Keysigning Party, Simi Valley, CA, USA

2001-04-16 Thread V. Alex Brennen

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


LUG-Fest (Linux User's Group Festival) an expo style
event for Linux users in the bay area is going to
hold a large keysigning party. If any cypherpunks
are interested in attending here is the relevant
information:

LUG Fest April 21-22, 2001 at Nortel
Networks, Simi Valley, CA, USA!

Keysigning Party Press Release:

http://www.lugfest.org/gpg.cgi

"Sunday, April 22nd, 2001, 12:30 p.m, the Simi Valley Linux Users
 group will hold a GPG/PGP Key signing party during LUGFest IV.
 LUGFest IV will be held at Nortel Networks in  Simi Valley, CA.
 The LUGFest and the key signing party are open to the public, all
 are welcome to attend."


The lugfest press release links to the GnuPG Keysigning
Party HOWTO, which I wrote.  Constructive criticism of
that document is appreciated.  I posted in here once
before for review and got some good feed back.  It
lives at:

http://www.cryptnet.net/fdp/crypto/gpg-party.html


I've been trying to get LUGs (linux user groups) around
the country to start holding regular keysigning parties
in the last 5 minutes of their meetings.  LUGs exist in
every major metro area in the US and meet regularly.
They are capable a providing an excellent backbone
(infrastructure support) for a strong nation wide web
of trust.  Local webs of trust formed by lugs can be
linked at conferences like LUG-Fest.  I strongly
urge everyone who can to participate in the LUG-Fest
party, and to thank LUG-Fest for holding it.  Also,
if you are a member of your local LUG, I urge you to
help it establish a keysigning tradition and a strong
web of trust.


Thanks,

- VAB
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: Made with pgp4pine 1.75-6

iD8DBQE62vWt+pIJc5kqSz8RArvHAJ4+nN/IBDjWIpEUWoU61m3Eo3NzuwCeJGcg
6DiqV+fs2HWcE5oxmrtxbfc=
=bCzD
-END PGP SIGNATURE-





Re: hello, I would like to learn how to hack a bit

2001-04-16 Thread Ray Dillinger

Certainly.  Head down to the local hardware store and buy 
yourself a very large axe.  

Now find something you want to hack, lift the axe over your 
head, and bring it down edge first.  You may need to hack 
three or four times before you break all the way through. 

It's easy once you get the hang of it.

Bear


On Mon, 16 Apr 2001, roland wrote:

but I'm not verry good jet, 
can u tell me how
pls answer me quick





Misc p2p article

2001-04-16 Thread George

Also, today's NYT has an article about national security
needs for more language experts.



