At 12:13 AM 12/11/01 -0600, Jim Choate wrote:
No, I'm not. 'discrimination' requires(!) 'prejudice'. Prejudice is the
In Choate prime, perhaps. For the rest of us, measurement (e.g.,
the redness vs greenness of a fruit) lets us discriminate useful from not.
At 06:35 AM 12/11/01 -0600, Jim Choate wrote:
Dude, there are HUNDREDS of alternate GUI front-ends (the vast majority
are not compatible with X (aka MIT's Athens - there's your clue as to its
popularity). Unfortunately they don't get the technical backing to get a
significant 'bootstrap'
At 10:39 AM 12/12/01 -0500, Declan McCullagh wrote:
PS: Not all libertarians believe the the public responsibilities of
the press are a myth. It's entirely possible to reconcile that phrase
with the idea that a newspaper is a for-profit business.
I'm afraid the closest I can come is to
At 09:40 PM 12/13/01 -0600, Jim Choate wrote:
I don't have a problem with commerce per se. Capitalism I do have a
problem with, greed good.
Is the basic human drive to better one's circumstances bad, Jim?
At 06:56 PM 12/17/01 -0600, Jim Choate wrote:
On Mon, 17 Dec 2001, Trei, Peter wrote:
Yes, I have read the letter - they need to treat input from known remailers
differently due to worries over spam and flooding attacks, so they treat
other known remailers as priviliged sources of high
At 07:35 PM 12/17/01 -0800, Bill Stewart wrote:
ATM is Adobe Type Manager. Linotype is a big font house.
Intellectual Property laws for fonts are normally even stranger than for
regular material,
but if any of these are in Postscript, they're also programs,
so there may be DMCA issues, and
At 02:06 PM 12/18/01 -0800, John Young wrote:
Couple of things on that. The building, which was only
a few years old, is reported to have collapsed due to
high heat of oil storage tanks, a small tank on the upper
floor to serve NYC Emergency Operations, and an
unsually large tank in the basement.
At 12:04 PM 12/18/01 -0800, [EMAIL PROTECTED] wrote:
Interesting article. However, it appears that it's not the fonts themselves
that are copyrightable, but rather the code
that draws them. From the same article:
This is what I remembered (from this list BTW) and why I suggested that the
At 02:42 PM 12/18/01 -0800, Meyer Wolfsheim wrote:
On Tue, 18 Dec 2001, David Honig wrote:
Can't spam be repelled by not forwarding email not encrypted to
the remailer's key?
Who is to say that spammers won't use remailer clients that automatically
encrypt to the remailers' keys?
Yes
At 12:38 AM 12/19/01 +, Graham Lally wrote:
Ralph Wallis wrote:
On Monday, 17 Dec 2001 at 07:58, Michael Motyka [EMAIL PROTECTED] wrote:
Could someone who knows more than I do explain to me why this MS IP is
anything other than making the owner of a PC unable to have root access
to their
At 11:47 PM 12/18/01 -0800, Petro wrote:
That would be utterly pointless (no pun intended). The value of
Postscript is that it *isn't* a set of pixels.
No, it wouldn't be pointless. Postscript is not the only way
to print.
It is the equivalent of using a function that approximates the
At 09:30 PM 12/20/01 -, Dr. Evil wrote:
A token-based remailer system, while an obvious system, would be a
major accomplishment.
Any kind of privacy-enhanced token/payment/value system would be a
major accomplishment at this point. The c'punks have been in biz for
almost ten years now,
At 11:55 AM 12/23/01 -0800, Tim May wrote:
Being an old-timer, I like to say: In my day, we had to walk five miles
through the snow to get a cup of mud from the vending machine. Actually,
in my day at Intel we were lucky to have patty melts for lunch, as most
of us ate out of vending machines
At 11:49 PM 12/26/01 -, Dr. Evil wrote:
effective against drug smuggling. The risk is very real; a woman
could carry several pounds of explosives. They are aware of this
but there isn't much they can do right now.
No one has yet mentioned surgically implanted explosives.
