Re: Wikipedia Tor

2005-09-30 Thread Morlock Elloi
But now we're back to the question: how can Tor be improved to deal with this very serious and important problem? What are the steps that might be taken, however imperfect, to reduce the amount of abuse coming from Tor nodes? That's trivial: charge Tor-originated users for editing. That

Re: Wikipedia Tor

2005-09-29 Thread Morlock Elloi
But now we're back to the question: how can Tor be improved to deal with this very serious and important problem? What are the steps that might be taken, however imperfect, to reduce the amount of abuse coming from Tor nodes? That's trivial: charge Tor-originated users for editing. That

spoofing for dyslexic

2005-05-07 Thread Morlock Elloi
Just a tiny interesting operation found out via routine misspelling that can breed paranoia in idle minds: sprint has smtp to SMS gateway for its customers running at messaging.sprintpcs.com, so if you e-mail to [EMAIL PROTECTED] the user gets message on the phone. Interestingly enough, there

Re: [IP] Google's Web Accelerator is a big privacy risk (fwd from dave@farber.net)

2005-05-06 Thread Morlock Elloi
Google cookies last as long as possible -- until 2038. If you've And you are allowing cookies because ... ? And you are keeping cookies past the session because ... ? Too lazy not to? To lazy to login again? Inherent belief that commercial entity should make your life easy for purely

spoofing for dyslexic

2005-05-06 Thread Morlock Elloi
Just a tiny interesting operation found out via routine misspelling that can breed paranoia in idle minds: sprint has smtp to SMS gateway for its customers running at messaging.sprintpcs.com, so if you e-mail to [EMAIL PROTECTED] the user gets message on the phone. Interestingly enough, there

Re: [IP] Google's Web Accelerator is a big privacy risk (fwd from dave@farber.net)

2005-05-06 Thread Morlock Elloi
Google cookies last as long as possible -- until 2038. If you've And you are allowing cookies because ... ? And you are keeping cookies past the session because ... ? Too lazy not to? To lazy to login again? Inherent belief that commercial entity should make your life easy for purely

zombied ypherpunks (Re: Email Certification?)

2005-04-28 Thread Morlock Elloi
I'm still having trouble understanding your threat model. Just assume braindeath and it becomes obvious. No tla with any dignity left would bother e-mail providers or try to get your password. All it need to do is fill gforms and get access to tapped traffic at major nodes (say, 20 in US is

Re: DTV Content Protection

2005-04-11 Thread Morlock Elloi
This very likely means that someone already has MM figured out; the question is not whether it will be revealed, but when. All of these attacks focus on finding the master secret MM value; once that is found, the security of the system collapses. Given a KSV it is immediately possible to

RE: What Will We Do With Innocent People's DNA?

2005-03-23 Thread Morlock Elloi
The simplest solution is to systematically spread one's DNA everywhere, thus making 'discovery' of it meaningless. end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Mail - now with 250MB

RE: What Will We Do With Innocent People's DNA?

2005-03-23 Thread Morlock Elloi
The simplest solution is to systematically spread one's DNA everywhere, thus making 'discovery' of it meaningless. end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Yahoo! Mail - now with 250MB

Re: [p2p-hackers] good-bye, Mnet, and good luck. I'm going commercial! plus my last design doc (fwd from zooko@zooko.com)

2005-03-13 Thread Morlock Elloi
If you want to be invisible to lawyers, you have to use something else. Whoever wants to design something 'else' should first see Monty Python's How not to be seen sketch (or was it Importance of not being seen ?) It applies pretty well to all current techniques for moving unpaid copyrighted

Re: [p2p-hackers] good-bye, Mnet, and good luck. I'm going commercial! plus my last design doc (fwd from zooko@zooko.com)

2005-03-11 Thread Morlock Elloi
If you want to be invisible to lawyers, you have to use something else. Whoever wants to design something 'else' should first see Monty Python's How not to be seen sketch (or was it Importance of not being seen ?) It applies pretty well to all current techniques for moving unpaid copyrighted

But does it pass Diehard?