http://interactive.wsj.com/articles/SB987356381635082061.htm
#
#April 16, 2001
#
#Asian Technology
#
#Two New Peer-to-Peer Programs Aim High, but Still Have Glitches
#
#By JEREMY WAGSTAFF Staff Reporter of THE WALL STREET JOURNAL
#
#Time to grovel. I was hoping this week to be able to trumpet 
#a bunch of new programs that free you from some of the physical 
#constraints of modern computing. I was hoping to be able to say 
#that, at last, you were free of shackles such as overprotective 
#technical staff, the corporate Intranet and endless e-mail 
#attachments.
#
#But paradise, I'm afraid to say, has to be postponed for a while. 
#The two programs I've been toying with, new versions of which 
#were both released last week, are Groove Networks Inc.'s Groove 
#(www.groove.net1 ) and GoToMyPC (www.gotomypc.com2 ) from 
#Expertcity Inc.
#
#Groove is the first serious attempt to introduce peer-to-peer 
#computing to the business marketplace, giving employees a chance 
#to communicate and share files by setting up their own online 
#work groups. GoToMyPC offers the first Web-based -- and legal 
#-- method of accessing and controlling another computer. Both, 
#in theory, are great ideas, elegant in their simplicity and 
#genuinely useful. But neither worked perfectly.
#
#Peer-to-peer computing -- where multiple users can interact 
#directly, rather than through a server -- is probably the next 
#great thing for the Internet. Best known as a way to swap music 
#over the Net via Napster, so-called P-to-P applications allow 
#much more, such as letting users share files, messages or 
#calendars, or collaborate in real time on a document or drawing.
#
#As I've mentioned before, the Web will start coming into its 
#own once people stop obsessing about how to make money out of 
#other users and start capitalizing on the intrinsic benefits 
#of having millions of people all sharing a network.
#
#Peer-to-peer computing offers users the chance to set up their 
#own personalized networks atop the public Web. Without these 
#P-to-P systems, people have to use a number of imperfect 
#alternatives. For instance, users can rely on their Internet-
#service providers to provide the tools (but they may be held 
#hostage to proprietary programs or HTML); or use corporate 
#networks (jealously guarded by techies rightly afraid of viruses 
#and other abuses); or shuffle e-mail messages among team members 
#(a cumbersome process).
#
#In practice, Groove isn't quite mature yet. The preview edition 
#looks and feels professional, and carries loads of useful 
#features, including instant messaging, file sharing, even a 
#doodling pad. It also supposedly works behind a firewall, and 
#around problems such as connecting to computers that share the 
#same Internet connection.
#
#Although the program is sturdier than its beta ancestors, I found 
#it unstable and unreliable. On one computer it wouldn't load 
#properly; on another it behaved erratically through the company 
#firewall and offered no easily accessible options that I could 
#tweak to make it perform better.
#
#Disappointing, but not fatal. Groove, or something like it, is 
#definitely the wave of the future: Freeing up employees to set 
#up their own peer groups without cluttering the corporate Intranet 
#makes sense. Pharmaceutical company GlaxoSmithKline, for one, 
#agrees: Last week it bought 10,000 licenses for more than 100,000 
#employees world-wide, making it Groove Networks' first paying 
#customer.
#
#GoToMyPC, meanwhile, tackles a similar problem from a slightly 
#different angle, and is a unilateral peer-to-peer system, rather 
#than the more common variety that lets anyone talk to anyone 
#else. Whether on the Net or not, users have been hamstrung by 
#the fact that generally they only can run one computer at a time. 
#Working from home? Chances are you only can access the office 
#network with difficulty. Forget a vital file at home? There are 
#only one or two programs available that allow you to access a 
#remote computer, and most of them aren't Internet-based. Instead, 
#these programs rely on actually dialing into the computer via 
#a phone line.
#
#GoToMyPC aims to make the process simpler by harnessing the 
#Internet to link computers. It sounds simple, and it is: Assuming 
#the two computers are connected to the Internet (and most office 
#computers permanently are hooked up, as are PCs on a cable modem 
#or other high-speed Internet connection), the software merely 
#links them together. It establishes 

Epilogue: U.S. v. Jim Bell trial in federal court in Tacoma

2001-04-16 Thread Declan McCullagh

Four articles are excerpted below:
  Wired News on government's motion to seal public court records
  Sierra Times: "IRS Prosecutes Outspoken Dissident"
  About.com: "Jim Bell's show trial"
  Cluebot.com on how government surveillance killed the cypherpunks list

-Declan

***

http://www.wired.com/news/politics/0,1283,43064,00.html

   The U.S. government wants to seal public court records in a trial of
   an Internet essayist for privacy reasons.
   
   Assistant U.S. Attorney Robb London this week asked a federal judge to
   seal all documents -- including exhibits and transcripts -- that might
   include personal information and home addresses about people who
   testified in the trial of Jim Bell. A jury found Bell guilty of two
   counts of interstate stalking.
   
   London said: "We are concerned that information in these exhibits not
   be published... (We) don't need to have that information posted on the
   Internet."
   
   While the charges are crucial to understanding the case against Bell,
   the government feels uneasy about the home addresses of federal agents
   being easily accessible to the public. London cited the addresses of
   agents dozens of times in open court, and displayed digital
   photographs of the homes Bell visited.
   
   U.S. District Judge Jack Tanner thought about London's request for a
   moment, then denied it. "I don't think I have the authority to do
   that," Tanner said.