You could carry
At 09:53 PM 12/27/01 -0800, John Young wrote:
Targets for centers of these exports are not hard to
identify,
After the WTC, the only truly theatrically worth it
encore I can think of is a stinger at the space shuttle.
This would not trepan the serpent but would
kick the angst up a notch.
Then
At 11:48 AM 12/28/01 -0800, John Young wrote:
of northern European hinterlands, Anglo-Saxon defectives
still enthralled with ceremonial violence inherent in
costume, sports, entertainment, prejudice, pride, and
exculpation of ego-driven indifference to harm caused
others
Wait, are you talking
At 03:16 PM 12/28/01 -0800, Eric Murray wrote:
22 caliber four-shot pistol hidden inside a cell phone, uncovered
during police raids in Europe.
http://abcnews.go.com/sections/world/DailyNews/phone001205.html
Cell phone users will have to be made aware that reaching for their
phones in some
Wired interview with creator of sexchart
http://wired.com/news/culture/0,1284,48997,00.html
The graph:
http://www.attrition.org/hosted/sexchart/sexchart.9.25
Relevence to Brin's _Transparent Society_ etc should be obvious.
At 08:26 PM 12/29/01 -0600, david wrote:
On Saturday 29 December 2001 05:00 pm, Faustine wrote:
Hm, whatever works, I guess. Sheer stealth isn't as much a factor for me as
is accuracy
I don't think the yugo cellphone .22 has been taken to the range
by an American gun rag yet... Thunder Ranch
At 02:52 PM 12/30/01 -0500, Matthew Gaylor wrote:
At 7:33 AM -0800 12/29/01, David Honig wrote:
Mossad prefers suppressed Berretta .22 which doesn't need racking.
Actually they're fond of using the single action Beretta model 70s in
.22lr. I believe that's what arms designer Gerald Bull
At 02:53 PM 12/30/01 -0800, Tim May wrote:
(* I've heard some claim that stainless steel is not a good idea, as it
glints in the dark. Perhaps, but this seems like a second-order effect
for any real use. It is also possible to get it in blackened stainless,
as the SIGs are commonly in.)
I've
At 07:37 PM 12/30/01 -0600, Harmon Seaver wrote:
This makes little sense. There are a great many .22 pistols which
have external hammers or an sufficient safety. Why would you have to
rack a slide, other than when you first loaded. With most, if not all,
semi-auto handguns, you always carry
.
Sincerely,
David Wu
At 10:37 AM 1/24/2002 +, Ken Brown wrote:
How unusual. All I am left with is the trite insight that in human
beings (and I suspect any species with a decent memory in which males
play, or can play, a significant part in rearing offspring) assessment
of reputation is, if not hard-wired, pretty
At 08:22 AM 1/25/02 -0800, Tim May wrote:
On Thursday, January 24, 2002, at 09:06 PM, [EMAIL PROTECTED] wrote:
I've concluded that you can't answer Tim's riddle
without knowing the radius of the drill --but I may
put myself open to ridicule for suggesting this.
But if you were devious
At 10:35 AM 1/27/02 -0800, [EMAIL PROTECTED] wrote:
Could someone post, or point to, a review of disk encryption
products.
OS: MS Win
Scramdisk is free, reliable, and source is available. I've used it on
a 200 Mhz laptop for some years---and I run my email from
the encrypted
At 07:47 PM 1/27/02 -0500, Matthew Gaylor wrote:
The American Red Cross has asked the American Medical Marijuana
Association http://www.drugsense.org/amma to stop using the red
cross with a marijuana leaf in the background in their insignia.
