Keysigning Party, Simi Valley, CA, USA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 LUG-Fest (Linux User's Group Festival) an expo style event for Linux users in the bay area is going to hold a large keysigning party. If any cypherpunks are interested in attending here is the relevant information: LUG Fest April 21-22, 2001 at Nortel Networks, Simi Valley, CA, USA! Keysigning Party Press Release: http://www.lugfest.org/gpg.cgi "Sunday, April 22nd, 2001, 12:30 p.m, the Simi Valley Linux Users group will hold a GPG/PGP Key signing party during LUGFest IV. LUGFest IV will be held at Nortel Networks in Simi Valley, CA. The LUGFest and the key signing party are open to the public, all are welcome to attend." The lugfest press release links to the GnuPG Keysigning Party HOWTO, which I wrote. Constructive criticism of that document is appreciated. I posted in here once before for review and got some good feed back. It lives at: http://www.cryptnet.net/fdp/crypto/gpg-party.html I've been trying to get LUGs (linux user groups) around the country to start holding regular keysigning parties in the last 5 minutes of their meetings. LUGs exist in every major metro area in the US and meet regularly. They are capable a providing an excellent backbone (infrastructure support) for a strong nation wide web of trust. Local webs of trust formed by lugs can be linked at conferences like LUG-Fest. I strongly urge everyone who can to participate in the LUG-Fest party, and to thank LUG-Fest for holding it. Also, if you are a member of your local LUG, I urge you to help it establish a keysigning tradition and a strong web of trust. Thanks, - VAB -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.4 (GNU/Linux) Comment: Made with pgp4pine 1.75-6 iD8DBQE62vWt+pIJc5kqSz8RArvHAJ4+nN/IBDjWIpEUWoU61m3Eo3NzuwCeJGcg 6DiqV+fs2HWcE5oxmrtxbfc= =bCzD -END PGP SIGNATURE-
Re: hello, I would like to learn how to hack a bit
Certainly. Head down to the local hardware store and buy yourself a very large axe. Now find something you want to hack, lift the axe over your head, and bring it down edge first. You may need to hack three or four times before you break all the way through. It's easy once you get the hang of it. Bear On Mon, 16 Apr 2001, roland wrote: but I'm not verry good jet, can u tell me how pls answer me quick
Misc p2p article
Also, today's NYT has an article about national security needs for more language experts. http://interactive.wsj.com/articles/SB987356381635082061.htm # #April 16, 2001 # #Asian Technology # #Two New Peer-to-Peer Programs Aim High, but Still Have Glitches # #By JEREMY WAGSTAFF Staff Reporter of THE WALL STREET JOURNAL # #Time to grovel. I was hoping this week to be able to trumpet #a bunch of new programs that free you from some of the physical #constraints of modern computing. I was hoping to be able to say #that, at last, you were free of shackles such as overprotective #technical staff, the corporate Intranet and endless e-mail #attachments. # #But paradise, I'm afraid to say, has to be postponed for a while. #The two programs I've been toying with, new versions of which #were both released last week, are Groove Networks Inc.'s Groove #(www.groove.net1 ) and GoToMyPC (www.gotomypc.com2 ) from #Expertcity Inc. # #Groove is the first serious attempt to introduce peer-to-peer #computing to the business marketplace, giving employees a chance #to communicate and share files by setting up their own online #work groups. GoToMyPC offers the first Web-based -- and legal #-- method of accessing and controlling another computer. Both, #in theory, are great ideas, elegant in their simplicity and #genuinely useful. But neither worked perfectly. # #Peer-to-peer computing -- where multiple users can interact #directly, rather than through a server -- is probably the next #great thing for the Internet. Best known as a way to swap music #over the Net via Napster, so-called P-to-P applications allow #much more, such as letting users share files, messages or #calendars, or collaborate in real time on a document or drawing. # #As I've mentioned before, the Web will start coming into its #own once people stop obsessing about how to make money out of #other users and start capitalizing on the intrinsic benefits #of having millions of people all sharing a network. # #Peer-to-peer computing offers users the chance to set up their #own personalized networks atop the public Web. Without these #P-to-P systems, people have to use a number of imperfect #alternatives. For instance, users can rely on their Internet- #service providers to provide the tools (but they may be held #hostage to proprietary programs or HTML); or use corporate #networks (jealously guarded by techies rightly afraid of viruses #and other abuses); or shuffle e-mail messages among team members #(a cumbersome process). # #In practice, Groove isn't quite mature yet. The preview edition #looks and feels professional, and carries loads of useful #features, including instant messaging, file sharing, even a #doodling pad. It also supposedly works behind a firewall, and #around problems such as connecting to computers that share the #same Internet connection. # #Although the program is sturdier than its beta ancestors, I found #it unstable and unreliable. On one computer it wouldn't load #properly; on another it behaved erratically through the company #firewall and offered no easily accessible options that I could #tweak to make it perform better. # #Disappointing, but not fatal. Groove, or something like it, is #definitely the wave of the future: Freeing up employees to set #up their own peer groups without cluttering the corporate Intranet #makes sense. Pharmaceutical company GlaxoSmithKline, for one, #agrees: Last week it bought 10,000 licenses for more than 100,000 #employees world-wide, making it Groove Networks' first paying #customer. # #GoToMyPC, meanwhile, tackles a similar problem from a slightly #different angle, and is a unilateral peer-to-peer system, rather #than the more common variety that lets anyone talk to anyone #else. Whether on the Net or not, users have been hamstrung by #the fact that generally they only can run one computer at a time. #Working from home? Chances are you only can access the office #network with difficulty. Forget a vital file at home? There are #only one or two programs available that allow you to access a #remote computer, and most of them aren't Internet-based. Instead, #these programs rely on actually dialing into the computer via #a phone line. # #GoToMyPC aims to make the process simpler by harnessing the #Internet to link computers. It sounds simple, and it is: Assuming #the two computers are connected to the Internet (and most office #computers permanently are hooked up, as are PCs on a cable modem #or other high-speed Internet connection), the software merely #links them together. It establishes
Epilogue: U.S. v. Jim Bell trial in federal court in Tacoma
Four articles are excerpted below: Wired News on government's motion to seal public court records Sierra Times: "IRS Prosecutes Outspoken Dissident" About.com: "Jim Bell's show trial" Cluebot.com on how government surveillance killed the cypherpunks list -Declan *** http://www.wired.com/news/politics/0,1283,43064,00.html The U.S. government wants to seal public court records in a trial of an Internet essayist for privacy reasons. Assistant U.S. Attorney Robb London this week asked a federal judge to seal all documents -- including exhibits and transcripts -- that might include personal information and home addresses about people who testified in the trial of Jim Bell. A jury found Bell guilty of two counts of interstate stalking. London said: "We are concerned that information in these exhibits not be published... (We) don't need to have that information posted on the Internet." While the charges are crucial to understanding the case against Bell, the government feels uneasy about the home addresses of federal agents being easily accessible to the public. London cited the addresses of agents dozens of times in open court, and displayed digital photographs of the homes Bell visited. U.S. District Judge Jack Tanner thought about London's request for a moment, then denied it. "I don't think I have the authority to do that," Tanner said. [The meaning was changed slightly in editing. The fourth paragraph should be "addresses of people Bell *believed* to be federal agents but were not. One was, for instance, a real estate agent. --DBM] *** http://www.sierratimes.com/archive/files/apr/13/arst041301.htm IRS Prosecutes Outspoken Dissident SierraTimes 04.13.00 James Dalton Bell may remind you of somebody you know. He's very bright, dresses and looks like a nerd and, most importantly, he dislikes the IRS. In that last respect, he is not in a minority. Where Jim Bell does fall into a minority is that instead of merely grumbling quietly, he decided to do something about it. And that's why he was just convicted in the Washington Federal District Court in Tacoma on Tuesday [4/10/2001]. Jim Bell has been a lifelong libertarian, ever since he was a teenager. Bell's view of government was that it was unnecessary. Is he an anarchist? Only, as he puts it, in the sense of "I believe in order; I do not believe in orders." He disparaged the huge hierarchies that have evolved in current bureaucracies, and believed that such hierarchies were unresponsive and dehumanizing. And, as Bell would personally learn, such a hierarchy creates two classes as outlined in George Orwell's Animal Farm: those who are part of the government hierarchy, and those who are not. [...] Bell, in his defense, stated that he had signed the LP oath that he would not initiate violence. And there was absolutely no direct evidence that he had ever initiated violence against anyone. People that he had come in contact with in his 2000 investigation characterized him as polite, and did not see him as threat. And Bell had obviously taken no discernible steps that would equip him to initiate violence. So what the government was left with was prosecuting a thought crime: intent. Because Bell had used his freedom of political speech to write such items as "Assassination Politics" and disclose IRS agents' home addresses, he obviously had to have the intent to harass federal agents. And the harassment was loosely construed. Any attempt to find or disclose any personal information about an agent can be made to fit federal law against "intention to harass or injure" an agent. Several times during the trial, the prosecutor made it clear that such an investigation was inappropriate and illegal merely on the basis that the subjects of such investigation were federal agents. Numerous times he cited the special privilege that agents hold that ordinary citizens don't possess. Federal agents are, indeed, a breed apart and must be specially protected, he insisted. While they could surveil and investigate ordinary citizens, it was illegal for ordinary citizens to do the same to them. [...] *** http://civilliberty.about.com/newsissues/civilliberty/library/weekly/aa041101a.htm Jim Bell's show trial Cypherpunk Jim Bell was found guilty of making the feds nervous Dateline: 4/11/01 Jim Bell has been probed, raided and arrested. He spent time in prison for "obstructing" Internal Revenue Service agents and using a false Social Security number. Now Bell has been convicted for get this stalking government
