On Wed, 20 Jun 2001, Roy M. Silvernail wrote:
On 20 Jun 2001, at 8:51, Ray Dillinger wrote:
The particular URL that I'm taking this particular paranoia trip on:
(It's a pretty long document, look toward the bottom)
http://www.phoenix.com/PlatSS/pcplatforms/desktop/PBfeatures.pdf
Talk
On Wed, 20 Jun 2001 [EMAIL PROTECTED] wrote:
http://www.nytimes.com/aponline/national/AP-FBI-Arrest.html
#LAS VEGAS (AP) -- An FBI security expert who had access to
#informant identities and witness lists has been charged with
#selling classified files to organized crime figures
You know what? If Alice puts up a list of all the sites
she's blocking mail from, there is no problem with that.
She is not coercing anyone. She can block any site for any
reason she wants -- maybe she has intestinal gas, or maybe
she just doesn't like somebody. Tough toenails.
If Bob
On Wed, 13 Jun 2001 [EMAIL PROTECTED] wrote:
There is another dark side to ORBS which seems to be missed here: Most
people's primary complaint about spammers is that they (the spammer) is
making use of network services at someone elses expense, without
permission of the spamee. ORBS is
On Mon, 4 Jun 2001, Matthew Gaylor wrote:
As I thought of carnivore I reflexively mentioned that the real
threat doesn't lie with the FBI, but rather with the filtering that
goes on in our schools and libraries. Censorware has got to be one
of the most Orwellian concepts yet implemented.
.
The archives of cpunks are many things, but in general they are
a reasonably accurate record of what happened here; I don't mind
being in them, and in fact I think that they serve to demonstrate
the truth of the matter.
Ray Dillinger already comes up in Google searches as being someone
associated
-- Forwarded message --
Date: Tue, 29 May 2001 12:34:45 +0200
From: [iso-8859-1] Bo Elkjær [EMAIL PROTECTED]
To: 'Tib ' [EMAIL PROTECTED]
Cc: '[EMAIL PROTECTED]' [EMAIL PROTECTED]
Subject: RE: NSA tapping undersea fibers?
Hi Tib, List
The US patent office may have some
My name came up several times during the Bell trial,
with the connection being that it was in a message to Ray
Dillinger that Bell hatched an idea for using PCB's to
destroy the value of seized automobiles, and that this letter
to Ray Dillinger was found on the seized computer
Just a note:
To tap a fiber without interrupting the flow of data,
the method is to first remove the polymer sheath
(chemistry or micromachining is your friend), and then
very carefully score the side of the glass fiber itself.
You'd have to use a diamond-edged something-or-other and
be
On Wed, 16 May 2001, Eric Cordian wrote:
If backbone providers start screening content, it's going to cause
problems.
Eh. Cause problems or solve them. If backbone providers start
screening content, it may just finally motivate people to be
multi-homed. Which they've been pretty lax
On Wed, 16 May 2001, tidepool wrote:
The way I see it, they will be unable to provide any sort of scheme that
will prevent people from converting sounds into mp3's or a similar
compression scheme. As long as the user can hear the end result, they will
be able to convert the music into a
On Wed, 16 May 2001, ganns.com wrote:
Ray, that is an interesting view of the situation, wanting them to succeed
so that they cut their own throats. I'll bet that after subtracting
manufacturing costs and the label cut, entire mp3(or suitable format) albums
could be purchased online for
On Tue, 15 May 2001, Blank Frank wrote:
Label releases copy-protected CD with Pride
More power to him. Let this guy copy-protect his songs if he can;
Sooner or later the artists who intentionally release free music
will bury him.
Bear
On Tue, 15 May 2001, Ben Laurie wrote:
Ray Dillinger wrote:
Okay. Here is one way to do it. Encrypt the message using a symmetric
algorithm such as Twofish or AES or something. Now create a header that
snip
You just described PGP.
