salon.com Books March 8, 2000
URL: http://www.salon.com/books/feature/2000/03/08/poe
The tell-tale cipher
Could a mysterious cryptograph be a final message from Edgar Allan Poe?
- - - - - - - - - - - -
By Jeffery Kurz
For Edgar Allan Poe, dying did not necessarily leave a person
Censorware Exposed Again
by Chris Oakes
3:00 a.m. 9.Mar.2000 PST
If you buy software to filter smut from the eyes of Web-savvy children, you might
expect it to catch a few innocent sites in its electronic net.
But you may be surprised if over half of those sites being blocked are on the
We are anonymously offering a FREE Netpliance I-Opener to whoever first
sucessfully hacks into DIGEX. The Winner can opt to receive their prize
as cash, $99 USD. A panel of 5 independent judges will determine the
winner. The deadline is April 15, 2000.
There are no other rules to this
Meanwhile, Zero-Knowledge is taking off. His firm's 80 employees in December have
grown to about 200 now, and he expects to have 600 by the end of the year. The company
has raised $38 million, led by Platinum Venture Partners and Strategic Acquisitions
Ventures, and is planning another round i
FBI agent: I am Big Brother
By Robert Lemos, ZDNN
April 5, 2000 5:19 PM PT
URL: http://www.zdnet.com/zdnn/stories/news/0,4586,2522568,00.html
TORONTO -- Can effective law enforcement and personal privacy coexist?
Law enforcement officials and privacy advocates faced off in a panel discussion
It's not the joke. But it provides an interesting list of individuals that
should be kept for the future reference.
Chuck Williams, Nevenko Zunic, Stephen M. Matyas, Jr., Sarbari Gupta, Michael Willett,
Key Recovery Alliance (KRA) Technology Papers,
Special Issue --- Introduction, Computers
About a month ago I mailed a postcard to a friend in another state and
rot13'd the message on the back. The picture was of the DC Hazmat team.
Weeks passed and he did not receive it.
Testing a theory, I subsequently mailed him another postcard with some
inane sheeple statements about the
The point of a cypher is to be secure. Ability to encrypt OC192 is not
a substitute.
While I agree that NSA did a great con job on crypto community, that
is not a reason not to do the best one can.
You fear that we are playing with broken toys and wasting our time.
What else is there to do ?
[EMAIL PROTECTED] wrote:
is at all possible to close the list to outsiders, make it a "closed"
listso that you need to be a subscriber to send mail to the
list.this spam is really annoyingthoughts? flames?
The ability to post using anonymous remailers should not be
While we're fantasizing, let's imagine that it uses some kind of crypto
credential system to prevent abuse. Is this feasible?
What do you mean by "abuse"?
Considering that most people on this list are misanthropic fuckheads (myself included)
it's hardly unusual to be so modestly flamed. If the frequent lack of civility bothers
you...don't read this list...
[EMAIL PROTECTED] spewed:
good christ people! its a email! not a letter to the
1. Bomb-making instructions are now illegal on the Net, courtesy of
Feinstein and her ilk. (I don't recall the exact name of the act, but
it was discussed a couple of years ago. So far as I know, it passed
and was signed into law. Anyone know for sure? Also, this has not
been tested in
I've replied to some of the spam with threats that I will track them
It has to be more expensive than that.
What I found effective is calling ISP and complaining over phone to
higher-level staff (look in contact pages and pass the secretary :-)
No threats, but followed up with others
[When you consider how much industrial espionage the French government engages in this
is a bit rich]
PARIS (Reuters) - A French state prosecutor has launched a preliminary judicial
investigation into the workings of the United States' Echelon spy system of satellites
and listening posts, the
Someone snuck in last night and replaced cryptome.org/jya.com with an
Internal Service Error. Anyone know what happened?
from anonymizer.com to toad -no toad sexing
Following this crypto list and spam attacks has interesting side-effects.
To us living outside US it is almost unbelieveable what kind of pathetic
retards US general public became. Just look at the spam subjects. Petwarmers.
Heartwarmers. And don't tell me that spam is not matched to the public.
More later on those names.
Careful here, JYA.
There is some law that says you are fucked for many years (negroes in the
federal institution) if you publish the names of federal servants.
The rationale is obvious - Tims may ambush them if their whereabouts
become known.
I am not saying that
Date: 22 Jul 2000 04:37:37 -
From: [EMAIL PROTECTED]
Subject: Austrian Sparbuchs
Newsgroups: alt.privacy
Mail-To-News-Contact: [EMAIL PROTECTED]
Organization: [EMAIL PROTECTED]
It is now impossible to get any famous Austrian Sparbuch, 100% anonymous
bank account.
