Well that's easy to break:
1) obtain one audio CD player with digital out
2) connect to sound card with digital in
3) copy to gold CD with ECC errors being fixed by audio CD player
or simply re-digitise from high quality audio CD player. Probably at
MP3 quality the distinction won't be that
I notice Inchoate has started putting Reply-to: [EMAIL PROTECTED] in mails
through his node.
Which is not what the rest of them are doing (as far as I know), and is
officially evil.
The simplest thing that could be done about his [CDR] crap, and continual
jerking people around with his warped
It's clear this CD won't play in an audio CD player. You load it into a
computer, you buy a decryption key and then you can download audio into an
MP3 player. (So the article claims). So a few of the MP3 players support
the broken SDMI copy marking schemes, perhaps this is what they're talking
On Mon, May 14, 2001 at 06:13:20PM -0700, Ray Dillinger wrote:
This works, if it doesn't really matter that the users have separate
keys -- ie, if it won't cause a hash collision or something in some
other part of the system, or if you don't care that the users can
identify each other by
Could you explain the relevance of this to the list readership?
(The link explains all about how to become an actuary.)
Adam
On Thu, May 03, 2001 at 06:36:02PM -0500, Jim Choate wrote:
http://www.math.purdue.edu/actuary/What.html
This is cryptic -- how do I know what this link will be about from your
subject line. Can't you quote as ascii the first paragraph, or write your
own summary, or something?
If you can't be bothered to do that, the reference is not useful; it's just
a random pointer. Historically most of them
Take a look at:
http://opennap.sourceforge.net
Adam
On Fri, Feb 16, 2001 at 10:36:31AM -0800, Ray Dillinger wrote:
On Thu, 15 Feb 2001, Adam Back wrote:
It may be that Napster will continue in the form of the open napster
clones, even if Napster the company is prevented. Anyone
Heh, heh. Guess who uses outlook :-)
Endless source of amusement as a linux user watching the VB
script worms play out. I think you actually have to click
on this one, though the double extension helps as many
users won't see the 2nd .vbs, just the .jpg.
Adam
On Mon, Feb 12, 2001 at
I think a watermark is more likely to be keyed. Without the key
it's a bit harder to be sure to remove the watermark without affecting
the quality of the image. With the key you can tell which parts of
the message to remove.
In addition watermarking has to mean a mark tied to the identity
of
Aimee wrote:
I agree, but you yourself stated that the average American isn't
that concerned about privacy and won't purchase privacy enhancing
technologies. (In a general privacy sense, I don't see a lot of
"privacy reclamation." I do see a lot of notice provisions -- the
functional
I think the 2.0 mail system has a number of advantages over the
reply-blocks based 1.0 pseudonymous mail system, though a couple of
disadvantages. These trade offs are documented in the mail system
white paper.
http://www.freedom.net/info/whitepapers/
In summary for people who don't
Coincidentally, or perhaps not given my recent comments about
the dumbness of tracing and blocking as a strategy, someone
appears to be syn flooding my cable modem right now. Tons
of TCP connections from a bank of IP addresses slowly changing.
Adam
Adam Shostack wrote:
Folks should take a
12 matches
Mail list logo