At 10:12 PM -0800 3/4/00, Secret Squirrel wrote:
>Let us keep in mind that it is not illegal to seek financial privacy.
>It is only illegal to launder the results of illegal activity.
The "structuring" laws apply to all financial transactions, not just money coming from "illegal activity."
On Sun, Mar 05, 2000 at 12:19:03AM -0500, Phillip Hallam-Baker wrote:
I don't think anyone has accussed Markoff of actually falsifying the emails
exchanged between Mitnick and his accomplices and I refered to the book
only to establish that the material was already in the public domain and
And then the grocery sells that info to a national database that
adds it to all the other info on you. Which the cops can access to see
just how much alcohol Tim is using these days, and maybe they need to put
his vehicle description/plates on a watch list to stop for DWI checks
whenever
And the four cops were of course not dressed as cops...they were part of
the "Street Crimes Unit," meaning they were supposed to blend in by looking
like street thugs.
What Yabba.. thought was going down when four white guys started yelling at
him will forever be unknown to us.
I know what
Sunder writes:
Any jurisdiction that considers pupming 41 pieces of lead in a man that
refuses to talk to four predatory bastards isn't by any stretch of the
immagination free.
The number of bullets is not the issue. As has been discussed here
before, any firefight involving multiple
On Sat, 4 Mar 2000, Black Unicorn wrote:
This was and is rather expensive. Each CTR (currency transaction report)
costs a bank between $5 and $25 to process. From 1987-1996 U.S. banks filed
more than 77,000,000 million Currency Transaction Reports at a cost to
consumers of over 1.2
At 9:31 PM -0500 on 3/4/00, John Young wrote:
To read the stuff now is again electrifying.
Yup.
I got here in spring/summer of 1994, and I had the same experience when
Ryan's venona archives were up for a while a couple of years back.
The way I figure it, the loop probably started at about
I'm just curious whether I'm the only one who never reads these "digitally
signed and verified" messages that comes through from time to time. As a
matter of policy, I sure don't trust the authors of my browser enough to
"click here to continue" -- which is how my browser displays those
On Sun, 5 Mar 2000, Black Unicorn wrote:
Did you make it up?
Not at all. All in (among other places) the Congressional Record.
Any other questions?
Nope, thanks for the vector.
The future is
At 12:02 PM -0500 3/5/2000, Phillip Hallam-Baker wrote:
...
If you think that the problem with S/MIME is the lack of an
open source client then do what the cypherpunks list *used*
to be about - write some code to do the job the way *you*
think is correct. The standard is published by the IETF
In response to Steve Mynott: the name cypherpunk is due to John
Gilmore
No, this is not correct.
Ooops, sorry Tim! On the net you both look alike you know.
I'll get it right in the book.
Phill
smime.p7s
Is [EMAIL PROTECTED] down? I have not received any mail since
yesterday from them.
--
---
William H. Geiger IIIhttp://www.openpgp.net
Geiger Consulting
Data Security Cryptology Consulting
Programming,
Every copy of Windows 2000 and Windows millenium will have full
strength 128 bit crypto in the base O/S.
Source, or "a proof" please, since I don't recognize your name as being
authoritative regarding what M$ does and/or does not contain.
It was announced at RSA in the Microsoft keynote speach.
--
At 10:49 AM 3/3/00 -0800, Tim May wrote:
(Sure, the delivery has to be untraceability. As always, if Alice and Bob
are using mundane e-mail mechanisms then any supposed untracebility of the
money is ipso fact lost.)
While an evesdropper can determine that Bob, a purportedly upright
The only real alternative to handguns is shotguns.
Short barreled carbines--like the M-1 carbine, or a lever
action 30-30, or "Sub-machine guns" like the MP5 do quite a decent
job.
--
A quote from Petro's Archives: **
If the courts
I wrote much of what you quoted and then responded to, and yet you snipped
the part that said "Tim May wrote..."
Please take some care in how you quote.
Apologies.
--
A quote from Petro's Archives: **
If the courts started interpreting
Noon - Hearing
EVENT: House Select Intelligence Committee
AGENDA: Full committee hearing on drug interdiction in Colombia.
(Rescheduled from February 17) No new date announced.)
WHO: Bob Brown, supply director, Office of National Drug Control Policy;
Gen. John Gordon, deputy director, Central
At 02:58 PM 3/1/00, you wrote:
Subject: Fw: Great American Gas Out
This message was received and forwarded - please forward it!
Anytime we can stick it to them it's a good day. Last year on April
30,1999, a gas out was staged across Canada and the U.S. to
bring the price of gas down, and it
[EMAIL PROTECTED] wrote:
I know of no way to lend support to the idea that government in general
needs good leadership -- history shows that particular governments
(namely, those that mankind has managed erect) suffer from bad
leadership.
OTOH, I will admit that humanity is fairly new to
untraceable contract killings. At least 342,000 persons in America have
already earned killing.
