Your proposed network is really just a tree, from which you're
picking some nearby nodes to use to distribute queries to the nodes below them.
In practice, it's not substantially different from querying the root node.
(In fact it's about 99% identical.)
You're failing to recognize the hierarchy, b
>On 2 Apr 2002 at 10:35, [EMAIL PROTECTED] wrote:
> > I've been monitoring the e-gold discussion list for some time and this
> guy appears to be legit (i.e., a lack of negative comments). I have not
> purchased from him, but am considering obtaining one of these. Would be
> most interested in
At 05:51 AM 04/02/2002 -0800, Major Variola (ret) wrote:
>And Morloch: your replacing DNS (as a vulnerable point of
>failure/control) is a good idea. Of course,
>AOL does this, with their own name space. But without their tightly
>herded masses, or access to the Root Servers
>you'll have to writ
At 04:45 AM 04/05/2002 +1000, Julian Assange wrote:
>[ Charset ISO-8859-1 unsupported, converting... ]
> > Citerar Michael Roberts <[EMAIL PROTECTED]>:
> >
> > > In Sweeden basic emotional education for all cuts social problems down
> > > to a minscule amount.
> >
> > Sweden has a basic emotional
At 11:30 AM 04/05/2002 -0800, Major Variola (ret) wrote:
>Hmm, that's about 5x what Union Carbide paid for dead Bhopal Indians...
They were paying for them wholesale, after the fact.
>but a real bargain compared to many US wrongful-death lawsuits.
>What kind of payback does the USG pay
At 07:59 AM 04/08/2002 -0600, Anonymous wrote:
>"Any attacker who can control 100,000 machines is a major force on the
>internet, while someone with a million or more is currently unstoppable:
>able to launch massively diffuse DDOS attacks, perform needle in a
>hayfield searches, and commit all so
At 06:53 PM 04/10/2002 -0700, and a number of other times, Tim May wrote:
>--Tim May
>"Dogs can't conceive of a group of cats without an alpha cat." --David
>Honig, on the Cypherpunks list, 2001-11
I've got three cats, and one of them very definitely is the alpha cat.
On the other hand, there's
19 (Bill)
If you have questions, comments or last-minute agenda requests, please
contact the
meeting organizers:
Bill Stewart [EMAIL PROTECTED]
Dave Del Torto [EMAIL PROTECTED]
---
This announcement is posted at or near
http://cryptorights.org/cypherpunks/meeting
SF Bay Area Cypherpunks April 2002 Physical Meeting Announcement
Sorry for the triskadekaphobia - Saturday is of course the 13th of April 2002.
General Info:
DATE: Saturday 13 April 2002
TIME: 12:00 - 5:00 PM (Pacific Time)
PLACE: Boalt Hall Rm. 140
Bancroft & Piedmont
Ber
>Ken Brown <[EMAIL PROTECTED]> writes:
>
> >For some reason the mention of a "Susan B Anthony" dollar stuck in my
> brain as
> >an "Alice B Sheldon" dollar. Susan Anthony is a person who I've never heard
> >of. I'm almost tempted not to find out who she is or was to preserve a
> nugget
> >of del
At 09:00 PM 04/11/2002 +0100, Ken Brown wrote:
>"Trei, Peter" wrote:
> > Mea culpa. It's been a long time since I read 'Dangerous Visions'.
>
>Must be, seeing as "Harlequin" was published in Galaxy magazine, then
>reprinted in Ellison's "Paingod and other Delusions", not in DV which
>was an origi
At 12:43 AM 04/12/2002 +0100, Adam Back wrote:
>To be more concrete: there are already apparently e-gold backed credit
>cards. So why not Everquest virtual platinum backed credit cards for
>spending your Everquest acquired wealth directly in the real world. I
>would have thought Sony could have
At 10:51 AM 04/11/2002 -0700, Tim May wrote:
>No, we have AC because AC works better than DC in home wiring situations.
Most of the telco business runs on 48V DC, and much of the
"off-the-grid" solar energy electric applications run fine on 12V DC.
The big advantages of AC are for motors.
>And t
At 12:41 AM 04/18/2002 -0400, An Metet wrote:
> >Maybe the subject line should actually be "Die, Spammer, Die".