I've been promised the email exchanges between the
DAVID OBI
BRANCH MANAGER,
UNITED BANK FOR AFRICA PLC
ILUPEJU BRANCH
LAGOS NIGERIA
TELEPHONE: 234-1-776 0962
FAX: 234-1-759-4725
ATTN: PRESIDENT/C.E.O
I am pleased to get across to you for a very urgent and profitable business proposal,
though I
at Tuesday, January 07, 2003 1:14 AM, Michael Motyka [EMAIL PROTECTED]
was seen to say:
financial resources,
other than those that pass through verified identity
gatekeepers;
That's an odd way to spell Campaign Fund Contributing Corporations
at Friday, January 24, 2003 4:53 PM, Mike Rosing [EMAIL PROTECTED]
was seen to say:
Thanks Eugen, It looks like the IBM TPM chip is only a key
store read/write device. It has no code space for the kind of
security discussed in the TCPA. The user still controls the machine
and can still
at Friday, January 31, 2003 2:18 AM, Peter Gutmann
[EMAIL PROTECTED] was seen to say:
schnipp
More particularly, governments are likely to want to explore the
issues related to potential foreign control/influence over domestic
governmental use/access to domestic government held data.
In
Marketing On The Net
6OUfpW0 Order Report # 3 from:
Chhinda Malhotra
144a Grange Road
Gillingham
Kent ME7 2QS
United Kingdom
__
REPORT # 4: How To Become A Millionaire Using
MLM The Net
Order Report # 4 from:
David Harwood
3
and expectations of thousands of investors that have proven themselves with more accurate data over the past five years!!
We look forward to serving you as a client.
Sincerely,
David Hunimen
Client Services
WhisperNumber.com
Sentiment, Expectations, Earnings, Inc.
The Leading Advocate
No, the various provisions of the Constitution, flawed though it is,
make it clear that there is no prove that you are not guilty
provision (unless you're a Jap, or the government wants your land, or
someone says that you are disrespectful of colored people).
Unfortuately, this is not true in
at Thursday, February 06, 2003 11:21 AM, Pete Capelli
Then which one of these groups does the federal government fall
under, when they use crypto? In the feds opinion, of course. Or do
they believe that their use of crypto is the only wholesome one?
Terrorism of course, using their own
at Thursday, February 06, 2003 4:48 PM, Chris Ball
[EMAIL PROTECTED] was seen to say:
Another point is that ``normal'' constables aren't able to action the
request; they have to be approved by the Chief Constable of a police
force, or the head of a relevant Government department. The full text
144a Grange Road
Gillingham
Kent ME7 2QS
United Kingdom
__
REPORT # 4: How To Become A Millionaire Using
MLM The Net
Order Report # 4 from:
David Harwood
3 Forio House
Ford Garthorne
Cardiff. CF10 4DD
United Kingdom
at Thursday, February 06, 2003 2:34 PM, Tyler Durden
[EMAIL PROTECTED] was seen to say:
I've got a question...
If you actually care about the NSA or KGB doing a low-level
magnetic scan to recover data from your disk drives,
you need to be using an encrypted file system, period, no questions.
at Thursday, February 06, 2003 3:44 PM, Peter Fairbrother
[EMAIL PROTECTED] was seen to say:
David Howe wrote:
a) it's not law yet, and may never become law. It's an Act of
Parliament, but it's two-and-a-bit years old and still isn't in
force. No signs of that happening either, except a few
at Monday, February 10, 2003 3:20 AM, Jim Choate
[EMAIL PROTECTED] was seen to say:
On Sun, 9 Feb 2003, Sunder wrote:
The OS doesn't boot until you type in your passphrase, plug in your
USB fob, etc. and allow it to read the key. Like, Duh! You know,
you really ought to stop smoking crack.
at Monday, February 10, 2003 3:09 AM, Jim Choate
[EMAIL PROTECTED] was seen to say:
On Mon, 10 Feb 2003, Dave Howe wrote:
no, lilo is. if you you can mount a pgpdisk (say) without software,
then you are obviously much more talented than I am :)
Bullshit. lilo isn't doing -anything- at that
at Friday, February 21, 2003 4:44 PM, James A. Donald
[EMAIL PROTECTED] was seen to say:
Highly capitalist nations do not murder millions.
but their highly capitalist companies sometimes do. is this a meaningful
distinction?
at Thursday, February 20, 2003 2:04 AM, Harmon Seaver
[EMAIL PROTECTED] was seen to say:
The real school of the future won't have classrooms at all, and no
teachers as we now know them. Instead there will be workstations
with VR helmets and a number of software gurus in the machine
at Thursday, February 20, 2003 1:28 AM, Harmon Seaver
[EMAIL PROTECTED] was seen to say:
No oil but lots of dope, especially lots of high grade opium and
the CIA and the US scum military has been just desperate to get
control of the world heroin trade again like they did in Vietnam days.
