But now we're back to the question: how can Tor be improved to deal with
this very serious and important problem? What are the steps that might
be taken, however imperfect, to reduce the amount of abuse coming from
Tor nodes?
That's trivial: charge Tor-originated users for editing. That
But now we're back to the question: how can Tor be improved to deal with
this very serious and important problem? What are the steps that might
be taken, however imperfect, to reduce the amount of abuse coming from
Tor nodes?
That's trivial: charge Tor-originated users for editing. That
Just a tiny interesting operation found out via routine misspelling that can
breed paranoia in idle minds:
sprint has smtp to SMS gateway for its customers running at
messaging.sprintpcs.com, so if you e-mail to
[EMAIL PROTECTED] the user gets message on the phone.
Interestingly enough, there
Google cookies last as long as possible -- until 2038. If you've
And you are allowing cookies because ... ?
And you are keeping cookies past the session because ... ?
Too lazy not to?
To lazy to login again?
Inherent belief that commercial entity should make your life easy for purely
Just a tiny interesting operation found out via routine misspelling that can
breed paranoia in idle minds:
sprint has smtp to SMS gateway for its customers running at
messaging.sprintpcs.com, so if you e-mail to
[EMAIL PROTECTED] the user gets message on the phone.
Interestingly enough, there
Google cookies last as long as possible -- until 2038. If you've
And you are allowing cookies because ... ?
And you are keeping cookies past the session because ... ?
Too lazy not to?
To lazy to login again?
Inherent belief that commercial entity should make your life easy for purely
I'm still having trouble understanding your threat model.
Just assume braindeath and it becomes obvious.
No tla with any dignity left would bother e-mail providers or try to get your
password. All it need to do is fill gforms and get access to tapped traffic at
major nodes (say, 20 in US is
This very likely means that someone already has MM figured out; the question is
not whether it will be revealed, but when.
All of these attacks focus on finding the master secret MM value; once
that is found, the security of the system collapses. Given a KSV it is
immediately possible to
The simplest solution is to systematically spread one's DNA everywhere, thus
making 'discovery' of it meaningless.
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
__
Do you Yahoo!?
Yahoo! Mail - now with 250MB
The simplest solution is to systematically spread one's DNA everywhere, thus
making 'discovery' of it meaningless.
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
__
Do you Yahoo!?
Yahoo! Mail - now with 250MB
If you want to be invisible to lawyers, you have to use something else.
Whoever wants to design something 'else' should first see Monty Python's How
not to be seen sketch (or was it Importance of not being seen ?)
It applies pretty well to all current techniques for moving unpaid copyrighted
If you want to be invisible to lawyers, you have to use something else.
Whoever wants to design something 'else' should first see Monty Python's How
not to be seen sketch (or was it Importance of not being seen ?)
It applies pretty well to all current techniques for moving unpaid copyrighted
Apologies for introducing crypto-related stuff:
RNG that reads minds and predicts future:
http://www.rednova.com/news/display/?id=126649
Can This Black Box See Into the Future?
DEEP in the basement of a dusty university library in Edinburgh lies a
small black box, roughly the size of two
Unless I'm missing something obvious, it seems impossible to divine the
origination IP address from gmail-sourced e-mail headers. The first IP (the
last header) has 10.*.*.* form and is of course internal to google.
This is not the case with any other e-mail service I know of (mixmaster
What are the possible solutions for the remailers? Make all
remailers middleman only and adding the ability to opt-in for
Open wireless access points.
No one said you are entitled to mail anonymously from the comfort of your
home/office. Stop whining.
=
end
(of original message)
What are the possible solutions for the remailers? Make all
remailers middleman only and adding the ability to opt-in for
Open wireless access points.
No one said you are entitled to mail anonymously from the comfort of your
home/office. Stop whining.
=
end
(of original message)
A cool thing for this purpose could be a patch for gcc to produce unique
code every time, perhaps using some of the polymorphic methods used by
viruses.