> >Don't go to JobsOnline.com -- it's a scam. They inundate you with
> >pop up ads while you're there, the kind that just don't quit, like
> >the porn sites, and once you've registered (
At 12:49 PM 04/25/2002 -0400, Trei, Peter wrote:
>Of particular humor is his repeated insistance that anywhere one
>might use a PRNG, a RNG would be better. Jim, try implementing
>SSL with a true RNG instead of RC4. The ciphertext may be quite
>secure, but it's not very useful.
I've been thinking
At 12:36 AM 04/28/2002 -0700, Lucky Green wrote:
>I would like to direct anybody's attention who is interested in
>transparent drive encryption to GEOM, which will be a native feature of
>FreeBSD 5.0.
Geom looks really exciting, not so much for the crypto as for the
flexibility it provides for th
At 12:34 AM 04/23/2002 -0400, An Metet wrote:
>... and morpheus gets cached
>(from [EMAIL PROTECTED] )
>
>When you setup some of these peer-to-peer sharing clients (like Morpheus)
>you can limit what IP's can share with you. I've set one up and excluded
>everyone except our class C. In theroy, t
At 01:13 AM 04/29/2002 -0700, [EMAIL PROTECTED] wrote:
> [each cluster has 128 bits permanent half-key, 128 bits nonce half-key...]
> are for the second cluster, and so on. Each time a disk cluster is
> written to, a new temporary half-key is pulled from the (P)RNG and used
> to encrypt the cl
Also, one redeeming factor of Choate's reluctance to bother writing summaries
of the articles he's sending URLs for is that his messages are really short -
usually just an URL and a few lines of signature block.
So you're not downloading much, unlike Matt The Ranter's messages.
At 09:44 AM 05/05
At 05:06 PM 05/04/2002 -0700, Morlock Elloi wrote:
>Slightly unrelated, sort of poll:
>Would anyone object if mail list software would limit number of daily messages
>from the same source* to an arbitary percentage of total messages from all
>sources ?
Yes - that's a job for client-side filters,
ig%2fq7nt%2f4LNgWNF%2fa1qhqHICeS9a7ai2OltFkZiYgPDszCFjxJvJ3UztMHzmFTCWjOQiJv2UTeibsDTf5lX9Oul8Duzz5H7zRf28q5W1dNWEBuSwmIPN5CsnCBt%2fxKER0o8urmuYY0JLBD%2bcq4kxukn3wumZakgMOfn1A8xylUh5faGP64S6LM40YY9rGDpd4sUKuLClF5LIam8E%3d
Weather Forecast: high 70s.
---
Contact information, or if lost
Bill Stewart - +1-415-307-7119 - [EM
At 03:50 PM 05/12/2002 -0700, Tim May wrote:
>On Sunday, May 12, 2002, at 07:00 AM, Jim Choate wrote:
>
>>On or about Sun, 12 May 2002, somebody wrote:
>>
People don't actually have to understand it as long as they get paid,
of course. People who are getting paid want to get paid as chea
Gilman Louie, CEO of In-Q-Tel, will be speaking at PARC on Thursday afternoon.
PARC runs a nice series of lectures on mostly scientific topics;
feels like the Friday afternoon talks at Bell Labs back when
there was still a Bell Labs.
>To: [EMAIL PROTECTED]
>Subject: PARC Forum this Thursday: G
At 12:43 AM 05/22/2002 -0400, R. A. Hettinga wrote:
>At 11:49 PM -0400 on 5/21/02, Luis Villa wrote, on FoRK:
> > Well, yes, but you seem to be implying some sinister motive that
> > not all of us are reading between the lines clearly enough to see
> > :) I mean, otherwise, this just seems like a
Peter Wayner has a few books that deal with this and related topics.
Search for them on Amazon or wherever.
At 11:19 AM 05/29/2002 -0400, you wrote:
>I am writing my dissertation on steganography. Basically I'm writing a
>technical monograph that would be of use to undergraduate instructors.
>Wha
> >F.B.I. Given Broad Authority to Monitor the Public
> >By THE ASSOCIATED PRESS
>
> > WASHINGTON (AP) -- Attorney General John Ashcroft on Thursday
> > gave the FBI broad new authority to monitor Internet sites,
> > libraries, churches and political organizations,
> > calling restrictions on dome
Vitas - I hope you're enjoying your stay at the Millenium & Copthorne Hotels,
where you're using the internet service.
You can find all the cracking tools you need for Jane's at 128.11.100.130
and 167.216.248.42.