There is no weakness in it that I could come up with (presuming the
audio
input is sufficiently random, which in case of badly tuned station it
seems to be; white noise generator would be better, though).
Sounds good to me. you should certainly get 16 good bytes from 128, and
while assuming a
at Thursday, March 06, 2003 5:02 PM, Ed Gerck [EMAIL PROTECTED] was
seen
to say:
On the other hand, photographing a paper receipt behind a glass,
which
receipt is printed after your vote choices are final, is not
readily
deniable because that receipt is printed only after you confirm
DR. DAVID MOTIBA
DEPARTMENT OF
MINERALS ENERGY,
PRETORIA, SOUTH AFRICA.
Dear Sir,
It is my pleasure to write you this letter on behalf of my colleagues. Your
information was given to me by a member of the South African Export Promotion Council
(SAEPC) who was with the Government delegation
About the threat to Washington: I think it's relatively high. A
nerve gas attack on buildings or the Metro seems likely. (The
Japanese AUM cult had Sarin, but was inept. A more capable,
military-trained operative has had many months to get into D.C. and
wait for the obvious time to attack.
at Thursday, March 20, 2003 3:23 PM, Tyler Durden
[EMAIL PROTECTED] was seen to say:
I've heard that for terror alert black we're all supposed to down a
few 100 milligrams of valium, and stay in our beds, butts-up.
For hidden weapons inspections, of course.
*lol*
might be close to the truth at
at Thursday, March 27, 2003 6:36 AM, Sarad AV [EMAIL PROTECTED]
was seen to say:
there is a lot of self imposed sensor ship in US on
the war.The Us pows's shown on al-jazeera were not
broadcasted over Us and those sites which had pictures
of POW's were removed as unethical graphics on web
at Tuesday, April 01, 2003 11:53 PM, Kevin S. Van Horn
[EMAIL PROTECTED] was seen to say:
What's a legitimate government? One with enough firepower to make its
rule stick?
One with real (not imagined) WMD to frighten off american presidents. NK
being a good example...
On Mon, Apr 01, 2002 at 01:34:35AM +0100, Adam Back wrote:
Hi
I've trimmed the Cc line a bit as this is now focussing more on GPG
and not adding any thing new technically for the excluded set.
On Sun, Mar 31, 2002 at 06:08:14PM -0500, David Shaw wrote:
The OpenPGP spec handles
Peter Trei wrote:
Encrypted files on a portable device that you keep with you would
seem to be the best of all worlds.
any of the usb mini drives can manage that - just set them to autorun
Scramdisk Traveller and mount a SD volume from the device. just don't forget
to dismount it before you
Jim Choate [EMAIL PROTECTED] wrote:
But that changes the game in the middle of play, the sequence of digits
in pi is fixed, not random. You can't get a random number from a constant.
Otherwise it wouldn't be a constant.
PRNG output is fixed/repeatable too - that is a properly you *want* from a
No it isn't. You -want- a RNG but you can't have one. Nobody
-wants- a PRNG, they -settle- for it.
I think there is some confusion here - if you are using a PRNG as a stream
cypher, the last thing in the world you want is for it to be truely random -
you need to sync up two prngs in order to
[EMAIL PROTECTED] wrote:
On 24 Apr 2002 at 17:41, David Howe wrote:
its probably a better (if much slower) stream cypher than most currently
in
use; I can't think of any that have larger than a 256 internal state,
and
that implies a 2^256 step cycle at best; for pi to be worse, it would
On Sunday, April 28, 2002, at 07:32 AM, Jan Dobrucki wrote:
Greetings,
I've been reading the list for a while now, and what I find annoying
is that there are mostly American news and little about what's
happening in Europe. As little as I respect America, America is not
all of the world.