2005-02-15 Thread Morlock Elloi
Apologies for introducing crypto-related stuff: RNG that reads minds and predicts future: http://www.rednova.com/news/display/?id=126649 Can This Black Box See Into the Future? DEEP in the basement of a dusty university library in Edinburgh lies a small black box, roughly the size of two

(un)intended anonymity feature of gmail

2004-10-13 Thread Morlock Elloi
Unless I'm missing something obvious, it seems impossible to divine the origination IP address from gmail-sourced e-mail headers. The first IP (the last header) has 10.*.*.* form and is of course internal to google. This is not the case with any other e-mail service I know of (mixmaster

Re: Remailers an unsolveable paradox?

2004-09-01 Thread Morlock Elloi
What are the possible solutions for the remailers? Make all remailers middleman only and adding the ability to opt-in for Open wireless access points. No one said you are entitled to mail anonymously from the comfort of your home/office. Stop whining. = end (of original message)

Re: Remailers an unsolveable paradox?

2004-09-01 Thread Morlock Elloi
What are the possible solutions for the remailers? Make all remailers middleman only and adding the ability to opt-in for Open wireless access points. No one said you are entitled to mail anonymously from the comfort of your home/office. Stop whining. = end (of original message)

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Morlock Elloi
A cool thing for this purpose could be a patch for gcc to produce unique code every time, perhaps using some of the polymorphic methods used by viruses. The purpose would be that they do not figure out that you are using some security program, so they don't suspect that noise in the file or

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Morlock Elloi
A cool thing for this purpose could be a patch for gcc to produce unique code every time, perhaps using some of the polymorphic methods used by viruses. The purpose would be that they do not figure out that you are using some security program, so they don't suspect that noise in the file or

Re: On what the NSA does with its tech

2004-08-05 Thread Morlock Elloi
The impracticability of breaking symmetric ciphers is only a comparatively small part of the overall problem. I see that it can be done only by brute farce myth is live and well. Hint: all major cryptanalytic advances, where governments broke a cypher and general public found out few *decades*

Re: On what the NSA does with its tech

2004-08-04 Thread Morlock Elloi
The impracticability of breaking symmetric ciphers is only a comparatively small part of the overall problem. I see that it can be done only by brute farce myth is live and well. Hint: all major cryptanalytic advances, where governments broke a cypher and general public found out few *decades*

Nice pussy (was Re: [IP] more on more on E-mail intercept ruling - good grief!! )

2004-07-03 Thread Morlock Elloi
If VOIP gets no protection, then you'll see a lot of digital bugs in Protection of bits by legislation ??? Why is this a subject ? If you don't encrypt you will be listened to. Who the fuck cares if intercept is legal or not. That is irrelevant. It's like trying to obsolete summer clothing by

Nice pussy (was Re: [IP] more on more on E-mail intercept ruling - good grief!! )

2004-07-02 Thread Morlock Elloi
If VOIP gets no protection, then you'll see a lot of digital bugs in Protection of bits by legislation ??? Why is this a subject ? If you don't encrypt you will be listened to. Who the fuck cares if intercept is legal or not. That is irrelevant. It's like trying to obsolete summer clothing by

Re: [IP] When police ask your name, you must give it, Supreme Court says (fwd from dave@farber.net)

2004-06-22 Thread Morlock Elloi
incriminating, and the State has a substantial interest in knowing who you are -- you may need medicating, or you may owe the government money, or Exactly ... and maybe you are on this consumer list: http://bmj.bmjjournals.com/cgi/content/full/328/7454/1458 The president's commission found

Re: [IP] When police ask your name, you must give it, Supreme Court says (fwd from dave@farber.net)

2004-06-22 Thread Morlock Elloi
incriminating, and the State has a substantial interest in knowing who you are -- you may need medicating, or you may owe the government money, or Exactly ... and maybe you are on this consumer list: http://bmj.bmjjournals.com/cgi/content/full/328/7454/1458 The president's commission found