>Delivered-To: [EMAIL PROTECTED]
>X-Originating-IP: [195.224.80.50]
>From: "cristi
Several people said yes...
You're hereby designated as the
"Official San Francisco Bay Area Cpunks-Meeting-in-Exile" :-)
At 07:07 PM 06/20/2002 -0400, Greg Newby wrote:
>H2K2, 2600's conference, is at Hotel Penn in New York
>July 12-14. http://www.h2k2.net
>
>CP contributors who are sch
At 02:23 PM 06/25/2002 -0700, Joseph Ashwood wrote:
>I can tell you that at least in some areas that is simply not the case. I
>have personal experience with the San Jose City library and know this for a
>fact to be incorrect. They store information since the last upgrade of the
>central database,
Bob - I'm not sure if you copied David separately/Bcc on your reply,
and I've dropped Cc:s to some of your lists that I'm not on,
and I missed your original message that David flamed you for
which you're flaming back about, but
Perhaps I've missed some really critical things the time or two
t
At 03:31 AM 06/29/2002 -0700, [EMAIL PROTECTED] wrote:
>Thanks Bill, for passing on your message, along with the news that I've been
>dissed and discussed by R.A. Hettinga. Naturally, he never informed me, nor
>copied me his missives, nor invited me to answer. This appears to be quite
>typical.
The Indianapolis Star newspaper ran the NYTimes version of this story
with the headline "Drug Peddling Pilots May Get Wings Clipped".
I was assuming it would be about revoking their pilots' licenses
or confiscating their airplanes, but no, it was about
shooting them down and machine-gunning any fl
ude International
Postal Union standards for link layer and addressing formats and pricing,
though I'm not directly familiar with standards for shipping containers
where data encapsulation is required.
Thanks; Bill Stewart, [EMAIL PROTECTED]
>From: Jon Zittrain <[
moking dope" database,
and the shipping companies' "Not a union troublemaker" database",
and the "originally from _this_ country even though they're now American"
database,
and Blacknet's databases on "gets in Bar Fights" and "scab
At 10:07 PM 06/26/2002 -0700, Lucky Green wrote:
>An EMBASSY-like CPU security co-processor would have seriously blown the
>part cost design constraint on the TPM by an order of magnitude or two.
Compared to the cost of rewriting Windows to have a infrastructure
that can support real security? M
One of the usual arguments for key escrow was always
"what if your employee dies and you can't get his data?"
Secret Sharing techniques are of course a better approach,
or at least storing sealed envelopes in company safes
as a much better approach than pre-broken crypto.
There've been a couple of
At 09:43 PM 06/28/2002 +0200, Thomas Tydal wrote:
>Well, first I want to say that I don't like the way it is today.
>I want things to get better. I can't read e-books on my pocket computer,
>for example, which is sad since I actually would be able to enjoy e-books
>if I only could load them onto m
At 05:29 PM 06/28/2002 +0200, Eugen Leitl wrote:
>I've bought me a little (32 MBytes) hotpluggable USB flash stick (a
>TrekStor). It mounts fine, but what I'd like to do is to automount it, and
>fire up a program (I intend to put my keyring on it) if hotplugged.
>
>The system I'm testing this on i
At 12:01 PM 07/04/2002 -0700, Tim May wrote:
>On Monday, July 1, 2002, at 01:10 PM, Anonymous wrote:
>>If we don't get DRM, that's probably what we will end up with: government
>>subsidies of the arts.
>
>About 20 years ago the American program "60 Minutes" did a nice piece on
>how the Dutch gov
At 06:31 PM 07/06/2002 -0700, Joseph Ashwood wrote:
>First, closed source testing, beginning in the late Alpha testing stage, is
>generally done without any assistance from source code, by _anyone_, this
>significantly hampers the testing.
>This has led to observed situations where
>QA engineers
At or about 09:22 AM 07/04/2002 -0700, [EMAIL PROTECTED] replied thusly:
> > If they can't even ban crypto, you think they'll be able to ban
> > Perl?
>
>They cannot ban crypto without first banning Perl. That was the
>point of the Crypto-on-a-T-Shirt movement. Obvious solution.