Yeah, I did. I've been looking at it. :-)
Note
On Mon, 14 May 2001, Faustine wrote:
Forensic Stylistics / by G. R. McMenamin ISBN: 0444815449
Elsevier Science 07/01/1993 264 pages
I'm unable to find any pointers to this one. Amazon has evidently
never heard of it. Do you have any more information -- an LC
number maybe, or was it
On Wed, 9 May 2001, katkittty wrote:
the random number generator in my Java sure takes a long time. It makes the
randomly rotating 3D face I am working on move kinda slow. Is there a fast
way to make fake random numbers?
Heh. In crypto we spend a lot of effort on getting really *good* random
On Tue, 24 Apr 2001, Daniel J. Boone wrote:
Instead, I think the way crypto facilitates the rise and survival of competing
gangs, and lets those gangs have a chance to eat the government gang for lunch,
is much more important. So far I can't point to anywhere where this effect has
I have been studying cryptographic protocols for consensus action
of late, and I have come to a somewhat startling conclusion.
If a society is sufficiently rich in cryptographic protocols, there
is no need for anyone to work for a government.
The only sticking point is the exercise of
On Sun, 22 Apr 2001, Jim Choate wrote:
SPINTRONIC PROBE MICROSCOPES.
snip
The SP-STM method is used not so much to image atoms
in a sample as to map their magnetism. Previous to this one could
map magnetism in a bulk material but only at the scale of 10
nm or more. With
Here's an interesting article.
In this one, a US District Judge says explicitly that
the first amendment does apply to the internet and that
people DO have a right to anonymous speech online.
The case involved a company claiming that users of a
chatroom had "conspired" to drive its stock
On Mon, 16 Apr 2001, Jim Choate wrote:
On Fri, 13 Apr 2001, Ray Dillinger wrote:
In a fully distributed state, the number of elements that have to
fail in order to make the system not work is the same as the number
of elements in the system. Fully distributed systems (as in plan D
I recommend that you castrate yourself with the dull edge of a bowling
ball. If that doesn't work for ya, come on back. I've got other
recommendations too.
Bear
On Fri, 13 Apr 2001, Charles wrote:
hello cyberpunks,
I want to know if yo know a good free(
On Fri, 13 Apr 2001, Matthew Gaylor wrote:
When living systems - including people like us - spontaneously reorganize
themselves, we call it hierarchical restructuring.
A hierarchical organization is like a tree. Hierarchical restructuring
(as in plan C) results in a different, and
On Wed, 11 Apr 2001, Ken Brown wrote:
Leen told Tanner that all of Bell's discovery notes were at Seatac; that
Seatac would not release the notes without a court order, and that the counsellor
who would release the notes doesn't work on the weekend. Leen asked for
an opportunity to
from "Can hackers help stop child porn on the Net?"
http://dailynews.yahoo.com/h/zd/20010411/tc/can_hackers_help_stop_child_porn_on_the_net__1.html
Okay, I haven't been on usenet in a while, but
"A newsgroup on ferrets and high school football"...
It just seems an unexpected
On Wed, 11 Apr 2001, Declan McCullagh wrote:
It's all so sad and predictable and sad again. The cypherpunks list
had its glory days: Wired magazine cover stories, blossoming
technology, and, yes, even those damnable tentacles. Now it's become a
convenient way for the Feds to land convictions.
This is an April Fool, right? Even if the tech existed, it would
require substantial processing power and there's no way they could
get it into cameras by... um, by April First ...
Bear
"Remember, Remember
The fifth of november
The gunpowder Treason
On Wed, 28 Mar 2001 [EMAIL PROTECTED] wrote:
I think Judge Kozinski's ruling can also be easily read in support of free
speech by operator and participants in anonymous betting pools with political
interests.
I think you are wrong. The neuremberg files website didn't *create*
a motive
On Thu, 29 Mar 2001, Steve Schear wrote:
At 09:09 PM 3/29/01 -0600, you wrote:
http://www.sightings.com/politics6/dwbb.htm
There have been a few discussions on this list of possible means for
defeating such systems operating in public places. I recall suggesting a
new religion, whose
On Wed, 28 Mar 2001, Jim Choate wrote:
The only way to pay in cash is two either send it through the mail (you do
know about the cash sniffing dogs used at the UPS and airports don't you?)
