PGP signature


Re: The Values-Vote Myth

2004-11-07 Thread Eugen Leitl
On Sat, Nov 06, 2004 at 06:25:19PM +, Justin wrote:

 Not true.
 
 http://www.cnn.com/2004/ALLPOLITICS/11/03/voter.turnout.ap/
 
 [Curtis] Gans puts the total turnout at nearly 120 million people.
 That represents just under 60% of eligible voters...

You didn't vote against a candidate, you tacitly accept whatever other voters
decide. For you. There isn't none of the above option, unfortunately.
 
 120m * 100%/60% = 200 million eligible voters  (The U.S. population
 according to census.gov was 290,809,777 as of 2003-07-01
 
 http://www.cnn.com/ELECTION/2004/
 Bush Vote: 59,459,765
 Let's generously round that up to 65 million.
 
 65m/200m = 32.5% of eligible voters voted for Bush
 65m/290.8m = 22.4% of the U.S. population voted for Bush
 
 I can't find an accurate number of registered voters, but one article
 suggests 15% of registered voters don't vote.  That means there are
 probably around 141m registered voters.  Bush didn't even win majority
 support from /those/.
 
 65m/141m = 46% of registered voters voted for Bush

Don't mince numbers. About half of those who could and could be bothered to
vote voted for more of the same.

At least that's how the rest of the world is going to see it.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpssFR0nkjou.pgp
Description: PGP signature


Re: The Values-Vote Myth

2004-11-06 Thread Eugen Leitl
On Sat, Nov 06, 2004 at 08:46:17AM -0500, Tyler Durden wrote:

 So: A 'moral values' question for Cypherpunks. Does this election indict 
 the American people as being complicit in the crime known as Operation 

Of course. What kind of question is that? Regardless of voting fraud, about
half of US has voted for four more years of the same. Guilty.

 Freedom? (I notice everyone forgot about that name.)

Huh? What was the question, again?

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgplDt75HxeY3.pgp
Description: PGP signature


Re: Finding Galt's Gulch (fwd)

2004-11-05 Thread Eugen Leitl
On Thu, Nov 04, 2004 at 08:05:34PM -0600, J.A. Terranson wrote:

 Where does one go today, if they are unwilling to participate in the
 Failed Experiment?  (BTW: No, Lichtenstein does not accept immigrants, and
 yes, I have reverified this recently).

Go East. Fortunes are made there.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgp4gTtKuy0Hg.pgp
Description: PGP signature


Diebold

2004-11-03 Thread Eugen Leitl

So, we know Diebold commited vote fraud. Irregularities, my ass. 

Why did Kerry just roll over? The second time, after Gore?

This just doesn't make sense.
There's been over a year to prepare. Or is the entire process just a charade?

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpL7b1jxJfWi.pgp
Description: PGP signature


Re: This Memorable Day

2004-11-02 Thread Eugen Leitl
On Tue, Nov 02, 2004 at 08:16:41AM -0500, R. A. Hettinga wrote:

 http://online.wsj.com/article_print/0,,SB109936293065461940,00.html

No cypherpunks content. Just local politics.
 
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpkbAEtb245e.pgp
Description: PGP signature


Re: Geodesic neoconservative empire

2004-10-30 Thread Eugen Leitl
On Fri, Oct 29, 2004 at 09:24:20PM -0500, J.A. Terranson wrote:

 Agreed.  Our interest in not in Afghanistan/Iraq per se.  Our interest is
 in ruling the *planet*, rather than any individual pissant player.

Empires never last, and if there's going to be a new one, it's going to be
Chinese. (Of course it won't last, either).

It sucks to be old-growth in a large new-growth market.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgp9MyKcAfxHN.pgp
Description: PGP signature


Re: bin Laden gets a Promotion

2004-10-30 Thread Eugen Leitl
On Sat, Oct 30, 2004 at 02:42:25PM -0400, Sunder wrote:

 As usual, South Park is a great source of wisdom.  So, are you voting for 
 the Giant Douche or the Turd Sandwich?

My candidate is Mr Hanky, Poo party.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpSoQcbyxMnZ.pgp
Description: PGP signature


Re: the simian unelected is blocking the world

2004-10-27 Thread Eugen Leitl
On Wed, Oct 27, 2004 at 09:02:48AM -0500, J.A. Terranson wrote:
 
 On Wed, 27 Oct 2004, Eugen Leitl wrote:
 
  Access to http://www.georgewbush.com/ is blocked but from US IP address
  space.
 
 Works from 204.238.179.0/24.  