>First ban Perl,
At 08:49 PM 07/09/2002 -0500, Harmon Seaver wrote:
>On Tue, Jul 09, 2002 at 03:17:52PM -0400, Sunder wrote:
> > Sure, you can revive old hardware with Linux, but you'll find it runs KDE
> > 3.0 or GNOME slower than windows 95 did on the same hardware. So unless
> > you're willing to also go to ol
Lile Elam is hosting a cypherpunks meeting and BBQ this Saturday at
130 Bryant St., Palo Alto.
The home and art gallery has 802.11b access, a display area inside for
A/V presentations, a yard outside for spoken presentations and
discussions (and BBQ). Bring things to grill and potluck-typ
At 05:22 PM 07/22/2002 -0700, Steve Schear wrote:
>In this article http://news.com.com/2010-1079-945347.html?tag=politech
>you said:
>"That's a reasonable position: The White House has never made an
>unequivocal statement against the scheme, and it's possible that America
>could edge toward a
The Fastrak system used for toll collections in San Francisco
and other areas has found another use - monitoring traffic flow on freeways
by tracking suckers\\\customers' cars when they're *not* in tollbooths.
The system managers purport that they'll protect privacy by
destroying any individua
At 03:13 PM 08/10/2002 -0700, Lucky Green wrote:
>Lastly, I feel obliged to mention that it is quite irrelevant what I,
>Microsoft, or the subscribers to this list believe to be the case with
>respect to my patent application.
>All that matters is what the patent examiner at the USPTO believes.
T
Click your heels together three times and say "There's No Place Like Home"
and you'll be back in bed in Kansas. And yer little dog, too
At 12:58 AM 08/11/2002 -0700, Lucky Green wrote:
>BTW, does anybody here know if there is still an email time stamping
>server in operation? The references that I found to such servers appear
>to be dead.
The canonical timestamping system was Haber & Stornetta's work at
Bellcore, commercialized
Sounds like libel to me.
So there's a published list, even if it's only published to cops,
saying "This person is likely to commit a crime".
Leave aside the obvious civil liberties issues for the moment -
this seems like simple libel to me. At least for the Usual Suspects
who haven't yet been ar
At 12:53 PM 09/04/2002 -0700, Morlock Elloi wrote:
>I'm not sure which is more funny - this being a hoax or not.
Appears not to be, at least if you can believe "The Register".
I can't tell if "operation of games", as defined under Greek law,
refers to anybody playing the game, or is more technica
At 04:34 PM 09/23/2002 -0700, James A. Donald wrote:
>The biggest application of smart cards that I know of are
>anonymous phone minutes.
They're also used for non-cellular phone minutes -
Ladatel in Mexico is a big user, and I've worked with some
British Telecom folks whose business cards are al
http://www.satirewire.com/news/aug02/encryption.shtml
HACKERS BEG BORING PEOPLE TO STOP ENCRYPTING EMAIL
Security Experts Concur Most of You Have Nothing Worth Encrypting Anyway
San Jose, Calif. (SatireWire.com)
In an unusual worldwide appeal, the International Brotherhood of
Computer Hackers
At 07:53 PM 09/27/2002 -0500, Harmon Seaver wrote:
> Forget the pencils and pens, just ban paper. Or perhaps a step in the right
>direction would be to ban all paper except that made from hemp, thereby
>solving
>numerous problems at the stroke of a (gasp) pen.
You don't need to do that - just
At 09:38 AM 09/27/2002 -0400, Adam Shostack wrote:
>"The US Government has mistakenly given secret documents to the only
>man charged so far in connection with the 11 September attacks,
>Zacarias Moussaoui."
>
>http://news.bbc.co.uk/2/hi/americas/2284325.stm
That wasn't because they gave him a se
At 09:38 PM 09/30/2002 -0700, Bram Cohen wrote:
>Peter Gutmann wrote:
> > I recently came across a real-world use of steganography which hides extra
> > data in the LSB of CD audio tracks to allow (according to the vendor) the
> > equivalent of 20-bit samples instead of 16-bit and assorted other f
At 09:11 AM 10/01/2002 -0700, Major Variola (ret) wrote:
>After reading the last paragraph in the excerpt below,
>it occurs to me how much fun could be had in DC with some chalk,
>even without an 802.11blah receiver :-)
Depending on how well-read the security folks are about warchalking,
you can
At 09:05 AM 10/01/2002 -0700, Major Variola (ret) wrote:
>So yes Alice at ABC.COM sends mail to Bob at XYZ.COM and
>the SMTP link is encrypted, so the bored upstream-ISP netops
>can't learn anything besides traffic analysis.
