http://tinyurl.com/bgk6t
Feds Want to Tap In-Flight Internet Communications
By Gene J. Koprowski
TechNewsWorld
07/15/05 9:15 AM PT
Online WiFi service was first tested in 2003 by Boeing aboard a
Lufthansa flight from Germany, and United Airlines was the first
American carrier to move forward
control of your superiors. I believe this view is wrong. This document
seeks to provide the means to protect your right to privacy and anonymous net
access anywhere, even under the most draconian of conditions - including, but
not limited to, criminal investigation. So what are you saying? That I
You wrote:
new terrorist target: Union Station
You used a remailer for THAT?!!
So what if he did?
There's no requirement that people say insignificant stuff under their real
name or real alias.
http://reuters.myway.com/article/20050511/2005-05-11T173816Z_01_N11199658_RTRIDST_0_NEWS-SECURITY-WASHINGTON-DC.html
WASHINGTON (Reuters) - Fighter jets scrambled over Washington and
authorities hurriedly evacuated the White House and the U.S. Congress
on Wednesday when an unidentified plane
You wrote:
new terrorist target: Union Station
You used a remailer for THAT?!!
So what if he did?
There's no requirement that people say insignificant stuff under their real
name or real alias.
new terrorist target: Union Station
You used a remailer for THAT?!!
You used a pseudonym for THAT?!
http://reuters.myway.com/article/20050511/2005-05-11T173816Z_01_N11199658_RTRIDST_0_NEWS-SECURITY-WASHINGTON-DC.html
WASHINGTON (Reuters) - Fighter jets scrambled over Washington and
authorities hurriedly evacuated the White House and the U.S. Congress
on Wednesday when an unidentified plane
new terrorist target: Union Station
You used a remailer for THAT?!!
You used a pseudonym for THAT?!
And then, of course, in the off chance they can't actually break the
message under that flag, they can merely send a guy out with
binoculars or whatever.
Don't forget about rubber-hose cryptanlysis. Rumour has it that
method is preferred in many cases since it makes the code-breakers
DTV Content Protection
Two content protection systems are in use to protect digital television
(DTV) signals on the wires of American home video systems: HDCP and DTCP.
HDCP is used for the most common digital cable connection to HD monitors,
HDMI, which is a variant of DVI. DTCP is used for
Tyler Durden writes:
An interesting though I had last night was that the Drug trade in the
Golden Triangle (Burma, China, Thailand, etc...) might exist for precisely
this reason...in other words, as a form of arbitrage of sorts between
the actual local cost of goods and services and manpower
Tyler Durden writes:
An interesting though I had last night was that the Drug trade in the
Golden Triangle (Burma, China, Thailand, etc...) might exist for precisely
this reason...in other words, as a form of arbitrage of sorts between
the actual local cost of goods and services and manpower
At last, the secret of how to make MD5 collisions is out!
See http://cryptography.hyperlink.cz/MD5_collisions.html. This includes
the Wang report, probably the one which will be presented at Eurocrypt:
http://www.infosec.sdu.edu.cn/paper/md5-attack.pdf.
As a bonus, it includes an independent
At last, the secret of how to make MD5 collisions is out!
See http://cryptography.hyperlink.cz/MD5_collisions.html. This includes
the Wang report, probably the one which will be presented at Eurocrypt:
http://www.infosec.sdu.edu.cn/paper/md5-attack.pdf.
As a bonus, it includes an independent
R.A. Hettinga wrote:
http://www.msnbc.msn.com/id/7087572/print/1/displaymode/1098/
While this is marginally more cypherpunks-related than Hunter Thompson's
suicide, I think we're all capable of reading the daily headlines if we
care about the SEC investigation du jour.