I don't think you get freelance IRA guys. Not with both
kneecaps, anyway.
might be surprised - donations from the states have apparently tailled off
(having been the subject of a terrorist attack themselves they seem less
willing to fund them) and they could do with the revenue - but you are
Jim Choate [EMAIL PROTECTED] gave us the benefit of the following
opinion:
It makes no sense to talk about 'cheapness of payment' from the
recipients
view. It costs them nothing to get paid (outside of whatever service
or
labor was involved in the exchange). You have your cognates reversed
Bullshit Tim. The card holder (person paying) has an interest rate
tacked on their payments -EVERY MONTH-. It's right there at
the bottem of your statement.
I would switch to a better card provider then if I were you - here in
the UK, that interest payment only kicks in if you don't clear the
Microsoft also said open-source software is inherently less secure
because the code is available for the world to examine for flaws,
making it possible for hackers or criminals to exploit
them. Proprietary software, the company argued, is more secure because
of its closed nature.
Presumably the
Mike Rosing [EMAIL PROTECTED] wrote:
Having it be transparent where the user doesn't need to know
anything about how it works does not have to destroy the
effectiveness of digital signatures or crypto. When people sign a
document they don't know all the ramifications because few bother to
Mike Rosing [EMAIL PROTECTED] wrote:
Having it be transparent where the user doesn't need to know
anything about how it works does not have to destroy the
effectiveness of digital signatures or crypto. When people sign a
document they don't know all the ramifications because few bother to
hello i got your e-mail address off of a web site, and i was hoping you could help me crack it, if ya dont feel like helping thats ok.
hksqphpkwasyoqgjwwscocgvwtavvgsjhthgpgsjpcwgsfanvkhnsphcp iptsvwggjoaakwqsuvwhahfsqpqwwpksugphjoisqpnhwpqsnpqwfpma
Scott Guthery wrote:
Perhaps somebody can describe
a non-DRM privacy management system.
Uhh, anonymous remailers? I never disclose my identity, hence there is
no need for parties I don't trust to manage it.
Come on, folks. This ought to be cypherpunks 101. DRM might be one
way to achieve
Anonymous wrote:
The amazing thing about this discussion is that there are two pieces
of conventional wisdom which people in the cypherpunk/EFF/freedom
communities adhere to, and they are completely contradictory.
I can't agree. Strong protection of copyright is probably possible if
the
Mike Rosing wrote:
As long as MS Office isn't mandated by law, who cares?
It's not clear that enabling anti-competitive behavior is good
for society. After all, there's a reason we have anti-trust law.
Ross Anderson's point -- and it seems to me it's one worth considering
-- is that, if there
at Friday, October 25, 2002 6:22 PM, bear [EMAIL PROTECTED] was seen to
say:
The implication is that they have a hard problem in their
bioscience application, which they have recast as a cipher.
The temptation is to break it, *tell* them you have broken it (and offer
to break any messages they
at Saturday, October 26, 2002 1:18 AM, Tim May [EMAIL PROTECTED] was seen
to say:
Yes, but check very carefully whether one is in violation of the
anti-hacking laws (viz. DMCA). By some readings of the laws, merely
trying to break a cipher is ipso fact a violation.
IIRC, you can't be arrested
at Tuesday, October 01, 2002 3:08 AM, Peter Gutmann
[EMAIL PROTECTED] was seen to say:
For encryption, STARTTLS, which protects more mail than all other
email encryption technology combined. See
http://www.cs.auckland.ac.nz/~pgut001/pubs/usenix02_slides.pdf
(towards the back).