Of course it works. For you. It's US according to ip2location.com

204.238.179.1   US  UNITED STATES   MISSOURICLAYTON
MISSOURI FREENET

 Where are your coming in from?

Germany, and I'm still blocked.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpYkBAgx3Z21.pgp
Description: PGP signature


[FoRK] Google buys Keyhole (fwd from andrew@ceruleansystems.com)

2004-10-27 Thread Eugen Leitl
- Forwarded message from J. Andrew Rogers [EMAIL PROTECTED] -

From: J. Andrew Rogers [EMAIL PROTECTED]
Date: Wed, 27 Oct 2004 10:36:38 -0700
To: [EMAIL PROTECTED]
Subject: [FoRK] Google buys Keyhole
X-Mailer: WebMail 1.25
Reply-To: [EMAIL PROTECTED]

Finally.

I've been sitting on this story for weeks, and I was looking forward to
this morning because there is a lot about this deal that is worth
talking about, particularly with regard to how this fits into Google's
portfolio.  Even though I knew about the deal, I have no clue as to the
reasoning why Google bought them.  All the talk about them being a map
provider is a bit of nonsense, since Keyhole is a hell of a lot more
than a map provider.  If they wanted maps they could have gone to the
source, since it isn't like Keyhole creates their own map data --
Keyhole is more of a data integrator.

Salient points:

- Keyhole is fussy Windows-only client software (something that won't
change soon), which appears to be a departure from Google's normally
web-centric applications.

- Keyhole can consume some serious bandwidth, and isn't really something
that will scale to average home use (in many different ways) without
wholesale re-architecting of the system.

- Keyhole has terabytes of very interesting databases, many of which are
not public.  For example, the US DoD has become fond of using Keyhole to
process all sorts of reconnaissance, intelligence, and battle planning
data.  And more Federal agencies and foreign governments are moving to
do the same.



I've maintained for some time that Google is very aggressively trying to
position themselves as a very deep data-mining operation, and are
facilitating that by arranging that as much data as possible flow
through their systems.  I've stated in the past that they have the
potential to be super-evil, if only because of the access they are being
granted to vast ranges of data, which many people seem more than happy
to grant.  From that perspective, I find the above points worrisome.

It will be very interesting to see what they do with this.

cheers,

j. andrew rogers

___
FoRK mailing list
http://xent.com/mailman/listinfo/fork

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgph5GrGRzlFR.pgp
Description: PGP signature


Re: Airport insanity

2004-10-25 Thread Eugen Leitl

Can you guys please take it outside? The majority of us just isn't
interested.

On Sun, Oct 24, 2004 at 12:49:52PM -0700, James A. Donald wrote:

 Nail your colors to the mast. Pick one of the above and defend
 it. 

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpt1nBwKP7hO.pgp
Description: PGP signature


[FoRK] Your papers, citizen (fwd from deafbox@hotmail.com)

2004-10-25 Thread Eugen Leitl
- Forwarded message from Russell Turpin [EMAIL PROTECTED] -

From: Russell Turpin [EMAIL PROTECTED]
Date: Mon, 25 Oct 2004 15:31:39 +
To: [EMAIL PROTECTED]
Subject: [FoRK] Your papers, citizen

This was on Slashdot's political feed. Here's the jaw-dropper:

McCain envisions erecting physical checkpoints, dubbed
screening points, near subways, airports, bus stations,
train stations, federal buildings, telephone companies,
Internet hubs and any other critical infrastructure
facility deemed vulnerable to terrorist attacks. Secretary
Tom Ridge would appear to be authorized to issue new
federal IDs--with biometric identifiers--that Americans
could be required to show at checkpoints.

Here's the article:

http://news.zdnet.com/2100-1009_22-5415111.html

_
FREE pop-up blocking with the new MSN Toolbar ? get it now! 
http://toolbar.msn.click-url.com/go/onm00200415ave/direct/01/

___
FoRK mailing list
http://xent.com/mailman/listinfo/fork

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpMjPztq4TqO.pgp
Description: PGP signature


Re: Donald's Job Description

2004-10-25 Thread Eugen Leitl
On Mon, Oct 25, 2004 at 03:20:28PM -0400, R. A. Hettinga wrote:

 *Nobody* was a counterbalance to Tim, me or anyone else. Simple fact, no
 matter how much he pissed on my shoes, or anyone else's.

