Re: Private Homes may be taken for public good

2005-06-24 Thread Thomas Shaddack
On Thu, 23 Jun 2005, Tyler Durden wrote: How do you take out a bulldozer? Anti-tank mine?

Re: Your epapers, please?

2005-04-03 Thread Thomas Shaddack
On Thu, 31 Mar 2005, Major Variola (ret) wrote: At 10:08 PM 3/31/05 +0200, Eugen Leitl wrote: government plan to insert remotely readable chips in American passports, calling the chips [2]homing devices for high-tech muggers, So the market for faraday-cages for your passport will

RE: Team Building?? WIMPS!!

2005-02-14 Thread Thomas Shaddack
On Thu, 10 Feb 2005, Tyler Durden wrote: Well, I didn't say it would be easy. We'd definitely need to split up into teams...one to handle the alarm systems, Teamwork is essential here. Maybe attract a lightning with a rocket on a wire[1], the induced current will do the job with the sensors

Re: campus network admins

2004-11-04 Thread Thomas Shaddack
On Thu, 4 Nov 2004 [EMAIL PROTECTED] wrote: I recently violated the network user agreement (they packet-sniffed and got the username/password for my FTP server and didn't like what I was sharing with myself) and was informed by the admin that I am now 'under observation' and that they hope

Re: Airport insanity

2004-10-20 Thread Thomas Shaddack
On Tue, 19 Oct 2004, James A. Donald wrote: The US government should expose and condemn these objectionable practices, subvert moderately objectionable regimes, and annihilate more objectionable regimes. The pentagon should deprive moderately objectionable regimes of economic resources,

RE: Airport insanity

2004-10-18 Thread Thomas Shaddack
On Mon, 18 Oct 2004, James A. Donald wrote: a. The probability ratios don't work out so that the overwhelming majority of people you throw off planes are innocent. Provided the number of people you throw off planes is rather small, I don't see the problem. It isn't a problem for

RE: Airport insanity

2004-10-18 Thread Thomas Shaddack
On Mon, 18 Oct 2004, James A. Donald wrote: Thomas Shaddack wrote: It isn't a problem for you until it happens to you. Who knows when being interested in anon e-cash will become a ground to blacklist *you*. I know when it will happen. It will happen when people interested in anon

Re: Airport insanity

2004-10-18 Thread Thomas Shaddack
On Mon, 18 Oct 2004, James A. Donald wrote: Sadre protected himself with Iraqi women and young children as human shields, showing that he expected the Pentagon to show more concern for Iraqi lives than he did. Pentagon protects their people by distance - being it by bombing from high

Re: Airport insanity

2004-10-18 Thread Thomas Shaddack
On Sun, 17 Oct 2004, James A. Donald wrote: -- James A. Donald: If you really look like the shoe bomber, then you should have to drive, or use public transport. Thomas Shaddack Ever tried to drive to Europe? Or to Hawaii? Hard biscuit Do I interpret this statement

Re: Airport insanity

2004-10-16 Thread Thomas Shaddack
On Sat, 16 Oct 2004, James A. Donald wrote: If you really look like the shoe bomber, then you should have to drive, or use public transport. Ever tried to drive to Europe? Or to Hawaii? Why airplanes don't count as a form of public transport? So by that rationale, every Arab should

Re: RFID Driver's licenses for VA

2004-10-09 Thread Thomas Shaddack
On Thu, 7 Oct 2004, Sunder wrote: So the cops and RFID h4x0rZ can know your true name from a distance. and since RFID tags, are what, $0.05 each, the terrorists and ID counterfitters will be able to make fake ones too... Whee! Given the power requirements for doing anything more than dumb

Re: Foreign Travelers Face Fingerprints and Jet Lag

2004-10-03 Thread Thomas Shaddack
On Sun, 3 Oct 2004, J.A. Terranson wrote: (1) There are also a number of non-rebar+concrete walls in place to keep US citizens from leaving; Please elaborate?

