On Sat, 25 Aug 2001, Gary Jeffers wrote:
My fellow Cypherpunks,
Ray Dillinger believes that scanning would assist oppressors as
much as regular users. Joseph Ashwood agrees with this and further
thinks that the Internet overhead of a scanner would be a serious
problem.
Not really
On Sat, 25 Aug 2001, John Young wrote:
See 9-page judgment in TIF format:
http://cryptome.org/jdb-hit.tif (262KB)
In addition to 10 years Jim was also fined $10,000 due
immediately and faces three years of probation. No
computer use and a long list of other prohibitions
including no
On Sat, 18 Aug -1 [EMAIL PROTECTED] wrote:
Will someone publish the home address of the prosecuting attorney and judge issuing
the warrant?
There are serious risks in doing so. Having such a post linked
to your meatspace identity could result in persecution - and
most likely eventually
On Wed, 15 Aug 2001, Jim Choate wrote:
On Thu, 16 Aug 2001, Sampo Syreeni wrote:
Maybe, maybe not. I'm the first to agree that porn *should* be treated as
equal to other speech,
But 'porn' is no more speech than 'murder' is. What makes porn so
offensive isn't the pictures, but the ACTS
On Wed, 15 Aug 2001, Jim Choate wrote:
The desire to get the 'speech' is what drives the act. To address one and
ignore the other is simply not reasonable. The images should be taken as
evidence of the act and then destroyed. They should not in and of
themselves be left in circulation to
On Tue, 14 Aug 2001, Declan McCullagh wrote:
- Forwarded message from Declan McCullagh [EMAIL PROTECTED] -
In addition, of course, organized crime groups use the Internet for
communications (usually encrypted) and for any other purposes when
they see it as useful and profitable. Indeed,
On Mon, 13 Aug 2001, Black Unicorn wrote:
Do I think that software should have products liability attached to it? No.
Do I think strict liability stifles innovation? No.
I would actually like to make a smaller point here. Broadly I
agree with BU, but I'd like to analyze it a little.
If
On Tue, 7 Aug 2001, Tim May wrote:
(I'm surprised no one has urged me to use Lynx. Is it still being used?)
Some of us still use it, but we tend not to recommend it to
anyone - it has become fairly obscure and, to be honest, lots
of webpages suck pretty hard when viewed through lynx. I
find
On Tue, 7 Aug 2001, Tim May wrote:
( I expect 98% of the readers here have no idea what a Symbolics is or
was.)
Heh. I would cheerfully commit a felony or two to get my hands
on a Symbolics Ivory chip fabbed using modern technology and running
at a GHz or so. When I was a student, we had
On Tue, 7 Aug 2001, Tim May wrote:
To all who have contributed ideas about turning off Java, blah blah, l
wasn't really _complaining_ about my personal situation. I was noting
the bizarre world of online advertising in which the right third of a
page is filled with ads, the top third is
On Wed, 8 Aug 2001, Tim May wrote:
(Ads could be tied-in to the content, with some light crypto or copright
protection. A circumvention of this liight crypto could be a DMCA
violation. I would not be surprised to see this already impicated in the
DVD cases: that 5 minute period of trailors
On Mon, 6 Aug 2001, Tim May wrote:
Just a note about what's happening with Web advertising.
Went to a site, www.imdb.com, to check something about a film. Up popped
a doubleclick.net ad. In front of the main page, obscuring it. I clicked
the close box. Up popped a _different_ ad. I clicked
On Mon, 6 Aug 2001 [EMAIL PROTECTED] wrote:
re: driving remops out of business
I'm quite aware of the attack. It's not guaranteed successful yet.
True. But it beats the snot out of guessing keys.
Offhand, I'd estimate that if three US remops were taken down
forcefully, and the federal law
On Mon, 6 Aug 2001, Jim Choate wrote:
On Mon, 6 Aug 2001, Ray Dillinger wrote:
Second, it pretty much means the US is going to have to withdraw
from the space treaty of 1965, which bans space weapons. This
latter is actually more interesting to me, because that treaty
also bans
On Mon, 6 Aug 2001, Jim Choate wrote:
Note the commentary about changing the budget to prevent other flags from
being planted...
http://www.harmonize.com/swdroundup/Apollo11.htm
Note the commentary that it was strictly a symbolic activity, as the
United Nations Treaty on Outer Space
On Thu, 2 Aug 2001, An Metet wrote:
Your complaints about free research suggest that you have the sense
that you are more valuable than or superior to other contributors.