What's he up to these days? It seems he got tired of of USENET, too


http://groups.google.com/groups?q=tcmay%40got.nethl=enlr=c2coff=1safe=offsa=Gscoring=d

Too bad.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgprLvkBjwgDx.pgp
Description: PGP signature


Re: Airport insanity

2004-10-24 Thread Eugen Leitl
On Sat, Oct 23, 2004 at 11:37:02PM -0400, Adam wrote:

 None-the-less, this has been one of the more inteteresting (and
 infuriating) threads in recent memory of Cypherpunks. I'm glad we're
 going through it with such vigor.

That thread bores me to tears.

I miss technical content. Or, at least, a few pointers of where the action
is. I'm tinkering with Nehemiah's RNG (/dev/hw_random is next to useless
without a patch), and about to start using PadLock patches, once C5P hardware
arrives. I'm also going to look into OpenBSD, once 3.6 is up on mirrors.

What is happening in TCP/IP level traffic remixing? P2P apps? Can someone in
the know provide a boilerplate, or at least a list of raw URLs?

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpRVFkhn5Xcv.pgp
Description: PGP signature


Re: Airport insanity

2004-10-21 Thread Eugen Leitl
On Thu, Oct 21, 2004 at 09:43:16AM -0700, James A. Donald wrote:

 When people are under attack, you cannot tell them to suck it 
 up, which is what you are doing.  If we had no government, we 

I'm not under attack. Are you? The Ghengis Khan thing's 
been a while back.

 might well be doing pogroms against american muslims - and a 
 good thing to.

This ways lies much rotting severed heads on stakes, and 
screaming. We've been there before. No need for a repetition.
 
 War causes governments, and causes governments to gain power, 
 but the US government was not the aggressor in this war.   US 

Your reality model is rather unique. Given that what your alleged
representatives are doing results in massive loss of prestige, you don't want
to associate with defectors. That stink's going to cling for a while.

 government meddling in the middle east was unwise and 
 unnecessary, but it did not provoke, nor does it justify, this 
 war.
 
 The intent of a large minority of muslims was to start a holy 
 war between the west and Islam, and the majority of muslims 

The only war there is was started by ShrubCo, and was tacitly approved by
about half of your countrymen. This isn't Nuremberg, but I color your guilty.

 lack the will or courage to stop them, or even criticize them. 
 That was not the intent of Americans, or the American 
 government.  They started it, they meant to start it. Americans

Ha ha.

 tried to avoid it, some of them are still trying to avoid it. 
 All Americans are still trying to conduct the war on the
 smallest possible scale, against the smallest possible subset
 of Islam, disagreeing only on how small that subset can be. 

Your reality distortion field manages to make bearded fanatics look good.
Quite an accomplishment. Herr Reichspropagandaminister would have been proud.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgp6EplBncDIz.pgp
Description: PGP signature


Re: Foreign Travelers Face Fingerprints and Jet Lag

2004-10-03 Thread Eugen Leitl
On Fri, Oct 01, 2004 at 09:43:04PM -0400, R. A. Hettinga wrote:

  It was more easy to visit before, she said. But I will still come back.

Well, no, I won't. (And quite a number of others).

No biometrics ID for me either.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgp5sdpQgjYHg.pgp
Description: PGP signature


[IP] Carry Umbrella in DC (fwd from dave@farber.net)

2004-09-30 Thread Eugen Leitl
- Forwarded message from David Farber [EMAIL PROTECTED] -

From: David Farber [EMAIL PROTECTED]
Date: Wed, 29 Sep 2004 19:18:53 -0400
To: Ip [EMAIL PROTECTED]
Subject: [IP] Carry Umbrella in DC
X-Mailer: Apple Mail (2.619)
Reply-To: [EMAIL PROTECTED]



Begin forwarded message:

From: James P. Howard, II [EMAIL PROTECTED]
Date: September 29, 2004 6:53:37 PM EDT
To: [EMAIL PROTECTED]
Subject: Carry Umbrella in DC

I work in downtown DC (a few blocks from the White House) and this
morning saw a plain white blimp over Farragut Park.  This thing has
no insignia, no numbers, no markings at all and it spent all day
circling the city.

CNN, and numerous other sources explain this is an Army survellience
blimp.  Aside from posse comitatus, this is simply immoral.  I for
one welcome our new art deco overlords.

Here's the CNN story:

  http://edition.cnn.com/2004/US/09/29/security.blimp.ap/

Security blimp tested in Washington skies

WASHINGTON (AP) -- Here's a head-turner for a security-nervous city:
A large white object was spotted in the skies above the nation's
capital in the pre-dawn hours Wednesday.

Pentagon police said the Defense Department is testing a security
blimp -- fully equipped with surveillance cameras. The white blimp
was spotted early Wednesday morning hovering at various times over
the Pentagon and the U.S. Capitol.