a cypherpunk is to live in cypherspace, the mythical land
where online interactions dominate and we can use information theory and
mathematics to protect ourselves. Of course, cypherspace is inevitably
grounded in the physical world, so we have to use anonymous remailers
and proxies to achieve
even more than cyberspace tends towards the
perfect-shield side of the equation. You can't harm a person if your
only interactions are anonymous communications. About the worst you
can give him is a stern talking-to. If your social analysis is correct,
then cypherpunk technologies are going to make
a cypherpunk is to live in cypherspace, the mythical land
where online interactions dominate and we can use information theory and
mathematics to protect ourselves. Of course, cypherspace is inevitably
grounded in the physical world, so we have to use anonymous remailers
and proxies to achieve
even more than cyberspace tends towards the
perfect-shield side of the equation. You can't harm a person if your
only interactions are anonymous communications. About the worst you
can give him is a stern talking-to. If your social analysis is correct,
then cypherpunk technologies are going to make
R.A. Hettinga spoke thusly...
http://www.townhall.com/columnists/jeffjacoby/printjj20050304.shtml
Townhall.com
An inglorious suicide
Jeff Jacoby (back to web version) | Send
March 4, 2005
Hunter Thompson's suicide was an act of selfishness and cruelty. But more
depraved by far has
R.A. Hettinga wrote:
http://www.msnbc.msn.com/id/7087572/print/1/displaymode/1098/
While this is marginally more cypherpunks-related than Hunter Thompson's
suicide, I think we're all capable of reading the daily headlines if we
care about the SEC investigation du jour.
R.A. Hettinga spoke thusly...
http://www.townhall.com/columnists/jeffjacoby/printjj20050304.shtml
Townhall.com
An inglorious suicide
Jeff Jacoby (back to web version) | Send
March 4, 2005
Hunter Thompson's suicide was an act of selfishness and cruelty. But more
depraved by far has
Justin writes:
No, I want the right to fair use of material I buy. If someone sells
DRM-only material, I won't buy it at anything approaching non-DRM
prices. In some cases, I won't buy it at all.
Well, that's fine, nobody's forcing you to buy anything. But try to think
about this from a
As far as the question of malware exploiting TC, it's difficult to
evaulate without knowing more details about how the technology ends up
being used.
First there was TCPA, which is now called TCG. Microsoft spun off their
own version called Palladium, then NGSCB. But then Microsoft withdrew
Eric Murray writes:
The TCPA chip verifies the (signature on the) BIOS and the OS.
So the software driver is the one that's trusted by the TCPA chip.
I don't believe this is correct. The TPM does not verify any signatures.
It is fundamentally a passive chip. Its only job is to store hashes
of
Justin writes:
No, I want the right to fair use of material I buy. If someone sells
DRM-only material, I won't buy it at anything approaching non-DRM
prices. In some cases, I won't buy it at all.
Well, that's fine, nobody's forcing you to buy anything. But try to think
about this from a
As far as the question of malware exploiting TC, it's difficult to
evaulate without knowing more details about how the technology ends up
being used.
First there was TCPA, which is now called TCG. Microsoft spun off their
own version called Palladium, then NGSCB. But then Microsoft withdrew
Eric Murray writes:
The TCPA chip verifies the (signature on the) BIOS and the OS.
So the software driver is the one that's trusted by the TCPA chip.
I don't believe this is correct. The TPM does not verify any signatures.
It is fundamentally a passive chip. Its only job is to store hashes
of
I spent considerable time a couple years ago on these lists arguing
that people should have the right to use this technology if they want.
I also believe that it has potential good uses. But let's be accurate.
Please stop relaying FUD. You have full control over your PC, even if this
one is
Reagan, Ronald Wilson unres 1911-02-06 2004-06-05 U.S.
president
Reagan's ssn is 480-07-7456.
Are there any in the remailerspace still operating? Google fails me, after
following
so many dead links from dying pages. Specifically want to route to
alt.anonymous.messages.
Just finished reading it (It was a Christmas present).
The story involves the heroes foiling a plot by eco-terrorists who attempt to
create natural disasters in an effort to push their agenda regarding global
warming.
Along the way the Crichton presents a pretty convincing argument that
Just finished reading it (It was a Christmas present).
The story involves the heroes foiling a plot by eco-terrorists who attempt to
create natural disasters in an effort to push their agenda regarding global
warming.