Re: potential new IETF WG on anonymous IPSec

2004-09-17 Thread Thomas Shaddack
On Thu, 16 Sep 2004, Major Variola (ret) wrote: At 02:17 PM 9/16/04 -0700, Joe Touch wrote: Except that certs need to be signed by authorities that are trusted. Name one. You don't have to sign the certs. Use self-signed ones, then publish a GPG signature of your certificate in a known

Re: Geopolitical Darwin Awards

2004-09-15 Thread Thomas Shaddack
On Tue, 14 Sep 2004, Major Variola (ret) wrote: How about Iran stating that they're messing with UF6, when Israel[1] is a known pre-emptive bomber of Facilities to the East? That's pretty much tickling the dragon. Maybe they are playing a different game. They couldn't use the eventually

Re: potential new IETF WG on anonymous IPSec

2004-09-15 Thread Thomas Shaddack
On Wed, 15 Sep 2004, Ian Grigg wrote: The whole point of the CA model is that there is no prior relationship and that the network is a wild wild west sort of place - both of these assumptions seem to be reversed in the backbone world, no? So one would think that using opportunistic

Re: Forest Fire responsible for a 2.5mi *mushroom cloud*?

2004-09-13 Thread Thomas Shaddack
On Sun, 12 Sep 2004, J.A. Terranson wrote: No big deal? Who are they kidding? A 2-mile wide cloud is WAY too big to be caused by a single explosion, unless REALLY big. The forest fire claim sounds more plausible in this regard. An existing cloud could be used for masking, though. But a

Re: anonymous IP terminology (Re: [anonsec] Re: potential new IETF WG on anonymous IPSec (fwd from hal@finney.org))

2004-09-13 Thread Thomas Shaddack
On Sun, 12 Sep 2004, R. A. Hettinga wrote: From: Adam Back [EMAIL PROTECTED] Subject: Re: anonymous IP terminology (Re: [anonsec] Re: potential new IETF At ZKS we had software to remail MIME mail to provide a pseudonymous email. But one gotcha is that mail clients include MIME boundary

Re: whatever is necessary

2004-09-04 Thread Thomas Shaddack
On Fri, 3 Sep 2004, Major Variola (ret) wrote: Just heard Clinton's going in the hospital to get a heart. Clinton was a victim of an assassination attempt by junk food. McQaeda, the cardiovascular terrorist organization endangering the Developed World and deemed responsible for millions

Re: gmail as a gigabyte of an external filesystem

2004-09-03 Thread Thomas Shaddack
On Sun, 29 Aug 2004, Thomas Shaddack wrote: Question for the crowd: How difficult it would be to write a suitable crypto engine as a plug-in module for FUSE itself? Then we could have support for encrypted files on any filesystem accessible through FUSE. --- http

Re: gmail as a gigabyte of an external filesystem

2004-09-03 Thread Thomas Shaddack
On Fri, 3 Sep 2004, Adam Back wrote: Don't know anything about EncFS, but you could also use loopback encryption on top of gmailfs. Just make a large file in gmail fs, and make a filesystem in it via loopback virtual block device-in-a-file. According to the shards of knowledge about GmailFS

Suggestion

2004-08-18 Thread Thomas Shaddack
I hereby suggest to postpone the flamewars for the winter, when the weather brings the need of some spare waste heat. I thought we're above name-calling here. But perhaps it was just a quiet period and the current situation will rectify on its own in couple days, as it usually does. Besides,

Re: yes, they look for stego, as a Hacker Tool

2004-08-15 Thread Thomas Shaddack
On Sat, 14 Aug 2004, Major Variola (ret) wrote: Argh. You misunderstood me. I don't want to find hash collisions, to create a false known hash - that is just too difficult. I want to make every file in the machine recognized as unidentifiable. No, I understood this. In a later post it was

Re: yes, they look for stego, as a Hacker Tool

2004-08-14 Thread Thomas Shaddack
On Fri, 13 Aug 2004, Major Variola (ret) wrote: Even if you map a particular hash into one of a million known-benign values, which takes work, there are multiple orthagonal hash algorithms included on the NIST CD. (Eg good luck finding values that collide in MD5 SHA-1 SHA-256

Re: yes, they look for stego, as a Hacker Tool

2004-08-14 Thread Thomas Shaddack
On Sat, 14 Aug 2004, Thomas Shaddack wrote: polymorphic or encrypted, but then they would be in the unknown category, along with user-created files. And programs :-) To be manually inspected by a forensic dude. Run a tool for signature changing preemptively, on *all* the files

Re: Cryptome on ABC Evening News?

