On 11/26/06, R.A. Hettinga <rah@shipwright.com> wrote:
At 8:11 PM -0500 11/26/06, Ulex Europae (yeah, *right*...) wrote:
Oh goody, someone looked that up. I chose that nym carefully, of course it isn't my real name. Why should you think it would be?
Our rights.
:-).
Funniest thing I've heard on this list in years. Exactly how did you get a "right" to someone else's work?
You didn't follow the link and read the rest of the quote, did you? What makes you think I was speaking only of code?
"When the hares made speeches in the assembly and demanded that all should have equality, the lions replied, "Where are your claws and teeth?" -- attributed to Antisthenes in Aristotle, 'Politics', 3.7.2
Yes, and Stalin dismissively asked an advisor how many divisions the Pope had. You aren't really advancing a might-makes-right argument are you? It doesn't always work that way RAH, you ought to know that by now.
It's hard to remember, but cypherpunks write code. Well, most of us do. :-)
Their own code.
You want code, you write it.
Yes, you've advanced that notion before. That sort of penurious antipathy is why encrypted communications as a matter of course will never catch on. Not among the masses where it is most needed. Outside of a few specialized transactions of the financial nature, which is not at all what cypherpunkism is really about. Or at least, what it used to be about. --Ulex
On 11/26/06, Ulex Europae <europus@gmail.com> wrote:
On 11/26/06, R.A. Hettinga <rah@shipwright.com> wrote:
... It's hard to remember, but cypherpunks write code. Well, most of us do. :-)
Their own code.
You want code, you write it.
Yes, you've advanced that notion before. That sort of penurious antipathy is why encrypted communications as a matter of course will never catch on.
nah, that only means the masses won't be coding their own anonymity and privacy systems, which is a good thing (the masses would fuck it up with impressive ROT13 style). this also means that the developers who can scratch this itch (a usable, secure, and windows application) are going to be fewer and far between. don't fret, it only takes one to code it and then all your seething masses can steep themselves in the hedonistic pleasures of anonymity and privacy in their familiar environments. and last but not least, regarding RAH's virtuous invitation to sling a little logic yourself: bitching on a mailing list about the platform specific deficiencies of anonymity/privacy software is not likely to conjure up one of these "usable, secure, windows capable" developers anxious to pleasure your impatient expectations of convenience. teaching yourself how to build secure privacy systems [0][1] so you can meet these wants with your own effort is more likely to result in the outcome you seek. with that colorful retort out of the way, you are absolutely correct about the usability and integration aspects of a given system affecting penetration in target user base and the actual security provided [2]. as was mentioned earlier, a virtual machine to host a well tested, robust installation of unix'y network intensive applications on windows is a compromise that often keeps both parties happy. there really is no good answer if you have to rely on the windows TCP stack under load, especially for non server flavors of windows (that is, even overlapped i/o will run into problems: about ~4,000 sockets last time i tested on xp pro). we used this virtual machine approach in janusvm [3], and tried to focus on good usability via two methods: a.) trimming the install process down as simple as possible (could be better. vmware requested we cease distribution of the combined janusvm+player+one-click-installer due to their licensing terms on the player distribution) b.) performing all of the anonymous Tor proxy of traffic transparently at the network level using a default PPTP VPN route through the virtual machine. the user feedback has been positive, since this obviates the need for error prone and tedious application specific configuration to use Tor, and avoids leaking information when a plug-in or scripting facility has the ability to bypass application proxy settings or is not resolving addresses via SOCKSv4a / MapAddr. (not to mention that some applications which don't even support SOCKS or HTTP proxies can now use Tor) "encrypted communications as a matter of course" is not yet dead. it's just taking a little longer than anyone expected back when the battle was raging over cipher implementations and encrypted network protocols with nary a thought to end user experience. best regards, 0. "Secure Programming for Linux and Unix HOWTO -- Creating Secure Software" http://www.dwheeler.com/secure-programs/ 1. "Anonymity bibliography" http://freehaven.net/anonbib/ 2. "Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 (1999)" http://citeseer.ist.psu.edu/whitten99why.html 3. JanusVM http://janusvm.peertech.org/ [yes, this dc14 release is old, but it's held up well and we will have a new version in january. (and yes, it made it through dc14 open wireless use without a scratch. we should have clued in the sheeps on the wall... ;) ]
At 11:13 PM -0500 11/26/06, Ulex "Europae" (s/b Ulex europaeus, a small highland shrub; maybe it's trying to speak in the royal 'we', but more likely Yet Another EuroLefty, apparently of the Scottish* variety) wrote:
You aren't really advancing a might-makes-right argument are you?
Might makes *fact*. "Right" is a fact made palatable by rationalization. When facts change, ethics change. If you don't believe that, you haven't read enough history yet. Physics causes finance, which causes philosophy; ethics in this particular case.
penurious antipathy
Blah, blah, blah. Go back under your bridge, troll. Or at least masturbate about your "rights" on a list where people give a damn. Again, for the groundlings, at least, since shrubbery doesn't have ears: When the market needs ubiquitous easy-to-use encryption it'll get it. When that's the case nothing the state can do will "repress" it. And, when somebody writes code worthy of being ubiquitous and easy-to-use, there's nothing the market will be able do to "repress" it, either. And somebody will get rich writing it, because the market will pay for it. So, take your shot, um, Mr. Shrub, and *write* the code you want. Until then, stop bleating around here about your "rights", and how other people should do your work for you for free. Cheers, RAH *<http://en.wikipedia.org/wiki/Gorse> -- ----------------- R. A. Hettinga <mailto: rah@ibuc.com> The Internet Bearer Underwriting Corporation <http://www.ibuc.com/> 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Might makes *fact*.
Who said that, Rumsfeld circa 04? _________________________________________________________________ Share your latest news with your friends with the Windows Live Spaces friends module. http://clk.atdmt.com/MSN/go/msnnkwsp0070000001msn/direct/01/?href=http://spaces.live.com/spacesapi.aspx?wx_action=create&wx_url=/friends.aspx&mk
participants (4)
-
coderman
-
R.A. Hettinga
-
Tyler Durden
-
Ulex Europae