Along the way the Crichton presents a pretty convincing argument that
Someone wrote:
At 10:23 AM -0500 12/21/04, Somebody wrote:
RAH, if you want to anonymize a quoted email, it helps if you remove the
In-Reply-To: and References: headers.
What the hell does an article about gypsy
mechanics have to do with cypherpunks?
I plead anarchic markets, m'lord.
Someone wrote:
At 10:23 AM -0500 12/21/04, Somebody wrote:
RAH, if you want to anonymize a quoted email, it helps if you remove the
In-Reply-To: and References: headers.
What the hell does an article about gypsy
mechanics have to do with cypherpunks?
I plead anarchic markets, m'lord.
PS: heard some fedscum mention 'militia and other terrorists' the
other
day, what would Gen George W think?
which fedscum, do you have a mentionable source, c.?
It was ATF, about some gun-robbers; it seems to be a reply to trollbait
by the Faux news channel or spontaneous dreck.
That
or Is there no computers in Brazil?
Thomas Sjoegren has created [0]maps of the [1]SILC, [2]TOR and key server
networks.
According to the images running servers related to privacy is mostly a western
thing,
out of 115 servers only eight are located outside the US and Europe.
PS: heard some fedscum mention 'militia and other terrorists' the
other
day, what would Gen George W think?
which fedscum, do you have a mentionable source, c.?
It was ATF, about some gun-robbers; it seems to be a reply to trollbait
by the Faux news channel or spontaneous dreck.
That
Major Variola typed:
If he really gave a shat he'd investigate the RDX stored in the
Murrah building, next to daycare, but that was just a (.mil trained)
'Merican,
not a bunch of specops Ay-rabs.
the proper pejorative is 'Merkin.
JYA may be Architects (snicker) but methinks he groks
Major Variola typed:
If he really gave a shat he'd investigate the RDX stored in the
Murrah building, next to daycare, but that was just a (.mil trained)
'Merican,
not a bunch of specops Ay-rabs.
the proper pejorative is 'Merkin.
JYA may be Architects (snicker) but methinks he groks
Police given computer spy powers
http://smh.com.au/news/National/Police-given-computer-spy-powers/2004/12/12/1102786954590.html
(smhguy/pass to access)
By Rob O'Neill
December 13, 2004
Federal and state police now have the power to use computer spyware to gather
evidence in a broad range of
Out of nowhere cometh Steve Thompson, and sayeth he all manner of things.
But, while his mouth moveth one way, he seemeth to move the other.
http://groups-beta.google.com/groups?q=%22steve+thompson%22start=0hl=ensafe=off;
What hath suddenly attracted our AUK creep?
Out of nowhere cometh Steve Thompson, and sayeth he all manner of things.
But, while his mouth moveth one way, he seemeth to move the other.
http://groups-beta.google.com/groups?q=%22steve+thompson%22start=0hl=ensafe=off;
What hath suddenly attracted our AUK creep?
Out of nowhere cometh Steve Thompson, and sayeth he all manner of things. But,
while his mouth moveth one way, he seemeth to move the other.
http://groups-beta.google.com/groups?q=%22steve+thompson%22start=0hl=ensafe=off;
What hath suddenly attracted our AUK creep?
Out of nowhere cometh Steve Thompson, and sayeth he all manner of things. But,
while his mouth moveth one way, he seemeth to move the other.
http://groups-beta.google.com/groups?q=%22steve+thompson%22start=0hl=ensafe=off;
What hath suddenly attracted our AUK creep?
Steve Thompson:
If that's true, then the government couldn't have stolen it.
However, I suspect that mainfraim code of any sophistication is
rarely released into the public domain. I imagine the author would
be able to clear that up, assuming he has no financial reason to
falsify its
http://www.boston.com/news/world/articles/2004/12/05/returning_fallujans_will_face_clampdown?mode=PF
The Boston Globe
US Marines rode in a convoy through Fallujah on Friday. The US military is
continuing missions to secure the city. (AFP Photo / Mehdi Fedouach)
Returning Fallujans
Steve Thompson:
If that's true, then the government couldn't have stolen it.