The purpose would be that they do not figure out that you are using some
security program, so they don't suspect that noise in the file or
A cool thing for this purpose could be a patch for gcc to produce unique
code every time, perhaps using some of the polymorphic methods used by
viruses.
The purpose would be that they do not figure out that you are using some
security program, so they don't suspect that noise in the file or
The impracticability of breaking symmetric ciphers is only a
comparatively small part of the overall problem.
I see that it can be done only by brute farce myth is live and well.
Hint: all major cryptanalytic advances, where governments broke a cypher and
general public found out few *decades*
The impracticability of breaking symmetric ciphers is only a
comparatively small part of the overall problem.
I see that it can be done only by brute farce myth is live and well.
Hint: all major cryptanalytic advances, where governments broke a cypher and
general public found out few *decades*
If VOIP gets no protection, then you'll see a lot of digital bugs in
Protection of bits by legislation ???
Why is this a subject ? If you don't encrypt you will be listened to. Who the
fuck cares if intercept is legal or not. That is irrelevant. It's like trying
to obsolete summer clothing by
If VOIP gets no protection, then you'll see a lot of digital bugs in
Protection of bits by legislation ???
Why is this a subject ? If you don't encrypt you will be listened to. Who the
fuck cares if intercept is legal or not. That is irrelevant. It's like trying
to obsolete summer clothing by
incriminating, and the State has a substantial interest in knowing who you
are -- you may need medicating, or you may owe the government money, or
Exactly ... and maybe you are on this consumer list:
http://bmj.bmjjournals.com/cgi/content/full/328/7454/1458
The president's commission found
incriminating, and the State has a substantial interest in knowing who you
are -- you may need medicating, or you may owe the government money, or
Exactly ... and maybe you are on this consumer list:
http://bmj.bmjjournals.com/cgi/content/full/328/7454/1458
The president's commission found
However, it should be known that fiberglass (eg van) panels are
transparent
to uwaves AFAIK and that a van with soft tires is a 0th-order
0.25 glass will cost you 2-2.5 dB.
At sufficiently good mechanical stabilization and gain, you will
encounter perhaps
The best way to do this is to
However, it should be known that fiberglass (eg van) panels are
transparent
to uwaves AFAIK and that a van with soft tires is a 0th-order
0.25 glass will cost you 2-2.5 dB.
At sufficiently good mechanical stabilization and gain, you will
encounter perhaps
The best way to do this is to
If there's any kind of leakage bias, then a high-powered signal might get a
few bits through. After that, only a Palm OS expert will know if there's
some kind of signal that can tease the Palm awake and then get it to swallow
some kind of trojan.
Bits are not marbles to exist outside
If there's any kind of leakage bias, then a high-powered signal might get a
few bits through. After that, only a Palm OS expert will know if there's
some kind of signal that can tease the Palm awake and then get it to swallow
some kind of trojan.
Bits are not marbles to exist outside
Does anyone know whether the low-power nature of wireless LANs protects
them from eavesdropping by satellite?
GSM cell phones have been successfully tapped via sat. Power is greater (up to
.5w) but antennas are worse, so effective radiated energy is very similar, as
are frequencies.
=
end
underground railroad would have worked better, but your still black.
Obviously you don't know about whitening properties of moder ciphers!
Seriously, today the distingushing marks among classes, tribes and castes are
far more informational than physical. So today crypto *can* make you white, or
underground railroad would have worked better, but your still black.
Obviously you don't know about whitening properties of moder ciphers!
Seriously, today the distingushing marks among classes, tribes and castes are
far more informational than physical. So today crypto *can* make you white, or
The extreme ease of use of internet wiretapping and lack of accountability
is not a good situation to create.
False.
It is the best possible situation cpunk-wise I can imagine.
It effectively deals away with bs artists (those who *argue* against this or
that) and empowers mathematics. If one
Can a TLA please give some sign here, any sign - just ack that you know the
list exists, otherwise the legitimacy of cpunks is definitely going down the
drain.