How did you come at this figure?
I'm proud that untraceable technologies we have helped to develop and
publicize will make possible the cleansing of this country of gun grabbers.
At 5:00 PM -0800 on 3/1/00, Tim May wrote:
Perhaps you are right. I am asking you, then, to not do it. Not because I
"own" my words here, but because readers on other lists lack context. (Few
of our articles are self-contained articles in the way magazine articles
are meant to be.)
Sigh.
Subject: toad pimping
At 08:55 PM 3/1/00 -0500, Eric Cordian wrote:
[EMAIL PROTECTED] writes:
can you send me toad
Me send toad. You lick toad. Then understand crypto.
How much if the toad wears heels?
X-Loop: openpgp.net
From: Jim Choate [EMAIL PROTECTED]
Yeah, thriving economies that only a handful of elite got to benefit from
while the rest of the population were pretty much on bread and water. You
really should study the fall of the Ottoman Empire a tad more closely (or
at least quit
Nope, I look at what life was like without governments - nasty, brutish and
short.
We both agree that bad governments can do a lot of evil, even in democratic
countries. Richard Nixon being a prime example, committing acts of treason
at home and committing war crimes abroad.
I don't
Title: RE: CDR: Re: damn commie hypocrite leech! (was Re: Re: Re: whyworry?)
I think the romans did. they finally lost the fight and state, but it
lasted for quite a long time, didn't it? and survived a whole bunch of
crooks.
The Romans had more than one phase of government. Firstly,
At 4:15 PM -0800 3/1/00, Marcel Popescu wrote:
...
This is a common misconception, even in my country (Romania, Eastern
Europe). I argued with someone claiming that "$1,000 in Romania is
equivalent to $4,000 in the US". I told him that it's the other way around:
you need at least $4,000 (and I
-BEGIN PGP SIGNED MESSAGE-
At 11:43 AM -0800 on 3/1/00, Tim May wrote:
I thought you (R.A. Hettinga) agreed not to forward my articles to your
stable of lists?
Actually, I may be wrong, but I'm not sure I agreed to that at all. What
I *did* agree to do, something I'm sure you
Austin Hill wrote:
If within these functions, there exists a market demand for payor and payee
anonymous digital cash, then you can be assured that some ambitious startup
will license from us and attack that market.
I would appreciate being placed as close to the front of that applicant list
At 5:29 PM -0500 on 3/1/00, R. A. Hettinga wrote:
First XCert (nice guys, and all, but...) do WOT in X.509. Now Sonera does
X.509 in PGP.
The ganglia twitch...
Wait a minute. If I remember correctly, *Thawte* does X.509 in PGP,
already, right?
Oh, well. I guess it stopped being funny a
At 12:02 3/5/2000 -0500, Phillip Hallam-Baker wrote:
Ooops, sorry Tim! On the net you both look alike you know.
Perhaps my cypherpunk photo archive can solve Phill's apparent identity
crisis. You can poke around there, but some useful starting links might be:
What would be the legal implications for web visitors if a
popular page gets hijacked and replaced with:
ATH0,,,DTa number of someone you like here
If the number is an international number - who would pay for it ?
The whole traffic to a country can probably be blocked if the hijacked
On Sun, 5 Mar 2000 [EMAIL PROTECTED] wrote:
Perhaps this solves a little problem we've been playing with:
We have an untrusted user that needs a key to unlock a file for
processing. Is there anyway we can transmit a key to the program that
processes the file and allow the program to
At 08:32 AM 3/2/00 -0800, Eric Cordian wrote:
NEW YORK (AP) -- The Clinton administration intends to ask Congress for
new power to combat money laundering, including the authority to ban
financial transactions between U.S. institutions and offshore financial
centers, The New York Times reported
On Sat, 4 Mar 2000, bram wrote:
I've written up a public key encryption algorithm I came up with and some
thoughts on it at
http://www.gawth.com/bram/essays/simple_public_key.html
Here's an idea I just had towards an attack on the system. I'm not
sure it goes all the way through. It
On Sat, 4 Mar 2000, bram wrote:
I've written up a public key encryption algorithm I came up with and
some thoughts on it at
http://www.gawth.com/bram/essays/simple_public_key.html
If I just send you the final sum, how do you know it was generated
correctly by adding stuff in the
Yes, but remember we started a discussion in this subject so as to
give a real life analogy of what happens on the Web. Businesses who
sale you stuff face to face are probably going to go for the sale
over getting information. But then, just take AirMiles for examaple,
do you think they are
I think the problem with S/MIME is that it violates a major principle
of software usability: make the most commonly performed tasks the
easiest to accomplish.
You find clicking on the little icons difficult?
This is just more of the same - parotting out some slogan you
read in some book in
Seen when I entered an unnamed security site:
"You must enable Javascript to access
our vulnerabilities database"
38 matches
Mail list logo