The 178-foot-long device, which is expected to remain in the skies
until Thursday, is conducting a mission for the Defense Department.

Authorities say the airship is equipped with infrared cameras
designed to provide real-time images to military commanders on the
ground. The equipment on the blimp already is being used to protect
troops in Afghanistan and Iraq.

The Army says the device will make at least one 24-hour flight in
the District of Columbia area. It has been in the region since last
week, and is also being used for test runs over the U.S. Marine
Corps Base in nearby Quantico, Virginia, and the Chesapeake Bay.

--
James P. Howard, II  --  [EMAIL PROTECTED]
http://www.jameshoward.us/  --  202-390-4933

-
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgp6OwY3KcNfa.pgp
Description: PGP signature


Re: Geopolitical Darwin Awards

2004-09-21 Thread Eugen Leitl
On Mon, Sep 20, 2004 at 08:19:30PM -0700, Major Variola (ret) wrote:

 fission rate, ie fewer spare neutrons to spoil the fun.  Even pure
 Pu-239,
 the result of short irradiation, has a problem with premature
 ejaculation.

So use a tritium-boosted fission nuke. Not as hard to do a true fusion
device.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpCtMplPGiQk.pgp
Description: PGP signature


Re: Forest Fire responsible for a 2.5mi *mushroom cloud*?

2004-09-13 Thread Eugen Leitl
On Sun, Sep 12, 2004 at 05:07:55PM -0500, J.A. Terranson wrote:
 On Sun, 12 Sep 2004, Eugen Leitl wrote:
 
  http://www.muenster.org/uiw/fach/chemie/material/gif/oppau.jpg
 
 Wow!  I had no idea ammonium nitrate (ANFO for all intents and purposes,
 yes?) could produce that kind of result!  How much was there?

About 4.5 kT of 50:50 ammonium nitrate/ammonium sulfate mix. One of the
largest, if not *the* largest nonnuclear explosions ever.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpYj9UwO0FvC.pgp
Description: PGP signature


[FoRK] Veeery Intewesting... (fwd from beberg@mithral.com)

2004-09-03 Thread Eugen Leitl
- Forwarded message from Adam L Beberg [EMAIL PROTECTED] -

From: Adam L Beberg [EMAIL PROTECTED]
Date: Thu, 02 Sep 2004 22:39:09 -0500
To: FoRK [EMAIL PROTECTED]
Subject: [FoRK] Veeery Intewesting...
User-Agent: Mozilla Thunderbird 0.7.3 (Windows/20040803)

http://www.sianews.com/modules.php?name=Newsfile=articlesid=1062

There over 800 prison camps in the United States, all fully operational 
and ready to receive prisoners. They are all staffed and even surrounded 
by full-time guards, but they are all empty. These camps are to be 
operated by FEMA (Federal Emergency Management Agency) should Martial 
Law need to be implemented in the United States and all it would take is 
a presidential signature on a proclamation and the attorney general's 
signature on a warrant to which a list of names is attached. Ask 
yourself if you really want to be on Ashcroft's list.

...

-- 
Adam L. Beberg - [EMAIL PROTECTED]
http://www.mithral.com/~beberg/
___
FoRK mailing list
http://xent.com/mailman/listinfo/fork

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpo9Fuy8U3YG.pgp
Description: PGP signature


[IRR] Army: JetBlue Data Use Was Legal

2004-08-28 Thread Eugen Leitl

Army: JetBlue Data Use Was Legal 

By Ryan Singel
02:00 AM Aug. 23, 2004 PT

An Army data-mining project that searched through JetBlue's passenger 
records and sensitive personal information from a data broker to 
pinpoint possible terrorists did not violate federal privacy law, 
according to an investigation by the Army's inspector general.

The inspector general's findings (PDF) were accepted by some, but 
critics say the report simply highlights the inability of the 
country's privacy laws to cope with 21st-century anti-terrorism 
efforts.

News of the Army project came to light in September 2003 when JetBlue 
admitted it had violated its privacy policy by turning over 5.1 
million passenger records to Torch Concepts , an Alabama-based 
defense contractor.

Torch subsequently enhanced the JetBlue data with information about 
passengers' salaries, family size and Social Security numbers that it 
purchased from Acxiom , one of the country's largest data aggregators.

The Army says it was testing the data-mining technology as part of a 
plan to screen visitors to Army bases.