>But once inside XYZ.COM, many unauthorized folks could
>intercept Bob's
http://www.interpol.int/Public/FinancialCrime/MoneyLaundering/hawala/default.asp
Interpol has an interesting article on Hawala.
It's written from a US-centric perspective,
which unfortunately includes asymmetry in the transactions,
so they miss out on the importance of net settlement
in making co
At 12:38 PM 10/06/2002 +0200, Mok-Kong Shen wrote:
>It seems to be strange that he wrote at <[EMAIL PROTECTED]>,
>an address which is also given on his web page, but
>ping pipeline.com doesn't work.
Lots of machines don't accept pings anymore,
either for security reasons or whatever.
That's indep
Somebody wrote to the cypherpunks list:
> > It seems to be strange that he wrote at <[EMAIL PROTECTED]>,
> > an address which is also given on his web page, but
> > ping pipeline.com doesn't work.
Very strange.
Pipeline has a bunch of MX records, mx01.pipeline.com etc., which we expected.
Pinging
> > Robin Whittle[SMTP:[EMAIL PROTECTED]] wrote:
> > .
>[lots of good stuff about the music business clipped]
>
> > I think this is an accurate analysis of a really sad situation. Like
> > King Canute, the record companies are devoting most of their thinking
> > and resources to holding back the
At 05:44 AM 10/07/2002 -0700, gfgs pedo wrote:
>In the case of algorithms is the best algorithm always
>the best solution to the problem,be the algorithm with
>a constant run time or randomised algorithm.
>
>i.e is the best solution always the optimal solution
>for a problem.
"Best" means "best f
At 06:53 PM 10/08/2002 -0500, Neil Johnson wrote:
>Many major net service providers (ISP's and Web Sites) try to host at least
>one of their DNS servers at different sites and on different network
>providers (some are paranoid enough to use different implementations of BIND
>and different OS platf
Somebody backdoored the source code for Sendmail on the official server.
So if you recompile from scratch, your sendmail is 0wned.
Another reason not to run mail systems as root
http://rss.com.com/2100-1001-961311.html?type=pt&part=rss&tag=feed&subj=news
By Robert Lemos
Staff Writer, CNET N
The following web page is about recent projects at the
Air Force Research Laboratory. Item 8 is about new wiretap technology,
designed to monitor large numbers of conversations for drug activity.
The accompanying artwork has a large and small version of a
wiretapper logo, which should be possible
At 09:01 PM 10/11/2002 -0400, Steve Furlong wrote:
>There are two advantages of web-based discussion fora over usenet:
>propagation time and firewalls. On the other hand, few discussions are
>so urgent that they need near-real-time reparte, and participants
>shouldn't be cruising usenet from work.
>> > Our bombing of the sudanese
>> > pharmacuetical factory?
>>
>>Yes: The factory was bombed, but actual
>>deaths were one night watchman, "not tens of thousands",
If so, that's gross incompetence on the part of the US military,
since the official rationale for why we were cruise-missiling it
At 01:06 PM 10/13/2002 -0400, Tyler Durden wrote:
>Oh yeah. Interesting. Of course, this would be done only.
>if the sender knew or supected how mass-scanning might be done.
>And so the existence of another level of heavier encryption ...
>might be a tip off that this is not simply a financial tr
> > David E. Weekly[SMTP:[EMAIL PROTECTED]]
> > As for PKI being secure for 20,000 years, it sure as hell won't be if
> > those million-qubit prototypes turn out to be worth their salt.
> > Think more like 5-10 years. In fact, just about everything except
> > for OTP solutions will be totally, tot
http://www.satirewire.com/news/aug02/encryption.shtml
HACKERS BEG BORING PEOPLE TO STOP ENCRYPTING EMAIL
Security Experts Concur Most of You Have Nothing Worth Encrypting Anyway
San Jose, Calif. (SatireWire.com)
In an unusual worldwide appeal, the International Brotherhood of
Computer Hackers t
At 12:16 PM 10/17/2002 -0700, Morlock Elloi wrote:
I have a working OTP system on $40 64 Mb USB flash disk on my keychain.
Cute. Is it available?
How do you prevent other applications from reading the file off your
USB disk, either while your application is using it or some other time?
That's
At 10:52 PM 10/17/2002 -0700, Morlock Elloi wrote:
> >I have a working OTP system on $40 64 Mb USB flash disk on my keychain.