However, I suspect that mainfraim code of any sophistication is
rarely released into the public domain. I imagine the author would
be able to clear that up, assuming he has no financial reason to
falsify its
http://www.boston.com/news/world/articles/2004/12/05/returning_fallujans_will_face_clampdown?mode=PF
The Boston Globe
US Marines rode in a convoy through Fallujah on Friday. The US military is
continuing missions to secure the city. (AFP Photo / Mehdi Fedouach)
Returning Fallujans
Bring em on, oops, they are here already. Darn, it wasn't
the commies and nazis who were the threat, it was your
indolent life-style paid for by your swell-paid, smarter wife,
up to women-empowered thieving the marketplace and
making innumerable enemies for you to blame for your
swelling
Bring em on, oops, they are here already. Darn, it wasn't
the commies and nazis who were the threat, it was your
indolent life-style paid for by your swell-paid, smarter wife,
up to women-empowered thieving the marketplace and
making innumerable enemies for you to blame for your
swelling
I've noticed a very high increase of incoming virii and malicious code of
various sorts to one of my nyms. Since the nym is not used anywhere
publically I really wonder if these are deliberate attacks to try to
compromise the machines of people using nyms to protect their identity. Is
this
On Tue, 17 Aug 2004, Nomen Nescio wrote:
They claim they have over 1 million users. Is a class action suit in
order? Their privacy policy clearly states
We consider your email address to be confidential information. We will
never rent, sell, or otherwise reveal it to any other party
On Tue, 17 Aug 2004, Nomen Nescio wrote:
They claim they have over 1 million users. Is a class action suit in
order? Their privacy policy clearly states
We consider your email address to be confidential information. We will
never rent, sell, or otherwise reveal it to any other party
I can see fatherland securitat goons raiding a certain restaurant at
Stanford next weekend ... assume all keys are compromised due to RH attack.
The NSA has also found a silver lining to the use of encrypted e-mail:
Even if a particular message cannot be read, the very use of encryption
can
On Mon, 2 Aug 2004, J.A. Terranson wrote:
Yes, this bugs me. But the person they outsourced it *to* scares me even
more!
They claim they have over 1 million users. Is a class action suit in
order? Their privacy policy clearly states
We consider your email address to be confidential
On Mon, 2 Aug 2004, J.A. Terranson wrote:
Yes, this bugs me. But the person they outsourced it *to* scares me even
more!
They claim they have over 1 million users. Is a class action suit in
order? Their privacy policy clearly states
We consider your email address to be confidential
Recently I received the Anonymizer PrivacyShield Alert, as an Anonymizer
user, and was distressed to note that it appears Anonymizer has now
outsourced its mail and marketing infrastructure.
Partial headers from new mail system:
Return-Path: [EMAIL PROTECTED]
Received: from
I can't imagine any intelligence professional wasting her time reading
the crap at times coming over this list.
As of mid 2000 most of traffic is recorded. By this time 'most' is very close to
'all'. But if you e-mail someone with account on the same local ISP, using dial-in at
the recipient
Praise Allah! The spires of the West will soon come crashing down!
Our Brother wishes for us to meet at the previously discussed
southeastern roadhouse on August 1st, in preparation for the
operations scheduled for August 6th and 9th.
Alternative targets have been chosen. Contact Jibril if you
I can't imagine any intelligence professional wasting her time reading
the crap at times coming over this list.
As of mid 2000 most of traffic is recorded. By this time 'most' is very close to
'all'. But if you e-mail someone with account on the same local ISP, using dial-in at
the recipient
Praise Allah! The spires of the West will soon come crashing down!
Our Brother wishes for us to meet at the previously discussed
southeastern roadhouse on August 1st, in preparation for the
operations scheduled for August 6th and 9th.
Alternative targets have been chosen. Contact Jibril if you
Major Variola (ret) writes:
The yanks did not wear regular uniforms and did not march in
rows in open fields like Gentlemen. Asymmetric warfare means not
playing by
*their* rules.
But asymm warfare has to accomplish its goal. It's not being very
successful. The only people who are siding
Major Variola (ret) writes:
The yanks did not wear regular uniforms and did not march in
rows in open fields like Gentlemen. Asymmetric warfare means not
playing by
*their* rules.