Looks like a Berlin wall syndrome.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
Forget about repeater.
13-15 db flat panel antenna will get you access to distant APs - up to one mile
in favourable conditions.
18db grid dish will connect you to omnidirectional AP within 2 miles.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
Forget about repeater.
13-15 db flat panel antenna will get you access to distant APs - up to one mile
in favourable conditions.
18db grid dish will connect you to omnidirectional AP within 2 miles.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
Because it means you can complete call to the POTs with no
company-controlled switch involved, meaning no where to serve a court
order. Since the call could be routed through a few intermediate nodes and
I see.
So, in the real world, X uses this to make telephone threats, your POTS gets
What I'd like to see is a P2P telephony that also supports end-user
gateways to the POTS. I'm not certain, but I think there are some MS
I don't get what does this have to do with crypto.
Outside crypto, this didn't quite work with (almost) public fax gateways of
'90s. In theory, you could
What I'd like to see is a P2P telephony that also supports end-user
gateways to the POTS. I'm not certain, but I think there are some MS
I don't get what does this have to do with crypto.
Outside crypto, this didn't quite work with (almost) public fax gateways of
'90s. In theory, you could
Its like steganalysis. Its an arms race between measuring your own
signatures vs. what the Adversary can measure. If sentence length
is a metric known to you, you can write filters that warn you.
Similarly for the Adversary. You end up in an arms race
over metrics ---who has the more
Its like steganalysis. Its an arms race between measuring your own
signatures vs. what the Adversary can measure. If sentence length
is a metric known to you, you can write filters that warn you.
Similarly for the Adversary. You end up in an arms race
over metrics ---who has the more
http://lists.cryptnet.net/mailman/listinfo/cpunx-news
Be sure and check the archive before posting. It is still small.
Cookies, members only archive access. Bad deal. Will not happen. Very few
consumers here.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam
http://lists.cryptnet.net/mailman/listinfo/cpunx-news
Be sure and check the archive before posting. It is still small.
Cookies, members only archive access. Bad deal. Will not happen. Very few
consumers here.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam
If you spatially fft a random photo, you'll find that the image detail
energy largely occupies certain bands. These are not the bands that stego
uses (or so I assume...it really can't be otherwise). The stego-able
spectrum will indeed be noise, but this noise will have a certain spectrum.
If you spatially fft a random photo, you'll find that the image detail
energy largely occupies certain bands. These are not the bands that stego
uses (or so I assume...it really can't be otherwise). The stego-able
spectrum will indeed be noise, but this noise will have a certain spectrum.
Does anyone have a reasonably complete cypherpunks archive available
for FTP? Perhaps I could host them on my server and let Google index
them. That might be useful.
There are only two live ones. Someone knows more ?
The second one is FTP-able:
I've been wondering why I havent seen more discussion on
wireless networking (802.11a/b/g) and anon/mix /dark nets.
Is this a subject of interest to anyone? I am curious what
kinds of work has been done in this area...
Check the archives.
Wireless solves all crypto anonymity problems for
Does anyone have a reasonably complete cypherpunks archive available
for FTP? Perhaps I could host them on my server and let Google index
them. That might be useful.
There are only two live ones. Someone knows more ?
The second one is FTP-able:
I've been wondering why I havent seen more discussion on
wireless networking (802.11a/b/g) and anon/mix /dark nets.
Is this a subject of interest to anyone? I am curious what
kinds of work has been done in this area...
Check the archives.
Wireless solves all crypto anonymity problems for
One exception: the ***, which hand writes the address. Is
Why do you assume that you can tell handwriting from machine-generated script?
There are techniques far more advanced than static fonts, that can introduce
randomness and be pretty much indistinguishable from the manual product.