...


http://www.wired.com/news/politics/0,1283,64647,00.html

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpKUbebzyWPL.pgp
Description: PGP signature


[IP] Air travel without ID. (fwd from dave@farber.net)

2004-08-27 Thread Eugen Leitl
 the
normal X-ray machine, take your laptop out, etc.  Then, on the other 
side,
they gave me the extended treatment, which normally occurs when I've 
been
randomly selected.  They X-rayed my shoes, swabbed my laptop for
explosives, and unzipped every compartment of my luggage.  After I 
passed
all of those tests, they let me through, never once examining any of the
cards I had in my wallet.

Moral of the story

While my story is hardly the same thing as a conclusive examination of 
the
policies of all major U.S. airports, my experience shows that it is, 
indeed,
possible to do interstate air travel without a driver's license.  
You're no
longer using the fast path of the airport security apparatus, and 
there is
clearly some variation in how the rules govern your slow path through 
the
system.  However, if you're willing to put up with the  treatment,
then it appears that you can legally travel by air within the U.S. 
without a
government-issued ID.  (Gilmore acknowledges this in his lawsuit, which 
is
focused on finding out where the requirement for presenting ID came 
from, in
the first place.)

Postscript

As a Continental frequent flyer, I was invited to show up at the 
airport to
be measured for a new biometric-based system that they've installed in
Houston. (I think it measures fingerprints, but I'm not entirely sure.) 
 I
was out of town, and thus unable to give that system a shot.  They do
require several forms of ID to get yourself registered, so it will have 
to
wait for another day.  Maybe I'll give it a try and write something 
about it
later for RISKS.  For all the known issues with biometric 
authentication,
it's quite difficult to leave your fingerprints at home in the wrong
trousers.


-
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpfs6fRPOxlI.pgp
Description: PGP signature


name of the Tor twin?

2004-08-09 Thread Eugen Leitl

I recall a TCP/IP traffic remixing network (not a socks proxy like
Tor) coming over the list a while back. My bookmarks are away, what's the
name of the thing? Not p2net, something similiar.

Hello Brain, this is Pinky. Please help.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgprNVMdIQY2d.pgp
Description: PGP signature


Re: name of the Tor twin?

2004-08-09 Thread Eugen Leitl
On Sun, Aug 08, 2004 at 03:55:07PM -0700, jrandom wrote:

 We're not ready for widespread use yet, but I've been working on it
 fulltime for over a year, and we've made a lot of progress.  I'll

Thanks. I've just got spare bandwidth I'd like to put to good use (and
increase the amount of opaque traffic).

 post more when there's more to post.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgptwQSQ0vrr6.pgp
Description: PGP signature


Tor: A JAP Replacement (fwd from brian-slashdotnews@hyperreal.org)

2004-08-06 Thread Eugen Leitl
 servers that forward each data stream
at least three times. Each server averages 10 Kbps of bandwidth. Those with
reliable Internet connections, who can support at least 1 Mbps in both
directions, are being recruited as potential servers in the network.

Users are permitted to operate an unrestricted number of nodes. But
Dingledine pointed out that a well-funded adversary could sign up for a large
number of servers and potentially take over the network.

Those who want to operate Tor routers must therefore convince the Tor
directory server operators that they are trustworthy and reliable. Dingledine
said developers are trying to find ways to scale the system without having to
have a human check the integrity of every new server that becomes part of the
network.

Dingeldine said the developers of another online anonymity project, called
JAP, were forced by the German government to insert a backdoor into the
program and were barred from revealing it. If anyone insisted on similar
measures for Tor, Dingledine said the community of open-source developers who
analyze source-code changes for each Tor revision would expose it -- as they
did with JAP.

The reason Tor works is that it's free and available software, said
Dingledine. If it was a closed source or a proprietary system, there is no
way to know. 

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgp7uffBNwoM5.pgp
Description: PGP signature


[IP] Your people are growing increasingly worried about a 'police state.' For such an educated audience, (fwd from dave@farber.net)

2004-08-06 Thread Eugen Leitl
- Forwarded message from David Farber [EMAIL PROTECTED] -

From: David Farber [EMAIL PROTECTED]
Date: Thu, 5 Aug 2004 18:21:43 -0400
To: Ip [EMAIL PROTECTED]
Subject: [IP] Your people are growing increasingly worried about a 'police state.' For 
such an educated audience,
X-Mailer: Apple Mail (2.618)
Reply-To: [EMAIL PROTECTED]



Begin forwarded message:

From: Brad Templeton [EMAIL PROTECTED]
Date: August 5, 2004 5:47:16 PM EDT
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: Re: [IP] Your people are growing increasingly worried about a 
'police state.' For such an educated audience,

Subj: Your people are growing increasingly worried about a 'police 
state.'
For such an educated audience, they seem to lack any sense of 
proportion, a sense of history or an  awareness of human nature.