2004-08-13 Thread Thomas Shaddack
Can somebody record it in MPEG or DivX, please? :) It's difficult to get ABC News across the Atlantic without a dish. On Thu, 12 Aug 2004, R. A. Hettinga wrote: There's a teaser for tonight's 6:30 news about a wesite that publishes pipeline maps and the names and addresses of government

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Thomas Shaddack
On Fri, 13 Aug 2004, Sunder wrote: If you're suspected of something really big, or you're middle eastern, then you need to worry about PDA forensics. Otherwise, you're just another geek with a case of megalomania thinking you're important enough for the FedZ to give a shit about you. In

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Thomas Shaddack
On Fri, 13 Aug 2004, Tyler Durden wrote: And it seems to me to be a difficult task getting ahold of enough photos that would be believably worth encrypting. Homemade porn?

Re: yes, they look for stego, as a Hacker Tool

2004-08-13 Thread Thomas Shaddack
On Fri, 13 Aug 2004, Major Variola (ret) wrote: Any jpg which looks like noise will be of interest. And any stego program will make them look at your images (etc) more closely :-) Most of the programs they've hashed is so the forensic pigs can discount them. But they would find

Re: Forensics on PDAs, notes from the field

2004-08-12 Thread Thomas Shaddack
On Wed, 11 Aug 2004, Major Variola (ret) wrote: Obvious lesson: Steganography tool authors, your programs should use the worm/HIV trick of changing their signatures with every invocation. Much harder for the forensic fedz to recognize your tools. (As suspicious, of course). It should be

Re: NSA Overcomes Fiber-Optic and Encryption

2004-08-11 Thread Thomas Shaddack
On Mon, 9 Aug 2004, John Young wrote: Excerpt below from a Baltimore Sun article of August 8, 2004. Some of it could be true, but. http://cryptome.org/dirnsa-shift.htm I think the correct title would be sidesteps instead of overcomes. It's a fundamentally different way (though the result is

Re: Michael Moore in Cambridge (download speech)

2004-08-11 Thread Thomas Shaddack
On Tue, 10 Aug 2004, Pete Capelli wrote: Being still currently undecided myself (although living in one of the 32 or so 'pre-ordained' states) I found this speech to be most cynical, opportunistic, divisive, and un-American ones I've listend to in awhile. Define un-American, please?

Re: On what the NSA does with its tech

2004-08-05 Thread Thomas Shaddack
On Wed, 4 Aug 2004, Hal Finney wrote: As you can see, breaking 128 bit keys is certainly not a task which is so impossible that it would fail even if every atom were a computer. If we really needed to do it, it's not outside the realm of possibility that it could be accomplished within 50

Re: X-Cypher, SIP VoIP, stupid propriatory crapola

2004-07-29 Thread Thomas Shaddack
On Wed, 28 Jul 2004, Dave Howe wrote: Particularly disgusted by the last paragraph | With encryption comes the problem of either managing public/private | keys, which must be kept secret, or the annoyance of transmitting a | secure key to a remote party over other secure methods.

Re: Why there is no anonymous e-cash

2004-07-24 Thread Thomas Shaddack
On Mon, 19 Jul 2004, James A. Donald wrote: As I predicted, transactions are increasingly going on line. And as Hettinga predicted, the more anonymous and irreversible the transaction service, the cheaper and more convenient its services. All happening as predicted. So why don't we

Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-23 Thread Thomas Shaddack
On Thu, 22 Jul 2004, Major Variola (ret) wrote: My point is only that they will be killed should they leak their actual capabilities. Well... I am reading a book about intelligence now. Specifically, Ernst Volkman: Spies - the secret agents who changed the course of history. Amusing book;

Re: Texas oil refineries, a White Van, and Al Qaeda

2004-07-20 Thread Thomas Shaddack
On Tue, 20 Jul 2004, Justin wrote: HOUSTON (Reuters) - Law enforcement officials said on Monday they are looking for a man seen taking pictures of two refineries in Texas City, Texas. How difficult it is to wait for a sunny day, wire a digital camera to take two pictures per second with

Low-cost thermal/multispectral imaging via mechanical slow-scan TV

2004-07-20 Thread Thomas Shaddack
Thermal imaging is a very powerful and very cool technology with many many applications in both security and engineering. However, the main obstacle for its wider usage in civilian sector is very high cost of the microbolometer array sensors. However, there are affordably cheap remote

Cheap TDR for fibers?

2004-07-19 Thread Thomas Shaddack
The laser diodes used in eg. CD players have a feedback photodiode, sensing the laser's optical output. If the lasers used for optical fibers have similar mechanism too, and if the diode is sensitive to the light coming to it not only from the chip but also from the fiber itself, and can

Re: vacuum-safe laptops ?