Re: Low-elevation skymapping at 2.45 Ghz

2004-06-17 Thread Morlock Elloi
However, it should be known that fiberglass (eg van) panels are transparent to uwaves AFAIK and that a van with soft tires is a 0th-order 0.25 glass will cost you 2-2.5 dB. At sufficiently good mechanical stabilization and gain, you will encounter perhaps The best way to do this is to

Re: Low-elevation skymapping at 2.45 Ghz

2004-06-16 Thread Morlock Elloi
However, it should be known that fiberglass (eg van) panels are transparent to uwaves AFAIK and that a van with soft tires is a 0th-order 0.25 glass will cost you 2-2.5 dB. At sufficiently good mechanical stabilization and gain, you will encounter perhaps The best way to do this is to

Re: Palm Hack?

2004-06-05 Thread Morlock Elloi
If there's any kind of leakage bias, then a high-powered signal might get a few bits through. After that, only a Palm OS expert will know if there's some kind of signal that can tease the Palm awake and then get it to swallow some kind of trojan. Bits are not marbles to exist outside

Re: Palm Hack?

2004-06-04 Thread Morlock Elloi
If there's any kind of leakage bias, then a high-powered signal might get a few bits through. After that, only a Palm OS expert will know if there's some kind of signal that can tease the Palm awake and then get it to swallow some kind of trojan. Bits are not marbles to exist outside

Re: Satellite eavesdropping of 802.11b traffic

2004-05-27 Thread Morlock Elloi
Does anyone know whether the low-power nature of wireless LANs protects them from eavesdropping by satellite? GSM cell phones have been successfully tapped via sat. Power is greater (up to .5w) but antennas are worse, so effective radiated energy is very similar, as are frequencies. = end

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-24 Thread Morlock Elloi
underground railroad would have worked better, but your still black. Obviously you don't know about whitening properties of moder ciphers! Seriously, today the distingushing marks among classes, tribes and castes are far more informational than physical. So today crypto *can* make you white, or

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-23 Thread Morlock Elloi
underground railroad would have worked better, but your still black. Obviously you don't know about whitening properties of moder ciphers! Seriously, today the distingushing marks among classes, tribes and castes are far more informational than physical. So today crypto *can* make you white, or

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-22 Thread Morlock Elloi
The extreme ease of use of internet wiretapping and lack of accountability is not a good situation to create. False. It is the best possible situation cpunk-wise I can imagine. It effectively deals away with bs artists (those who *argue* against this or that) and empowers mathematics. If one

Re: Cypherpunks response to viral stimuli

2004-02-03 Thread Morlock Elloi
Can a TLA please give some sign here, any sign - just ack that you know the list exists, otherwise the legitimacy of cpunks is definitely going down the drain. Looks like a Berlin wall syndrome. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows:

Re: WiFi Repeater?

2004-01-07 Thread Morlock Elloi
Forget about repeater. 13-15 db flat panel antenna will get you access to distant APs - up to one mile in favourable conditions. 18db grid dish will connect you to omnidirectional AP within 2 miles. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows:

Re: WiFi Repeater?

2004-01-06 Thread Morlock Elloi
Forget about repeater. 13-15 db flat panel antenna will get you access to distant APs - up to one mile in favourable conditions. 18db grid dish will connect you to omnidirectional AP within 2 miles. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows:

RE: The killer app for encryption

2003-12-19 Thread Morlock Elloi
Because it means you can complete call to the POTs with no company-controlled switch involved, meaning no where to serve a court order. Since the call could be routed through a few intermediate nodes and I see. So, in the real world, X uses this to make telephone threats, your POTS gets

RE: The killer app for encryption

2003-12-19 Thread Morlock Elloi
What I'd like to see is a P2P telephony that also supports end-user gateways to the POTS. I'm not certain, but I think there are some MS I don't get what does this have to do with crypto. Outside crypto, this didn't quite work with (almost) public fax gateways of '90s. In theory, you could

RE: The killer app for encryption

2003-12-18 Thread Morlock Elloi
What I'd like to see is a P2P telephony that also supports end-user gateways to the POTS. I'm not certain, but I think there are some MS I don't get what does this have to do with crypto. Outside crypto, this didn't quite work with (almost) public fax gateways of '90s. In theory, you could

