Re: Photos in transport plane of prisoners: Time for eJazeera?
Any wide-dissemination system must be distributed. Usenet used to fill this role, but due to aggregation of major nodes and feeds it is not that any more. Anything on the web has fixed pointers and already is or soon will be become chokable. I'd be surprised if there is no development in progress to install real time packet sniffin' and droppin' silicon on major exchange nodes, remotely loaded with patterns that identify the undesireables. Suddenly you get disappeared and invisible. Forget crypto and stego - it's not happening for the critical mass. Bootleg entertainment exchange P2P software offers some window, but it is progressively being hamstringed with TOS agreements and upcoming metered access (pay per Gb), and once freebies are gone, how many will bother to maintain and develop P2P networks for the old fashioned purpose of political activism ? We need to look beyond internet as it is today. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: U2 on LAUNCH - Exclusive greatest hits videos http://launch.yahoo.com/u2
Re: Photos in transport plane of prisoners: Time for eJazeera?
On Sat, Nov 09, 2002 at 08:10:22PM -0800, Mike Rosing wrote: | As long as there are people in the military who are willing and able to | inform us on what they are *really* doing, we actually can feel pretty | comfortable with their missions. It's gonna take a full polilce state | to prevent the dissemination of this kind of info. A full police state can't prevent anything, it can just make some things less common. For example, samizdat in the USSR still got copied and passed around. Drug use is a problem in US prisons. Etc. Adam -- It is seldom that liberty of any kind is lost all at once. -Hume
FYI: Hangar 18 Weekly Social, Austin Cpunks Monthy Meet, PotentialDowntime...
Howdy, Just a quick note that the weekly Hangar 18 meeting will -not- be held at Buffet Palace this week. Instead we'll be meeting at a members home to work on the Open Air Optical Network Project. If you're interested in attending then please contact myself, Bob, or Robert. I'll bring my project, hand tools, a soldering iron, and some Tsing Tao... The Austin Cypherpunks will be having their regular monthly meeting Tue. at the HEB Central Market Cafe at N. Lamar 38th. Look for the red covered Applied Cryptography. Nothing in particular on the agenda other than Guadalupe Catfish ;) Also, the city utilities has notified the upstream T1 site that there will be a power main switch sometime in the next week and a half or so. Don't know what changed, usually they just do it. The UPS was tested earlier this week as a result and all looks good. So, assuming nothing happens at the T1 site itself we should be able to weather the main switch with no interruption of services. But the best laid plans of mice and men... And speaking of the upstream T1, we've added some new switch boxes and extra power to the racks and can take four (4) Plan 9 boxes. We intend to add one, Bob will be adding one (if I understood his intent), and that leave two (2) open slots. In particular we're looking for process servers. This means fast CPU lots of RAM, with a medium size HD. I -think- Robert will be adding at least one box but he'll be taking care of the physical hosting himself (using the Hangar 18 Auth server for access I assume). Finally, we're looking into having two (2) BYOB's (Build Your Own Box) in the coming months. One in December before Christmas and another sometime late January. These will be standard Hangar 18 BYOB's so they will -not- be limited to any particular OS. I'll be setting up saucer.ssz.com as a Plan 9 auth server. This means we'll be ready to start adding other sites in late Dec. This also means that those who have been waiting on machines to come available for access should have resources to use in January. Zai Jian. -- We don't see things as they are, [EMAIL PROTECTED] we see them as we are. www.ssz.com [EMAIL PROTECTED] Anais Nin www.open-forge.org
Re: Photos in transport plane of prisoners: Time for eJazeera?
On Sat, 9 Nov 2002, Major Variola (ret) wrote: Specific use-cases can be written: the GI who took the picture; the photo-developer-tech who kept copies; the bored netop who intercepted the pix; an activist who is under insert type surveillance. Anyone interested? And what does it mean (if anything) to do this within the context of the Cypherpunk list? Dis be da place, at least for talk :-) If you can actually build links between service personell and the public, you don't need a document that says how to do shit. You use what ya got and ship the best you can do out to the real world. As long as there are people in the military who are willing and able to inform us on what they are *really* doing, we actually can feel pretty comfortable with their missions. It's gonna take a full polilce state to prevent the dissemination of this kind of info. Having known safe places and methods to send the info so the sender is always anonyomous is hard. Trash bags in parks isn't such a bad method :-) Patience, persistence, truth, Dr. mike
Publishing PGP keys --another hazard
If you publish your keys, random others can link the key to the published ID (e.g., email addr). This means, at least with the PGP UI, that if Alice encrypts to Bob and Carol (who don't know each other, but Bob publishes his key and Carol downloaded it) then Carol can see that the message is encrypted to Bob. If Bob and Carol are adversarial, or if Bob is concerned about traffic analysis and message confidentiality, that's bad. (Of course, if you privately distribute your (several) keys, you can prevent this.) Another reason the public 'web of trust' is nought but a social-network documentation device for TLAs, much like server-held address books (or even emailing lists?). The flip side of 'information wants to be free' is that sometimes its *your personal* information :-)