You might check out David Chaum's latest solution at
http://www.vreceipt.com/, there are more details in the whitepaper:
http://www.vreceipt.com/article.pdf
That is irrelevant. Whatever the solution is it must be understandable and
verifiable by the Standard high school dropout. Also, the
You might check out David Chaum's latest solution at
http://www.vreceipt.com/, there are more details in the whitepaper:
http://www.vreceipt.com/article.pdf
That is irrelevant. Whatever the solution is it must be understandable and
verifiable by the Standard high school dropout. Also, the
Somebody please tell me that this is a nightmare, and I am about to
wake up.
Let's see ... was there a contract to keep things up ad infinitum ?
This is a good step, part of waking up from the dream that there are free
things on Internet. If there is no eyeball-catching value to be derived
Somebody please tell me that this is a nightmare, and I am about to
wake up.
Let's see ... was there a contract to keep things up ad infinitum ?
This is a good step, part of waking up from the dream that there are free
things on Internet. If there is no eyeball-catching value to be derived
From what I've gathered from the diagrams in [1], it seems to be using
AES-256
in counter-mode XORed together with Twofish counter-mode output, Twofish also
being keyed with a 256 bit value. I sense paranoia here - but being paranoid
myself sometimes I very much welcome this decision! Those
From what I've gathered from the diagrams in [1], it seems to be using
AES-256
in counter-mode XORed together with Twofish counter-mode output, Twofish also
being keyed with a 256 bit value. I sense paranoia here - but being paranoid
myself sometimes I very much welcome this decision! Those
Isn't it really simpler to use RSA and DH and ECC in series ? Why choose ONE ?
There is no good reason for that.
Looks like PSYOP to me.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
__
Do you Yahoo!?
Exclusive Video Premiere
I have a few friends like thisanyone have suggestions for ways to change
their minds?
Basically they say things like If you think the government can't break all
the encryption schemes that we have, you're nuts. This guy was a math major
too, so he understands the principles of crypto.
Isn't it really simpler to use RSA and DH and ECC in series ? Why choose ONE ?
There is no good reason for that.
Looks like PSYOP to me.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
__
Do you Yahoo!?
Exclusive Video Premiere
ignored by citizens, but I have yet to see a license for owning a
typewriter or PC proposed. They have already ruled numerous times that the
Internet is deserving of at least as free and access as print media and
There are precedents. In Franko's Spain, all typewriters had to be
Looks like the only way to shield from DOS is to raise the cost of DOS. This
will eventually eliminate the low cost of Internet bandwidth, one way or
another. You don't get nearly the same amount of DOS on your telephone as you
do on Internet, right ? Because telephone call is not free and/or it's
Looks like the only way to shield from DOS is to raise the cost of DOS. This
will eventually eliminate the low cost of Internet bandwidth, one way or
another. You don't get nearly the same amount of DOS on your telephone as you
do on Internet, right ? Because telephone call is not free and/or it's
And what is the purpose of connecting the key and data storage in the first
place ?
Data storage is data storage, concealed or not. You feed encrypted data to/from
it.
Key is required at human interface and has absolutely nothing to do with the
storage.
If you want better security than
And what is the purpose of connecting the key and data storage in the first
place ?
Data storage is data storage, concealed or not. You feed encrypted data to/from
it.
Key is required at human interface and has absolutely nothing to do with the
storage.
If you want better security than
It took less than a decade for EFF to make a full turn, from championing
unrestricted uses of technology to censoring who can do what and in which way.
In this regards EFF resembles technological empires - like Cisco, for example,
that get born because of radically new ways to do things and then
It took less than a decade for EFF to make a full turn, from championing
unrestricted uses of technology to censoring who can do what and in which way.
In this regards EFF resembles technological empires - like Cisco, for example,
that get born because of radically new ways to do things and then
And who will free the chicken ?
Fucking racists.