Re:Textual analysis

2003-12-16 Thread Morlock Elloi
Its like steganalysis. Its an arms race between measuring your own signatures vs. what the Adversary can measure. If sentence length is a metric known to you, you can write filters that warn you. Similarly for the Adversary. You end up in an arms race over metrics ---who has the more

Re:Textual analysis

2003-12-16 Thread Morlock Elloi
Its like steganalysis. Its an arms race between measuring your own signatures vs. what the Adversary can measure. If sentence length is a metric known to you, you can write filters that warn you. Similarly for the Adversary. You end up in an arms race over metrics ---who has the more

Re: cpunk-like meeting report

2003-12-15 Thread Morlock Elloi
http://lists.cryptnet.net/mailman/listinfo/cpunx-news Be sure and check the archive before posting. It is still small. Cookies, members only archive access. Bad deal. Will not happen. Very few consumers here. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam

Re: cpunk-like meeting report

2003-12-14 Thread Morlock Elloi
http://lists.cryptnet.net/mailman/listinfo/cpunx-news Be sure and check the archive before posting. It is still small. Cookies, members only archive access. Bad deal. Will not happen. Very few consumers here. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam

Re: Has this photo been de-stegoed?

2003-12-11 Thread Morlock Elloi
If you spatially fft a random photo, you'll find that the image detail energy largely occupies certain bands. These are not the bands that stego uses (or so I assume...it really can't be otherwise). The stego-able spectrum will indeed be noise, but this noise will have a certain spectrum.

Re: Has this photo been de-stegoed?

2003-12-10 Thread Morlock Elloi
If you spatially fft a random photo, you'll find that the image detail energy largely occupies certain bands. These are not the bands that stego uses (or so I assume...it really can't be otherwise). The stego-able spectrum will indeed be noise, but this noise will have a certain spectrum.

Re: Type III Anonymous message

2003-12-09 Thread Morlock Elloi
Does anyone have a reasonably complete cypherpunks archive available for FTP? Perhaps I could host them on my server and let Google index them. That might be useful. There are only two live ones. Someone knows more ? The second one is FTP-able:

Re: Type III Anonymous message

2003-12-08 Thread Morlock Elloi
I've been wondering why I havent seen more discussion on wireless networking (802.11a/b/g) and anon/mix /dark nets. Is this a subject of interest to anyone? I am curious what kinds of work has been done in this area... Check the archives. Wireless solves all crypto anonymity problems for

Re: Type III Anonymous message

2003-12-08 Thread Morlock Elloi
Does anyone have a reasonably complete cypherpunks archive available for FTP? Perhaps I could host them on my server and let Google index them. That might be useful. There are only two live ones. Someone knows more ? The second one is FTP-able:

Re: Type III Anonymous message

2003-12-08 Thread Morlock Elloi
I've been wondering why I havent seen more discussion on wireless networking (802.11a/b/g) and anon/mix /dark nets. Is this a subject of interest to anyone? I am curious what kinds of work has been done in this area... Check the archives. Wireless solves all crypto anonymity problems for

Re: FOIA Data Mining

2003-11-30 Thread Morlock Elloi
One exception: the ***, which hand writes the address. Is Why do you assume that you can tell handwriting from machine-generated script? There are techniques far more advanced than static fonts, that can introduce randomness and be pretty much indistinguishable from the manual product.

Re: e voting (receipts, votebuying, brinworld)

2003-11-25 Thread Morlock Elloi
You might check out David Chaum's latest solution at http://www.vreceipt.com/, there are more details in the whitepaper: http://www.vreceipt.com/article.pdf That is irrelevant. Whatever the solution is it must be understandable and verifiable by the Standard high school dropout. Also, the

Re: e voting (receipts, votebuying, brinworld)

2003-11-25 Thread Morlock Elloi
You might check out David Chaum's latest solution at http://www.vreceipt.com/, there are more details in the whitepaper: http://www.vreceipt.com/article.pdf That is irrelevant. Whatever the solution is it must be understandable and verifiable by the Standard high school dropout. Also, the