"cash sniffing dogs?" C'mon, jim, I'm pretty paranoid, but that's
just *out there*. Got a cite? I
On Sun, 25 Mar 2001, Morlock Elloi wrote:
purposes. There are about 2^167 atoms in planet earth,
about 2^30 nanoseconds per second, and 2^39 seconds till the
^
Most proofs of security have a problem, this one was just easy
to spot :-)
Groan. Right you
On Sat, 24 Mar 2001, Jim Choate wrote:
http://slashdot.org/articles/01/03/24/1840252.shtml
Cryptographically interesting. It looks like starting now,
the highest-end threat facing a cryptosystem involves liters
of fluid performing molecular computation.
The kick is that these
On Fri, 23 Mar 2001, Jim Choate wrote:
http://www.eye.net/eye/issue/issue_03.15.01/news/ftaa.html
This is misguided. You can't involve the general public when you
are going to be doing something illegal. The guy announces, "we
will have secured the bridge" to the general public and
BO, trojans, http tunelling and similar are really not rocket science
these days. 99% of sheeple machines are vulnerable. This is perfectly
valid and real attack. Not on my machines and probably not on yours -
that does not make any difference.
This is just another data point supporting secure
The reason anonymizer is blocked is because it functions as a proxy
via which one can get to (presumably) any page on the web. The
alternative would be to block *every* URL many times: once for the
regular URL and once for the one that starts with www.anonymizer.com
and once for each of the
On Tue, 20 Mar 2001, Trei, Peter wrote:
Ken:
I'm sure the apparent discounting of the US murder rate by some American
list members seems inexplicable to you. At the risk of being extremely
non-PC, I think I can explain why.
The distribution of murders in the US is very heavily skewed
On Tue, 20 Mar 2001, Jim Choate wrote:
Of course it's British history would indicate it was really used by the
rich to punish those less fortunate but verbally active. Aren't laws in
the US supposed to answer to the Constitution and not British legal
precedence?
I know you're not going to
On Mon, 19 Mar 2001, Ken Brown wrote:
I think the murder rate in Britain is about 1/6 of what it is in the
USA. (I mean rate, not actual numbers, this is not a 28% paternity
error). And the proportion of people killed accidentally is far lower
here as well. We are perhaps a fine example of
On Sat, 17 Mar 2001, Sampo Syreeni wrote:
leitmotif to satanistic themes. Similarly a Goth attire and a suitable
amount of group aggression will likely be as efficient on a child with a
Christian fundamental worldview as a direct threat. And as time goes by,
Goth attire?? You mean short
On Sat, 17 Mar 2001, Jim Choate wrote:
900MHz packet ($100/site) coupled with Plan 9 is the base you want to
start from using current tech. It will require updating firewall software
so that it also handles bandwidth throttling and fail-over routing.
I've looked at that, but I'm unsure
Right now, attempts to control the internet lean on ISP's and
backbone sites pretty heavily. Most of the nodes on the internet
have exactly ONE route to the internet, and if you can get to
somebody's upstream, she's toast.
In the long run, I don't think the machinery of freedom is going
On Thu, 15 Mar 2001, Sampo Syreeni wrote:
On Wed, 14 Mar 2001, John Young wrote:
"According to the American Association of Blood Banks,
280,000 paternity tests were conducted in 1999, three
times as many as a decade earliet. And in 28 percent of
the tests, the man tested was found not to be
On Thu, 15 Mar 2001, Ray Dillinger wrote:
I've heard similar figures from the CDC - when they discover
genetic disease, they often do tests to find out which parent
it was inherited through - and about the same fraction of the
time, they find that kids are no relation to their fathers
On Sat, 10 Mar 2001, Becky wrote:
I was doing an internet search on cor esp. your article was on my hit list.