He is not superior in any substantial way; however, his expertise
in law, combined with a willingness to actually discuss
On Fri, 3 Aug 2001, Jim Choate wrote:
But the only place they can trace messages in a 'small world' model is at
source/destination link, which means they're already on top of you. If
they're out fishing all they'd see is a bunch of packets sent between
remailers with the body encrypted
On Tue, 31 Jul 2001, Tim May wrote:
The critical point is that Congress is now in the business of
criminalizing mere speech. mere research. Whether one quibbles about
whether hackers understand the instructions on how to bypass crypto
protections, or whether bombz d00dz understand the
On Tue, 31 Jul 2001 [EMAIL PROTECTED] wrote:
If it's a crime to take actions specifically for the purpose of later
rendering you unable to comply with a judge's order (is it?),
how is escrowing it on the isle of man any different?
Oddly, I've been watching this one with some interest.
The
On Fri, 27 Jul 2001, David Honig wrote:
You can create an executable, with source code, package it up and
send it to the copyright owner with a note that says your protection
is broken: here's the proof.
How about dropping them a note to send an engineer to DefCon?
Not a problem -- as long
On Thu, 26 Jul 2001 [EMAIL PROTECTED] wrote:
Declan wrote:
#
# Yes, clearly I was wrong and this must be the real thing.
# I urge you to start an online campaign straightaway!
I'm stunned you think this is a joke.
You misspelled hoax. Think about
On Thu, 26 Jul 2001 [EMAIL PROTECTED] wrote:
--
The rear window had been smashed in when they whacked the cop with the four inch
steel pipe, or when they whacked the cop with the two by four timber. so there was no
problem with chucking it underhand and sideways. Plenty of room. One is
`(3) FACTORS IN DETERMINING EXEMPTION- In determining whether a person
qualifies for the exemption under paragraph (2), the factors to be
considered shall include--
`(A) whether the information derived from the encryption research was
disseminated, and if so, whether it was disseminated in a
Good point.
A Russian cryptographer was grabbed, unable to talk to his consulate
for at least three days, and the Russians don't say anything?
I smell a rat. Perhaps Dmitry was sold down the river.
(Note for non-USA readers: sold down the river is an americanism
for betrayal. It dates
On Tue, 24 Jul 2001 [EMAIL PROTECTED] wrote:
Does anyone have a link to this B form, or more exact data on it's
contents? It seems a little pointless to fill out a form saying that
Unknown person refused to ID for a transaction of $3000.00. This
suspect was 5'8 and 125#, brn hair, brn eyes and
On Mon, 23 Jul 2001, Petro wrote:
At 11:30 PM -0700 7/22/01, Ray Dillinger wrote:
On Sun, 22 Jul 2001, Sandy Sandfort wrote:
The pressures of commercial advertising--in the sense of mass media--have been
with us for as long as there has been mass media.
You either deal
On Sat, 21 Jul 2001, Sandy Sandfort wrote:
It should be obvious that these riots are not so much ideologically
motivated (though that's the pseudo-rational), but testosterone motivated.
Most of these monkeys couldn't spell anarchy let alone understand it
philosophically. Let's not confuse the
On Sat, 21 Jul 2001, Declan McCullagh wrote:
I'm sympathetic to the deceased's family. But it strikes me that if
you assault a police vehicle with armed cops inside with the evident
intent to do physical harm, you'd better be wearing a bulletproof vest.
On Sat, 21 Jul 2001, Morlock Elloi wrote:
So Adobe thugs will pour out of the building sprayng crowd with machine-gun
fire ? Corporate commandos will make arrests and cart them to software
sweatshops ?
What exactly peaceful banner-carrying demonstrators on the public grounds
should be afraid of
On Mon, 16 Jul 2001 [EMAIL PROTECTED] wrote:
Back to the original question: It's obvious that NAI is operating
under the belief that some ISPs are complying with some unspoken BXA
idea/wannabe-law and blocking encrypted messages from no-no
originating domains. Is this really the case, or is
On Thu, 12 Jul 2001 [EMAIL PROTECTED] wrote:
Um, what would the price premium be for a toilet that operates as a
stoolie? 10X? 20X? Don't hold your breath waiting for it to become a
standard.
The hell of it is, this provides a useful function. The only thing
that makes it invasive is that it
On Wed, 11 Jul 2001, Eugene Leitl wrote:
clip
L.A. May Be Shot Down in Bid to Tax Satellites
By Dan Whitcomb
clip
Auerbach insisted that he was not pushing for a tax on the satellites but
was simply doing his job and trying to determine whether they should be
taxed.