Re: Vivendi to Destroy MP3.com archive

2003-11-22 Thread Morlock Elloi
Somebody please tell me that this is a nightmare, and I am about to wake up. Let's see ... was there a contract to keep things up ad infinitum ? This is a good step, part of waking up from the dream that there are free things on Internet. If there is no eyeball-catching value to be derived

Re: Vivendi to Destroy MP3.com archive

2003-11-21 Thread Morlock Elloi
Somebody please tell me that this is a nightmare, and I am about to wake up. Let's see ... was there a contract to keep things up ad infinitum ? This is a good step, part of waking up from the dream that there are free things on Internet. If there is no eyeball-catching value to be derived

Re: Freedomphone

2003-11-21 Thread Morlock Elloi
From what I've gathered from the diagrams in [1], it seems to be using AES-256 in counter-mode XORed together with Twofish counter-mode output, Twofish also being keyed with a 256 bit value. I sense paranoia here - but being paranoid myself sometimes I very much welcome this decision! Those

Re: Freedomphone

2003-11-20 Thread Morlock Elloi
From what I've gathered from the diagrams in [1], it seems to be using AES-256 in counter-mode XORed together with Twofish counter-mode output, Twofish also being keyed with a 256 bit value. I sense paranoia here - but being paranoid myself sometimes I very much welcome this decision! Those

Re: NSA Turns To Commercial Software For Encryption

2003-10-27 Thread Morlock Elloi
Isn't it really simpler to use RSA and DH and ECC in series ? Why choose ONE ? There is no good reason for that. Looks like PSYOP to me. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Exclusive Video Premiere

Re: If you use encryption, you help the terrorists win

2003-10-27 Thread Morlock Elloi
I have a few friends like thisanyone have suggestions for ways to change their minds? Basically they say things like If you think the government can't break all the encryption schemes that we have, you're nuts. This guy was a math major too, so he understands the principles of crypto.

Re: NSA Turns To Commercial Software For Encryption

2003-10-27 Thread Morlock Elloi
Isn't it really simpler to use RSA and DH and ECC in series ? Why choose ONE ? There is no good reason for that. Looks like PSYOP to me. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you Yahoo!? Exclusive Video Premiere

Re: [mnet-devel] DOS in DHTs (fwd from amichrisde@yahoo.de)

2003-10-23 Thread Morlock Elloi
ignored by citizens, but I have yet to see a license for owning a typewriter or PC proposed. They have already ruled numerous times that the Internet is deserving of at least as free and access as print media and There are precedents. In Franko's Spain, all typewriters had to be

Re: [mnet-devel] DOS in DHTs (fwd from amichrisde@yahoo.de)

2003-10-20 Thread Morlock Elloi
Looks like the only way to shield from DOS is to raise the cost of DOS. This will eventually eliminate the low cost of Internet bandwidth, one way or another. You don't get nearly the same amount of DOS on your telephone as you do on Internet, right ? Because telephone call is not free and/or it's

Re: [mnet-devel] DOS in DHTs (fwd from amichrisde@yahoo.de)

2003-10-20 Thread Morlock Elloi
Looks like the only way to shield from DOS is to raise the cost of DOS. This will eventually eliminate the low cost of Internet bandwidth, one way or another. You don't get nearly the same amount of DOS on your telephone as you do on Internet, right ? Because telephone call is not free and/or it's

Re: Idea: Small-volume concealed data storage

2003-10-11 Thread Morlock Elloi
And what is the purpose of connecting the key and data storage in the first place ? Data storage is data storage, concealed or not. You feed encrypted data to/from it. Key is required at human interface and has absolutely nothing to do with the storage. If you want better security than

Re: Idea: Small-volume concealed data storage

2003-10-11 Thread Morlock Elloi
And what is the purpose of connecting the key and data storage in the first place ? Data storage is data storage, concealed or not. You feed encrypted data to/from it. Key is required at human interface and has absolutely nothing to do with the storage. If you want better security than