>
> Cute. Is it available?
$39 + tax in Fry's.
I don't mean the disk - there are lots of those.
I mean your software.
Also, can your tool use floppies instead of USB ke
At 02:04 PM 10/17/2002 +0200, Eugen Leitl wrote:
It is important to note that currently NMR bases systems only allow for
6 qubits. Only very recently we're getting practical qubits in solid state.
.
Everybody realizes that we're discussing currently completely theoretical
vulnerabilities, righ
Subject: Fwd: BNA's Internet Law News (ILN) - 10/18/02
FINLAND CONSIDERING NEW INTERNET SPEECH RESTRICTIONS
Finland is considering establishing changes to its freedom
of speech laws that focus on the Internet. A proposed bill
would allow a court to order an online publication to remove
messages
[There's been some discussion of whether you can trust hardware crypto.]
At 11:54 AM 10/18/2002 -0400, Tyler Durden wrote:
OK...a follow up question (actually, really the same question in a
diferent form).
Let's say I had a crypto chip or other encryption engine, the code of
which I could not s
At 06:02 PM 10/21/2002 -0700, Major Variola (ret) wrote:
So two illegals are going back because they were in a white van
near a pay phone. They're fortunate, they only got the
12gauge in the face and the asphalt facial;
in a month it'll be a cruise missile first, forensics later.
If this were B
At 02:11 PM 10/11/2002 -0700, James Donald wrote:
> > > > "Our overriding purpose, from the
> > > > beginning through to the present
> > > > day, has been world domination -
.
> > > > Ramsey Clark, former US Attorney General
From: "Trei, Peter" <[EMAIL PROTECTED]>
> The Sun is an alternative
At 09:20 PM 10/16/2002 -0400, Sam Ritchie wrote:
ACTUALLY, quantum computing does more than just halve the effective key
length. With classical computing, the resources required to attack a given
key grow exponentially with key length. (a 128-bit key has 2^128
possibilities, 129 has 2^129, etc
[Sorry about any duplicated - lne.com spam-blocked me the first time.]
At 01:34 PM 10/27/2002 +0100, Eugen Leitl wrote:
>Advent of another technology wide deployment of which we must delay as
>long as possible. ...
>Unfortunately, brinistas welcome this development because they idiotically
>assume
[Hmm. lne.com spam-blocked me on the first attempt.
Given the identity of the research group, I forgot to add the obvious
"The computer says he's a rambling wreck from Georgia Tech."
]
At 01:36 AM 10/27/2002 -0400, Declan McCullagh wrote:
>See also:
>http://www.wired.com/news/politics/0,1283,38
Estimating crowd sizes is difficult even if you don't have
good visibility, and for most events, there are at least
two or three sets of people estimating crowd size who have
axes to grind that bias their results. Washington DC's
especially bad about that.
According to the newsblurb we heard in S
At 06:31 PM 10/27/2002 -0800, Tim May wrote:
On Sunday, October 27, 2002, at 01:04 PM, Bill Stewart wrote:
[Hmm. lne.com spam-blocked me on the first attempt.
Can you provide details?
If lne.com is blocking posts, I will have to find another CP node.
I don't think Eric will mi
At 09:32 PM 10/31/2002 -0800, Tim May wrote:
I'm missing the gist of this scenario.
If the attackers/hijackers cannot get into the cockpit and gain control of
the plane, then the most they can do with disabling/lethal/nerve gases is
to cause the plane to essentially crash randomly...which kills
At 12:41 PM 11/02/2002 -0500, Steve Furlong wrote:
The only business environment I've ever worked in which successfully
used encrypted email mandated specific versions of mail client
(Outlook, ecch) and PGP (integrated into Outlook), had a jackbooted
thug to make sure everyone's keyring was up to
http://www.theregister.co.uk/content/5/27917.html
German secret service taps phones, bills buggees
By Tim Richardson
Posted: 04/11/2002 at 14:30 GMT
A software error is being blamed for an incident in which mobile phone
users discovered they were being bugged by German secret squirrels.
Accordi
> [EMAIL PROTECTED] (Major Variola ret) writes:
>
> > http://www.washtimes.com/national/20021104-81830128.htm
> > Officials attempt to get inside cells of al Qaeda in U.S.