``I'm neutral on the
On Tue, 10 Jul 2001, Dynamite Bob wrote:
quoting someone who is not participating in this discussion
The property in question here is geostationary,
said Larry Hoenig, a San Francisco attorney
representing Hughes Electronics. Geostationary
satellites sit above the equator in a fixed
position;
On Tue, 10 Jul 2001, Jim Choate wrote:
Seems to me the only answer is to keep moving, don't settle in any one
country (or store your possessions in any one jurisdiction) for a lengthy
stay. A couple of years max.
Um, no. A couple of years would have been fine a decade ago, but
these days if
I turned on a television set last night, for the first time in many
months. I was watching videotapes, but I caught fragments of shows
while tapes were rewinding, etc.
American TV has taken a definite turn for the vicious since I last
watched. It's still pablum-and-opiates, but someone has
On Sat, 7 Jul 2001, Sampo Syreeni wrote:
the protection afforded by Black Blocs is quite thin (just indict them under
organized crime or gang laws),
The similar clothing is enough to charge with gang membership and invoke
RICO. Also, the 'black bloc' tactic has 'premeditated' written all
On Sun, 11 Mar 2001, A. Melon wrote:
Does anyone know the law regarding duplication of out of print
books/other works?
It's the same law as the law regarding duplication of in-print
books/other works. There are places and situations in which the
enforcement varies depending on whether it's
On Thu, 1 Mar 2001, An Metet wrote:
Suppose can-sats WERE launched illegally, and then started broadcasting
time synchronisation signals/OTP/other cypherpunk related signals,
along with a spoken commentary by Radio Free North America (so Joe
Sixpack has an excuse when those nice detector van
On Sat, 13 Jan 2001, dmolnar wrote:
1) To post a message, sender S takes a 2-dollar coin and then
uses some kind of verifiable secret sharing protocol to split it
into shares.
snip
4) If a group agent thinks the message is spam, it sends its
share to
ike it if somebody has figured out a way for a
group to form consensus and act on that consensus as though
it were a single individual -- capable of participating in
general protocols.
But individual solutions to problems like the above would
be a great start.
Bear
On Mon, 8 Jan 2001, Phillip Zakas wrote:
Just a minor correction to the below posting: cell phone locations are NOT
calculated using GPS. They're triangulated via the three nearest cell sites
reading the cell phone signal. Accuracy is much lower than with GPS, but
good enough for cops to,
in the xmit circuitry when the battery is
plugged in and the power is turned off. Of course I'm having trouble
putting the case back on the phone correctly but I'll figure that out later
;)
phillip zakas
-Original Message-
X-Loop: openpgp.net
From: Ray Dillinger [mailto:[EMAIL PROTECTED]]
Sent
On Mon, 8 Jan 2001, David Honig wrote:
At 08:17 AM 1/8/01 -0500, Ken Brown wrote:
and there are very few opportunities for real misunderstanding. We know
The meaning of 'billion' differs by three orders of magnitude
across the pond. That's plenty of room for confusion :-)
And in the US,
On Mon, 8 Jan 2001, Tim May wrote:
Ray, you seem knowledgeable in some areas. But your pontifications on
California basements, cellphone GPS, etc., are very "Choatean" in
nature. Something you might want to look at.
You can trust anything I say about Math or Programming (especially
AI and
On Wed, 15 Nov 2000 [EMAIL PROTECTED] wrote:
US Citizenship is required, as is successful completion of a medical evaluation,
polygraph interview and an extensive background investigation.
A "medical evaluation"??
http://www.odci.gov/cia/employment/jobpostings/architectstud.htm
Pretty
On Wed, 1 Nov 2000, David Honig wrote:
Although its hazardous if done wrong [cf recent PGP problems], is
tarnished by the Fedz/Denning/etc, and might have no use in a personal
privacy tool (your diary dies with you), isn't it too dogmatic to rule out
key escrow for tools intended for use by
On Wed, 25 Oct 2000, David Honig wrote:
At 08:06 PM 10/24/00 -0400, Ray Dillinger wrote:
If nobody comes up with some filterware that works, then there will
probably be continuing pressure to regulate content.
Its called 'parenting' but most are too busy, so they ask the State, or
machines
On Thu, 19 Oct 2000, jim bell wrote:
Naturally, a chemical solution (pun not directly intended...but I'll take it
anyway) becomes apparent. If the ultimate motivation of the car siezures is
to sell them and keep the money, what would happen if somebody acquired a
few ounces or gallons of
On Wed, 11 Oct 2000, jim bell wrote:
A popular, but false, myth. The video cards radiate more than the CRT's.
Laptops tend to be the worst offenders.