Re: EFF Report on Trusted Computing

2003-10-09 Thread Morlock Elloi
It took less than a decade for EFF to make a full turn, from championing unrestricted uses of technology to censoring who can do what and in which way. In this regards EFF resembles technological empires - like Cisco, for example, that get born because of radically new ways to do things and then

Re: EFF Report on Trusted Computing

2003-10-09 Thread Morlock Elloi
It took less than a decade for EFF to make a full turn, from championing unrestricted uses of technology to censoring who can do what and in which way. In this regards EFF resembles technological empires - like Cisco, for example, that get born because of radically new ways to do things and then

Re: Duck Freedom Fighter (Terrorists), Euler SUV Graffiti

2003-09-18 Thread Morlock Elloi
And who will free the chicken ? Fucking racists. Activists Take Ducks From Foie Gras Shed FARMINGTON, Calif.  With only the dim light of a half-moon to guide them, four self-proclaimed duck freedom fighters made their way early Wednesday across an abandoned field, around dilapidated,

Re: Verisign's Wildcard A-Records and DNSSEC Plans?

2003-09-17 Thread Morlock Elloi
What does it mean to say that 64.94.110.11 is or is not certified by .com as the address for bad-example-12345.com , or that something else is? Is it really the same as a wild-card that points to real sites? Your Best Practices says that At this point it is immaterial what Verisign will or

Re: [p2p-hackers] Project Announcement: P2P Sockets

2003-09-12 Thread Morlock Elloi
infrastructure for these. Everyone knows about them by using a common boostrap server to bootstrap into the Jxta network to gain the addresses of a few Rendezvous nodes. Rendezvous nodes then propagate So they are subject to lawsuits. Anyone running them can be traced and persuaded by the

Re: [p2p-hackers] Project Announcement: P2P Sockets

2003-09-11 Thread Morlock Elloi
infrastructure for these. Everyone knows about them by using a common boostrap server to bootstrap into the Jxta network to gain the addresses of a few Rendezvous nodes. Rendezvous nodes then propagate So they are subject to lawsuits. Anyone running them can be traced and persuaded by the

Re: [p2p-hackers] Project Announcement: P2P Sockets (fwd from bradneuberg@yahoo.com)

2003-09-10 Thread Morlock Elloi
stable IP address. Super-peers on the Jxta network run application-level routers which store special information such as how to reach peers, how to join So these super peers are reliable, non-vulnerable, although everyone knows where they are, because ? = end (of original message)

Re: cats

2003-09-10 Thread Morlock Elloi
Well, cats *do* have a quite strict hierarchy which is far from ad-hoc establishment of the pecking order. So the analogy dosn't hold with cat behavioral experts. However, if cats could perform anonymized hissing, biting and scratching, then I'm sure that cypherpunk maillist would be a good

Re: [p2p-hackers] Project Announcement: P2P Sockets (fwd from bradneuberg@yahoo.com)

2003-09-10 Thread Morlock Elloi
stable IP address. Super-peers on the Jxta network run application-level routers which store special information such as how to reach peers, how to join So these super peers are reliable, non-vulnerable, although everyone knows where they are, because ? = end (of original message)

Re: cats

2003-09-09 Thread Morlock Elloi
Well, cats *do* have a quite strict hierarchy which is far from ad-hoc establishment of the pecking order. So the analogy dosn't hold with cat behavioral experts. However, if cats could perform anonymized hissing, biting and scratching, then I'm sure that cypherpunk maillist would be a good

Charted death of cypherpunks

2003-09-09 Thread Morlock Elloi
http://recall.archive.org/?query=cypherpunkssearch=goafterMonth=1afterYear=1996beforeMonth=TodaybeforeYear=%A0 (the above URL should be all in one line, of course) = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __ Do you

Re: Searching for uncopyable key made of sparkles in plastic

2003-09-03 Thread Morlock Elloi
Several months ago, I read about someone who was making a key that was difficult if not impossible to copy. They mixed sparkly things into a plastic resin and let them set. A camera would take a picture This boils down to difficulty of faking the analog interface. Anything that regular