Indeed, as you cite, there are many police states and history is
littered with ones that have risen and fallen as well.

Each time a police state rose, there were those who cried that a police
state was coming and were called paranoid.   There were those who
actively assisted the police state in coming, seeking the security it
promised.  There were those who assisted the police state in coming,
not wanting one, but feeling those who called out the warnings were
paranoid.  There were those who said and did nothing.

Free states are the abberation in the history of mankind.  Police states
(for the level of technology of the day) the norm.

So perhaps when Mr. Ashcroft erodes civil rights, you can make a valid
claim that it introduces only a very slight risk of a police state, or
is only the start of a trend.

How much risk is enough?  If events only presented a 1% chance of
taking the path to a police state, would you want to tolerate it?

Would you find it acceptable to teeter on the edge of a police state,
because you were still on the free side of the line?

Often, in the defence of free speech, we find ourselves defending people
expressing ideas we loathe.   Nazis, pedophiles and other scum.  We
do it not because we welcome a world full of their messages, but because
we know that if the Holocaust deniers can publish, we are _really, 
really_
sure that we can publish.  It's not paranoia.

-
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpujJyO43lir.pgp
Description: PGP signature


[IP] more on a police state (fwd from dave@farber.net)

2004-08-06 Thread Eugen Leitl
- Forwarded message from David Farber [EMAIL PROTECTED] -

From: David Farber [EMAIL PROTECTED]
Date: Fri, 6 Aug 2004 04:56:51 -0400
To: Ip [EMAIL PROTECTED]
Subject: [IP] more on  a police state
X-Mailer: Apple Mail (2.618)
Reply-To: [EMAIL PROTECTED]



Begin forwarded message:

From: [EMAIL PROTECTED]
Date: August 5, 2004 10:32:22 PM EDT
To: [EMAIL PROTECTED]
Subject: Re: a police state

Well, since the fastest growing black household in America is the 
cellblock; since here in Philadelphia I still can hear cops step from 
their cars asking, Where'd the nigger go? in front of black 
onlookers; since Independence Hall now has a clearly visible 
surveillance camera in its tower and visitors to the Liberty Bell are 
searched and wanded multiple times; since the fastest growing group of 
armed police in the US are private security and prison guard, since 
without trying very hard, I can read more and more about police getting 
no-knock powers, about prisoners held incommunicado, etc. -- I think we 
shouldn't wait until we are all getting routinely Taser'd  for getting 
smart at the latest preventive roadblock.

 It's enough like a police state--or a hall monitor's wet dream -- to 
get me nervous.

 --Michael McGettigan

 One recent example -- a friend of mine who worked transmitters for 
Motorola was sent to a crime-ridden North Philly high-rise project. His 
mission -- inspect a repeater transmitter that was inside a 
steel-doored room atop the building -- the transmitter's function was 
to boost the signals of the various law enforcement/drug authorities 
that raided it on a regular basis. They'd found that their hand radios 
often didn't work well enough.  The idea that this high-rise should 
maybe be razed rather than rigged for a permanent state of drug busts 
didn't seem to occur to anyone.

-
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpGfoDAH75Eu.pgp
Description: PGP signature


[IP] New US Passport ID Technology Has High Error Rate (fwd from dave@farber.net)

2004-08-06 Thread Eugen Leitl
- Forwarded message from David Farber [EMAIL PROTECTED] -

From: David Farber [EMAIL PROTECTED]
Date: Fri, 6 Aug 2004 08:29:29 -0400
To: Ip [EMAIL PROTECTED]
Subject: [IP] New US Passport ID Technology Has High Error Rate
X-Mailer: Apple Mail (2.618)
Reply-To: [EMAIL PROTECTED]



Begin forwarded message:

From: Richard Forno [EMAIL PROTECTED]
Date: August 6, 2004 8:22:46 AM EDT
To: Dave Farber [EMAIL PROTECTED]
Subject: New US Passport ID Technology Has High Error Rate



Here is yet another example of security theater (the illusion of  
effective
or enhanced security) being pursued as a matter of national security --  
in
this case, an unbelievable 50% error rate in the security technology  
being
implemented is deemed acceptable enough by the US government to track
passports.