But asymm warfare has to accomplish its goal. It's not being very
successful. The only people who are siding
Your_money.cpl
Description: Binary data
Info.cpl
Description: Binary data
Recently someone proposed a system which combined ecash and hashcash
for email postage. The effect is to get a form of reusable hashcash.
Here is some analysis.
There are already proposals and even some working code for hashcash email
postage. See http://www.camram.org/. This is intended as an
Thomas Shaddack writes:
I have a standard implementation of OpenSSL, with Diffie-Hellman prime in
the SSL certificate. The DH cipher suite is enabled.
Is it safe to keep one prime there forever, or should I rather
periodically regenerate it? Why? If yes, what's some sane period to do so:
Thomas Shaddack writes:
I have a standard implementation of OpenSSL, with Diffie-Hellman prime in
the SSL certificate. The DH cipher suite is enabled.
Is it safe to keep one prime there forever, or should I rather
periodically regenerate it? Why? If yes, what's some sane period to do so:
Recently someone proposed a system which combined ecash and hashcash
for email postage. The effect is to get a form of reusable hashcash.
Here is some analysis.
There are already proposals and even some working code for hashcash email
postage. See http://www.camram.org/. This is intended as an
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Often people ask about blind DSA signatures. There are many known
variants on DSA signatures which allow for blinding, but blinding plain
DSA signatures is not discussed much.
Clearly, blinding DSA signatures is possible, through general purpose
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Often people ask about blind DSA signatures. There are many known
variants on DSA signatures which allow for blinding, but blinding plain
DSA signatures is not discussed much.
Clearly, blinding DSA signatures is possible, through general purpose
Tyler Durden wrote:
RAH wrote...
Only if they pay me cash
few miles. If I'm a router, I'm also sending that info behind me (which is
routing I'm paying for basically), but I will understand that the reason I
am getting my telemetry is precisely because there's a string of me's in
the
of proposals
in the literature with various characteristics in terms of scalability,
security and privacy. The votehere.net scheme uses advanced cryptographic
techniques including zero knowledge proofs and verifiable remixing,
the same method that might be used in next generation anonymous remailers
of proposals
in the literature with various characteristics in terms of scalability,
security and privacy. The votehere.net scheme uses advanced cryptographic
techniques including zero knowledge proofs and verifiable remixing,
the same method that might be used in next generation anonymous remailers
#
In-Reply-To: [EMAIL PROTECTED]
Major Variola wrote:
A fence is being considered around the Capital in DC also.
Capitol.
Hettinga advocates:
So, what, declare all current property claims in Fallujah to be null and
void, sell claims off to the highest bidder, and whoever gets there with
the most men owns it. I mean, it worked in Texas with the Comanches and
Apaches...
Yeah, it's a fantasy, but we all have our
Hettinga advocates:
So, what, declare all current property claims in Fallujah to be null and
void, sell claims off to the highest bidder, and whoever gets there with
the most men owns it. I mean, it worked in Texas with the Comanches and
Apaches...
Yeah, it's a fantasy, but we all have our
Harmon Seaver wrote:
If a member of a club, to which you belong, commits an act of
violence, are you liable for that act?
No, but if the club, as an entity, does such, you should be. If
the corporation pollutes, all and sundry owners and employees should
be equally liable. Or maybe
Harmon Seaver wrote:
If a member of a club, to which you belong, commits an act of
violence, are you liable for that act?
No, but if the club, as an entity, does such, you should be. If
the corporation pollutes, all and sundry owners and employees should
be equally liable. Or maybe
Hi,
Sandy Harris wrote:
Tarapia Tapioco wrote:
A possible implementation looks like this:
...
* Linux/KAME's IKE daemon racoon is patched to attempt retrieval of an
RSA key from said DNS repository and generate appropriate security
policies.
Cleaner solution, but more work probably.
Why
Hi,
Sandy Harris wrote:
Tarapia Tapioco wrote:
A possible implementation looks like this:
...
* Linux/KAME's IKE daemon racoon is patched to attempt retrieval of an
RSA key from said DNS repository and generate appropriate security
policies.