Re: Responding to orders which include a secrecy requirement

2003-09-02 Thread Morlock Elloi
What Tim is (correctly) observing here is that a working challenge to the force monopoly is a very effective way to modify behaviour. Where Tim is wrong, though, is that he may have anything resembling a working challenge. = end (of original message) Y-a*h*o-o (yes, they scan for this)

Re: Responding to orders which include a secrecy requirement

2003-09-01 Thread Morlock Elloi
What Tim is (correctly) observing here is that a working challenge to the force monopoly is a very effective way to modify behaviour. Where Tim is wrong, though, is that he may have anything resembling a working challenge. = end (of original message) Y-a*h*o-o (yes, they scan for this)

Re: traffix analysis

2003-08-30 Thread Morlock Elloi
as a solid dish. (The uwaves see the screen as solid, however.) With that much gain (ie directionality) wind could mess with your (albeit brief) connection. This one has 30 degree coverage and is perfect for connecting to consumer APs up to a mile:

Re: traffix analysis

2003-08-30 Thread Morlock Elloi
as a solid dish. (The uwaves see the screen as solid, however.) With that much gain (ie directionality) wind could mess with your (albeit brief) connection. This one has 30 degree coverage and is perfect for connecting to consumer APs up to a mile:

Re: JAP back doored

2003-08-21 Thread Morlock Elloi
This is a terrible day for privacy advocates that used the once (perhaps This is the great day for *true* privacy advocates worldwide. In face of huge difficulties and dangers in providing real anonymity, some human rights/wrongs organisations capitalised (in several ways) on the need for

Re: paradoxes of randomness

2003-08-19 Thread Morlock Elloi
Is this sequence random? Compressible? How could you tell whether this sequence is random or not, if you didn't know the key? This is the a way to describe so-called randomness. One simply has no adequate access to the Key and/or the Algorithm. Both coin flipping and quantum noise fall into

Re: paradoxes of randomness

2003-08-16 Thread Morlock Elloi
- N+1 is the smallest integer that's not interesting. But that's interesting in itself - so N+1 is interesting. It breaks down after few consequtive non-interesting integers. In fact, there is a proof somewhere that 17, 18 and 19 are not interesting at all. = end (of original

Re: Idea: Homemade Passive Radar System (GNU/Radar)

2003-08-14 Thread Morlock Elloi
As an active twist, we can also use a separate unit, Illuminating Transceiver (IT), periodically broadcasting a pulse of known characteristics, easy to recognize by the LPs when it bounces from an aerial target. This unit has to be cheap and expendable - it's easy to locate and to destroy by

Re: They never learn: Omniva Policy Systems

2003-08-14 Thread Morlock Elloi
seems horribly limiting. What of those using Entourage, or Mail, or any of the dozens of platforms and news readers in existence. The site mentions that they are now Blackberry-compliant. Well, does this mean employees of the companies using Omniva Policy Manager cannot read their mail on

Re: A 'Funky A.T.M.' Lets You Pay for Purchases Made Online

2003-07-22 Thread Morlock Elloi
If the digicash isn't anonymous, it's worthless. I'd argue to the contrary. First, most people have nothing to hide. The folks will want digicash for reasons other than anonymity, as argued You are misusing the term cash. What you are describing are essentially internet debit cards. While it

Re: idea: brinworld meets the credit card

2003-07-08 Thread Morlock Elloi
Those are the hard problems. No one in biometrics has yet been able to solve them in a general way. And the merchant example is the wrong application. The merchant doesn't care WHO you are - that's a false premise. Merchant cares if you can pay. Now, that's a completely solvable issue. Of

Re: Idea: The ultimate CD/DVD auditing tool

2003-07-06 Thread Morlock Elloi
There's a good reason why, viz: it would cost the drive developer to allow or export this flexibility. Since very few customers are sick enough This will go the same way as radio. First, you have hundreds of separate boxes, each doing some custom modulation/frequency gig (am, fm, shortwave,

Re: Attacking networks using DHCP, DNS - probably kills DNSSEC

2003-06-30 Thread Morlock Elloi
security, but having both the user and administrator configure a per host secret was apparently out of the question. There is no such thing as automatic security. That's an oxymoron. Any system that is secure without the ongoing burn of end-user brain cycles is subject to more-or-less easy