2004-07-18 Thread Thomas Shaddack
On Fri, 16 Jul 2004, Major Variola (ret) wrote: Um, even the small form factor PC on a board the size of your palm may still rely on caps in the power supply that don't handle 760 to 0 mm Hg/min so readily. However, if you use a low-power board, you have less current to filter the ripples

Re: vacuum-safe laptops ?

2004-07-18 Thread Thomas Shaddack
On Sat, 17 Jul 2004, Tyler Durden wrote: Sorry to need educating once again, but I had assumed can-shaped capacitors were gone from laptops in lieu of surface mount. Anyone know? (I don't own a laptop.) The can caps can be surface-mounted as well. The leads then look different, but the

Re: Secure telephones

2004-07-18 Thread Thomas Shaddack
On Sat, 17 Jul 2004, Steve Schear wrote: How about building a secure cell phone using GnuRadio as a core? That way you have maximum control afforded by the protocols. Several reasons valid at this moment (though I suppose (and hope) the situation will improve in next couple years). There is

Re: Secure telephones

2004-07-18 Thread Thomas Shaddack
On Sun, 18 Jul 2004, Bill Stewart wrote: If you're trying to build a usable cellphone, you've got much more stringent design criteria than a deskphone. I am painfully aware of it. You've got packaging requirements that force you into serious industrial design if you want something

Re: vacuum-safe laptops ?

2004-07-17 Thread Thomas Shaddack
On Fri, 16 Jul 2004, Major Variola (ret) wrote: Does anyone *know* (first or second hand, I can speculate myself) which laptops, if any, can safely go to zero air pressure (dropping from 1 atm to 0 in, say, 1 minute.) Sorry so late ---but your can-shaped capacitors might not handle the

Re: FIPS chassis/linux security engineer?

2004-07-17 Thread Thomas Shaddack
On Sat, 17 Jul 2004, Eric Murray wrote: For a seperate project, does anyone know of a small linux-ready/able box with ethernet? Gumstix looks cool but I need hardwire networking. Soekris, http://www.soekris.com/. PXA255, http://www.hw-server.com/hw_products/sld_hws.html Are there more,

Re: Mexico Atty. General gets microchipped (fwd)

2004-07-14 Thread Thomas Shaddack
On Tue, 13 Jul 2004, J.A. Terranson wrote: Forwarded for amusement http://www.cnn.com/2004/WORLD/americas/07/13/mexico.chip.reut/index.html Mexico attorney general gets microchip implant Politicians getting RFIDs. Will it spur a new generation of smart roadside bombs, landmines, and

Re: Bumazhkas

2004-07-13 Thread Thomas Shaddack
On Tue, 13 Jul 2004, Harmon Seaver wrote: Bumazhkas? I thought I was pretty familiar with most weapons of the world, but not Bumazhkas. What calibre are they? I've always liked those CZ Model 52 pistols and Model 32 subguns in .30Mauser. Loaded hot with a teflon coated bullet they

Re: USA PATRIOT Act Survives Amendment Attempt

2004-07-12 Thread Thomas Shaddack
On Sat, 10 Jul 2004 [EMAIL PROTECTED] wrote: But we have a psychological mechanism here; many people tend to be tough when not under direct threat. Then they implement the mechanism. Then years flow by. Then the prosecutors come. But by then it is too late to cooperate. They are doomed

Re: USA PATRIOT Act Survives Amendment Attempt

2004-07-11 Thread Thomas Shaddack
On Fri, 9 Jul 2004, Steve Schear wrote: This may best be accomplished by placing the data offshore and empowering the db operators with some non-repudiatable right of disclosure (especially under duress of a warrant). This may be impractical in some cases. Some months back I discussed a

Re: [IP] Hi-tech rays to aid terror fight

2004-07-09 Thread Thomas Shaddack
On Thu, 8 Jul 2004, Major Variola (ret) wrote: 5. One could call terahertz hard RF in same way that hard x-rays bleed into soft gammas. But calling anything hard implies danger, and we mustn't scare the proles. Perhaps soft IR is better. Technically, it's closer to soft IR. If I remember

Re: Querying SSL/TLS capabilities of SMTP servers

2004-07-09 Thread Thomas Shaddack
cases. In the rest, I have to resort to telnet. Thanks a lot. Seems I have to learn perl. Looks powerful. On Thu, 8 Jul 2004, Justin wrote: On 2004-07-08T17:50:57+0200, Thomas Shaddack wrote: I cobbled up together a small bash shell script that does this. It lists the MX records for a domain

