Maybe the subject line should actually be Die, Spammer, Die.
Don't go to JobsOnline.com -- it's a scam. They inundate you with
pop up ads while you're there, the kind that just don't quit, like
the porn sites, and once you've registered (which you have to do to
look at their job ads), you
Maybe the subject line should actually be Die, Spammer, Die.
Don't go to JobsOnline.com -- it's a scam. They inundate you with
pop up ads while you're there, the kind that just don't quit, like
the porn sites, and once you've registered (which you have to do to
look at their job ads), you start
What are the tax implications of a US resident green card holder, with substantial
assets both in his original nation and in the US, of becoming a US citizen?
On Sat, 21 Dec 2002 21:22:17 -0800, you wrote:
On Saturday, December 21, 2002, at 10:07 AM, Eugen Leitl wrote:
http://sciencenow.sciencemag.org/cgi/content/full/2002/1217/1
Policing Bioterror Research
One of science's hottest fields is now becoming one of its most heavily
regulated, too.
It would be easy for me to say that all of the operators connected with JPE
Maybe this is the place to post their names, for posterity.
Tim May:
If cops ask local neighborhood members to report any suspicious
activity, the folks know that any benefits they gain from acting as
informants tend to be a lot smaller than the danger of being beat up or
even killed by the Mafia.
When the cost of acting as an informant is zero,
http://recall.archive.org/?query=tim+maysearch=goafterMonth=1afterYear=1996beforeMonth=TodaybeforeYear=%A0
The devil is in details.
Given small numbers and absence of any other grouping factor there needs to be an
obvious place for ZPs to refer to. Any obvious place that becomes even remotely
attractive to ZPs will be immediately raided. Because ZPs have potential to be
actually dangerous to the
Eugen* Leitl a href=http://leitl.org;leitl/a writes:
The passphrase locking idear won't fly, but a biometrics-lockable
wallet could. Isn't part of Pd envelope goal establishing a tamper-proof
compartment? We know Pd is evil, but once hardware support is everywhere,
one can as well use it for
Anonymizer is working with the FBI on international blackmail cases - no
subpoena required!
From http://www.theregister.co.uk/content/55/36485.html :
To download the online picture, he used the Anonymizer.com service,
believing the companys privacy policy would protect him. Not so. Dutch
The privacy news has been full of fuss and bluster lately about
Google's proposed Gmail service. The latest complaint comes at
http://www.privacyrights.org/ar/GmailLetter.htm with an open letter from
dozens of privacy groups to the Google founders asking them to revamp
the service.
Cypherpunks
Tyler Durden writes:
Ironically, some of the features of Gmail bear resemblance to BlackNet.
In particular, its claimed policy of retaining email indefinitely,
even after the recipient has stopped using the account, is reminiscent
of BlackNet's function as a data haven, as well as other
Regarding the question of whether debt must be merely 'forgiven'
or actually 'forgotten', see http://www.epic.org/privacy/fcra for
information on the Fair Credit Reporting Act of 1970:
The FCRA limits the length of time some information can appear in a
consumer report. For instance, bankruptcies
Really, what's the difference between scanning the message in order to,
say, render HTML tags it may contain, and scanning it in order to
generate targetted advertising based on keywords it contains?
That's irrelevant. These arguments that Gmail is just like other services
are nothing but red
Major Variola writes:
Language is how you manipulate people from a distance. Much
more convenient than hitting them.
Crypto *can* keep bits free. And so maybe language.
But Men with Guns control physical reality, which limits what
those bits can do. Read the archives on the problems
Thinking about something, I found an interesting problem. It is possible
to set up a reputation-based system with nyms, where every nym is an
identity with attached reputation.
Is it possible to have a system where nyms can share reputation without
divulging the links between them? That
Lew Rockwell had written:
The Rothbardian approach to a pro-freedom strategy comes down to the
following four affirmations: 1) the victory of liberty is the highest
political end; 2) the proper groundwork for this goal is a moral passion
for justice; 3) the end should be pursued by the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Here is the blind DSA signature based on MacKenzie and Reiter,
http://www.ece.cmu.edu/~reiter/papers/2001/CRYPTO.pdf, in graphical form.
Recall that a DSA public key is p, q, g, y; private key x; signature on
hash h is:
Choose k q
r = g^k mod p mod
Eric Cordian quotes:
FBI Shill: Are we gonna exterminate the rat?
Hale: I'm going to fight within the law and, but, ... if you wish to,
ah, do anything, yourself, you can.
You're such a liar. I don't know why I even bother to respond to you.
You left off the next few lines:
So
What technologies currently exist for receiving a/psuedononymous message?
With Mixmaster, sending mail, posting news, and even blog posting are
possible, However, receiving replies securely or, better, holding a private
conversation is difficult or impossible. Best bet seems is to encrypt and
spam
On Fri, 2004-04-30 at 14:12, An Metet wrote:
What technologies currently exist for receiving a/psuedononymous message?
With Mixmaster, sending mail, posting news, and even blog posting are
possible, However, receiving replies securely or, better, holding a private
conversation is difficult
Steve Furlong writes:
Does anyone know of a reference implementation for Stefan Brands's
digital certificate scheme? Alternatively, does anyone have an email
address for Brands so I can ask him myself? (I haven't gotten anything
back from ZKS's contact us address. But I don't know if Brands is
I know there are readers here who are good at optimizing code. Here are
my attempts to make simple and short versions of base64 encode/decode
in C. I'd like to hear suggestions on how to simplify them even more.
Base64 encoding is a way of turning arbitrary binary data into printable
On August 6, 2002, Lucky Green wrote a reply to Anonymous (whom I will
now come clean and admit was none other than me), about the suggestion
that TCPA (now called TCG) could incorporate anonymous cryptographic
credentials to protect users' privacy, rather than the cumbersome
privacy CA mechanism
Does anyone *know* (first or second hand, I can speculate myself) which laptops, if
any, can safely go to zero air pressure (dropping from 1 atm to 0 in, say, 1 minute.)
25 matches
Mail list logo