On Thu, 2 Jan 2003, Sarad AV wrote:
An axiom is an improvable statement which is accepted
as true.
An axiom is a statement which is -assumed to be universaly required-.
That is -not- equivalent to 'true' (eg A point has only position is not
'true' but a -definition- which is neither true or
At 10:52 AM 1/2/2003 -0800, Declan McCullagh wrote:
http://news.com.com/2010-1028-978636.html
Perspective: Will this land me in jail?
By Declan McCullagh
December 23, 2002, 4:00 AM PT
WASHINGTON--It's not every day that I fret about committing a string
of federal felonies that
Isn't the obvious way to handle this to include an undeveloped
(latent image) photograph of some obscure object, person, or place on
the film rather than just a blank film ? ? You could then develop it
and check for light damage and evidence of lack of authenticity. I
suspect there
On Wednesday, January 1, 2003, at 04:50 AM, [EMAIL PROTECTED] wrote:
What's the latest news on Adelman's cryptological
soup? Once his DNA crypto was touted as a
substantial breakthrough for crypto, though since
overshadowed by quantum crypto smoke-blowing.
On Wednesday, January 1, 2003, at 07:34 PM, Major Variola (ret) wrote:
Its very common, if the person in front of you hasn't a card, to loan
your
card (to a total stranger! gasp!) when you them without. I've also
noticed that the checkers now
keep a working card to use in these situations.
On Tuesday, December 31, 2002, at 07:38 AM, Tyler Durden wrote:
Actually, Tyler Durden (ie, me) wrote what is attributed to the
generic anonymous name of Norman Nescio. Anyway,...
Hilarious to see a generic Tyler Durden, last seen in movie theaters,
claiming to be the _real_ Tyler Durden.
hi,
--- Jim Choate [EMAIL PROTECTED] wrote:
On Thu, 2 Jan 2003, Sarad AV wrote:
An axiom is an improvable statement which is
accepted
as true.
An axiom is a statement which is -assumed to be
universaly required-.
That is -not- equivalent to 'true' (eg A point has
only position is
hi,
with reference to
http://www.utm.edu/research/iep/p/par-liar.htm
it says
The Liar Paradox is an argument that arrives at a
contradiction by reasoning about a Liar Sentence. The
most familiar Liar Sentence is the following
self-referential sentence:
(1) This sentence is false.
Experts
On Fri, 3 Jan 2003, Sarad AV wrote:
The Liar Paradox is an argument that arrives at a
contradiction by reasoning about a Liar Sentence. The
most familiar Liar Sentence is the following
self-referential sentence:
As it says-they are self referecial statements.What do
we learn from the
On Wed, 1 Jan 2003, A.Melon wrote:
If you still want to say there's some kind of hole in quantum theory, then are you
saying that if
we fix this hole, QM will bve able to predict experimental outcomes to, say 20
decimals rather than
10? (QM is by far the most sucesful physical theory ever
On Wed, 1 Jan 2003, Eugen Leitl wrote:
On Tue, 31 Dec 2002, Thomas Shaddack wrote:
Is there a way to RELIABLY find the mail was opened?
I have a related question. I have a little server sitting in a wall
closet. Does anyone have an easy solution (preferably low tech) for
figuring out
On Wednesday, January 1, 2003, at 08:55 PM, Michael Cardenas wrote:
On Tue, Dec 31, 2002 at 12:23:51PM -0800, Tim May wrote:
On Tuesday, December 31, 2002, at 11:41 AM, Michael Cardenas wrote:
How do you all see the future use of biologically based systems
affecting cryptography in general?
On Wed, 1 Jan 2003, Eugen Leitl wrote:
On Wed, 1 Jan 2003 [EMAIL PROTECTED] wrote:
What's the latest news on Adelman's cryptological
soup? Once his DNA crypto was touted as a
substantial breakthrough for crypto, though since
overshadowed by quantum crypto smoke-blowing.
DNA computes
On Wed, 1 Jan 2003, Matthew X wrote:
Chompsky makes the point that the state underwrites the so called free market.
As we are all libertarians,(cept shoate) here we should be doing our utmost
to expose,ridicule,attack and destroy the state,nest pas?