DoD's Counterdrug Technology Office Launches Biometrics Catalog
NATIONAL INSTITUTE OF JUSTICE (NIJ) Biometrics Catalog Online NIJ has teamed with the U.S. Department of Defense's Counterdrug Technology Development Program Office to launch the online Biometrics Catalog. Biometrics consist of automated methods for recognizing a person based on physiological or behavioral characteristics such as fingerprints, voice patterns, facial recognition, etc. The catalog provides a single location to find information about biometric technologies and allows the Biometrics community to share information about commercial products, development efforts, and government evaluations. To visit the Biometrics Catalog online, please go to the following: http://www.biometricscatalog.org/ You can search in the following categories: Fingerprint, hand geometry, eye-retinal, eye-iris, facial recognition, speaker, dynamic signature, multiple biometric, and other types. I did a sample search on facial recognition and commercially available products and got these hits. BioANTS-Face 4/3/01 FaceIt 7/28/00 FaceMail4/2/01 FaceVACS3/30/01 HNeT Acsys FRS...4/2/01 MindsEye 4/5/01 President 4/2/01 Here's the info for the "President" package: Modified: 4/2/01 9:01:00 PM Category: Commercially Available Products Biometric Type: Facial Recognition Vendor: Biometrica Title: President Description: Biometrica Systems, Inc. supplies facial recognition technology to casinos worldwide. In addition, their software is used by law enforcement and other surveillance departments worldwide. Additional References Related sites: Biometrica Systems, Inc. http://www.biometrica.com Now I'm just going to have to make sure I remember to invest in those theatrical mask companies...Or I could just celebrate Halloween all year long. Regards, Matt- ** Subscribe to Freematt's Alerts: Pro-Individual Rights Issues Send a blank message to: [EMAIL PROTECTED] with the words subscribe FA on the subject line. List is private and moderated (7-30 messages per week) Matthew Gaylor, 2175 Bayfield Drive, Columbus, OH 43229 (614) 313-5722 ICQ: 106212065 Archived at http://groups.yahoo.com/group/fa/ **
Re: Starium?
Peter, Thanks for the tip on that. I'll be looking out for it, although at that price, it's cheaper to buy a dedicated PC and run SpeakFreely, as you point out. Linux PDAs with good sound chips are just around the corner, apparently, and it seems that it shouldn't be too big a feat to get SpeakFreely or something similar running on them. These PDAs are a lot cheaper than the dedicated encryption hardware, such as Starium, which was going to price at around $500, last I heard. Also, because everything in the PDA is open source, it would be easier to trust it. Maybe when I have time and money to do it, and the PDAs with the necessary hardware are really shipping, I'll do some project like this. Basically, all it needs would be a full-duplex sound chip, and a built-in modem, and a reasonably fast CPU. It's just a shame that we have encryption all over the place, except for the one medium which we probably use the most: voice.
Re: hello, I would like to learn how to hack a bit
It's very simple. Go to a military surplus store or your local Wall-Mart and buy a machete. If you buy a surplus one, you may want to sharpen it and polish the rusty blade, although this step is not essential because one may hack quite noisily and dramatically with a rusty dull machete. Go out in your back yard and find some brush or small trees. (Bamboo works well but may not be available in your area.) Hack away -- it's that simple! Disclaimer: In many states, if you hack at decorative trees or shrubs that do not belong to you, you may be liable for a sum in damages equal to thrice the actual value of the vegetation destroyed. -- Daniel - Original Message - From: roland [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Monday, April 16, 2001 5:02 AM Subject: CDR: hello, I would like to learn how to hack a bit but I'm not verry good jet, can u tell me how pls answer me quick
RE: Starium?
Here it is http://www.L-3Com.com/cs-east/programs/infosec/privatel.htm 3DES, 1024 bit D-H, TEMPEST compliant. Handles both voice and data. -- From: Trei, Peter Reply To: Trei, Peter Sent: Monday, April 16, 2001 1:35 PM To: Dr. Evil; 'Declan McCullagh' Cc: [EMAIL PROTECTED] Subject: RE: Starium? At the RSA conference I saw a company selling Starium-equivalent units, both for voice and data encryption. The voice only units were about $1400 apiece. (frankly, at that price, you could plug a PC with an A/D converter card between the handset and the base, and roll your own). I'm still decompressing, and have not unpacked all my bumph, else I'd have more specific data. Peter Trei -- From: Declan McCullagh[SMTP:[EMAIL PROTECTED]] Reply To: Declan McCullagh Sent: Sunday, April 15, 2001 1:46 PM To: Dr. Evil Cc: [EMAIL PROTECTED] Subject:Re: Starium? I have a pair of their preproduction units they sent me in December. --Declan On Sun, Apr 15, 2001 at 02:01:10AM -, Dr. Evil wrote: Does anyone know if Starium is ever going to release anything? I noticed on their News section that they have engaged an MA specialist. That's probably not a good sign for them operating as a stand-alone company. email to them bounces.