-rick
Infowarrior.org


Passport ID Technology Has High Error Rate
http://www.washingtonpost.com/ac2/wp-dyn/A43944-2004Aug5? 
language=printer

By Jonathan Krim
Washington Post Staff Writer
Friday, August 6, 2004; Page A01

The State Department is moving ahead with a plan to implant electronic
identification chips in U.S. passports that will allow computer  
matching of
facial characteristics, despite warnings that the technology is prone  
to a
high rate of error.

Federal researchers, academics, industry experts and some privacy  
advocates
say the government should instead use more-reliable fingerprints to help
thwart potential terrorists.

The enhanced U.S. passports, scheduled to be issued next spring for  
people
obtaining new or renewed passports, will be the first to include what is
known as biometric information. Such data, which can be a fingerprint, a
picture of parts of eyes or of facial characteristics, is used to verify
identity and help prevent forgery.

Under State Department specifications finalized this month for  
companies to
bid on the new system, a chip woven into the cover of the passport would
contain a digital photograph of the traveler's face. That photo could  
then
be compared with an image of the traveler taken at the passport control
station, and also matched against photos of people on government watch
lists.

The department chose face recognition to be consistent with standards  
being
adopted by other nations, officials said. Those who drafted the  
standards
reasoned that travelers are accustomed to submitting photographs and  
would
find giving fingerprints to be intrusive.

But federal researchers who have tested face-recognition technology say  
its
error rate is unacceptably high -- up to 50 percent if photographs are  
taken
without proper lighting. They say the error rate is far lower for
fingerprints, which could be added to the chip without violating the
international standard.

 snip 

The concerns come at a time of heightened terrorism alerts and urgent  
calls
for changes in national security from the commission investigating the  
Sept.
11, 2001, attacks. Among its many recommendations were quick adoption of
biometric passports and more secure drivers' licenses, though the  
commission
did not specify which type of data should be used.

 snip 

Facial recognition isn't going to do it for us at large scale, Wayman
said. If there's a 10 percent error rate with 300 people on a 747,  
that's a
problem.

According to tests by the National Institute for Standards and  
Technology,
two fingerprints provide an accuracy rate of 99.6 percent. With face
recognition, if the pictures are taken under controlled circumstances  
with
proper illumination, angles and facial expression, the accuracy rate  
was 90
percent.

 snip 

-- End of Forwarded Message

-
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpmyC7WANg9J.pgp
Description: PGP signature


C# UAV

2004-08-06 Thread Eugen Leitl

Kindly ignore absence of Hellfire periphery and (worse) 
the M$ marketing waffle below:

http://research.microsoft.com/displayArticle.aspx?id=685

Unmanned Flight with Windows XP Embedded
by Suzanne Ross
Project Specs:
On-board Technoland PC/104+ form factor
800MHz Crusoe computer
USB to serial device provides 4 additional RS232 communication ports
Microsoft Windows XP Embedded

Kids who graduated from balsa wood bi-planes to radio-controlled airplanes
will love what's coming around the corner.

Faculty and students at Cornell University have built an unmanned airplane
with its own on-board, embedded control system. The large-scale model plane
flies by accessing coordinates from an off-the-shelf GPS unit.

The plane is capable of GPS guided flight, surveillance, and is very
modular, said Kevin Kornegay, one of the faculty advisors for the project.

Last year, the group won an Innovation Excellence Award from Microsoft
Research to continue their previous work in designing an autopilot system for
a large scale model aircraft. Schools around the globe received awards from
the Microsoft Research University Relations program to enable them to conduct
research in emerging technologies.

Our previous design represented a very early prototype for an autonomous
aircraft. The autopilot system was extremely heavy, it lacked software
functionality, but it was a strong version one, said Kornegay.

This year the system is based on a PC/104 form factor Windows XP Embedded
computer and has a variety of navigational sensors.

The software is written in C#, and is broken into four large applications.
The autopilot software resides on the airplane and allows the plane to fly
complete missions without any assistance from the ground. The plane also has
wireless modems, which it uses to relay telemetry to the ground, and to allow
for updated mission guidelines, explains Kornegay.

The client software is written to display telemetry to the end user, for
instance, where the plane is on a map or how fast it is traveling. The group
developed two applications, one for a laptop or desktop computer, and one for
a Pocket PC. Students monitored the airplane's flight from the Pocket PC
application.

The students entered the resulting prototype in the second annual Association
for Unmanned Vehicle Systems (AUVSI) student competition. In 2003, they
placed first in the contest. This year, however, they lost most of their
equipment in a fire just before the competition. We still gave our software
demonstration though, allowing us to place 'best of teams that didn't fly,
said Kornegay.