I would dispute
at Monday, October 28, 2002 9:34 PM, Major Variola (ret) [EMAIL PROTECTED]
was seen to say:
Did that Wired reporter just admit to a crime? Does it matter that
the site is overseas? That they're Evil(tm)??
nope, hacking into overseas servers is officially not a crime in the
US - after that
at Monday, September 30, 2002 7:52 PM, James A. Donald
[EMAIL PROTECTED] was seen to say:
Is it practical for a particular group, for
example a corporation or a conspiracy, to whip up its own
damned root certificate, without buggering around with
verisign? (Of course fixing Microsoft's
at Monday, November 04, 2002 2:28 AM, Tim May [EMAIL PROTECTED] was seen
to say:
Those who need to know, know.
Which of course is a viable model, provided you are only using your key
for private email to those who need to know
if you are using it for signatures posted to a mailing list though, it
at Monday, November 04, 2002 3:13 PM, Tyler Durden
This is an interesting issue...how much information can be gleaned
from encrypted payloads?
Usually, the VPN is an encrypted tunnel from a specified IP (individual
pc or lan) to another specified IP (the outer marker of the lan, usually
the
at Thursday, November 07, 2002 6:13 PM, David Honig [EMAIL PROTECTED]
was seen to say:
Wouldn't a crypto coder be using paranoid-programming
skills, like *checking* that the memory is actually zeroed?
That is one of the workarounds yes - but of course a (theoretical)
clever compiler could
At 03:55 PM 11/7/02 +0100, Steven M. Bellovin wrote:
Regardless of whether one uses volatile or a pragma, the basic point
remains: cryptographic application writers have to be aware of what a
clever compiler can do, so that they know to take countermeasures.
Wouldn't a crypto coder be using
Tyler Durden wrote:
Sorry, I'm new, but does this refer to the notion of splitting up a document
holographically, and placing the various pieces of numerous servers
throughout the 'Net?
No. It is referring to conventional encryption of your local hard disk.
at Thursday, November 21, 2002 1:52 PM, Jim Choate
[EMAIL PROTECTED] was seen to say:
http://www.extremetech.com/article2/0,3973,717170,00.asp
LOL!
which references - the archive of this list for bibliography :)
at Thursday, November 21, 2002 2:26 PM, Sarad AV
[EMAIL PROTECTED] was seen to say:
'A' uses a very strong crytographic algorithm which
would be forced out by rubber horse cryptanalysis
Now if Aice could give another key k` such that the
cipher text (c) decrypts to another dummy plain
at Monday, December 02, 2002 8:42 AM, Eugen Leitl [EMAIL PROTECTED] was
seen to say:
No, an orthogonal identifier is sufficient. In fact, DNS loc would be
a good start.
I think what I am trying to say is - given a normal internet user
using IPv4 software that wants to connect to someone in the
at Monday, December 16, 2002 8:34 AM, Major Variola (ret) [EMAIL PROTECTED]
was seen to say:
The network? Sorry, its one wire from here to there. Even a router
with multiple NICs only copies a given packet to a single interface.
That is unfortunately too much of a generalisation - although I
at Tuesday, December 17, 2002 5:33 AM, the following Choatisms were
heard:
Nobody (but perhaps you by inference) is claiming it is identical,
however, it -is- a broadcast (just consider how a packet gets routed,
consider the TTL for example or how a ping works).
ping packets aren't routed any
at Monday, December 23, 2002 7:29 PM, Mike Rosing [EMAIL PROTECTED]
was seen to say:
On Tue, 24 Dec 2002, Matthew X wrote:
The containment vessel may survive a jet impact but the control room
and/or temporary pools of spent fuel lying outside the containment
vessel might not survive. A
[EMAIL PROTECTED] [EMAIL PROTECTED] was seen to declaim:
IE comes preloaded with about 34 root certificate authorities, and
it is easy for the end user to add more, to add more in batches.
Anyone can coerce open SSL to generate any certificates he
pleases, with some work.
Why is not someone
Anonymous wrote:
Legislation of DRM is not in the cards, [...]
Care to support this claim? (the Hollings bill and the DMCA requirement
for Macrovision in every VCR come to mind as evidence to the contrary)
David Wagner wrote:
Anonymous wrote:
Legislation of DRM is not in the cards, [...]