Activists Take Ducks From Foie Gras Shed
FARMINGTON, Calif. With only the dim light of a half-moon to guide
them, four self-proclaimed duck freedom fighters made their way early
Wednesday across an abandoned field, around dilapidated,
What does it mean to say that 64.94.110.11 is or is not
certified by .com as the address for bad-example-12345.com ,
or that something else is? Is it really the same as a
wild-card that points to real sites? Your Best Practices says that
At this point it is immaterial what Verisign will or
infrastructure for these. Everyone knows about them
by using a common boostrap server to bootstrap into
the Jxta network to gain the addresses of a few
Rendezvous nodes. Rendezvous nodes then propagate
So they are subject to lawsuits. Anyone running them can be traced and
persuaded by the
infrastructure for these. Everyone knows about them
by using a common boostrap server to bootstrap into
the Jxta network to gain the addresses of a few
Rendezvous nodes. Rendezvous nodes then propagate
So they are subject to lawsuits. Anyone running them can be traced and
persuaded by the
stable IP address. Super-peers on the Jxta network run
application-level routers which store special
information such as how to reach peers, how to join
So these super peers are reliable, non-vulnerable, although everyone knows
where they are, because ?
=
end
(of original message)
Well, cats *do* have a quite strict hierarchy which is far from ad-hoc
establishment of the pecking order. So the analogy dosn't hold with cat
behavioral experts.
However, if cats could perform anonymized hissing, biting and scratching, then
I'm sure that cypherpunk maillist would be a good
stable IP address. Super-peers on the Jxta network run
application-level routers which store special
information such as how to reach peers, how to join
So these super peers are reliable, non-vulnerable, although everyone knows
where they are, because ?
=
end
(of original message)
Well, cats *do* have a quite strict hierarchy which is far from ad-hoc
establishment of the pecking order. So the analogy dosn't hold with cat
behavioral experts.
However, if cats could perform anonymized hissing, biting and scratching, then
I'm sure that cypherpunk maillist would be a good
http://recall.archive.org/?query=cypherpunkssearch=goafterMonth=1afterYear=1996beforeMonth=TodaybeforeYear=%A0
(the above URL should be all in one line, of course)
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
__
Do you
Several months ago, I read about someone who was making a key that
was difficult if not impossible to copy. They mixed sparkly things
into a plastic resin and let them set. A camera would take a picture
This boils down to difficulty of faking the analog interface.
Anything that regular
What Tim is (correctly) observing here is that a working challenge to the force
monopoly is a very effective way to modify behaviour.
Where Tim is wrong, though, is that he may have anything resembling a working
challenge.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this)
What Tim is (correctly) observing here is that a working challenge to the force
monopoly is a very effective way to modify behaviour.
Where Tim is wrong, though, is that he may have anything resembling a working
challenge.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this)
as a solid dish. (The uwaves see the screen as solid, however.) With
that much gain (ie directionality) wind could mess with your (albeit brief)
connection.
This one has 30 degree coverage and is perfect for connecting to consumer APs
up to a mile:
as a solid dish. (The uwaves see the screen as solid, however.) With
that much gain (ie directionality) wind could mess with your (albeit brief)
connection.
This one has 30 degree coverage and is perfect for connecting to consumer APs
up to a mile:
This is a terrible day for privacy advocates that used the once (perhaps
This is the great day for *true* privacy advocates worldwide.
In face of huge difficulties and dangers in providing real anonymity, some
human rights/wrongs organisations capitalised (in several ways) on the need for
Is this sequence random? Compressible? How could you tell whether this
sequence is random or not, if you didn't know the key?
This is the a way to describe so-called randomness.
One simply has no adequate access to the Key and/or the Algorithm.
Both coin flipping and quantum noise fall into
- N+1 is the smallest integer that's not interesting.
But that's interesting in itself - so N+1 is interesting.
It breaks down after few consequtive non-interesting integers.
In fact, there is a proof somewhere that 17, 18 and 19 are not interesting at
all.
=
end
(of original
As an active twist, we can also use a separate unit, Illuminating
Transceiver (IT), periodically broadcasting a pulse of known
characteristics, easy to recognize by the LPs when it bounces from an
aerial target. This unit has to be cheap and expendable - it's easy to
locate and to destroy by
seems horribly limiting. What of those using Entourage, or Mail, or any
of the dozens of platforms and news readers in existence. The site
mentions that they are now Blackberry-compliant. Well, does this mean
employees of the companies using Omniva Policy Manager cannot read
their mail on
If the digicash isn't anonymous, it's worthless.