The mission for the competition requires the plane to take off manually or
autonomously, then autonomously navigate a course with five to ten GPS
waypoints while using an onboard video or camera system to locate a series of
man-made objects on the ground.

Each team has 30 minutes of flight time to complete their mission. The planes
will be judged on time, aircraft cost and weight, navigation accuracy,
efficiency, safety and ability to locate the objects.
Cornell Student Team
Karl Schulze
Andrew Abramson
Brian Rogan
Ron Hose
Jonathon Kron
Aaron Kimball
Joe Sullivan
Will Aber

To test their flight control algorithms, the group used Microsoft Flight
Simulator 2004, running the algorithms for hundreds of hours. They used a SIG
Rascal aircraft with a 110 wingspan. The aircraft is 75 ¾ long and weighs
thirteen pounds.

The students modified the vehicle for unmanned flight by replacing the
factory tail with a custom lifting tail, which moved the center of gravity
further towards the rear of the plane. They also installed large in-wing
flaps because the wings on the airframe had a heavier than designed for load.
The in-wing flaps allowed a slower stall speed and improved takeoff and
landings.

The system runs off two 512 MB compact flash cards, which provides a storage
system with no moving parts able to withstand up to 10,000 Gs. One compact
flash card holds the operating system in a protected write mode, while the
other stores a real-time flight log - a 'black box' that can be examined to
diagnose problems, even if the vehicle crashes. 

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpYp87geW2zD.pgp
Description: PGP signature


Re: [FoRK] ECC and the web (fwd from robert.harley@gmail.com)

2004-08-05 Thread Eugen Leitl
- Forwarded message from Robert Harley [EMAIL PROTECTED] -

From: Robert Harley [EMAIL PROTECTED]
Date: Thu, 5 Aug 2004 00:10:32 +0100
To: FoRK [EMAIL PROTECTED]
Subject: Re: [FoRK] ECC and the web
Reply-To: [EMAIL PROTECTED]

Came across this today and thought it would be of interest to some of you..

*Integrating elliptic curve cryptography into the web's security
infrastructure *
Vipul Gupta, Douglas Stebila, Sheueling Chang Shantz
[...]

Sheueling contacted me a couple of times a couple of years ago about
the same stuff...
described her research at Sun... enquired about working together but
decided it wasn't a go-er since I was in Paris and her in the Bay
area...


RSA is the most popular public-key cryptosystem on the Web today but
long-term trends such as [...] increasing security needs will make
continued reliance on RSA more
challenging over time.  [...]

I've long doubted the security of RSA and have more concrete reasons
for doubting these days... won't say more than that... ;)

R
___
FoRK mailing list
http://xent.com/mailman/listinfo/fork

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpFUYpIXDunW.pgp
Description: PGP signature


Re: planet sized processors (Re: On what the NSA does with its tech)

2004-08-05 Thread Eugen Leitl
On Wed, Aug 04, 2004 at 06:16:14PM -0400, Adam Back wrote:

 The planet sized processor stuff reminds me of Charlie Stross' sci-fi
 short story Scratch Monkey which features nanotech, planet sized

Not a coincidence, as he's been mining diverse transhumanist/extropian
communities for raw bits. Kudos to his work, very nicely done.

 processors which colonize space and build more planet-sized
 processors.  The application is upload, real-time memory backup, and
 afterlife in DreamTime (distributed simulation environment), and an
 option of reincarnation.

http://www.aleph.se/Trans/ is a bit dated, but is still a very good resource.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpZM2A9BHzEJ.pgp
Description: PGP signature


Re: On what the NSA does with its tech

2004-08-04 Thread Eugen Leitl
On Wed, Aug 04, 2004 at 04:44:58PM -0400, Jack Lloyd wrote:

 If I did my unit conversions right, such a disk would be over 30,000 miles in

Drexler's estimate for computers are coservative (purely mechanical rod
logic).

SWNT-based reversible logic (in spintronics? even utilizing nontrivial
amounts of entangled electron spins in solid state qubits for specific
codes?) could do a lot better.

So today's secrets perhaps won't be in a few decades. What else is new?
Rather, who's passphrase has 128 bits of pure entropy? Certainly not mine.
So the weakest link is elsewhere.

 diameter. So we'll probably get some advance notice - Hey, what's that big-ass
 thing orbiting around the Moon?

By that time the question is rather do you think that's air you're
breathing? 

Check out some of the stuff on http://moleculardevices.org/
you might get a surprise.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgp9Ajhh6BqCE.pgp
Description: PGP signature


  1   2   3   4   >