Re: USA PATRIOT Act Survives Amendment Attempt (fwd from brian-slashdotnews@hyperreal.org)

2004-07-09 Thread Thomas Shaddack
On Fri, 9 Jul 2004, Steve Schear wrote: Quite a few book stores (including the local Half-Priced Books) now keep no records not required and some do not even automate and encourage their patron to pay cash. In California book sellers to such used/remaindered stores must identify themselves

Querying SSL/TLS capabilities of SMTP servers

2004-07-08 Thread Thomas Shaddack
I cobbled up together a small bash shell script that does this. It lists the MX records for a domain, and then tries to connect to each of them, issue an EHLO command, disconnect, then list the output of the server, alerting if the server supports STARTTLS. It should be easy to further query

RE: photodisc search (was Re: BOUNTY BEAR is Faster ...)

2004-07-08 Thread Thomas Shaddack
A big database of images with metadata can be used to train a neural network (or other suitable AI approach) to recognize unknown images. On Thu, 8 Jul 2004, Tyler Durden wrote: Yeah, but this is a metadata search, correct? Seems to me Our Protectors(TM) are probably able to search a vast

Re: Privacy laws and social engineering

2004-07-07 Thread Thomas Shaddack
On Tue, 6 Jul 2004, Major Variola (ret) wrote: So, which is better, Schneier's books or Mitnick's? I suspect the former, but am curious what the community opinion is? You may like one side of the coin more than the other one, but they still belong to the same flat, dirty, formerly shiny

Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-07 Thread Thomas Shaddack
Reading some news about the email wiretapping by ISPs, and getting an idea. There are various email forwarding services, which are nothing more than a SMTP server with pairs of [EMAIL PROTECTED] -- [EMAIL PROTECTED] Messages in storage have much lower judicial protection than messages in

Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-07 Thread Thomas Shaddack
On Tue, 6 Jul 2004, Hal Finney wrote: There are various email forwarding services, which are nothing more than a SMTP server with pairs of [EMAIL PROTECTED] -- [EMAIL PROTECTED] Right, mostly for use as disposable email addresses. I've used spamgourmet to good effect, myself. I

China about to begin realtime censoring SMS messages

2004-07-03 Thread Thomas Shaddack
Mass-sending of SMS messages in China is a popular channel of spreading alternative, government-unsanctioned news. Used eg. by the Falun Gong group, to spread the news about SARS, and probably in numerous other cases. Some phones are even directly equipped with the functions to automatically

Re: Tyler's Education

2004-07-03 Thread Thomas Shaddack
On Sat, 3 Jul 2004, Major Variola (ret) wrote: And digital edges are sharp, in the Ghz even when the clock is in the Mhz. How much do the spread spectrum clock feature on the modern motherboards help here? And boxes need ventilation slots. Not necessarily. There are other ways of heat

Re: China about to begin realtime censoring SMS messages

2004-07-03 Thread Thomas Shaddack
On Sat, 3 Jul 2004, Major Variola (ret) wrote: At 06:25 PM 7/3/04 +0200, Thomas Shaddack wrote: automatically send SMS messages to a list of numbers. The government already keeps statistics on number of messages sent at time period from a single number, and alerts the officials when it's

Re: For Liars and Loafers, Cellphones Offer an Alibi

2004-06-27 Thread Thomas Shaddack
On Sat, 26 Jun 2004, J.A. Terranson wrote: a mikropower jammer, Only if you are willing to forego the phone as well, in which case, just remove the battery pack :-) I am assuming here that the phone has a dual receiver, one of the GPS signal and one of the cellular service itself. As both

Re: For Liars and Loafers, Cellphones Offer an Alibi

2004-06-27 Thread Thomas Shaddack
On Sat, 26 Jun 2004, J.A. Terranson wrote: Eventually the cellphones will be able to tell another phone approx where they are. Remember the 911-locator fascism? I hate to break the news to you Major, but GPS enabled phones cannot be instructed to turn off the GPS feature for law

Re: For Liars and Loafers, Cellphones Offer an Alibi

2004-06-27 Thread Thomas Shaddack
On Sat, 26 Jun 2004, Major Variola (ret) wrote: I'm fully aware the pigs track you unless the battery is removed or you have a TEMPEST case. I'm suggesting that regular citizens will have access to that, if (in my cluelessness) they don't already. If the phone is shielded, it can't