Re: Senators from Utah being Southern

2003-06-23 Thread Morlock Elloi
Religions are essentially collections of stories about the latter method Religions are artificial shortcuts to knowledge and excellent method to neutralize congenital human curiosity. If you can't comprehend it, fake it. They all offer explanations of various phenomena by using familiar human

Re: An attack on paypal -- secure UI for browsers

2003-06-10 Thread Morlock Elloi
The solution to this is Palladium (NGSCB). You'd want each ecommerce site to download a Nexus Computing Agent into the client. This should be no more difficult than downloading an Active-X control or some other DLL. The NCA has a manifest file associated with it No shit? This is moronic.

Re: IQ, g, flying

2003-06-01 Thread Morlock Elloi
Just FYI, if you read up on G (general intelligence factor), you will learn that the *only* cause of death that increases with G is dying in airplanes. Surviving flying is very much similar to exercising safe crypto practices; you must examine the source and recompile PGP for each message.

cooperative evil bit

2003-04-03 Thread Morlock Elloi
ftp://ftp.rfc-editor.org/in-notes/rfc3514.txt excerpt: 1. Introduction Firewalls [CBR03], packet filters, intrusion detection systems, and the like often have difficulty distinguishing between packets that have malicious intent and those that are merely unusual. The problem is that

Re: Logging of Web Usage

2003-04-02 Thread Morlock Elloi
Frankly, it seems that some brains around here are softening. Relying on httpd operators to protect those who access is plain silly, even if echelon (funny how that word dropped below radar lately) did not exist. The proper way is, of course, self-protection. Start with tight control of outgoing

Re: pgp in internet cafe (webpgp)

2003-03-23 Thread Morlock Elloi
why not just use ssh? you can scp the text to your host, encrypt/decrypt it *there* then scp it back if needs be. you also then don't need to use webmail - just have a mailbox on that server that you forward your webmail to, and that you send email in the name of the webmail account from. its

Re: Crypto anarchy now more than ever

2003-02-15 Thread Morlock Elloi
This is what we need to fight. And this was, and perhaps still is, the promises of unlinkable credentials, of untraceable digital cash, and of True Names. Crypto anarchy is needed now more than ever. There are hardly battlegrounds available. Software runs on machines big ones make, bits

Re: The practical reason the U.S. is starting a war

2003-02-15 Thread Morlock Elloi
I'm wondering why Cryptome decided to place thisB particular piece of opinion.B It is not inkeeping w/ the type of stuff I've read here before, in terms of it being a straightB opinion piece, not a document,B federal register entry, etc..B Why did you (who is that exactly, anyway?) choose

Re: The practical reason the U.S. is starting a war

2003-02-15 Thread Morlock Elloi
I'm wondering why Cryptome decided to place thisB particular piece of opinion.B It is not inkeeping w/ the type of stuff I've read here before, in terms of it being a straightB opinion piece, not a document,B federal register entry, etc..B Why did you (who is that exactly, anyway?) choose

Re: Crypto anarchy now more than ever

2003-02-15 Thread Morlock Elloi
This is what we need to fight. And this was, and perhaps still is, the promises of unlinkable credentials, of untraceable digital cash, and of True Names. Crypto anarchy is needed now more than ever. There are hardly battlegrounds available. Software runs on machines big ones make, bits

Re: Putting the NSA Data Overwrite Standard Legend to Death... (fwd)

2003-02-05 Thread Morlock Elloi
From the OSI 7-layer model, which took it from the fact that the number 7 is It's simpler than that. Russians wanted 6, americans 8. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Mail Plus - Powerful. Affordable. Sign up now.

Re: Putting the NSA Data Overwrite Standard Legend to Death... (fwd)

2003-02-04 Thread Morlock Elloi
From the OSI 7-layer model, which took it from the fact that the number 7 is It's simpler than that. Russians wanted 6, americans 8. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Mail Plus - Powerful. Affordable. Sign up now.

  1   2   3   >