Care to support this claim? (the Hollings bill and the DMCA requirement
for Macrovision in every VCR come to mind as evidence to the contrary)
To reiterate and lay out the points explicitly
AARG! Anonymous wrote:
David Wagner wrote:
The Hollings bill was interesting not for its success or failure, but
for what it reveals the content companies' agenda.
The CBDTPA, available in text form at
http://www.politechbot.com/docs/cbdtpa/hollings.s2048.032102.html,
does not explicitly call
Roy M. Silvernail [EMAIL PROTECTED] was seen to declaim:
Given internet access from a private intranet, through an HTTP
proxy out of the user's control, is it possible to establish a secure
tunnel to an outside server? I'd expect that ordinary SSL
connections will secure user - proxy and
John Kozubik [EMAIL PROTECTED] was seen to declaim:
SSH java applets exist:
http://www.appgate.com/ag.asp?template=productslevel1=product_mindterm
http://javassh.org/
And indeed are very useful - but I think you miss the whole point of a
java applet. the applet downloads to (and runs on) the
James A. Donald wrote:
According to Microsoft, the end user can turn the palladium
hardware off, and the computer will still boot. As long as that
is true, it is an end user option and no one can object.
Your point is taken. That said, even if you could turn off TCPA
Palladium and run some
cypherpunks ,
From;Mr.David Kargbou and Family,
Johannesburg,South Africa.
My Dear ,
Good day.This very confidential request should come as a surprise to you.But it is
because of the nature of what is happening to me and my family urged me to contact
you, and I quite understand
cypherpunks ,
From;Mr.David Kargbou and Family,
Johannesburg,South Africa.
My Dear ,
Good day.This very confidential request should come as a surprise to you.But it is
because of the nature of what is happening to me and my family urged me to contact
you, and I quite understand
R. A. Hettinga wrote:
[Ob Cypherpunks: Seriously, folks. How clueful can someone be who
clearly doesn't know how to use more than one remailer hop, as proven
by the fact that he's always coming out of the *same* remailer all
the time?
I hope I don't need to point out that always using the same
AARG! Anonymous wrote:
In fact, you are perfectly correct that Microsoft architectures would
make it easy at any time to implement DRL's or SNRL's. They could do
that tomorrow! They don't need TCPA. So why blame TCPA for this feature?
The relevance should be obvious. Without TCPA/Palladium,
AARG! Anonymous wrote:
His description of how the Document Revocation List could work is
interesting as well. Basically you would have to connect to a server
every time you wanted to read a document, in order to download a key
to unlock it. Then if someone decided that the document needed
to
Nomen Nescio wrote:
Carl Ellison suggested an alternate way that TCPA could work to allow
for revoking virtualized TPMs without the privacy problems associated
with the present systems, and the technical problems of the elaborate
cryptographic methods.
[...]
Instead of burning only one key into
at Monday, September 23, 2002 10:35 PM, Curt Smith
[EMAIL PROTECTED] was seen to say:
http://www.drivecrypt.com/dcplus.html
DriveCrypt Plus does everything you want. I believe it may
have descended from ScramDisk (Dave Barton's disk encryption
program).
It has. Basically, the author of
at Monday, September 23, 2002 10:35 PM, Curt Smith
[EMAIL PROTECTED] was seen to say:
http://www.drivecrypt.com/dcplus.html
DriveCrypt Plus does everything you want. I believe it may
have descended from ScramDisk (Dave Barton's disk encryption
program).
As an aside - Dave Barton? Shaun
at Thursday, September 26, 2002 7:14 PM, Major Variola (ret)
[EMAIL PROTECTED] was seen to say:
The original fax from the Met is now online
http://www.thinkofthechildren.co.uk/metfaxbig.shtml
-BEGIN PGP SIGNED MESSAGE-
at Tuesday, October 01, 2002 9:04 PM, Petro [EMAIL PROTECTED] was
seen
to say:
Well, it's a start. Every mail server (except mx1 and
mx2.prserv.net) should use TLS.
Its nice in theory, but in practice look how long it takes the bulk
of the internet to
401 - 500 of 667 matches
Mail list logo