Re: For Liars and Loafers, Cellphones Offer an Alibi

2004-06-27 Thread Thomas Shaddack
On Sun, 27 Jun 2004, Eugen Leitl wrote: Triangulation by signal strength is one thing, triangulation by relativistic ToF (time of flight) -- while still not present in consumer gadgets -- is far more difficult to fool. Especially if it's tied into the protocol, that you're getting position

Re: For Liars and Loafers, Cellphones Offer an Alibi

2004-06-27 Thread Thomas Shaddack
On Sun, 27 Jun 2004, Riad S. Wahby wrote: J.A. Terranson [EMAIL PROTECTED] wrote: Interestingly, some [early] models had external antenna jacks built in to them. Many still have test jacks on them. Both my old Samsung A500 and my current Sanyo SCP-8100 have a connector (either MC or

Re: Low-elevation skymapping at 2.45 Ghz

2004-06-17 Thread Thomas Shaddack
The best way to do this is to mount the narrow-angle dish *and* video camera on the same mount, then use simple circuitry to superimpose white circle on the center of the image when signal exceeds some threshold (or vary the size with signal level.) The results could be startling. You could

Re: [osint] Assassination Plans Found On Internet

2004-06-14 Thread Thomas Shaddack
On Mon, 14 Jun 2004, R. A. Hettinga wrote: I can't stop laughing. *This* is why the west will win. They post their plans, in the clear. It may be also a very cheap method of attack. Don't spend any money on material nor people; just send out an attack documentation in the clear and watch the

RE: [irtheory] War ain't beanbag. Irony is conserved.

2004-06-13 Thread Thomas Shaddack
Exactly at which point does a war (any war) stop being defensive because according to the history books the US has never fought an aggressive war. I prefer to think about the McDonald's paradox: No country that has a McDonald's has attacked another. :-). Then either the paradox is dead

Re: Satellite eavesdropping of 802.11b traffic

2004-05-27 Thread Thomas Shaddack
On Thu, 27 May 2004, Roy M. Silvernail wrote: It seems to me that you'd need a pretty big dish in orbit to get that kind of resolution. The Keyholes(?) are for microwaves, right? Where better to put the big dish than in orbit? Clarke-belt birds are separated by what, 10 km? So a 5 km

Re: welcoming computer viruses

2004-05-23 Thread Thomas Shaddack
On Fri, 21 May 2004, Tyler Durden wrote: Imagine I'm working for a large Fortune 100 Company. Now imagine I hear about a sasser-like worm that will install atself and spread, BUT it has been confirmed that the worm will proceed to vomit spam at X for a period of 48 hours. Depend on X (eg,

RE: EU seeks quantum cryptography response to Echelon

2004-05-19 Thread Thomas Shaddack
On Tue, 18 May 2004, Tyler Durden wrote: Monyk believes there will be a global market of several million users once a workable solution has been developed. A political decision will have to be taken as to who those users will be in order to prevent terrorists and criminals from taking

Diffie-Hellman question

2004-05-17 Thread Thomas Shaddack
I have a standard implementation of OpenSSL, with Diffie-Hellman prime in the SSL certificate. The DH cipher suite is enabled. Is it safe to keep one prime there forever, or should I rather periodically regenerate it? Why? If yes, what's some sane period to do so: day, week, month? If the

Re: We're jamming, we're jamming, we hope you like jammin too

2004-05-12 Thread Thomas Shaddack
RFID jamming should be very easy and a quite amusing DoS attack on commercial targets. Easy because its not frequency hopping, low power, and relatively low frequency. Particularly cute would be transmitting sex-toy codes intermittently. Considering the transmitting powers of the tags, an

Re: Can Skype be wiretapped by the authorities? (fwd from em@em.no-ip.com)

2004-05-09 Thread Thomas Shaddack
the traffic flows through them): see e.g. John Walker's analysis of the reasons that led him to abandon SpeakFreely at http://www.fourmilab.ch/speakfree/ . Thomas Shaddack suggested to leverage on Jabber, but: 1. Jabber uses TCP as transport, and therefore can't be efficiently used

Re: Fact checking

2004-04-28 Thread Thomas Shaddack
On Wed, 28 Apr 2004, Tim Benham wrote: I bet people would start voting after that. If they don't, offer them two vials of crack! It's already being done; it's called political promises. The candidates are usually pretty high on that stuff. What won't hurt could be making them liable for

Infrared flash?

