"Mo" say air passengers. "Ba" say students.
-- Forwarded message --
Date: Fri, 20 Oct 2000 19:42:05 -0400
Newsgroups: alt.privacy
Subject: New ID system keeps tabs on kids
Students have their ID Cards scanned at the start of the school
day at Bensalem High School
By Den
Jodi Hoffman wrote:
> If you're serious, send it. We own a law firm. Furthermore, a lot of
> the cases we handle are pro bono, especially when children are involved.
You "own" a law firm, eh? Big surprise there.
State Department Aides Seek $300 Million to Better Security
WASHINGTON, Aug. 3 -- Three months after Secretary of State Madeleine K. Albright
declared herself "humiliated" by lax security at her department, manifested in one
case by the loss of a laptop computer with classified information, of
MojoNation has great promise. It's a nuts and bolts attempt to put the
old cypherpunk ideas into action: micropayments for data transfers,
reputation servers, all those ideas which we have bullshitted about
for years. All open source. This is a project which cypherpunks should
get behind.
Don'
Feds may update wiretap law for e-mail
By Ted Bridis, WSJ Interactive Edition
July 18, 2000 6:58 AM PT
URL: http://www.zdnet.com/zdnn/stories/news/0,4586,2604731,00.html?chkpt=zdhpnews01
WASHINGTON -- The White House is urging changes in U.S. law to make it easier for
authorities to eavesdrop on
>NYT's current obsession (albeit, widely shared) with music and film
>"copyright," and crypto-enhanced intellectual property protection.
Copyright is a short-lived aberration (60-70 years ?), and technology is
finally dealing with it. Copyright is going away, and of course that
industries that ca
Looks like Yet Another Crypto Chip is in the air ... or vapour:
http://www.craigslist.org/sfo/bus/255495.html
Is there any crypto way to get rid of visitors to the SF ball park
(named after Pacific Hell) ?
Or at least some stego or anonymous way ?
Marcel Popescu <[EMAIL PROTECTED]> shares his infinite wisdom:
> I won't copy the entire text of "The Ultimate Resource" here. Anyway, the
> notion of "finite resources" is dumb. All resources are infinite. The Earth
> is round. Deal with it.
So when the infinite terrorist/yippies pour their in
> Dear Mr. Federal Reserve Board Governor,
>
> If you want to see your pet poodle Fluffy again, encrypt the decisions
> of the next 3 board meetings to this public key (xxxyyyzzz...) and
> post to alt.ransom.payments before the decisions are made public.
Yeah, that works, but only against that on
On SportsNight (the best show you're not watching, according to TV
guide), there was a reference to anonymous remailers this past Tuesday.
Is this the first mention in pop culture?
Office nerd Jeremy has recently met a porn star in a bar and is thinking
about seeing more of her (so to speak). He
Stefan Brands writes:
> Also, I would never start insulting another person
> in a discussion in order to alleviate my frustration about
> a disagreement, let alone hide behind a remailer pseudonym
> in such a situation.
The point about insults is well taken, but it is discouraging to
see Stef
There seems to be a widespread misconception that "peer review" refers
to a process in which the material to be reviewed is thrown open to
the public. In fact the term is more restrictive and means a review by
a small number of selected experts in the field. Here is a description
from http://ww
http://www4.law.cornell.edu/uscode/18/1956.text.html
Daniel Boone writes:
> Another design issue to take into account in building a payments mix system
> is that, unlike a message mix system, there is (at least in the United
> States) an obvious "legal" (as opposed to technical) attack against p
David Molnar writes:
> Note that cash payments can have a property which encrypted messages
> usually do not : you can have the mix break up the payment into
> random-sized chunks, or aggregate several payments into a single
> transaction between servers.
>
> For example, say I send a payment f
Maybe it's time to consider deploying anonymous payment mixes.
This is an idea from Ron Rivest for achieving anonymity on top of a
traceable payment system. It uses exactly the same idea as the Chaum mix,
which is the foundation for the cypherpunk remailers.
The idea is that you would have fin
Subject: modem attack notes
Eric C posted about modem-based
DDoS attacks using hayes sequences
to dial a third party via ping data.
Amusingly, I was unable to forward his letter
as-is since it killed my
modem connection.
I find that a url has the same effect.
Much potential for disconnect fu
At 06:41 PM 2/26/00 -0500, [EMAIL PROTECTED] wrote:
>Stefan Brands' thesis finally came yesterday from Fatbrain, almost two
>months after ordering. His techniques are very powerful and interesting,
>but unfortunately patented and hence of no practical value for anyone
>other than the one licens
It took some three years for the Echelon story to migrate from cpunks-like
forums (obscure & irrelevant due to low exposure) to mainstream media
[which probably means that Echelon itself has been abandoned and its
empty shell is used as the front for something else, but that's another
rant.]
So
>I hate communist political systems with almost the same passion that I
Q.E.D.
Subject: FBI Kisses Queens Pocked Arse
So now the FBI obeys the Official
Secrets Act?
U.S. may fight to keep letters about Lennon secret
Updated 9:09 PM ET February 18, 2000
LOS ANGELES (Reuters) - Almost 20 years after the
assassination of John Lennon, a gover
From:
http://www.wsws.org/articles/2000/feb2000/nwa-f11.shtml
Date: 2/14/00
Time: 8:41:33 AM
Remote Name: 205.188.192.174
Comments
WSWS : Workers Struggles : Airlines
Action against dissidents in airline contract
struggle
US court orders seizure of Northwest flight
attendants' home computer
Jodi Hoffman wrote:
"Dustin, at the age of six, was sitting by his father in a
minivan when a runaway semi truck tire hit the front bumper (at a rate
of about 70 miles per hour, bounced 30-40 feet in the air, then crashed
down on the area where the windshield meets the roof of the va
Hackers [sic] Force Yahoo Shutdown
Group action suspected in attack
that closed Web site for 3 hours
Carrie Kirby, Chronicle Staff Writer
Excerpt on how folks figured out that if you use a
different proxy, university censorship goes away.
(The correct solution, of course, is to throttle
consumption based on bandwidth, not content of the
b/w. Assuming the university is not lying about
their intent in filtering. [The same objectio
25 matches
Mail list logo