I'd argue to the contrary. First, most people have nothing to hide.
The folks will want digicash for reasons other than anonymity, as argued
You are misusing the term cash. What you are describing are essentially
internet debit cards. While it
Those are the hard problems. No one in biometrics
has yet been able to solve them in a general way.
And the merchant example is the wrong application.
The merchant doesn't care WHO you are - that's a false premise.
Merchant cares if you can pay. Now, that's a completely solvable issue.
Of
There's a good reason why, viz: it would cost the drive developer to allow
or export this flexibility. Since very few customers are sick enough
This will go the same way as radio. First, you have hundreds of separate boxes,
each doing some custom modulation/frequency gig (am, fm, shortwave,
security, but having both the user and administrator configure a per
host secret was apparently out of the question.
There is no such thing as automatic security. That's an oxymoron.
Any system that is secure without the ongoing burn of end-user brain cycles
is subject to more-or-less easy
Religions are essentially collections of stories about the latter method
Religions are artificial shortcuts to knowledge and excellent method to
neutralize congenital human curiosity. If you can't comprehend it, fake it.
They all offer explanations of various phenomena by using familiar human
The solution to this is Palladium (NGSCB).
You'd want each ecommerce site to download a Nexus Computing Agent into
the client. This should be no more difficult than downloading an Active-X
control or some other DLL. The NCA has a manifest file associated with it
No shit? This is moronic.
Just FYI, if you read up on G (general intelligence factor), you will
learn that the *only* cause of death that increases with G is dying in
airplanes.
Surviving flying is very much similar to exercising safe crypto practices; you
must examine the source and recompile PGP for each message.
ftp://ftp.rfc-editor.org/in-notes/rfc3514.txt
excerpt:
1. Introduction
Firewalls [CBR03], packet filters, intrusion detection systems, and
the like often have difficulty distinguishing between packets that
have malicious intent and those that are merely unusual. The problem
is that
Frankly, it seems that some brains around here are softening. Relying on httpd
operators to protect those who access is plain silly, even if echelon (funny
how that word dropped below radar lately) did not exist.
The proper way is, of course, self-protection. Start with tight control of
outgoing
why not just use ssh? you can scp the text to your host, encrypt/decrypt it
*there* then scp it back if needs be. you also then don't need to use
webmail - just have a mailbox on that server that you forward your webmail
to, and that you send email in the name of the webmail account from.
its
This is what we need to fight. And this was, and perhaps still is, the
promises of unlinkable credentials, of untraceable digital cash, and of
True Names. Crypto anarchy is needed now more than ever.
There are hardly battlegrounds available. Software runs on machines big ones
make, bits
I'm wondering why Cryptome decided to place thisB particular piece of
opinion.B
It is not inkeeping w/ the type of stuff I've read here before, in terms of
it being a straightB opinion piece, not a document,B federal register entry,
etc..B Why did you (who is that exactly, anyway?) choose
I'm wondering why Cryptome decided to place thisB particular piece of
opinion.B
It is not inkeeping w/ the type of stuff I've read here before, in terms of
it being a straightB opinion piece, not a document,B federal register entry,
etc..B Why did you (who is that exactly, anyway?) choose
This is what we need to fight. And this was, and perhaps still is, the
promises of unlinkable credentials, of untraceable digital cash, and of
True Names. Crypto anarchy is needed now more than ever.
There are hardly battlegrounds available. Software runs on machines big ones
make, bits
From the OSI 7-layer model, which took it from the fact that the number 7 is
It's simpler than that. Russians wanted 6, americans 8.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
From the OSI 7-layer model, which took it from the fact that the number 7 is
It's simpler than that. Russians wanted 6, americans 8.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
1 - 100 of 295 matches
Mail list logo