At this point I cannot recall the page. Are you the right person for the
subject?
One or more of the several thousand people you are addressing may be
the right person for the
Okay, if you want to learn how to hack, I recommend the
following books: (these are available on Amazon).
Introduction to Algorithms, from MIT press.
Structure and Interpretation of Computer Programs,
same source.
The Art of Computer Programming, (get all
On Sun, 11 Mar 2001, David Honig wrote:
Yeah, the problem is the fire marshall/BATF when they learn you're storing
70% H202 in your garage :-) And the neighbors when they ask why their cat
is a bleached
blonde now..
Um, there's a problem with 70%. Actually a couple problems.
First, if
On Mon, 5 Mar 2001, Phillip H. Zakas wrote:
- Biotechnology patents are especially troubling. On the one hand one can
patent a gene sequence discovered to be vaguely related to, say, breast
cancer. On the other hand that gene sequence is usually derived from some
volunteer's dna, but that
Maybe they could be stegotexts?
five long rambles with semi-random spelling and spacing variations
could cover a message of several dozen words.
Bear
On Mon, 26 Feb 2001, Ken Brown wrote:
I think the "state government of California" guy must be just a
On Thu, 22 Feb 2001, Tom wrote:
Ray Dillinger wrote:
Here's an interesting thought, though. There are all kinds of
number generators already hanging in the sky, and some of them
are fairly random, so this thing might actually have a prayer
of working.
that, of course, requires that you
On Wed, 21 Feb 2001, Tom wrote:
Ray Dillinger wrote:
What if it was just a few dozen Blum-Blum-Shub generators
up there spewing all those bits? We'd never see the
difference, but a data thief who was "in the know" about
how they were keyed could recreate any sequence at any
On Mon, 19 Feb 2001, David Honig wrote:
At 11:38 AM 2/19/01 -0800, Ray Dillinger wrote:
The problem is that data that's been written over once, or even
twice or ten times, can often still be read if someone actually
takes the platters out and uses electromagnetic microscopy on
them
A much better article on the topic can be found at
http://www.cs.auckland.ac.nz/~pgut001/secure_del.html
The problem is that data that's been written over once, or even
twice or ten times, can often still be read if someone actually
takes the platters out and uses electromagnetic microscopy
On 19 Feb 2001, LUIS VILDOSOLA wrote:
Encryption is used in economic policy,
without it a minority wouldn't be so lucky over the stock markets
and the majority wouldn't have consistent bad luck over it.
I submit that the majority have consistent bad luck precisely
because they are relying on
On Thu, 15 Feb 2001, Adam Back wrote:
It may be that Napster will continue in the form of the open napster
clones, even if Napster the company is prevented. Anyone can start
napster servers at this point.
I don't know if it implements exactly the same protocol, but
SuSE 7.1 (released on
On Sun, 11 Feb 2001, Aimee Farr wrote:
Yes. However, I've been here a while. The dynamics of this community is
somewhat difficult to grasp, and I can only beg your understanding of the
same.
One of the crucial things needed to understand what goes on cypherpunks
is that about three-quarters
On Fri, 9 Feb 2001, Declan McCullagh wrote:
Right. Prominent articles in USA Today and eslewhere, followed by front-page
LA Times article, followed by the Fidel Castro cyberterror hearing on Wed.
There's a pattern.
Yah. A pretty blatant one. I'm wondering though why they're
concentrating
Odd. I rather doubt that any of the incriminating
information he sought to avoid discovery of was
actually on that chip.
Thinking about it though, given the massive headaches
about disposing of crypto modules and key dongles
properly once they are obsolete or broken, perhaps
there is a
Regularly intercepting POTUS' international email is hardly
"untargeted". I figure that's probably a fairly routine, if
small, part of Echelon.
Bear
POTUS = "President Of The United States" for all who aren't
up on spook jargon.
On Mon, 5 Feb 2001 [EMAIL
58 matches
Mail list logo