2004-04-27 Thread Thomas Shaddack
For bright flashes of visible light, xenon flash tubes are the choice. But when I want a really bright flash on about 800-900 nm, what approach is the best? One application is a security camera taking a snapshot without alerting the adversary with a flash. (Could be a good system against

Re: Mask secures personal displays

2004-04-26 Thread Thomas Shaddack
Yamamoto is also optimistic that this technique will find commercial applications. Display of secret information on PDA and computer screens are practical applications, he explained. Other business applications include: securing the screen of a terminal at a bank; an operator screen that

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-24 Thread Thomas Shaddack
On Fri, 23 Apr 2004, A.Melon wrote: Are there any publicly available documents that detail interrogation protocols and what brainwave patterns and bloodflow look like during truth telling and lying? Preferably something that gets into how to consciously alter brainwave patterns and

Re: cop-proof disk drives

2004-04-24 Thread Thomas Shaddack
On Sat, 24 Apr 2004, Bill Stewart wrote: That's really overkill. Computers these days have enough horsepower to run file system encryption in the CPU. That's true, but it's possible to get access to the key in memory. Once the machine is compromised, the keys are leaked. It's true that when

RE: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-23 Thread Thomas Shaddack
Right, there are at least two workable solutions- Hard drives with user alterable firmware. I surprised that none of the major drive manufacturers seems to have thought about offering a version of their controllers, for substantially more money, that offers this. A retrofit device that

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-23 Thread Thomas Shaddack
On Fri, 23 Apr 2004, John Kelsey wrote: The obvious problem with multiple levels of passwords and data is: When does the guy with the rubber hose stop beating passwords out of you? After he gets one? Yeah, that's plausible, if he's convinced there's only one. But once he's seen a second

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-23 Thread Thomas Shaddack
On Fri, 23 Apr 2004, Major Variola (ret) wrote: filesystems (etc) with layers of deniable stego. Are there any decent implementations for Linux/BSD/NT? I haven't looked recently. One property that such a FS or app should have is that it is useful for something *else* besides stego duress

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-22 Thread Thomas Shaddack
On Thu, 22 Apr 2004, Major Variola (ret) wrote: At 12:09 PM 4/22/04 +0200, Eugen Leitl wrote: Are you truly expecting a worldwide ban on encryption? How do you prove somebody is using encryption on a steganographic channel? Torture, of the sender, receiver, or their families, has worked

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-22 Thread Thomas Shaddack
On Thu, 22 Apr 2004, Major Variola (ret) wrote: However, it's not entirely reliable. At some point, the suspect tells you what you want to hear, whether or not it is the truth, just so you leave him alone. It can even happen that the suspect convinces himself that what he really did what he

Behavior pattern recognition

2004-04-18 Thread Thomas Shaddack
http://us.cnn.com/2004/TRAVEL/04/16/airline.behavior.ap/ http://www.usatoday.com/travel/news/2004-04-16-behaviorscan_x.htm http://news.bostonherald.com/national/view.bg?articleid=1780 Carnival Booth, anyone? Besides, it's matter of time until the checklists leak and the adversaries adjust their

Anonymity vs reputation question

2004-04-17 Thread Thomas Shaddack
Thinking about something, I found an interesting problem. It is possible to set up a reputation-based system with nyms, where every nym is an identity with attached reputation. The problem is, a nym that exists for a long time can get its anonymity partially or fully compromised. Abandonment of

Idea: Offshore gambling as gateway between real and electronic money

2004-04-17 Thread Thomas Shaddack
Adoption of anonymous e-money is to great degree hindered by the lack of infrastructure to convert this currency to/from meatspace money. However, there is possible a method, using offshore gambling companies. There may be a special kind of gamble, that looks from the outside like regular

Re: On Killing Blaster

2004-04-13 Thread Thomas Shaddack
On Mon, 12 Apr 2004, Major Variola (ret) wrote: against Men with Guns...in the end Men With Guns will probably try to shoot away bits, but it's not going to work too well. You forget that there are no bits which are not physical. Physical things reside on land leased from the State (try

Steve Brinich: The Criminal

2004-04-10 Thread Thomas Shaddack
Dug this from my old archives, after finding out it vanished from the Net. Decade-old, but more truthful than before. May it provide some inspiration. -- Title: The Criminal Lyrics by: Steve Brinich Tune: The Idiot (Stan Rogers) Date:

RE: Sttop Spreading Hatred

2004-03-28 Thread Thomas Shaddack
On Sun, 28 Mar 2004, Tyler Durden wrote: Another thing that seems to bind us (and again bind is probably a poor choice of words) is an extreme tolerance to opinions very different from that of any one subscriber. U... like ...and in a flame war bind them? /me hides

Re: [p2p-hackers] Ideas for an opensource Skype lookalike (fwd from em@em.no-ip.com)

2004-03-14 Thread Thomas Shaddack
On Sat, 13 Mar 2004, Eugen Leitl wrote: - Forwarded message from Enzo Michelangeli [EMAIL PROTECTED] - - Directories for location and presence. Nothing fancy here, already done before for P2P chat systems. I think I suggested it already somewhere. Use Jabber. Use Jabber ID instead of

Re: [Users] Announce: FreeS/WAN Project Ending

2004-03-02 Thread Thomas Shaddack
On Tue, 2 Mar 2004, Justin wrote: From: Claudia Schmeing [EMAIL PROTECTED] Subject: [Users] Announce: FreeS/WAN Project Ending Dear FreeS/WAN community, After more than five years of active development, the FreeS/WAN project will be coming to an end. Is anyone disappointed? Yes.

Re: [Users] Announce: FreeS/WAN Project Ending

2004-03-02 Thread Thomas Shaddack
good news snipped :) And sure, you use FreeS/WAN, and a company I used to work for used it too. There are employees of many other companies who post to the FreeS/WAN lists. But that's hardly representative of the majority of companies. Majority as in number of employees, or as in count?

Re: Humorous Airport DoS (from cryptogram)

2004-02-16 Thread Thomas Shaddack
Or if I sprayed the seats in the airports lounge or restaurant, the bomb-sniffing dogs would become butt-sniffing dogs, to the major embarrassment of security. This last, while humorous, would go a long way toward discrediting the security force. Chemicals that aren't detected themselves

FCC vs decentralization

2004-02-13 Thread Thomas Shaddack
Wondering a little. FCC recently mandated fees for Internet radio broadcasters, based on the number of listeners. However, there are emergent technologies for P2P broadcasting, where some of the clients act as broadcasters themselves, retranslating the stream. This way it may not be technically

Spam filter / killfile rule

2004-01-10 Thread Thomas Shaddack
There is a problem here how to killfile (or spamfilter) the more repeated nothing-saying posts without losing also his good stuff as the collateral damage. The good ruleset could be (translate to the syntax of whatever you use): Sender: [EMAIL PROTECTED] Body contains: smoke Body contains:

Small embedded computer board? (SLD PXA 255 DIMM)

2004-01-07 Thread Thomas Shaddack
http://www.hw-server.com/test/sld_hws.html Take a look at the DIMM modules. Looks like a good candidate for a battery-powered portable VoIP/GSM encrypted cellphone. Add a GPRS modem or a cellphone (or, for landline version, a modem), a small display/keyboard, and eg. SpeakFreely with suitable

Re: Small embedded computer board? (SLD PXA 255 DIMM)

2004-01-07 Thread Thomas Shaddack
want to get fancy, throw in a small form factor CF bluetooth card (the 860 has a CF slot) and you could bond to a Bluetooth cellphone Speakfreely without wires :) Moe Thomas Shaddack wrote: http://www.hw-server.com/test/sld_hws.html Take a look at the DIMM modules. Looks like a good

Re: WiFi Repeater?

2004-01-06 Thread Thomas Shaddack
I can't be considered an expert on this technology, so probably there is another, much simpler solution. The first idea (and so far the only one) I got is to use a pair of wireless access points, eg, DWL-900AP+ ones (the only ones I have experience with so far); if I'd have a pair of these, I'd

Re: Quantum Loop Gravity Be For Whitey

2004-01-04 Thread Thomas Shaddack
On Thu, 1 Jan 2004, Tim May wrote: A few moments of thought will show the connection between replicators and general assemblers. A general assembler can make another general assembler, hence all general assemblers are replicators. And in fact this is necessary to make mechanosynthesis

Idea: Simplified TEMPEST-shielded unit (speculative proposal)

2003-12-15 Thread Thomas Shaddack
TEMPEST shielding is fairly esoteric (at least for non-EM-specialists) field. But potentially could be made easier by simplifying the problem. If we won't want to shield the user interface (eg. we want just a cryptographic processor), we may put the device into a solid metal case without holes,

  1   2   3   >