Cleaner solution, but more work probably.
Why
Hi,
Sandy Harris wrote:
Tarapia Tapioco wrote:
A possible implementation looks like this:
...
* Linux/KAME's IKE daemon racoon is patched to attempt retrieval of an
RSA key from said DNS repository and generate appropriate security
policies.
Cleaner solution, but more work probably.
Why
Tyler Durden wrote:
Damn. I'd say that's the most intolerant hate-filled garbage I ever...
But shit. It's basically true. Or at least the fundamentalists in charge of
the government these days seem to equate their two-dimensional cartoon view
of the world with reality, and that's
Recently there has been publicity about a report critical of a proposed
internet voting experiment, http://servesecurityreport.org/. The authors
critique the SERVE system, which was designed to allow overseas military
personnel to vote absentee via the internet. The authors were four
members of
Some # for GWB is in this.
The AP Sports desk accidentally emailed out there sports rolodex
today to other newsies. If you've been wanting to raise hell with
Peter Ueberroth, talk to Hammering Hank, or see how much Pete Rose
was actually wagering - give em a call. Before they change their
http://www.fauxnewschannel.com/
Re saddam et all...
http://www.atimes.com/atimes/Middle_East/EL19Ak01.html
The war of words over Saddam Bush is quite amusing. The blind faith in ones
govt structure and the willingness to support force that is in such extreme
measure overpowering and statist such as the dropping of tons of
http://www.fauxnewschannel.com/
Greetings
Has Saddam recieved a lawyer yet?
Will Saddam be judged by a court having jurisdiction and being recognized
internationally?
On Wed, 17 Dec 2003, BillyGOTO wrote:
Nice, but the problem still remains: At this point it doesn't matter
what he has done (or we say he has done). This is not a punishment.
Innocent until proofen guilty anyone? This is the basis for the
enlightened western society, no?
This isn't a ski
Harmon Seaver wrote:
This isn't a ski mask burglary. We KNOW Saddam ruled Iraq.
We KNOW what crimes were committed. Simple syllogism.
No we don't. We only know what the propaganda mills have told us.
Twenty years ago it was a different story.
The propaganda mills were working for
The U.S. official's way of behaving like Texas rednecks are embarrassing. Not only
are they cheering we got him like a child who can not withhold his enthusiasm.
Displaying Saddam the way they did are also possibly a clear violation of the Geneva
convention as far as I can tell.
What was
The U.S. official's way of behaving like Texas rednecks are embarrassing. Not
Crosspost from nettime:
Subject: nettime wrong signals
If symbols really do matter we might conclude that American
administration's PR machine has got it badly wrong. In the carefully
orchestrated news management of
While I agree with much of what you say I don't think it's likely that any
kind of advanced SIGINT operation was what brought him down. The most important thing
to have is intelligence from humans. From insiders. This is partly the problem with
the intelligence agencies today. They
I am not sure I agree. I am no expert on this however. I saw several people commenting
the issue of Geneva convention on CNN during the day. Also I saw an expert on this
field from another country commenting on the issue stating that it was a clear
violation of the convention. In either of
The U.S. official's way of behaving like Texas rednecks are embarrassing. Not only
are they cheering we got him like a child who can not withhold his enthusiasm.
Displaying Saddam the way they did are also possibly a clear violation of the Geneva
convention as far as I can tell.
What was
The U.S. official's way of behaving like Texas rednecks are embarrassing. Not
Crosspost from nettime:
Subject: nettime wrong signals
If symbols really do matter we might conclude that American
administration's PR machine has got it badly wrong. In the carefully
orchestrated news management of
While I agree with much of what you say I don't think it's likely that any
kind of advanced SIGINT operation was what brought him down. The most important thing
to have is intelligence from humans. From insiders. This is partly the problem with
the intelligence agencies today. They
I am not sure I agree. I am no expert on this however. I saw several people commenting
the issue of Geneva convention on CNN during the day. Also I saw an expert on this
field from another country commenting on the issue stating that it was a clear
violation of the convention. In either of
1 - 100 of 706 matches
Mail list logo