   [The meaning was changed slightly in editing. The fourth paragraph
   should be "addresses of people Bell *believed* to be federal agents
   but were not. One was, for instance, a real estate agent. --DBM]

***

http://www.sierratimes.com/archive/files/apr/13/arst041301.htm

   IRS Prosecutes Outspoken Dissident 
   SierraTimes 04.13.00
  
   James Dalton Bell may remind you of somebody you know. He's very
   bright, dresses and looks like a nerd and,
   most importantly, he dislikes the IRS. In that last respect, he is not
   in a minority.
   
   Where Jim Bell does fall into a minority is that instead of merely
   grumbling quietly, he decided to do something
   about it. And that's why he was just convicted in the Washington
   Federal District Court in Tacoma on Tuesday
   [4/10/2001].
  
   Jim Bell has been a lifelong libertarian, ever since he was a
   teenager. Bell's view of government was that it was unnecessary. Is he
   an anarchist? Only, as he puts it, in the sense of "I believe in
   order; I do not believe in orders." He disparaged the huge hierarchies
   that have evolved in current bureaucracies, and believed that such
   hierarchies were unresponsive and dehumanizing. And, as Bell would
   personally learn, such a hierarchy creates two classes as outlined in
   George Orwell's Animal Farm: those who are part of the government
   hierarchy, and those who are not.

   [...]
  
   Bell, in his defense, stated that he had signed the LP oath that he
   would not initiate violence. And there was absolutely no direct
   evidence that he had ever initiated violence against anyone. People
   that he had come in contact with in his 2000 investigation
   characterized him as polite, and did not see him as threat. And Bell
   had obviously taken no discernible steps that would equip him to
   initiate violence.
  
   So what the government was left with was prosecuting a thought crime:
   intent. Because Bell had used his freedom of political speech to write
   such items as "Assassination Politics" and disclose IRS agents' home
   addresses, he obviously had to have the intent to harass federal
   agents. And the harassment was loosely construed. Any attempt to find
   or disclose any personal information about an agent can be made to fit
   federal law against "intention to harass or injure" an agent.
  
   Several times during the trial, the prosecutor made it clear that such
   an investigation was inappropriate and illegal merely on the basis
   that the subjects of such investigation were federal agents. Numerous
   times he cited the special privilege that agents hold that ordinary
   citizens don't possess. Federal agents are, indeed, a breed apart and
   must be specially protected, he insisted. While they could surveil and
   investigate ordinary citizens, it was illegal for ordinary citizens to
   do the same to them.

   [...]

***

http://civilliberty.about.com/newsissues/civilliberty/library/weekly/aa041101a.htm

   Jim Bell's show trial
   Cypherpunk Jim Bell was found guilty of making the feds nervous
   Dateline: 4/11/01
   
   Jim Bell has been probed, raided and arrested. He spent time in prison
   for "obstructing" Internal Revenue Service agents and using a false
   Social Security number. Now Bell has been convicted for get this
   stalking government 

DoD's Counterdrug Technology Office Launches Biometrics Catalog

2001-04-16 Thread Matthew Gaylor

NATIONAL INSTITUTE OF JUSTICE (NIJ)

Biometrics Catalog Online

NIJ has teamed with the U.S. Department of Defense's Counterdrug 
Technology Development Program Office to launch the online Biometrics 
Catalog. Biometrics consist of automated methods for recognizing a 
person based on physiological or behavioral characteristics such as 
fingerprints, voice patterns, facial recognition, etc.

The catalog provides a single location to find information about 
biometric technologies and allows the Biometrics community to share 
information about commercial products, development efforts, and 
government evaluations. To visit the Biometrics Catalog online, 
please go to the following:

http://www.biometricscatalog.org/

You can search in the following categories: Fingerprint, hand 
geometry, eye-retinal, eye-iris, facial recognition, speaker, dynamic 
signature, multiple biometric, and other types.

I did a sample search on facial recognition and commercially 
available products and got these hits.

BioANTS-Face 4/3/01
FaceIt  7/28/00
FaceMail4/2/01
FaceVACS3/30/01
HNeT Acsys FRS...4/2/01
MindsEye 4/5/01
President 4/2/01

Here's the info for the "President" package:

Modified: 4/2/01 9:01:00 PM
Category: Commercially Available Products
Biometric Type: Facial Recognition
Vendor: Biometrica
Title: President
Description: Biometrica Systems, Inc. supplies facial recognition 
technology to casinos worldwide. In addition, their software is used 
by law enforcement and other surveillance departments worldwide.
Additional References Related sites: Biometrica Systems, Inc. 
http://www.biometrica.com

Now I'm just going to have to make sure I remember to invest in those 
theatrical mask companies...Or I could just celebrate Halloween all 
year long.

