Re: How to Stop Junk E-Mail: Charge for the Stamp

2005-03-03 Thread ken
My view - as controversial as ever - is that the problem is unfixable, and mail will eventually fade away. That which will take its place is p2p / IM / chat / SMS based. Which are easier to spam and less secure than smtp. SMTP is p2p by definition, though you can use servers if you want. SMS

FYI: paper about Metcalfe's Law

2005-03-03 Thread R.A. Hettinga
--- begin forwarded text Date: Wed, 2 Mar 2005 23:20:58 -0600 (CST) From: Andrew Odlyzko [EMAIL PROTECTED] To: Andrew Odlyzko [EMAIL PROTECTED] Subject: FYI: paper about Metcalfe's Law Dear Colleagues, Sorry for the spam, but I thought you might be interested in the paper described below.

Reinventing Enterprise Learning

2005-03-03 Thread KMSI
Title: Reinventing Enterprise Learning Reinventing Enterprise Learning E-Learning Return On Investment (ROI) Web Seminar SeriesDear subscriber,One of the greatest challenges in achieving and sustaining the vision of enterprise learning is not to have individuals working expeditiously

Undelivered mail

2005-03-03 Thread owner-LISTSERV
-- Error description: Error-For: NET-HAPPENINGS@LISTSERV.CLASSROOM.COM Error-Code: 3 Error-Text: No such list. Error-End: One error reported.

Re: I'll show you mine if you show me, er, mine

2005-03-03 Thread J.A. Terranson
On Thu, 24 Feb 2005, Peter Gutmann wrote: (Either this is a really bad idea or the details have been mangled by the Register). No, it's just a really bad idea. A small group of us looked at this a few weeks ago when it was announced, and while none of us are professional cryptographers, we

Re: How to Stop Junk E-Mail: Charge for the Stamp

2005-03-03 Thread Justin
On 2005-03-03T11:52:59+, ken wrote: Chat is already higher volume (I read somewhere) in raw quantity of messages sent than email. I suspect you don't get much traffic. The beauty of a non-real-time store-and-forward system like smtp (or SMS, or oldstyle conferencing systems with

Build your TV!

2005-03-03 Thread R.A. Hettinga
http://www.sfbg.com/39/22/cover_fcc.html San Francisco Bay Guardian News THE SAN FRANCISCO BAY Mar. 2 - Mar. 8, 2005* Vol. 39, No. 22 Build your TV! As the FCC and the entertainment biz get ready to end home recording as we know it, a bunch of radical geeks are working on a solution or two.

Re: I'll show you mine if you show me, er, mine

2005-03-03 Thread Jerrold Leichter
| Briefly, it works like this: point A transmits an encrypted message to point | B. Point B can decrypt this, if it knows the password. The decrypted text is | then sent back to point A, which can verify the decryption, and confirm that | point B really does know point A's password. Point A then

With Terror in Mind, a Formulaic Way to Parse Sentences

2005-03-03 Thread R.A. Hettinga
http://www.nytimes.com/2005/03/03/technology/circuits/03next.html?8cir=pagewanted=printposition= The New York Times March 3, 2005 WHAT'S NEXT With Terror in Mind, a Formulaic Way to Parse Sentences By NOAH SHACHTMAN MAYBE sixth-grade English was more helpful than you thought. One of the

bounty for errors in _Translucent Databases_

2005-03-03 Thread R.A. Hettinga
--- begin forwarded text To: R.A.Hettinga [EMAIL PROTECTED] From: Peter Wayner [EMAIL PROTECTED] Subject: bounty for errors in _Translucent Databases_ Date: Thu, 3 Mar 2005 16:05:44 -0500 To: All readers of Translucent Databases. I'm starting work on the second edition of _Translucent

Re: I'll show you mine if you show me, er, mine

2005-03-03 Thread Dan Kaminsky
The description has virtually nothing to do with the actual algorithm proposed. Follow the link in the article - http://www.stealth-attacks.info/ - for an actual - if informal - description. There is no actual description publically available (there are three completely different protocols

RE: I'll show you mine if you show me, er, mine

2005-03-03 Thread Whyte, William
I haven't read the original paper, and I have a great deal of respect for Markus Jakobsson. However, techniques that establish that the parties share a weak secret without leaking that secret have been around for years -- Bellovin and Merritt's DH-EKE, David Jablon's SPEKE. And they don't require

The coming crackdown on blogging

2005-03-03 Thread R.A. Hettinga
http://news.com.com/2102-1028_3-5597079.html?tag=st.util.print CNET News http://www.news.com/ The coming crackdown on blogging By Declan McCullagh Story last modified Thu Mar 03 04:00:00 PST 2005 Bradley Smith says that the freewheeling days of political blogging and online

Re: How to Stop Junk E-Mail: Charge for the Stamp

2005-03-03 Thread ken
My view - as controversial as ever - is that the problem is unfixable, and mail will eventually fade away. That which will take its place is p2p / IM / chat / SMS based. Which are easier to spam and less secure than smtp. SMTP is p2p by definition, though you can use servers if you want. SMS

Re: How to Stop Junk E-Mail: Charge for the Stamp

2005-03-03 Thread Justin
On 2005-03-03T11:52:59+, ken wrote: Chat is already higher volume (I read somewhere) in raw quantity of messages sent than email. I suspect you don't get much traffic. The beauty of a non-real-time store-and-forward system like smtp (or SMS, or oldstyle conferencing systems with

Re: I'll show you mine if you show me, er, mine

2005-03-03 Thread J.A. Terranson
On Thu, 24 Feb 2005, Peter Gutmann wrote: (Either this is a really bad idea or the details have been mangled by the Register). No, it's just a really bad idea. A small group of us looked at this a few weeks ago when it was announced, and while none of us are professional cryptographers, we

Re: I'll show you mine if you show me, er, mine

2005-03-03 Thread Dan Kaminsky
The description has virtually nothing to do with the actual algorithm proposed. Follow the link in the article - http://www.stealth-attacks.info/ - for an actual - if informal - description. There is no actual description publically available (there are three completely different protocols

Re: I'll show you mine if you show me, er, mine

2005-03-03 Thread Jerrold Leichter
| Briefly, it works like this: point A transmits an encrypted message to point | B. Point B can decrypt this, if it knows the password. The decrypted text is | then sent back to point A, which can verify the decryption, and confirm that | point B really does know point A's password. Point A then