You're right, I don't want to get rid of
On Fri, 3 Jan 2003, Sarad AV wrote:
As you already see-what you say is correct for your
definition of proof and axiom.
Here is the fundamental error in your thinking, you are trying to argue
apples and oranges. As my comments alude to, what you are doing is trying
to argue geometry using two
On Fri, 3 Jan 2003, Thomas Shaddack wrote:
I have a related question. I have a little server sitting in a wall
closet. Does anyone have an easy solution (preferably low tech) for
figuring out that the closet door has been opened?
A switch that shutdowns the server, and a passphrase on
On Fri, 3 Jan 2003, Sarad AV wrote:
As it says-they are self referecial statements.What do
we learn from the liars paradox?
We arrive at a senseless result-doesn't all other
paradoxes do that-with the difference that they pick
only either true or false-which they so strongly
beleive in and
I have a related question. I have a little server sitting in a wall
closet. Does anyone have an easy solution (preferably low tech) for
figuring out that the closet door has been opened?
A switch that shutdowns the server, and a passphrase on the startup.
Remote logging of the power-ups, using
And your point is?
I mean, I really appreciate your posting an excerpt from my resume on
the list - thereby attributing rather more importance to it than it
deserves - but I somehow don't think you did it to promote my
translation or editing work. Why, then?
Marc de Piolenc
Matthew X wrote:
Jim Choate wrote...
Burrowing into what I claimed is 'wacky crapola' I discovered a nugget of truth I can
agree with (but it'll take a minute to get there...)
And no, Relativity and QM have -not- been joined into a -single cohesive theory-.
You have to qualify this. General relativity has
WASHINGTON, Jan. 2 ? A 19-year-old University of Chicago student was
arrested in Los Angeles today and charged with stealing trade
secrets from DirecTV, the nation's leading satellite television
provider
http://www.nytimes.com/2003/01/03/technology/03PIRA.html
According to prosecutors,
At 02:18 AM 01/03/2003 -0800, Tim May wrote:
On Wednesday, January 1, 2003, at 08:55 PM, Michael Cardenas wrote:
People do break cyphers, by finding weaknesses in them. Are you saying
that you think that current cyphers are unbreakable?
You know not whereof you speak.
Breaking RSA or similar
On Fri, 3 Jan 2003 07:24:12 +0100 (CET), you wrote:
We have a resourceful adversary, who will quickly learn the
tricks. We need a low-tech technology that will be highly resistant
against undetected tampering by the adversary.
Hindering the adversary is the fact that he must face thousands
Here's why wavefunction collapse matters, or might.
A few months ago, we were debating the End of the Golden age of crypto, and that
went into a discussion of the inherent (or not!) difficulty wrt factoring large
numbers consisting of big primes.
And the question that was raised (and is still
I see that you're entirely correct. I've read about half of Scheiner's
applied cryptography, and I'm familiar with the fact that current
algorithms' strength is based on factoring large primes, and familiar
with his estimates of 10^11 years for a 112 bit key, (given the caveat
of no new scifi
On Fri, Jan 03, 2003 at 10:39:45AM -0800, Bill Stewart wrote:
At 02:18 AM 01/03/2003 -0800, Tim May wrote:
On Wednesday, January 1, 2003, at 08:55 PM, Michael Cardenas wrote:
People do break cyphers, by finding weaknesses in them. Are you saying
that you think that current cyphers are
On Friday, January 3, 2003, at 08:39 AM, Michael Cardenas wrote:
I see that you're entirely correct. I've read about half of Scheiner's
applied cryptography, and I'm familiar with the fact that current
algorithms' strength is based on factoring large primes,
Factoring large primes is easy.
On Thu, Dec 19, 2002 at 06:16:48PM -0500, Trei, Peter wrote:
A year or two ago, I suggested to someone associated with
http://www.thebunker.com (an ISP based in an underground
ex-RAF bunker in Britain) that they set up a web-accessible
camera on the entrance, so that anyone could detect an
It's a tradeoff. I was able to raise an alarm about the DMCA and get
journalists (who usually don't think of it as a threat) to be more skeptical.
Also show the silly security practices of the TSA.
I'm happy to balance that against the actual value of the information
in the encrypted documents
29 matches
Mail list logo