--Lucky Green [EMAIL PROTECTED]
As to the video cards...
Sorry, Lucky, but you're going to have to support this a little better.
Emissions
On Wed, 11 Oct 2000, Arnold G. Reinhold wrote:
The fact that some people put Medeco's in glass doors, doesn't mean
Medeco should never develop a better lock.
I don't have a problem with people who manufacture locks.
I have a problem with the people who sell them.
A sign of irrational
On Fri, 6 Oct 2000, Tom Vogt wrote:
I'm currently thinking of whether or not it is feasable to put stego
data into EVERY .mp3 downloaded. just put random data into those not
intended to carry a message.
On Fri, 6 Oct 2000, Ray Dillinger wrote:
You're talking
about making the audio
On Fri, 6 Oct 2000, Tom Vogt wrote:
I'm currently thinking of whether or not it is feasable to put stego
data into EVERY .mp3 downloaded. just put random data into those not
intended to carry a message.
For the sake of us audiophiles, please don't. MP3 is tinny and flat
at best; it ticks
On Wed, 4 Oct 2000, Tom Vogt wrote:
same problem here: how do you find out whether or not a message is
encrypted?
Plaintext looks like plaintext. This isn't even a "real" problem,
once you look at the text produced by, eg, PGP, GPG, and whatever
else you allow on the system.
You don't
On Wed, 4 Oct 2000, Jim Choate wrote:
On Wed, 4 Oct 2000, Ray Dillinger wrote:
Plaintext looks like plaintext.
Yeah, if the only thing you right is simple English. Most of the planet
doesn't speak English and their plaintext doesn't necessarily look like
plaintext.
This is a xenophobic
On Tue, 3 Oct 2000, Kevin Elliott wrote:
A
cryptographically strong PRNG would then be a PRNG with a very large
period and some way of reinjecting randomness to guarantee the device
never begins to recycle.
--
Isn't that a misnomer though? If randomness is reinjected to
prevent the
On Tue, 3 Oct 2000, Kevin Elliott wrote:
Actually if you can pull that off you've got yourself a darn fine
real random number generator- any PRNG has to have some period after
which it will begin to recycle (assuming no other randomness in
introduced into the system), in which case you just
On Sun, 24 Sep 2000 [EMAIL PROTECTED] wrote:
Rival products include HushMail, ZixMail, Disappearing Inc. and Authentica.
I own Disappaering Inc. We have no such product and we have no
such product under development.
Ray Dillinger
t be exported, that would be a good sign.
Aside from that, I don't know the particulars of the encryption they
use - they claim to use a product cipher, but so far I haven't seen
what the components of the product cipher are, what the key lengths
are, how they do key management, etc etc etc
the owner of the domain name "disappearing-inc.com", which I have
not yet used.
This pisses me off now they'll probably try to evict me as
a cybersquatter.
Ray Dillinger
On Mon, 25 Sep 2000, Ray Dillinger wrote:
On Sun, 24 Sep 2000 [EMAIL PROTECTED] wr
server way back in April. It's scheduled to be installed
on October 3. Argh, Argh, Argh
Ray
On Mon, 25 Sep 2000, Ray Dillinger wrote:
Correction:
After a web search through USPTO, I find that there is another
company also named Disappearing Inc,
On Thu, 21 Sep 2000, Marcel Popescu wrote:
Would you mind writing a "tutorial for the beginner cryptanalist"?
Mark
Maybe in a year or so. Right now I'm working on a reference book on
cryptographic protocols, and it's looking like it's gonna take a pretty
major chunk of work.
Meanwhile,
On Tue, Sep 19, 2000 at 01:52:54AM -0400, Jodi Hoffman wrote:
And more from this "only TEENAGERS and adults" website...
MASSIVE SNIP
Ms. Hoffman, please stop posting this crap to the Cypherpunks
list. It won't help. It is damned insulting to everyone here
that you seem to expect us to
Hmmm. These devices could be useful, even without using
them as credit cards. I wonder if you could buy a batch
of them from the manufacturer with custom software installed?
It would sure be nice if I could make a physical key token
that would render my system completely useless if the
I'm of the opinion that an *attempted* crime should probably be
punished as a crime. The question is of action, knowledge, and
intent, rather than result.
I'm also of the opinion that people do not have the right to take
reasonably foreseeable risks with other people's lives or property,
Declan McCullagh wrote:
When it comes to maintaining the size of government or giving more
money to police, there is rarely gridlock. Look at the ever-increasing
FBI budgets, for instance.
This should be expected, actually; In the presence of strong
crypto and really good surveillence
65 matches
Mail list logo