But it is still legal til
Does anyone have a clue - who is the tax collector in
charge of HavenCo ?
Do the company and employees pay taxes to the British gov't,
or to the platform chieftan ?
It looks like massive spam subscriptions are back.
I will contact e-groups and request IP logs, on a company letterhead,
let's see where this goes. It would be most amusing if the origin is in
Maryland.
A new Ohio law kicked in today requiring anyone purchasing 5 or more kegs
of beer to file a form with the Ohio Department of Public Safety, and wait
5 days before picking up said beer.
Worse, the law gives LEOs the right to search the beer-consumption site
without first obtaining a search
7.6.3 Magnetic Disks.
Magnetic disks will be declassified by degaussing by an authorized
degausser or by completly overwriting the entire surface of the
disk by an approved overwrite program. Floppy disks will be
declassified only by degaussing. Overwriting is not an authorized
procedure for
The second case is far more interesting from a theoretical standpoint -
that of comparing files from the unmodified original. Technically this
would work just fine, as it is a simple variation of the classic key
management problem. That said, it is a relatively trivial manner to
manipulate
There's no point in using a neighborhood name space that's
not available globally for a resource that _is_ connected globally -
/ad hominem on
This is the clear case of globalistic poisonong.
/ad hominem off
"whatever is on the net must be global".
Bullshit. I could not care less about the
I like. What pray tell is '(SM)'?
Registered Service Mark.
If you use it without license from Anonymous, Inc., we sue you.
This does not have to do much with crypto, but I noticed that many
cpunks salivate on this issue.
As usual, I was buying some tickets last week with cash, in United
office. It took the clerk long time to get all the paperwork,
and he said that I am the first to pay cash that week.
After
Hello,
I am looking for the source pointers to mail list server with
PGP capabilities.
Functionality: posters send e-mail encrypted with the (single) server's key.
Server decrypts, then encrypts with each recipient's key as it
explodes the mail.
If nothing is available as described, what is
ZDNet cancer swallowed another domain:
http://www.underground-online.com/
Now that the PGP key management "bug" is public, I'd like to comment
on some source code issues and follies.
The source for versions in question (starting from 5.*) has been available
for more than two years.
While many crypto experts intensely bullshit about the importance
of the source code
snip
searches of your home. That bill is currently before a conference
committee, which has only about a week left to finish it before
Congress adjourns for the year. You may want to contact your
legislators before it's too late.
Yes. "contact."
In conjunction with First Monday's "Unite to End Gun Violence" campaign,
the Children's Defense Fund (motto: Defend Children, Not Guns) released a
report today on "Children and Guns."
http://www.childrensdefense.org/youthviolence/Gun-report-2000.htm
Readers will be unsurprised and unimpressed
[http://www.pscu.com/Newsbytes/2000/156920.html]
New Encryption Regulations Take Effect On Today
October 19, 2000
By Brian Krebs, Newsbytes.
WASHINGTON, D.C., U.S.A.,
Published By Newsbytes News Network
In the final step toward matching the European Union's recent
"jim bell" [EMAIL PROTECTED] wrote:
I need an estimate of the cost to break a 1024-bit PGP key in 1997, given
then-existing algorithms and hardware, etc.
"There are some things that money can't buy."
Would you like an estimate of the cost to break into somebody's house
and copy the secret
The women in Michigan did it, the women in Penn. did it,
the women in Fla. did it. Wake up punks, it's the wimmens.
They rule.
MacN
They need raping.
No User [EMAIL PROTECTED] wrote:
A history professor from Uppsala Universitet in Sweden, called to
tell me about this article she had read
Uppsala Universitet has no female history professors. Sorry.
Bill Stewart wrote:
The "bunch of elementary school kids had no trouble" press release
is fun, but bogus. If the teacher had told the kids
"Vote for Gore and Lieberman" instead of "Vote for Gore",
they'd have been much more likely to make a mistake.
More likely, maybe, but not "much more
Frankly, I think much of Al Gores desperation comes from his
Tim,
---
! !
! !
! !
! !
! !
!! !!
!!! !!--
Well, not crypto but stego.
I was looking for ways to use existing infrastructure for
transporting ascii messages to send info which is not
harvestable by machines.
This came up:
It is intended for cross-eyed free viewing. Cross your eyes until the
Vs and Xs at the top and bottom overlap with
By Dan Vergano, USA TODAY
Scientists have unveiled a miniature device that emits light particles, or photons,
one at a time, an accomplishment which could pave the way for impregnable coded
messages and electronic commerce in coming decades.