At 11:09 PM 11/04/2002 -0500, Elyn Wollensky wrote:
& your point would be
;~)
If people start showing up at Cypherpun
At 08:32 PM 11/06/2002 -0800, Mike Rosing wrote:
On Wed, 6 Nov 2002, Harmon Seaver wrote:
> On Wed, Nov 06, 2002 at 04:02:54PM -0800, Bill Stewart wrote:
> > Reported on the NANOG list
> > > 80% of Amsterdam is without power, one AMS-IX site is without no-break
> > > p
Reported on the NANOG list
> There's been an explosion in a power distribution center in amsterdam,
over
> half the city is without power, and, as far as I know, the Nikhef building
> is competely powerless, Telecity is running on backup generators. Redbus
> building seems at least partially up, bu
At 09:20 AM 11/07/2002 -0800, our local weapon of mass destruction forwarded:
Sharon Shea-Keneally, principal of Mount Anthony Union High School in
Bennington, Vermont, was shocked when she received a
letter in May from military recruiters demanding a list of all her
students, including names,
--- "James A. Donald" <[EMAIL PROTECTED]> wrote:
> I am struck the contrast between the seemingly
> strong demand for wifi security, compared to the almost complete
> absence of demand for email security.
>
> Why is it so?
Because people generally understand the concept that Wifi is open,
and tha
At 10:51 AM 11/12/2002 -0800, James A. Donald wrote:
Alleged attempts to introduce internet currencies have a ninety
percent humbug and fraud rate.
And the other 10% have unsustainable business plans
:-)
James Donald writes:
> In principle it should be possible to create poker playing
> software where the server cannot cheat, but it is not obvious
> to me how this can be done.
>
> Does anyone know of a cheat proof algorithm?
At 05:40 AM 11/15/2002 +0100, Nomen Nescio wrote:
Sure, there are any n
At 01:02 PM 11/18/2002 -0500, Declan McCullagh wrote:
http://news.com.com/2010-1069-966164.html
Perspective: Say hello to Big Brother
By Declan McCullagh
November 18, 2002, 7:05 AM PT
WASHINGTON--Like it or not, the proposed Department of Homeland
Security firmly establishes Washi
At 02:27 PM 11/18/2002 -0800, Bill Frantz wrote:
At 10:42 AM -0800 11/15/02, Sunder wrote:
>What's disturbing about this is that we are on someone's list as e-gold
>customers or something, and this is very likely the same spoofer that had
>earlier set up e-golb.com and attempted the same kind of s
That, or it's a dot-com that didn't make it,
or an office-space construction that someone hoped to sell to a dot-com
but missed the boom. There's huge amounts of that in SF.
At 05:37 PM 11/24/2002 -0600, Neil Johnson wrote:
On Sunday 24 November 2002 04:49 pm, Tarapia Tapioco wrote:
> There is a
At 10:23 AM 11/24/2002 -0600, Neil Johnson wrote:
(Referring to previous thread about capturing video.)
As I sit here looking at a 64 MB SD Card that I just picked up for $28 at my
local Wally World, I was wondering why it (or it is larger capacity brethren)
couldn't be used to record video and
Telco central office. Lots of copper loop I/O, and a big switch.
Used to be mechanical crossbars. Probably a diesel
generator somewhere.
That would normally be my guess too, but it's on one of the ones
AT&T shares with Pac Bell - there's 611 Folsom and another on
Post or thereabouts. But it c
At 11:36 PM 11/19/2002 -0800, Tim May wrote:
On Tuesday, November 19, 2002, at 11:20 PM, Tim May wrote:
* Add additional names...perhaps some in-laws, relatives, college
friends, or colleagues of those who are responsible for this Witch Hunt.
It may be unfortunate to implicate some "innocents
At 11:28 AM 12/07/2002 -0800, Steve Schear wrote:
At 10:56 AM 12/7/2002 -0800, Morlock Elloi wrote:
This, with obligatory cameras in cybercafes, is just plugging the
anonymity holes.
I haven't noticed any cameras in my neighborhood cafes.
Well of course you haven't seen them - that just shows
> It also helps to speak a language you don't think the telemarketer
> understands...they'll hang up the phone pretty quickly if you're
talking in
> Chinese, for instance. (And if they have a Chinese accent I'll talk to
them
> in Spanish.)
So if you tell them "Put me on your 'Don't Call List'" i
1 - 100 of 465 matches
Mail list logo