Regards,  Matt-


**
Subscribe to Freematt's Alerts: Pro-Individual Rights Issues
Send a blank message to: [EMAIL PROTECTED] with the words subscribe FA
on the subject line. List is private and moderated (7-30 messages per week)
Matthew Gaylor, 2175 Bayfield Drive, Columbus, OH 43229
(614) 313-5722  ICQ: 106212065   Archived at http://groups.yahoo.com/group/fa/
**




Re: Starium?

2001-04-16 Thread Dr. Evil


Peter,

Thanks for the tip on that.  I'll be looking out for it, although at
that price, it's cheaper to buy a dedicated PC and run SpeakFreely, as
you point out.

Linux PDAs with good sound chips are just around the corner,
apparently, and it seems that it shouldn't be too big a feat to get
SpeakFreely or something similar running on them.  These PDAs are a
lot cheaper than the dedicated encryption hardware, such as Starium,
which was going to price at around $500, last I heard.  Also, because
everything in the PDA is open source, it would be easier to trust it.
Maybe when I have time and money to do it, and the PDAs with the
necessary hardware are really shipping, I'll do some project like
this.  Basically, all it needs would be a full-duplex sound chip, and
a built-in modem, and a reasonably fast CPU.

It's just a shame that we have encryption all over the place, except
for the one medium which we probably use the most: voice.




Re: hello, I would like to learn how to hack a bit

2001-04-16 Thread Daniel J. Boone

It's very simple.

Go to a military surplus store or your local Wall-Mart and buy a machete.  If
you buy a surplus one, you may want to sharpen it and polish the rusty blade,
although this step is not essential because one may hack quite noisily and
dramatically with a rusty dull machete.

Go out in your back yard and find some brush or small trees.  (Bamboo works
well but may not be available in your area.)

Hack away -- it's that simple!

Disclaimer:  In many states, if you hack at decorative trees or shrubs that do
not belong to you, you may be liable for a sum in damages equal to thrice the
actual value of the vegetation destroyed.

-- Daniel

- Original Message -
From: roland [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Monday, April 16, 2001 5:02 AM
Subject: CDR: hello, I would like to learn how to hack a bit


 but I'm not verry good jet,
 can u tell me how
 pls answer me quick






RE: Starium?

2001-04-16 Thread Trei, Peter

Here it is

http://www.L-3Com.com/cs-east/programs/infosec/privatel.htm

3DES, 1024 bit D-H, TEMPEST compliant. Handles both voice
and data.

 --
 From: Trei, Peter
 Reply To: Trei, Peter
 Sent: Monday, April 16, 2001 1:35 PM
 To:   Dr. Evil; 'Declan McCullagh'
 Cc:   [EMAIL PROTECTED]
 Subject:  RE: Starium?
 
 At the RSA conference I saw a company selling Starium-equivalent
 units, both for voice and data encryption. The voice only units were
 about $1400 apiece. (frankly, at that price, you could plug a PC
 with an A/D converter card between the handset and the base, and
 roll your own). 
 
 I'm still decompressing, and have not unpacked all my bumph, else
 I'd have more specific data.
 
 Peter Trei
 
  --
  From:   Declan McCullagh[SMTP:[EMAIL PROTECTED]]
  Reply To:   Declan McCullagh
  Sent:   Sunday, April 15, 2001 1:46 PM
  To: Dr. Evil
  Cc: [EMAIL PROTECTED]
  Subject:Re: Starium?
  
  I have a pair of their preproduction units they sent me in December.
  --Declan
  
  
  On Sun, Apr 15, 2001 at 02:01:10AM -, Dr. Evil wrote:
   Does anyone know if Starium is ever going to release anything?  I
   noticed on their News section that they have engaged an MA
   specialist.  That's probably not a good sign for them operating as a
   stand-alone company.  email to them bounces.