Talking to someone who was at the legendary cypherpunks anniversary bbq.
He brought up the fact that someone there was talking about private
hedonistic cells (any errors are mine, not his, and whoever talked
about this, if they have any more thoughts on the matter, please feel
free to email me.)
There have been episodes of spoofing on this list. If client
side encryption just worked, and if what is considerably more
difficult, checking the signatures just worked, there would
be no bother, hence it would be rational to sign
Not just work but opt out is what you are looking for. If
Well, there was also some other details left out by that article. A 100kW
beam doesn't tell you very much if you don't know the beam diameter. A
1310nm telecom laser can cause serious eye damage with 10mW, but that's 10mW
into, say 38 um^2. But it ain't going to do nothing to enemy aircraft
Yes: The factory was bombed, but actual
deaths were one night watchman, not tens
of thousands,
Well, you haven't given me a very convincing argument here. In most of his
writings, Chomsky makes it clear that the deaths were not due to the bomb,
but the loss of medicine (such as penecillin)
At 10:17 PM 10/12/2002 -0400, Tyler Durden wrote:
Well, there was also some other details left out by that article. A 100kW
beam doesn't tell you very much if you don't know the beam diameter.
It tells you the output power, from which one may estimate input power
requirements.
A 1310nm
On Fri, 11 Oct 2002, Tyler Durden wrote:
And indeed, in a world where most messages are fairly weakly encrypted,
bursts of strongly-encrypted messages will stand out all the more and
possibly flag the need for other methods of investigation.
Doesn't figure: while it's easy to screen for
Experian threatens to sue in electoral roll row
'In a growing battle over privacy rights, Experian, Britain's biggest
credit reference agency, is threatening legal action against local
authorities refusing to release information held on the electoral roll. An
Experian spokesman said: A number
At 12:10 PM 10/11/2002 -0700, Major Variola (ret) [EMAIL PROTECTED] wrote:
Theres no huge explosion associated with its employment, there are no
pieces and
parts left behind that someone can analyze to say, this came from the
United States,
explains an unnamed Lockheed Martin official quoted in
On Sun, 13 Oct 2002, Sunder wrote:
Of course, for all you and I really know that could have been an Anthrax
factory cleverly disguised as as a pharmaceuticals factory, but we can put
up rethorical questions and answers such as these for the next millenia
and not get anywhere either.
And of course you can package 'strong' encryption into a 'weak' encryption
envelope, so you will only know that 'strong' encryption has been used after
you've broken the 'weak' envelope.
Oh yeah. Interesting. Of course, this would be done only if the sender knew
or supected how mass-scanning
On Sun, 13 Oct 2002, Tyler Durden wrote:
And of course you can package 'strong' encryption into a 'weak' encryption
envelope, so you will only know that 'strong' encryption has been used after
you've broken the 'weak' envelope.
Oh yeah. Interesting. Of course, this would be done only if
--
James A. Donald
Increasingly however, we see smartcard interfaces sold for
PCs. What for, I wonder?
On 24 Sep 2002 at 1:41, Bill Stewart wrote:
I'm not convinced that the number of people selling them is
closely related to the number of people buying; this could be
another
--- Tyler Durden [EMAIL PROTECTED] wrote:
Well, you haven't given me a very convincing
argument here. In most of his
writings, Chomsky makes it clear that the deaths
were not due to the bomb,
but the loss of medicine (such as penecillin) in
Sudan's only pharmecuetical
factory.
As those
At 09:01 PM 10/11/2002 -0400, Steve Furlong wrote:
There are two advantages of web-based discussion fora over usenet:
propagation time and firewalls. On the other hand, few discussions are
so urgent that they need near-real-time reparte, and participants
shouldn't be cruising usenet from work.
Sunder:
Yes: The factory was bombed, but actual
deaths were one night watchman, not tens
of thousands, and he asserted that the
Sudanese government are the good guys in
the civil war, and their opponents
terrorists.
James A. Donald:
And how many of their citizens have or
Hey don't forget you can still buy a smart card reader from that most
cypherpunkish of babes BRITNEY SPEARS ! Only $30 !
https://www.visiblevisitors.com/mltest/order_form.asp
--
_
Remember Kids- Somebody tries to kill you,
you try and kill'em
Our bombing of the sudanese
pharmacuetical factory?
Yes: The factory was bombed, but actual
deaths were one night watchman, not tens of thousands,
If so, that's gross incompetence on the part of the US military,
since the official rationale for why we were cruise-missiling it
was that we
packaging strong crypto inside weak crypto
At 01:06 PM 10/13/2002 -0400, Tyler Durden wrote:
Oh yeah. Interesting. Of course, this would be done only.
if the sender knew or supected how mass-scanning might be done.
And so the existence of another level of heavier encryption ...
might be a tip off
At 10:52 AM -0700 on 10/13/02, Bill Stewart wrote:
(You may not remember, but there was a program from fortify.net
that fixed 40-bit implementations of Netscape,
and there was even a one-liner Javascript signature-line program
that let you set Netscape to use 128 bits...
Not to mention the
The main difference, the axis along which one classifies
maillists/usenet/weblogs is the control.
On usenet, once the site agrees to carry a newsgroup, you have many entry
points and automatic distribution that is next to impossible to choke (other
than with noise.)
Maillists are more
On Sunday, October 13, 2002, at 01:16 AM, Ryan Sorensen wrote:
Talking to someone who was at the legendary cypherpunks anniversary
bbq.
He brought up the fact that someone there was talking about private
hedonistic cells (any errors are mine, not his, and whoever talked
about this, if
21 matches
Mail list logo