In theory, such a single light particle offers
Sampo A Syreeni [EMAIL PROTECTED] wrote:
Just by the way, how widespread is this use of the word 'geodesic'?
Not very, I think. It seems it's RAH's specialty. It's quite poetic,
actually.
http://www.google.com/search?q="geodesic+economy"+-hettinga+-shipwright
Linkname: David J. Phillips
http://www.jewishworldreview.com/cols/williams1.asp
"Me" [EMAIL PROTECTED] wrote:
- Original Message -
From: "sparky" [EMAIL PROTECTED]
http://www.opposeashcroft.com
I'm not trying to get people into any arguments here.. I
thought this
might be appropriate since people here are concerned with civil
rights.
Quite right, I am
-BEGIN PGP SIGNED MESSAGE-
[EMAIL PROTECTED] (Aimee Elizabeth Farr) recited:
Of course, you have all watched this battle for many years, so you
have a longevity of insight that I don't have. Probably just the
same-ole-same-ole to you...
Believe me, you have NO idea.
Then, [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Perhaps...
Still what of this?
And of what form? Persephone, Demeter?
And would she be so fortunate to find herself an initiant
into the Eleusinian mysteries...? There are only three modern
cults of Demeter which remain and two of them have quickly
become
I think it might have something to do with the fact that we rarely see
females posting on cypherpunks.
But let's see her use a TYPE II remailer, yeah !
I found out that Worldtravel had moved my flight to a Tuesday departure
that would get into the city that afternoon, *after* the proceedings had
begun. That could (understandably) piss off the judge -- I'd be violating a
This is my worst nightmare.
We are ruled by infantile idiots.
Oh, the
How do we expect to even find them, when they're using mixmasters to
remain anonymous? Do you know what a mixmaster is? This is exactly the
problem.
from "Can hackers help stop child porn on the Net?"
I see now, this is why ICC is enlisting cypherpunks.
---
High Co
In view of the recent gimme-the-logs-or-we-fuck-you activities
of armed men
(http://www.indymedia.org/front.php3?article_id=36912group=webcast ,
http://seattle.indymedia.org/display.php3?article_id=3013 )
what would be the legal consequence of the following:
1. A virus is designed that spreads
new features coming to a mobile phone near you interesting: the subscriber's
telephony provider will be able to initiate outbound calls via a request
over SMS and even will be able to access the user's phone directory without
user approval or notification. Nobody at this meeting that I could
There is some traffic on sci.crypt about cloakware, which apparently
transforms executables into semantically equivalent but very removed from
the human-interface flow, in order to make reverse-engineering and mods
more difficult.
Does anyone have more insight into this ?
sci.crypt:
It seems
So we see things like "Freedom", "Harmless Little Project" -- trying
to use persuade the governments to propose "banning freedom".
Small s/w cos (ie. ZKS/HavenCo) or cult movements (ie. FSF/GNU/Linux) do
not have talent and cannot afford to hire good social engineers. Talented
social engineers
This is the UNIX version of the
"ILOVEYOU" worm, which works
on the honor system.
If you receive this email, delete
a bunch of GIFs, MP3s, and binaries
from your home directory, then
send a copy of this email to everyone
you know.
Perhaps one of the helpful lurking LEOs (Hi Jeff!) can answer a question
or two:
Is the age of a person relevant when deciding whether or not to string
them up for possessing naughty pictures of young hard bodies? What about
the source of said porn?
Examples:
- One of the numerous 13-yr-old
Since no timely announcement from usual sources was detected,
why not meet in San Francisco, Golden Gate Park, 9th and Lincoln,
create an ad hoc agenda and beat it till dinner time.
If the original Freedom product is:
a. as unbreakable/untraceable as was originally planned (verdict is out, IMO)
and
b. is continued to be supported and distributed
then why would the new "trusted third parties" system be needed?
Risking to fall into the doomsayer trap, I would call this a
Gadhafi advises US power sharing
Sunday, 26 November 2000 16:09 (ET)
Gadhafi advises US power sharing
By SADEK al-TARHUNI
TRIPOLI, Libya, Nov. 26 (UPI) -- Libyan leader Col. Moammar Gadhafi has
advised the United States to split the presidency between Democrat
candidate Al Gore and
configuration options
supported by this remailer, use the subject: remailer-conf
$remailer{"bruble2"} = "[EMAIL PROTECTED] cpunk mix hybrid middle pgp pgponly latent
ek ekx esub cut hash repgp remix ext max test inflt150 rhop5 klen400";
Public keys for the remailer:
RSA Key
0x
60 matches
Mail list logo